Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
gfehgfwveg.exe

Overview

General Information

Sample name:gfehgfwveg.exe
Analysis ID:1580519
MD5:43ec2649e1b173b6e8b3800e18cceeb4
SHA1:e864b2d11a7c9c7497b22af930b31db1e2061244
SHA256:4e906e880e35e4bc0de7e9375fc0feb5757374ca0bb628dff6366174536d6183
Tags:exeuser-SquiblydooBlog
Infos:

Detection

DanaBot
Score:88
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected DanaBot stealer dll
AI detected suspicious sample
Machine Learning detection for sample
May use the Tor software to hide its network traffic
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
Contains functionality to query locales information (e.g. system language)
Creates a process in suspended mode (likely to inject code)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Internet Provider seen in connection with other malware
PE file contains more sections than normal
PE file contains sections with non-standard names
Potential time zone aware malware
Program does not show much activity (idle)
Queries information about the installed CPU (vendor, model number etc)
Queries the installation date of Windows
Queries the product ID of Windows
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Yara detected Credential Stealer

Classification

  • System is w10x64
  • gfehgfwveg.exe (PID: 3948 cmdline: "C:\Users\user\Desktop\gfehgfwveg.exe" MD5: 43EC2649E1B173B6E8B3800E18CCEEB4)
    • cmd.exe (PID: 5908 cmdline: cmd.exe /C wmic diskdrive where "DeviceID=\'c:\'" get SerialNumber /value MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 2876 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • WMIC.exe (PID: 6520 cmdline: wmic diskdrive where "DeviceID=\'c:\'" get SerialNumber /value MD5: E2DE6500DE1148C7F6027AD50AC8B891)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
DanaBotProofpoints describes DanaBot as the latest example of malware focused on persistence and stealing useful information that can later be monetized rather than demanding an immediate ransom from victims. The social engineering in the low-volume DanaBot campaigns we have observed so far has been well-crafted, again pointing to a renewed focus on quality over quantity in email-based threats. DanaBots modular nature enables it to download additional components, increasing the flexibility and robust stealing and remote monitoring capabilities of this banker.
  • SCULLY SPIDER
https://malpedia.caad.fkie.fraunhofer.de/details/win.danabot
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000003.2072119961.000000007E960000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_DanaBot_stealer_dllYara detected DanaBot stealer dllJoe Security
    00000000.00000002.3883206719.0000000003039000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000000.00000002.3883206719.0000000003039000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_DanaBot_stealer_dllYara detected DanaBot stealer dllJoe Security
        Process Memory Space: gfehgfwveg.exe PID: 3948JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          Process Memory Space: gfehgfwveg.exe PID: 3948JoeSecurity_DanaBot_stealer_dllYara detected DanaBot stealer dllJoe Security
            No Sigma rule has matched
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-12-24T20:58:13.887150+010020344651Malware Command and Control Activity Detected192.168.2.54983034.34.145.103443TCP
            2024-12-24T20:58:14.953488+010020344651Malware Command and Control Activity Detected192.168.2.54983134.169.99.17443TCP
            2024-12-24T20:58:16.044840+010020344651Malware Command and Control Activity Detected192.168.2.54983534.83.67.185443TCP
            2024-12-24T20:58:17.119157+010020344651Malware Command and Control Activity Detected192.168.2.54983835.195.45.98443TCP
            2024-12-24T20:59:18.664291+010020344651Malware Command and Control Activity Detected192.168.2.54998134.34.145.103443TCP
            2024-12-24T20:59:20.009982+010020344651Malware Command and Control Activity Detected192.168.2.54998534.169.99.17443TCP
            2024-12-24T20:59:21.083789+010020344651Malware Command and Control Activity Detected192.168.2.54998834.83.67.185443TCP
            2024-12-24T20:59:22.135469+010020344651Malware Command and Control Activity Detected192.168.2.54999135.195.45.98443TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: gfehgfwveg.exeAvira: detected
            Source: gfehgfwveg.exeReversingLabs: Detection: 55%
            Source: Yara matchFile source: 00000000.00000003.2072119961.000000007E960000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.3883206719.0000000003039000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: gfehgfwveg.exe PID: 3948, type: MEMORYSTR
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 98.5% probability
            Source: gfehgfwveg.exeJoe Sandbox ML: detected
            Source: gfehgfwveg.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
            Source: C:\Users\user\Desktop\gfehgfwveg.exeCode function: 0_2_0302E190 FindFirstFileW,FindClose,0_2_0302E190
            Source: C:\Users\user\Desktop\gfehgfwveg.exeCode function: 0_2_0302DBC4 GetModuleHandleW,GetProcAddress,FindFirstFileW,FindClose,lstrlenW,lstrlenW,0_2_0302DBC4

            Networking

            barindex
            Source: Network trafficSuricata IDS: 2034465 - Severity 1 - ET MALWARE Danabot Key Exchange Request : 192.168.2.5:49830 -> 34.34.145.103:443
            Source: Network trafficSuricata IDS: 2034465 - Severity 1 - ET MALWARE Danabot Key Exchange Request : 192.168.2.5:49831 -> 34.169.99.17:443
            Source: Network trafficSuricata IDS: 2034465 - Severity 1 - ET MALWARE Danabot Key Exchange Request : 192.168.2.5:49838 -> 35.195.45.98:443
            Source: Network trafficSuricata IDS: 2034465 - Severity 1 - ET MALWARE Danabot Key Exchange Request : 192.168.2.5:49835 -> 34.83.67.185:443
            Source: Network trafficSuricata IDS: 2034465 - Severity 1 - ET MALWARE Danabot Key Exchange Request : 192.168.2.5:49981 -> 34.34.145.103:443
            Source: Network trafficSuricata IDS: 2034465 - Severity 1 - ET MALWARE Danabot Key Exchange Request : 192.168.2.5:49988 -> 34.83.67.185:443
            Source: Network trafficSuricata IDS: 2034465 - Severity 1 - ET MALWARE Danabot Key Exchange Request : 192.168.2.5:49991 -> 35.195.45.98:443
            Source: Network trafficSuricata IDS: 2034465 - Severity 1 - ET MALWARE Danabot Key Exchange Request : 192.168.2.5:49985 -> 34.169.99.17:443
            Source: Joe Sandbox ViewASN Name: ATGS-MMD-ASUS ATGS-MMD-ASUS
            Source: Joe Sandbox ViewASN Name: ATGS-MMD-ASUS ATGS-MMD-ASUS
            Source: unknownTCP traffic detected without corresponding DNS query: 34.34.145.103
            Source: unknownTCP traffic detected without corresponding DNS query: 34.34.145.103
            Source: unknownTCP traffic detected without corresponding DNS query: 34.34.145.103
            Source: unknownTCP traffic detected without corresponding DNS query: 34.34.145.103
            Source: unknownTCP traffic detected without corresponding DNS query: 34.169.99.17
            Source: unknownTCP traffic detected without corresponding DNS query: 34.169.99.17
            Source: unknownTCP traffic detected without corresponding DNS query: 34.169.99.17
            Source: unknownTCP traffic detected without corresponding DNS query: 34.169.99.17
            Source: unknownTCP traffic detected without corresponding DNS query: 34.83.67.185
            Source: unknownTCP traffic detected without corresponding DNS query: 34.83.67.185
            Source: unknownTCP traffic detected without corresponding DNS query: 34.83.67.185
            Source: unknownTCP traffic detected without corresponding DNS query: 34.83.67.185
            Source: unknownTCP traffic detected without corresponding DNS query: 35.195.45.98
            Source: unknownTCP traffic detected without corresponding DNS query: 35.195.45.98
            Source: unknownTCP traffic detected without corresponding DNS query: 35.195.45.98
            Source: unknownTCP traffic detected without corresponding DNS query: 35.195.45.98
            Source: unknownTCP traffic detected without corresponding DNS query: 34.34.145.103
            Source: unknownTCP traffic detected without corresponding DNS query: 34.34.145.103
            Source: unknownTCP traffic detected without corresponding DNS query: 34.34.145.103
            Source: unknownTCP traffic detected without corresponding DNS query: 34.34.145.103
            Source: unknownTCP traffic detected without corresponding DNS query: 34.169.99.17
            Source: unknownTCP traffic detected without corresponding DNS query: 34.169.99.17
            Source: unknownTCP traffic detected without corresponding DNS query: 34.169.99.17
            Source: unknownTCP traffic detected without corresponding DNS query: 34.83.67.185
            Source: unknownTCP traffic detected without corresponding DNS query: 34.83.67.185
            Source: unknownTCP traffic detected without corresponding DNS query: 34.83.67.185
            Source: unknownTCP traffic detected without corresponding DNS query: 34.83.67.185
            Source: unknownTCP traffic detected without corresponding DNS query: 35.195.45.98
            Source: unknownTCP traffic detected without corresponding DNS query: 35.195.45.98
            Source: unknownTCP traffic detected without corresponding DNS query: 35.195.45.98
            Source: unknownTCP traffic detected without corresponding DNS query: 35.195.45.98
            Source: unknownTCP traffic detected without corresponding DNS query: 34.34.145.103
            Source: unknownTCP traffic detected without corresponding DNS query: 34.34.145.103
            Source: unknownTCP traffic detected without corresponding DNS query: 34.34.145.103
            Source: unknownTCP traffic detected without corresponding DNS query: 34.34.145.103
            Source: unknownTCP traffic detected without corresponding DNS query: 34.169.99.17
            Source: unknownTCP traffic detected without corresponding DNS query: 34.169.99.17
            Source: unknownTCP traffic detected without corresponding DNS query: 34.169.99.17
            Source: unknownTCP traffic detected without corresponding DNS query: 34.169.99.17
            Source: unknownTCP traffic detected without corresponding DNS query: 34.83.67.185
            Source: unknownTCP traffic detected without corresponding DNS query: 34.83.67.185
            Source: unknownTCP traffic detected without corresponding DNS query: 34.83.67.185
            Source: unknownTCP traffic detected without corresponding DNS query: 34.83.67.185
            Source: unknownTCP traffic detected without corresponding DNS query: 35.195.45.98
            Source: unknownTCP traffic detected without corresponding DNS query: 35.195.45.98
            Source: unknownTCP traffic detected without corresponding DNS query: 35.195.45.98
            Source: unknownTCP traffic detected without corresponding DNS query: 35.195.45.98
            Source: unknownTCP traffic detected without corresponding DNS query: 34.34.145.103
            Source: unknownTCP traffic detected without corresponding DNS query: 34.34.145.103
            Source: unknownTCP traffic detected without corresponding DNS query: 34.34.145.103
            Source: gfehgfwveg.exe, 00000000.00000003.2072119961.000000007E960000.00000004.00001000.00020000.00000000.sdmp, gfehgfwveg.exe, 00000000.00000002.3883206719.0000000003039000.00000040.00001000.00020000.00000000.sdmpString found in binary or memory: http://.css
            Source: gfehgfwveg.exe, 00000000.00000003.2072119961.000000007E960000.00000004.00001000.00020000.00000000.sdmp, gfehgfwveg.exe, 00000000.00000002.3883206719.0000000003039000.00000040.00001000.00020000.00000000.sdmpString found in binary or memory: http://.jpg
            Source: gfehgfwveg.exe, 00000000.00000003.2072119961.000000007E960000.00000004.00001000.00020000.00000000.sdmp, gfehgfwveg.exe, 00000000.00000002.3883206719.0000000003039000.00000040.00001000.00020000.00000000.sdmpString found in binary or memory: http://html4/loose.dtd
            Source: gfehgfwveg.exe, 00000000.00000002.3889930307.000000006E66F000.00000040.00001000.00020000.00000000.sdmp, gfehgfwveg.exe, 00000000.00000002.3888275981.0000000063469000.00000040.00001000.00020000.00000000.sdmp, gfehgfwveg.exe, 00000000.00000003.2080229872.000000007EB1A000.00000004.00001000.00020000.00000000.sdmp, gfehgfwveg.exe, 00000000.00000003.2075649868.000000007EB44000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.openssl.org/V
            Source: gfehgfwveg.exe, 00000000.00000003.2074901686.000000007ECF0000.00000004.00001000.00020000.00000000.sdmp, gfehgfwveg.exe, 00000000.00000002.3888275981.0000000063281000.00000040.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.openssl.org/support/faq.html
            Source: gfehgfwveg.exe, 00000000.00000003.2074901686.000000007ECF0000.00000004.00001000.00020000.00000000.sdmp, gfehgfwveg.exe, 00000000.00000002.3888275981.0000000063281000.00000040.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.openssl.org/support/faq.htmlRAND
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49843
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49985
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49841
            Source: unknownNetwork traffic detected: HTTP traffic on port 49838 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49840
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49981
            Source: unknownNetwork traffic detected: HTTP traffic on port 49840 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49831 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49839
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49838
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49835
            Source: unknownNetwork traffic detected: HTTP traffic on port 49841 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49831
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49830
            Source: unknownNetwork traffic detected: HTTP traffic on port 49839 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49843 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49991
            Source: unknownNetwork traffic detected: HTTP traffic on port 49835 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49988 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49985 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49981 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49830 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
            Source: unknownNetwork traffic detected: HTTP traffic on port 49991 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49988

            E-Banking Fraud

            barindex
            Source: Yara matchFile source: 00000000.00000003.2072119961.000000007E960000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.3883206719.0000000003039000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: gfehgfwveg.exe PID: 3948, type: MEMORYSTR
            Source: C:\Users\user\Desktop\gfehgfwveg.exeCode function: 0_2_034E525C LoadLibraryA,GetProcAddress,NtQueryVirtualMemory,NtQueryVirtualMemory,0_2_034E525C
            Source: gfehgfwveg.exeStatic PE information: Number of sections : 11 > 10
            Source: gfehgfwveg.exe, 00000000.00000002.3889930307.000000006E66F000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamessleay32.dllH vs gfehgfwveg.exe
            Source: gfehgfwveg.exe, 00000000.00000002.3888275981.0000000063469000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelibeay32.dllH vs gfehgfwveg.exe
            Source: gfehgfwveg.exe, 00000000.00000003.2080229872.000000007EB1A000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamessleay32.dllH vs gfehgfwveg.exe
            Source: gfehgfwveg.exe, 00000000.00000002.3881473973.00000000025D8000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamekernel32j% vs gfehgfwveg.exe
            Source: gfehgfwveg.exe, 00000000.00000003.2075649868.000000007EB44000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelibeay32.dllH vs gfehgfwveg.exe
            Source: gfehgfwveg.exe, 00000000.00000002.3886606090.0000000003824000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamekernel32j% vs gfehgfwveg.exe
            Source: gfehgfwveg.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
            Source: classification engineClassification label: mal88.troj.evad.winEXE@6/0@0/4
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2876:120:WilError_03
            Source: C:\Users\user\Desktop\gfehgfwveg.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
            Source: C:\Users\user\Desktop\gfehgfwveg.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
            Source: C:\Users\user\Desktop\gfehgfwveg.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
            Source: C:\Users\user\Desktop\gfehgfwveg.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
            Source: C:\Users\user\Desktop\gfehgfwveg.exeFile read: C:\Users\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\gfehgfwveg.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: gfehgfwveg.exe, 00000000.00000003.2072119961.000000007E960000.00000004.00001000.00020000.00000000.sdmp, gfehgfwveg.exe, 00000000.00000002.3883206719.0000000003039000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
            Source: gfehgfwveg.exe, 00000000.00000003.2072119961.000000007E960000.00000004.00001000.00020000.00000000.sdmp, gfehgfwveg.exe, 00000000.00000002.3883206719.0000000003039000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
            Source: gfehgfwveg.exe, 00000000.00000003.2072119961.000000007E960000.00000004.00001000.00020000.00000000.sdmp, gfehgfwveg.exe, 00000000.00000002.3883206719.0000000003039000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
            Source: gfehgfwveg.exe, 00000000.00000003.2072119961.000000007E960000.00000004.00001000.00020000.00000000.sdmp, gfehgfwveg.exe, 00000000.00000002.3883206719.0000000003039000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q COLLATE nocase AND (type='table' OR type='index' OR type='trigger');
            Source: gfehgfwveg.exeReversingLabs: Detection: 55%
            Source: unknownProcess created: C:\Users\user\Desktop\gfehgfwveg.exe "C:\Users\user\Desktop\gfehgfwveg.exe"
            Source: C:\Users\user\Desktop\gfehgfwveg.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C wmic diskdrive where "DeviceID=\'c:\'" get SerialNumber /value
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe wmic diskdrive where "DeviceID=\'c:\'" get SerialNumber /value
            Source: C:\Users\user\Desktop\gfehgfwveg.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C wmic diskdrive where "DeviceID=\'c:\'" get SerialNumber /valueJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe wmic diskdrive where "DeviceID=\'c:\'" get SerialNumber /valueJump to behavior
            Source: C:\Users\user\Desktop\gfehgfwveg.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\gfehgfwveg.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\gfehgfwveg.exeSection loaded: netapi32.dllJump to behavior
            Source: C:\Users\user\Desktop\gfehgfwveg.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\Desktop\gfehgfwveg.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Users\user\Desktop\gfehgfwveg.exeSection loaded: winmmbase.dllJump to behavior
            Source: C:\Users\user\Desktop\gfehgfwveg.exeSection loaded: mmdevapi.dllJump to behavior
            Source: C:\Users\user\Desktop\gfehgfwveg.exeSection loaded: devobj.dllJump to behavior
            Source: C:\Users\user\Desktop\gfehgfwveg.exeSection loaded: ksuser.dllJump to behavior
            Source: C:\Users\user\Desktop\gfehgfwveg.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\gfehgfwveg.exeSection loaded: avrt.dllJump to behavior
            Source: C:\Users\user\Desktop\gfehgfwveg.exeSection loaded: audioses.dllJump to behavior
            Source: C:\Users\user\Desktop\gfehgfwveg.exeSection loaded: powrprof.dllJump to behavior
            Source: C:\Users\user\Desktop\gfehgfwveg.exeSection loaded: umpdc.dllJump to behavior
            Source: C:\Users\user\Desktop\gfehgfwveg.exeSection loaded: msacm32.dllJump to behavior
            Source: C:\Users\user\Desktop\gfehgfwveg.exeSection loaded: midimap.dllJump to behavior
            Source: C:\Users\user\Desktop\gfehgfwveg.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\gfehgfwveg.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\gfehgfwveg.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\gfehgfwveg.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\gfehgfwveg.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Users\user\Desktop\gfehgfwveg.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\Desktop\gfehgfwveg.exeSection loaded: wsock32.dllJump to behavior
            Source: C:\Users\user\Desktop\gfehgfwveg.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\gfehgfwveg.exeSection loaded: rasapi32.dllJump to behavior
            Source: C:\Users\user\Desktop\gfehgfwveg.exeSection loaded: rasman.dllJump to behavior
            Source: C:\Users\user\Desktop\gfehgfwveg.exeSection loaded: samcli.dllJump to behavior
            Source: C:\Users\user\Desktop\gfehgfwveg.exeSection loaded: avifil32.dllJump to behavior
            Source: C:\Users\user\Desktop\gfehgfwveg.exeSection loaded: msvfw32.dllJump to behavior
            Source: C:\Users\user\Desktop\gfehgfwveg.exeSection loaded: cryptui.dllJump to behavior
            Source: C:\Users\user\Desktop\gfehgfwveg.exeSection loaded: wtsapi32.dllJump to behavior
            Source: C:\Users\user\Desktop\gfehgfwveg.exeSection loaded: pstorec.dllJump to behavior
            Source: C:\Users\user\Desktop\gfehgfwveg.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\gfehgfwveg.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\gfehgfwveg.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Users\user\Desktop\gfehgfwveg.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\gfehgfwveg.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Desktop\gfehgfwveg.exeSection loaded: winsta.dllJump to behavior
            Source: C:\Users\user\Desktop\gfehgfwveg.exeSection loaded: firewallapi.dllJump to behavior
            Source: C:\Users\user\Desktop\gfehgfwveg.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\Desktop\gfehgfwveg.exeSection loaded: fwbase.dllJump to behavior
            Source: C:\Users\user\Desktop\gfehgfwveg.exeSection loaded: sxs.dllJump to behavior
            Source: C:\Users\user\Desktop\gfehgfwveg.exeSection loaded: fwpolicyiomgr.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: framedynos.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: msxml6.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: vcruntime140.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\gfehgfwveg.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BCDE0395-E52F-467C-8E3D-C4579291692E}\InprocServer32Jump to behavior
            Source: C:\Users\user\Desktop\gfehgfwveg.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOwnerJump to behavior
            Source: gfehgfwveg.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
            Source: gfehgfwveg.exeStatic file information: File size 4276224 > 1048576
            Source: gfehgfwveg.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x3ec600
            Source: C:\Users\user\Desktop\gfehgfwveg.exeCode function: 0_2_034E525C LoadLibraryA,GetProcAddress,NtQueryVirtualMemory,NtQueryVirtualMemory,0_2_034E525C
            Source: gfehgfwveg.exeStatic PE information: section name: .didata

            Hooking and other Techniques for Hiding and Protection

            barindex
            Source: gfehgfwveg.exe, 00000000.00000002.3883206719.0000000003039000.00000040.00001000.00020000.00000000.sdmp, gfehgfwveg.exe, 00000000.00000003.2071863727.000000007E870000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: torConnect
            Source: C:\Users\user\Desktop\gfehgfwveg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\gfehgfwveg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\gfehgfwveg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT SerialNumber FROM Win32_DiskDrive WHERE DeviceID=\&apos;c:\&apos;
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT SerialNumber FROM Win32_DiskDrive WHERE DeviceID=\&apos;c:\&apos;
            Source: C:\Users\user\Desktop\gfehgfwveg.exeWindow / User API: threadDelayed 9217Jump to behavior
            Source: C:\Users\user\Desktop\gfehgfwveg.exeWindow / User API: threadDelayed 783Jump to behavior
            Source: C:\Users\user\Desktop\gfehgfwveg.exeSystem information queried: CurrentTimeZoneInformationJump to behavior
            Source: C:\Users\user\Desktop\gfehgfwveg.exeSystem information queried: CurrentTimeZoneInformationJump to behavior
            Source: C:\Users\user\Desktop\gfehgfwveg.exeSystem information queried: CurrentTimeZoneInformationJump to behavior
            Source: C:\Users\user\Desktop\gfehgfwveg.exeSystem information queried: CurrentTimeZoneInformationJump to behavior
            Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
            Source: C:\Users\user\Desktop\gfehgfwveg.exeCode function: 0_2_0302E190 FindFirstFileW,FindClose,0_2_0302E190
            Source: C:\Users\user\Desktop\gfehgfwveg.exeCode function: 0_2_0302DBC4 GetModuleHandleW,GetProcAddress,FindFirstFileW,FindClose,lstrlenW,lstrlenW,0_2_0302DBC4
            Source: gfehgfwveg.exe, 00000000.00000003.2082354644.0000000000AB4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
            Source: gfehgfwveg.exe, 00000000.00000002.3880702296.0000000000A5E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
            Source: C:\Users\user\Desktop\gfehgfwveg.exeAPI call chain: ExitProcess graph end nodegraph_0-2563
            Source: C:\Windows\SysWOW64\wbem\WMIC.exeProcess information queried: ProcessInformationJump to behavior
            Source: C:\Users\user\Desktop\gfehgfwveg.exeCode function: 0_2_034E525C LoadLibraryA,GetProcAddress,NtQueryVirtualMemory,NtQueryVirtualMemory,0_2_034E525C
            Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
            Source: C:\Users\user\Desktop\gfehgfwveg.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C wmic diskdrive where "DeviceID=\'c:\'" get SerialNumber /valueJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe wmic diskdrive where "DeviceID=\'c:\'" get SerialNumber /valueJump to behavior
            Source: gfehgfwveg.exe, 00000000.00000002.3883206719.0000000003039000.00000040.00001000.00020000.00000000.sdmp, gfehgfwveg.exe, 00000000.00000003.2071863727.000000007E870000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: Shell_TrayWndTrayNotifyWndSysPagerToolbarWindow32U
            Source: gfehgfwveg.exe, 00000000.00000002.3883206719.0000000003039000.00000040.00001000.00020000.00000000.sdmp, gfehgfwveg.exe, 00000000.00000003.2071863727.000000007E870000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: explorer.exeShell_TrayWnd
            Source: C:\Users\user\Desktop\gfehgfwveg.exeCode function: GetUserDefaultUILanguage,GetLocaleInfoW,0_2_0302E2C8
            Source: C:\Users\user\Desktop\gfehgfwveg.exeCode function: IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_2_0302D768
            Source: C:\Users\user\Desktop\gfehgfwveg.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
            Source: C:\Users\user\Desktop\gfehgfwveg.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
            Source: C:\Users\user\Desktop\gfehgfwveg.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
            Source: C:\Users\user\Desktop\gfehgfwveg.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
            Source: C:\Users\user\Desktop\gfehgfwveg.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
            Source: C:\Users\user\Desktop\gfehgfwveg.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
            Source: C:\Users\user\Desktop\gfehgfwveg.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
            Source: C:\Users\user\Desktop\gfehgfwveg.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
            Source: C:\Users\user\Desktop\gfehgfwveg.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
            Source: C:\Users\user\Desktop\gfehgfwveg.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
            Source: C:\Users\user\Desktop\gfehgfwveg.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
            Source: C:\Users\user\Desktop\gfehgfwveg.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
            Source: C:\Users\user\Desktop\gfehgfwveg.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
            Source: C:\Users\user\Desktop\gfehgfwveg.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
            Source: C:\Users\user\Desktop\gfehgfwveg.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
            Source: C:\Users\user\Desktop\gfehgfwveg.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
            Source: C:\Users\user\Desktop\gfehgfwveg.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
            Source: C:\Users\user\Desktop\gfehgfwveg.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
            Source: C:\Users\user\Desktop\gfehgfwveg.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
            Source: C:\Users\user\Desktop\gfehgfwveg.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
            Source: C:\Users\user\Desktop\gfehgfwveg.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
            Source: C:\Users\user\Desktop\gfehgfwveg.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1Jump to behavior
            Source: C:\Users\user\Desktop\gfehgfwveg.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1Jump to behavior
            Source: C:\Users\user\Desktop\gfehgfwveg.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1Jump to behavior
            Source: C:\Users\user\Desktop\gfehgfwveg.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
            Source: C:\Users\user\Desktop\gfehgfwveg.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
            Source: C:\Users\user\Desktop\gfehgfwveg.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
            Source: C:\Users\user\Desktop\gfehgfwveg.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
            Source: C:\Users\user\Desktop\gfehgfwveg.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
            Source: C:\Users\user\Desktop\gfehgfwveg.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
            Source: C:\Users\user\Desktop\gfehgfwveg.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
            Source: C:\Users\user\Desktop\gfehgfwveg.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
            Source: C:\Users\user\Desktop\gfehgfwveg.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
            Source: C:\Users\user\Desktop\gfehgfwveg.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
            Source: C:\Users\user\Desktop\gfehgfwveg.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
            Source: C:\Users\user\Desktop\gfehgfwveg.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
            Source: C:\Users\user\Desktop\gfehgfwveg.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
            Source: C:\Users\user\Desktop\gfehgfwveg.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
            Source: C:\Users\user\Desktop\gfehgfwveg.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1Jump to behavior
            Source: C:\Users\user\Desktop\gfehgfwveg.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1Jump to behavior
            Source: C:\Users\user\Desktop\gfehgfwveg.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1Jump to behavior
            Source: C:\Users\user\Desktop\gfehgfwveg.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion InstallDateJump to behavior
            Source: C:\Users\user\Desktop\gfehgfwveg.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion ProductIdJump to behavior
            Source: C:\Users\user\Desktop\gfehgfwveg.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\gfehgfwveg.exeCode function: 0_2_034E583C GetVersionExW,GetVersionExW,LoadLibraryW,0_2_034E583C
            Source: C:\Users\user\Desktop\gfehgfwveg.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 00000000.00000003.2072119961.000000007E960000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.3883206719.0000000003039000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: gfehgfwveg.exe PID: 3948, type: MEMORYSTR
            Source: Yara matchFile source: 00000000.00000002.3883206719.0000000003039000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: gfehgfwveg.exe PID: 3948, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 00000000.00000003.2072119961.000000007E960000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.3883206719.0000000003039000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: gfehgfwveg.exe PID: 3948, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
            Windows Management Instrumentation
            1
            DLL Side-Loading
            12
            Process Injection
            1
            Virtualization/Sandbox Evasion
            OS Credential Dumping1
            System Time Discovery
            Remote ServicesData from Local System2
            Encrypted Channel
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault Accounts1
            Native API
            Boot or Logon Initialization Scripts1
            DLL Side-Loading
            12
            Process Injection
            LSASS Memory11
            Security Software Discovery
            Remote Desktop ProtocolData from Removable Media1
            Multi-hop Proxy
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
            DLL Side-Loading
            Security Account Manager1
            Virtualization/Sandbox Evasion
            SMB/Windows Admin SharesData from Network Shared Drive1
            Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS2
            Process Discovery
            Distributed Component Object ModelInput Capture1
            Proxy
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets1
            Application Window Discovery
            SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials1
            System Owner/User Discovery
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync2
            File and Directory Discovery
            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem153
            System Information Discovery
            Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            gfehgfwveg.exe55%ReversingLabsWin32.Trojan.Danabot
            gfehgfwveg.exe100%AviraTR/ATRAPS.Gen
            gfehgfwveg.exe100%Joe Sandbox ML
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            No contacted domains info
            NameSourceMaliciousAntivirus DetectionReputation
            http://html4/loose.dtdgfehgfwveg.exe, 00000000.00000003.2072119961.000000007E960000.00000004.00001000.00020000.00000000.sdmp, gfehgfwveg.exe, 00000000.00000002.3883206719.0000000003039000.00000040.00001000.00020000.00000000.sdmpfalse
              high
              http://www.openssl.org/support/faq.htmlRANDgfehgfwveg.exe, 00000000.00000003.2074901686.000000007ECF0000.00000004.00001000.00020000.00000000.sdmp, gfehgfwveg.exe, 00000000.00000002.3888275981.0000000063281000.00000040.00001000.00020000.00000000.sdmpfalse
                high
                http://.cssgfehgfwveg.exe, 00000000.00000003.2072119961.000000007E960000.00000004.00001000.00020000.00000000.sdmp, gfehgfwveg.exe, 00000000.00000002.3883206719.0000000003039000.00000040.00001000.00020000.00000000.sdmpfalse
                  high
                  http://www.openssl.org/Vgfehgfwveg.exe, 00000000.00000002.3889930307.000000006E66F000.00000040.00001000.00020000.00000000.sdmp, gfehgfwveg.exe, 00000000.00000002.3888275981.0000000063469000.00000040.00001000.00020000.00000000.sdmp, gfehgfwveg.exe, 00000000.00000003.2080229872.000000007EB1A000.00000004.00001000.00020000.00000000.sdmp, gfehgfwveg.exe, 00000000.00000003.2075649868.000000007EB44000.00000004.00001000.00020000.00000000.sdmpfalse
                    high
                    http://.jpggfehgfwveg.exe, 00000000.00000003.2072119961.000000007E960000.00000004.00001000.00020000.00000000.sdmp, gfehgfwveg.exe, 00000000.00000002.3883206719.0000000003039000.00000040.00001000.00020000.00000000.sdmpfalse
                      high
                      http://www.openssl.org/support/faq.htmlgfehgfwveg.exe, 00000000.00000003.2074901686.000000007ECF0000.00000004.00001000.00020000.00000000.sdmp, gfehgfwveg.exe, 00000000.00000002.3888275981.0000000063281000.00000040.00001000.00020000.00000000.sdmpfalse
                        high
                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs
                        IPDomainCountryFlagASNASN NameMalicious
                        35.195.45.98
                        unknownUnited States
                        15169GOOGLEUSfalse
                        34.83.67.185
                        unknownUnited States
                        15169GOOGLEUSfalse
                        34.34.145.103
                        unknownUnited States
                        2686ATGS-MMD-ASUStrue
                        34.169.99.17
                        unknownUnited States
                        2686ATGS-MMD-ASUStrue
                        Joe Sandbox version:41.0.0 Charoite
                        Analysis ID:1580519
                        Start date and time:2024-12-24 20:56:11 +01:00
                        Joe Sandbox product:CloudBasic
                        Overall analysis duration:0h 6m 5s
                        Hypervisor based Inspection enabled:false
                        Report type:full
                        Cookbook file name:default.jbs
                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                        Run name:Run with higher sleep bypass
                        Number of analysed new started processes analysed:7
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Sample name:gfehgfwveg.exe
                        Detection:MAL
                        Classification:mal88.troj.evad.winEXE@6/0@0/4
                        EGA Information:
                        • Successful, ratio: 100%
                        HCA Information:Failed
                        Cookbook Comments:
                        • Found application associated with file extension: .exe
                        • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                        • Sleep loops longer than 100000000ms are bypassed. Single calls with delay of 100000000ms and higher are ignored
                        • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                        • Excluded IPs from analysis (whitelisted): 20.12.23.50, 13.107.246.63
                        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                        • Not all processes where analyzed, report is missing behavior information
                        • Report size getting too big, too many NtEnumerateKey calls found.
                        • Report size getting too big, too many NtOpenKeyEx calls found.
                        • Report size getting too big, too many NtQueryValueKey calls found.
                        • VT rate limit hit for: gfehgfwveg.exe
                        No simulations
                        No context
                        No context
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        ATGS-MMD-ASUShttps://issuu.com/txbct.com/docs/navex_quote_65169.?fr=xKAE9_zU1NQGet hashmaliciousHTMLPhisherBrowse
                        • 34.36.49.68
                        loligang.spc.elfGet hashmaliciousMiraiBrowse
                        • 32.27.52.57
                        loligang.ppc.elfGet hashmaliciousMiraiBrowse
                        • 57.54.62.198
                        loligang.sh4.elfGet hashmaliciousMiraiBrowse
                        • 34.133.187.81
                        loligang.mpsl.elfGet hashmaliciousMiraiBrowse
                        • 48.209.59.149
                        loligang.arm7.elfGet hashmaliciousMiraiBrowse
                        • 57.210.138.22
                        loligang.arm.elfGet hashmaliciousMiraiBrowse
                        • 48.123.52.22
                        loligang.x86.elfGet hashmaliciousMiraiBrowse
                        • 48.168.135.209
                        armv7l.elfGet hashmaliciousMiraiBrowse
                        • 34.17.113.87
                        ATGS-MMD-ASUShttps://issuu.com/txbct.com/docs/navex_quote_65169.?fr=xKAE9_zU1NQGet hashmaliciousHTMLPhisherBrowse
                        • 34.36.49.68
                        loligang.spc.elfGet hashmaliciousMiraiBrowse
                        • 32.27.52.57
                        loligang.ppc.elfGet hashmaliciousMiraiBrowse
                        • 57.54.62.198
                        loligang.sh4.elfGet hashmaliciousMiraiBrowse
                        • 34.133.187.81
                        loligang.mpsl.elfGet hashmaliciousMiraiBrowse
                        • 48.209.59.149
                        loligang.arm7.elfGet hashmaliciousMiraiBrowse
                        • 57.210.138.22
                        loligang.arm.elfGet hashmaliciousMiraiBrowse
                        • 48.123.52.22
                        loligang.x86.elfGet hashmaliciousMiraiBrowse
                        • 48.168.135.209
                        armv7l.elfGet hashmaliciousMiraiBrowse
                        • 34.17.113.87
                        No context
                        No context
                        No created / dropped files found
                        File type:PE32 executable (GUI) Intel 80386, for MS Windows
                        Entropy (8bit):7.797143844212164
                        TrID:
                        • Win32 Executable (generic) a (10002005/4) 99.53%
                        • Win32 EXE PECompact compressed (generic) (41571/9) 0.41%
                        • Win16/32 Executable Delphi generic (2074/23) 0.02%
                        • Generic Win/DOS Executable (2004/3) 0.02%
                        • DOS Executable Generic (2002/1) 0.02%
                        File name:gfehgfwveg.exe
                        File size:4'276'224 bytes
                        MD5:43ec2649e1b173b6e8b3800e18cceeb4
                        SHA1:e864b2d11a7c9c7497b22af930b31db1e2061244
                        SHA256:4e906e880e35e4bc0de7e9375fc0feb5757374ca0bb628dff6366174536d6183
                        SHA512:83ec8f330986807a7b927c47f6becf26fd926bbfac096b9160c36e30c3a30fd7e05ebdef2556dc1aab3c61bf01e1f633ab6e9535440d95bdfcfa418bf139f086
                        SSDEEP:98304:nNLjlVuxN0obg4MLp6bsYOYQyLmZwPoyAkDnZ:n5lVuxNvglisVyLZPJDnZ
                        TLSH:9F16F122F64C667ED4AF0E395877B594583F77A1B99ADC1B47E0098CCE35880363A24F
                        File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
                        Icon Hash:00928e8e8686b000
                        Entrypoint:0x7eee00
                        Entrypoint Section:.itext
                        Digitally signed:false
                        Imagebase:0x400000
                        Subsystem:windows gui
                        Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                        DLL Characteristics:
                        Time Stamp:0x676AEC85 [Tue Dec 24 17:16:53 2024 UTC]
                        TLS Callbacks:
                        CLR (.Net) Version:
                        OS Version Major:5
                        OS Version Minor:0
                        File Version Major:5
                        File Version Minor:0
                        Subsystem Version Major:5
                        Subsystem Version Minor:0
                        Import Hash:29e05b1fea10173c5bcc5ba6150988ec
                        Instruction
                        push ebp
                        mov ebp, esp
                        add esp, FFFFFFE4h
                        xor eax, eax
                        mov dword ptr [ebp-1Ch], eax
                        mov dword ptr [ebp-18h], eax
                        mov eax, 007E9C9Ch
                        call 00007F2C2822CD6Dh
                        xor eax, eax
                        push ebp
                        push 007EEF1Dh
                        push dword ptr fs:[eax]
                        mov dword ptr fs:[eax], esp
                        call 00007F2C286058AAh
                        cmp eax, 000000FAh
                        jnl 00007F2C2860B762h
                        call 00007F2C286058F6h
                        cmp eax, 78h
                        jnl 00007F2C2860B754h
                        mov dword ptr [007FCFA0h], 00000001h
                        mov dword ptr [007FCF9Ch], 001DBCD7h
                        mov eax, dword ptr [007FCF9Ch]
                        mov dword ptr [007FCFA4h], eax
                        mov eax, dword ptr [007FCF9Ch]
                        test eax, eax
                        jl 00007F2C2860B6BEh
                        inc eax
                        mov dword ptr [ebp-14h], eax
                        mov dword ptr [007FCF98h], 00000000h
                        inc dword ptr [007FCFA0h]
                        dec dword ptr [007FCFA4h]
                        push 00000000h
                        call 00007F2C28244D69h
                        inc dword ptr [007FCF98h]
                        dec dword ptr [ebp-14h]
                        jne 00007F2C2860B674h
                        cmp dword ptr [007FCFA4h], FFFFFFFFh
                        jne 00007F2C2860B6F4h
                        lea edx, dword ptr [ebp-18h]
                        mov ax, 0063h
                        call 00007F2C28605BD1h
                        mov eax, dword ptr [ebp-18h]
                        mov edx, 007EEF38h
                        call 00007F2C2822729Ch
                        je 00007F2C2860B6D9h
                        call 00007F2C28605E11h
                        cmp eax, 0Ah
                        jbe 00007F2C2860B6CFh
                        call 00007F2C28615E27h
                        NameVirtual AddressVirtual Size Is in Section
                        IMAGE_DIRECTORY_ENTRY_EXPORT0x4000000x96.edata
                        IMAGE_DIRECTORY_ENTRY_IMPORT0x3fd0000x16c6.idata
                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x41d0000x3600.rsrc
                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x4030000x191c0.reloc
                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                        IMAGE_DIRECTORY_ENTRY_TLS0x4020000x18.rdata
                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IAT0x3fd4cc0x364.idata
                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x3ff0000x278.didata
                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                        .text0x10000x3ec5440x3ec600d7aefb5d6e6de984e994dc7c45754b87unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        .itext0x3ee0000xf500x1000aada5a4a7410fe967643c3d004a17c32False0.558349609375data6.162614752272672IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        .data0x3ef0000x7d680x7e0072410db874b473bfd55dbb3785831cd6False0.5638950892857143data6.356179507417859IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .bss0x3f70000x5fac0x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .idata0x3fd0000x16c60x1800f83dfbc7a8d8169726b5b3aba8787951False0.3240559895833333data4.895786587173563IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .didata0x3ff0000x2780x4007a0cace727c21d6b42ac476919254aa3False0.26953125firmware 100 v0 (revision 2733719296) X\361? , version 54304.16640.10270 (region 2297446144), 0 bytes or less, UNKNOWN1 0x88f03f00, at 0 0 bytes , at 0 0 bytes , at 0x60524000 3629203456 bytes2.7239518130953684IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .edata0x4000000x960x20009704f1006f905baccdf053cd9af9689False0.248046875data1.738190464085354IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .tls0x4010000x200x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .rdata0x4020000x5c0x200610e9cb9d596ddf3f8481c9e9885e5feFalse0.1875data1.343433641850296IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .reloc0x4030000x191c00x192002d0a440ed47b481783a33f1e4c0e5378False0.5856071206467661data6.706934385109459IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                        .rsrc0x41d0000x36000x3600d77787dd189e78a674c960d21fa4faceFalse0.2931857638888889data3.7312727777990213IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        NameRVASizeTypeLanguageCountryZLIB Complexity
                        RT_STRING0x41d3680x4e0data0.3333333333333333
                        RT_STRING0x41d8480x310data0.35331632653061223
                        RT_STRING0x41db580x330data0.39215686274509803
                        RT_STRING0x41de880x4c4data0.3983606557377049
                        RT_STRING0x41e34c0x4acdata0.32274247491638797
                        RT_STRING0x41e7f80x3b4data0.3628691983122363
                        RT_STRING0x41ebac0x440data0.38235294117647056
                        RT_STRING0x41efec0x21cdata0.40555555555555556
                        RT_STRING0x41f2080xbcdata0.6542553191489362
                        RT_STRING0x41f2c40x100data0.62890625
                        RT_STRING0x41f3c40x338data0.4223300970873786
                        RT_STRING0x41f6fc0x478data0.29895104895104896
                        RT_STRING0x41fb740x354data0.4107981220657277
                        RT_STRING0x41fec80x2b8data0.4367816091954023
                        RT_RCDATA0x4201800x10data1.5
                        RT_RCDATA0x4201900x3ecdata0.6125498007968128
                        DLLImport
                        oleaut32.dllSysFreeString, SysReAllocStringLen, SysAllocStringLen
                        advapi32.dllRegQueryValueExW, RegOpenKeyExW, RegCloseKey
                        user32.dllCharNextW, LoadStringW
                        kernel32.dllSleep, VirtualFree, VirtualAlloc, lstrlenW, VirtualQuery, QueryPerformanceCounter, GetTickCount, GetSystemInfo, GetVersion, CompareStringW, IsValidLocale, SetThreadLocale, GetSystemDefaultUILanguage, GetUserDefaultUILanguage, GetLocaleInfoW, WideCharToMultiByte, MultiByteToWideChar, GetACP, LoadLibraryExW, GetStartupInfoW, GetProcAddress, GetModuleHandleW, GetModuleFileNameW, GetCommandLineW, FreeLibrary, GetLastError, UnhandledExceptionFilter, RtlUnwind, RaiseException, ExitProcess, ExitThread, SwitchToThread, GetCurrentThreadId, CreateThread, DeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, InitializeCriticalSection, FindFirstFileW, FindClose, WriteFile, GetStdHandle, CloseHandle
                        kernel32.dllGetProcAddress, RaiseException, LoadLibraryA, GetLastError, TlsSetValue, TlsGetValue, LocalFree, LocalAlloc, GetModuleHandleW, FreeLibrary
                        user32.dllCreateWindowExW, UpdateWindow, TranslateMessage, SystemParametersInfoW, ShowWindow, RegisterClassW, PeekMessageW, MsgWaitForMultipleObjects, MessageBoxW, LoadStringW, GetSystemMetrics, GetMessageW, EndPaint, DispatchMessageW, DefWindowProcW, CharUpperBuffW, CharUpperW, CharLowerBuffW, BeginPaint
                        gdi32.dllSetBkColor, Rectangle
                        version.dllVerQueryValueW, GetFileVersionInfoSizeW, GetFileVersionInfoW
                        kernel32.dllWriteFile, WideCharToMultiByte, WaitForSingleObject, VirtualQueryEx, VirtualQuery, VirtualProtect, VirtualFree, VirtualAlloc, VerSetConditionMask, VerifyVersionInfoW, UnmapViewOfFile, SwitchToThread, SuspendThread, Sleep, SetThreadPriority, SetLastError, SetFileTime, SetFilePointer, SetEvent, SetEndOfFile, ResumeThread, ResetEvent, ReleaseSemaphore, ReadFile, RaiseException, QueryDosDeviceW, IsDebuggerPresent, MapViewOfFile, LocalFree, LoadLibraryA, LoadLibraryW, LeaveCriticalSection, IsValidLocale, InitializeCriticalSection, HeapSize, HeapFree, HeapDestroy, HeapCreate, HeapAlloc, GetVolumeInformationW, GetVersionExW, GetTimeZoneInformation, GetTickCount64, GetTickCount, GetThreadPriority, GetThreadLocale, GetSystemInfo, GetStdHandle, GetProcAddress, GetModuleHandleW, GetModuleFileNameW, GetLogicalDrives, GetLogicalDriveStringsW, GetLocaleInfoW, GetLocalTime, GetLastError, GetFullPathNameW, GetFileSize, GetFileAttributesExW, GetFileAttributesW, GetExitCodeThread, GetDriveTypeW, GetDiskFreeSpaceW, GetDateFormatW, GetCurrentThreadId, GetCurrentThread, GetCurrentProcess, GetCPInfoExW, GetCPInfo, GetACP, FreeLibrary, FormatMessageW, FlushInstructionCache, FindNextFileW, FindFirstFileW, FindClose, FileTimeToSystemTime, FileTimeToLocalFileTime, FileTimeToDosDateTime, ExitProcess, EnumSystemLocalesW, EnumCalendarInfoW, EnterCriticalSection, DeleteCriticalSection, CreateSemaphoreA, CreateProcessW, CreatePipe, CreateFileMappingW, CreateFileW, CreateEventA, CreateEventW, CreateDirectoryW, CompareStringW, CloseHandle
                        kernel32.dllSleep
                        netapi32.dllNetApiBufferFree, NetWkstaGetInfo
                        oleaut32.dllSafeArrayPtrOfIndex, SafeArrayGetUBound, SafeArrayGetLBound, SafeArrayCreate, VariantChangeType, VariantCopy, VariantClear, VariantInit
                        oleaut32.dllGetErrorInfo, SysFreeString
                        ole32.dllCoCreateInstance, CoUninitialize, CoInitialize
                        msvcrt.dllmemset, memmove, memcpy
                        msvcrt.dll_beginthreadex
                        winmm.dllwaveOutGetVolume
                        NameOrdinalAddress
                        TMethodImplementationIntercept30x7824b4
                        __dbk_fcall_wrapper20x4103c4
                        dbkFCallWrapperAddr10x7fa630
                        TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                        2024-12-24T20:58:13.887150+01002034465ET MALWARE Danabot Key Exchange Request1192.168.2.54983034.34.145.103443TCP
                        2024-12-24T20:58:14.953488+01002034465ET MALWARE Danabot Key Exchange Request1192.168.2.54983134.169.99.17443TCP
                        2024-12-24T20:58:16.044840+01002034465ET MALWARE Danabot Key Exchange Request1192.168.2.54983534.83.67.185443TCP
                        2024-12-24T20:58:17.119157+01002034465ET MALWARE Danabot Key Exchange Request1192.168.2.54983835.195.45.98443TCP
                        2024-12-24T20:59:18.664291+01002034465ET MALWARE Danabot Key Exchange Request1192.168.2.54998134.34.145.103443TCP
                        2024-12-24T20:59:20.009982+01002034465ET MALWARE Danabot Key Exchange Request1192.168.2.54998534.169.99.17443TCP
                        2024-12-24T20:59:21.083789+01002034465ET MALWARE Danabot Key Exchange Request1192.168.2.54998834.83.67.185443TCP
                        2024-12-24T20:59:22.135469+01002034465ET MALWARE Danabot Key Exchange Request1192.168.2.54999135.195.45.98443TCP
                        TimestampSource PortDest PortSource IPDest IP
                        Dec 24, 2024 20:57:08.524483919 CET49704443192.168.2.534.34.145.103
                        Dec 24, 2024 20:57:08.524509907 CET4434970434.34.145.103192.168.2.5
                        Dec 24, 2024 20:57:08.524571896 CET49704443192.168.2.534.34.145.103
                        Dec 24, 2024 20:57:08.591147900 CET49704443192.168.2.534.34.145.103
                        Dec 24, 2024 20:57:08.591160059 CET4434970434.34.145.103192.168.2.5
                        Dec 24, 2024 20:57:08.591238976 CET4434970434.34.145.103192.168.2.5
                        Dec 24, 2024 20:57:08.591245890 CET49704443192.168.2.534.34.145.103
                        Dec 24, 2024 20:57:08.591264963 CET4434970434.34.145.103192.168.2.5
                        Dec 24, 2024 20:57:09.609468937 CET49705443192.168.2.534.169.99.17
                        Dec 24, 2024 20:57:09.609519958 CET4434970534.169.99.17192.168.2.5
                        Dec 24, 2024 20:57:09.609601021 CET49705443192.168.2.534.169.99.17
                        Dec 24, 2024 20:57:09.671768904 CET49705443192.168.2.534.169.99.17
                        Dec 24, 2024 20:57:09.671787977 CET4434970534.169.99.17192.168.2.5
                        Dec 24, 2024 20:57:09.671844006 CET4434970534.169.99.17192.168.2.5
                        Dec 24, 2024 20:57:09.671849012 CET49705443192.168.2.534.169.99.17
                        Dec 24, 2024 20:57:09.671858072 CET4434970534.169.99.17192.168.2.5
                        Dec 24, 2024 20:57:10.685132027 CET49706443192.168.2.534.83.67.185
                        Dec 24, 2024 20:57:10.685167074 CET4434970634.83.67.185192.168.2.5
                        Dec 24, 2024 20:57:10.685261011 CET49706443192.168.2.534.83.67.185
                        Dec 24, 2024 20:57:10.752799988 CET49706443192.168.2.534.83.67.185
                        Dec 24, 2024 20:57:10.752824068 CET4434970634.83.67.185192.168.2.5
                        Dec 24, 2024 20:57:10.752871037 CET49706443192.168.2.534.83.67.185
                        Dec 24, 2024 20:57:10.752876997 CET4434970634.83.67.185192.168.2.5
                        Dec 24, 2024 20:57:10.752924919 CET4434970634.83.67.185192.168.2.5
                        Dec 24, 2024 20:57:11.767685890 CET49707443192.168.2.535.195.45.98
                        Dec 24, 2024 20:57:11.767725945 CET4434970735.195.45.98192.168.2.5
                        Dec 24, 2024 20:57:11.767807961 CET49707443192.168.2.535.195.45.98
                        Dec 24, 2024 20:57:11.849766016 CET49707443192.168.2.535.195.45.98
                        Dec 24, 2024 20:57:11.849787951 CET4434970735.195.45.98192.168.2.5
                        Dec 24, 2024 20:57:11.849853039 CET49707443192.168.2.535.195.45.98
                        Dec 24, 2024 20:57:11.849859953 CET4434970735.195.45.98192.168.2.5
                        Dec 24, 2024 20:57:11.849894047 CET4434970735.195.45.98192.168.2.5
                        Dec 24, 2024 20:58:13.825732946 CET49830443192.168.2.534.34.145.103
                        Dec 24, 2024 20:58:13.825747967 CET4434983034.34.145.103192.168.2.5
                        Dec 24, 2024 20:58:13.825817108 CET49830443192.168.2.534.34.145.103
                        Dec 24, 2024 20:58:13.887150049 CET49830443192.168.2.534.34.145.103
                        Dec 24, 2024 20:58:13.887166023 CET4434983034.34.145.103192.168.2.5
                        Dec 24, 2024 20:58:13.887217999 CET49830443192.168.2.534.34.145.103
                        Dec 24, 2024 20:58:13.887223005 CET4434983034.34.145.103192.168.2.5
                        Dec 24, 2024 20:58:13.887274027 CET4434983034.34.145.103192.168.2.5
                        Dec 24, 2024 20:58:14.903908014 CET49831443192.168.2.534.169.99.17
                        Dec 24, 2024 20:58:14.904010057 CET4434983134.169.99.17192.168.2.5
                        Dec 24, 2024 20:58:14.904104948 CET49831443192.168.2.534.169.99.17
                        Dec 24, 2024 20:58:14.953488111 CET49831443192.168.2.534.169.99.17
                        Dec 24, 2024 20:58:14.953528881 CET4434983134.169.99.17192.168.2.5
                        Dec 24, 2024 20:58:14.953632116 CET4434983134.169.99.17192.168.2.5
                        Dec 24, 2024 20:58:15.966931105 CET49835443192.168.2.534.83.67.185
                        Dec 24, 2024 20:58:15.967015982 CET4434983534.83.67.185192.168.2.5
                        Dec 24, 2024 20:58:15.967107058 CET49835443192.168.2.534.83.67.185
                        Dec 24, 2024 20:58:16.044840097 CET49835443192.168.2.534.83.67.185
                        Dec 24, 2024 20:58:16.044878960 CET4434983534.83.67.185192.168.2.5
                        Dec 24, 2024 20:58:16.044960976 CET49835443192.168.2.534.83.67.185
                        Dec 24, 2024 20:58:16.044972897 CET4434983534.83.67.185192.168.2.5
                        Dec 24, 2024 20:58:16.045011044 CET4434983534.83.67.185192.168.2.5
                        Dec 24, 2024 20:58:17.060699940 CET49838443192.168.2.535.195.45.98
                        Dec 24, 2024 20:58:17.060801983 CET4434983835.195.45.98192.168.2.5
                        Dec 24, 2024 20:58:17.060910940 CET49838443192.168.2.535.195.45.98
                        Dec 24, 2024 20:58:17.119157076 CET49838443192.168.2.535.195.45.98
                        Dec 24, 2024 20:58:17.119189024 CET4434983835.195.45.98192.168.2.5
                        Dec 24, 2024 20:58:17.119256020 CET49838443192.168.2.535.195.45.98
                        Dec 24, 2024 20:58:17.119261980 CET4434983835.195.45.98192.168.2.5
                        Dec 24, 2024 20:58:17.119304895 CET4434983835.195.45.98192.168.2.5
                        Dec 24, 2024 20:58:17.126014948 CET49839443192.168.2.534.34.145.103
                        Dec 24, 2024 20:58:17.126044035 CET4434983934.34.145.103192.168.2.5
                        Dec 24, 2024 20:58:17.126133919 CET49839443192.168.2.534.34.145.103
                        Dec 24, 2024 20:58:17.195209026 CET49839443192.168.2.534.34.145.103
                        Dec 24, 2024 20:58:17.195223093 CET4434983934.34.145.103192.168.2.5
                        Dec 24, 2024 20:58:17.195280075 CET49839443192.168.2.534.34.145.103
                        Dec 24, 2024 20:58:17.195283890 CET4434983934.34.145.103192.168.2.5
                        Dec 24, 2024 20:58:17.195362091 CET4434983934.34.145.103192.168.2.5
                        Dec 24, 2024 20:58:17.205153942 CET49840443192.168.2.534.169.99.17
                        Dec 24, 2024 20:58:17.205177069 CET4434984034.169.99.17192.168.2.5
                        Dec 24, 2024 20:58:17.205307961 CET49840443192.168.2.534.169.99.17
                        Dec 24, 2024 20:58:17.286787987 CET49840443192.168.2.534.169.99.17
                        Dec 24, 2024 20:58:17.286798954 CET4434984034.169.99.17192.168.2.5
                        Dec 24, 2024 20:58:17.286865950 CET49840443192.168.2.534.169.99.17
                        Dec 24, 2024 20:58:17.286870956 CET4434984034.169.99.17192.168.2.5
                        Dec 24, 2024 20:58:17.287019968 CET4434984034.169.99.17192.168.2.5
                        Dec 24, 2024 20:58:17.295407057 CET49841443192.168.2.534.83.67.185
                        Dec 24, 2024 20:58:17.295507908 CET4434984134.83.67.185192.168.2.5
                        Dec 24, 2024 20:58:17.295614958 CET49841443192.168.2.534.83.67.185
                        Dec 24, 2024 20:58:17.402021885 CET49841443192.168.2.534.83.67.185
                        Dec 24, 2024 20:58:17.402095079 CET4434984134.83.67.185192.168.2.5
                        Dec 24, 2024 20:58:17.402153015 CET4434984134.83.67.185192.168.2.5
                        Dec 24, 2024 20:58:17.402184963 CET49841443192.168.2.534.83.67.185
                        Dec 24, 2024 20:58:17.402259111 CET4434984134.83.67.185192.168.2.5
                        Dec 24, 2024 20:58:17.411962032 CET49843443192.168.2.535.195.45.98
                        Dec 24, 2024 20:58:17.412045956 CET4434984335.195.45.98192.168.2.5
                        Dec 24, 2024 20:58:17.412153006 CET49843443192.168.2.535.195.45.98
                        Dec 24, 2024 20:58:17.476381063 CET49843443192.168.2.535.195.45.98
                        Dec 24, 2024 20:58:17.476433992 CET4434984335.195.45.98192.168.2.5
                        Dec 24, 2024 20:58:17.476486921 CET4434984335.195.45.98192.168.2.5
                        Dec 24, 2024 20:58:17.476515055 CET49843443192.168.2.535.195.45.98
                        Dec 24, 2024 20:58:17.476553917 CET4434984335.195.45.98192.168.2.5
                        Dec 24, 2024 20:59:18.607034922 CET49981443192.168.2.534.34.145.103
                        Dec 24, 2024 20:59:18.607055902 CET4434998134.34.145.103192.168.2.5
                        Dec 24, 2024 20:59:18.607127905 CET49981443192.168.2.534.34.145.103
                        Dec 24, 2024 20:59:18.664290905 CET49981443192.168.2.534.34.145.103
                        Dec 24, 2024 20:59:18.664305925 CET4434998134.34.145.103192.168.2.5
                        Dec 24, 2024 20:59:18.664355993 CET49981443192.168.2.534.34.145.103
                        Dec 24, 2024 20:59:18.664396048 CET4434998134.34.145.103192.168.2.5
                        Dec 24, 2024 20:59:18.664480925 CET4434998134.34.145.103192.168.2.5
                        Dec 24, 2024 20:59:19.927069902 CET49985443192.168.2.534.169.99.17
                        Dec 24, 2024 20:59:19.927100897 CET4434998534.169.99.17192.168.2.5
                        Dec 24, 2024 20:59:19.927150011 CET49985443192.168.2.534.169.99.17
                        Dec 24, 2024 20:59:20.009982109 CET49985443192.168.2.534.169.99.17
                        Dec 24, 2024 20:59:20.009995937 CET4434998534.169.99.17192.168.2.5
                        Dec 24, 2024 20:59:20.010052919 CET49985443192.168.2.534.169.99.17
                        Dec 24, 2024 20:59:20.010062933 CET4434998534.169.99.17192.168.2.5
                        Dec 24, 2024 20:59:20.010066986 CET4434998534.169.99.17192.168.2.5
                        Dec 24, 2024 20:59:21.029668093 CET49988443192.168.2.534.83.67.185
                        Dec 24, 2024 20:59:21.029717922 CET4434998834.83.67.185192.168.2.5
                        Dec 24, 2024 20:59:21.029848099 CET49988443192.168.2.534.83.67.185
                        Dec 24, 2024 20:59:21.083789110 CET49988443192.168.2.534.83.67.185
                        Dec 24, 2024 20:59:21.083818913 CET4434998834.83.67.185192.168.2.5
                        Dec 24, 2024 20:59:21.083883047 CET49988443192.168.2.534.83.67.185
                        Dec 24, 2024 20:59:21.083923101 CET4434998834.83.67.185192.168.2.5
                        Dec 24, 2024 20:59:22.091464996 CET49991443192.168.2.535.195.45.98
                        Dec 24, 2024 20:59:22.091528893 CET4434999135.195.45.98192.168.2.5
                        Dec 24, 2024 20:59:22.091618061 CET49991443192.168.2.535.195.45.98
                        Dec 24, 2024 20:59:22.135468960 CET49991443192.168.2.535.195.45.98
                        Dec 24, 2024 20:59:22.135502100 CET4434999135.195.45.98192.168.2.5
                        Dec 24, 2024 20:59:22.135580063 CET49991443192.168.2.535.195.45.98
                        Dec 24, 2024 20:59:22.135622978 CET4434999135.195.45.98192.168.2.5

                        Click to jump to process

                        Click to jump to process

                        Click to dive into process behavior distribution

                        Click to jump to process

                        Target ID:0
                        Start time:14:57:01
                        Start date:24/12/2024
                        Path:C:\Users\user\Desktop\gfehgfwveg.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Users\user\Desktop\gfehgfwveg.exe"
                        Imagebase:0x400000
                        File size:4'276'224 bytes
                        MD5 hash:43EC2649E1B173B6E8B3800E18CCEEB4
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:Borland Delphi
                        Yara matches:
                        • Rule: JoeSecurity_DanaBot_stealer_dll, Description: Yara detected DanaBot stealer dll, Source: 00000000.00000003.2072119961.000000007E960000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.3883206719.0000000003039000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_DanaBot_stealer_dll, Description: Yara detected DanaBot stealer dll, Source: 00000000.00000002.3883206719.0000000003039000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                        Reputation:low
                        Has exited:false

                        Target ID:2
                        Start time:14:57:04
                        Start date:24/12/2024
                        Path:C:\Windows\SysWOW64\cmd.exe
                        Wow64 process (32bit):true
                        Commandline:cmd.exe /C wmic diskdrive where "DeviceID=\'c:\'" get SerialNumber /value
                        Imagebase:0x790000
                        File size:236'544 bytes
                        MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:3
                        Start time:14:57:04
                        Start date:24/12/2024
                        Path:C:\Windows\System32\conhost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Imagebase:0x7ff6d64d0000
                        File size:862'208 bytes
                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:4
                        Start time:14:57:04
                        Start date:24/12/2024
                        Path:C:\Windows\SysWOW64\wbem\WMIC.exe
                        Wow64 process (32bit):true
                        Commandline:wmic diskdrive where "DeviceID=\'c:\'" get SerialNumber /value
                        Imagebase:0x2c0000
                        File size:427'008 bytes
                        MD5 hash:E2DE6500DE1148C7F6027AD50AC8B891
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:moderate
                        Has exited:true

                        Reset < >

                          Execution Graph

                          Execution Coverage:17.2%
                          Dynamic/Decrypted Code Coverage:100%
                          Signature Coverage:6.8%
                          Total number of Nodes:571
                          Total number of Limit Nodes:16
                          execution_graph 2866 31cea38 2871 303007c 2866->2871 2868 31cea58 2876 3029558 2868->2876 2873 3030084 2871->2873 2872 30300d1 2872->2868 2873->2872 2882 302d28c 2873->2882 2875 30300c0 LoadStringW 2875->2872 2877 3029566 2876->2877 2878 302955c 2876->2878 2881 30295a4 2877->2881 3019 3026fd4 2877->3019 2879 3029cc8 11 API calls 2878->2879 2879->2877 2883 302d2b9 2882->2883 2884 302d29a 2882->2884 2883->2875 2884->2883 2887 302d244 2884->2887 2888 302d254 GetModuleFileNameW 2887->2888 2889 302d270 2887->2889 2891 302e4b8 GetModuleFileNameW 2888->2891 2889->2875 2892 302e506 2891->2892 2897 302e394 2892->2897 2894 302e532 2895 302e544 LoadLibraryExW 2894->2895 2896 302e54c 2894->2896 2895->2896 2896->2889 2901 302e3b5 2897->2901 2898 302e43d 2898->2894 2900 302e42a 2902 302e430 2900->2902 2903 302e43f GetUserDefaultUILanguage 2900->2903 2901->2898 2915 302e0d0 2901->2915 2904 302e1fc 2 API calls 2902->2904 2919 302da80 EnterCriticalSection 2903->2919 2904->2898 2906 302e44c 2939 302e1fc 2906->2939 2908 302e459 2909 302e481 2908->2909 2910 302e467 GetSystemDefaultUILanguage 2908->2910 2909->2898 2943 302e2c8 2909->2943 2911 302da80 17 API calls 2910->2911 2913 302e474 2911->2913 2914 302e1fc 2 API calls 2913->2914 2914->2909 2916 302e0f2 2915->2916 2918 302e0fc 2915->2918 2951 302ddb4 2916->2951 2918->2900 2920 302dacc LeaveCriticalSection 2919->2920 2921 302daac 2919->2921 2988 3029e98 2920->2988 2923 302dabd LeaveCriticalSection 2921->2923 2925 302db6e 2923->2925 2924 302dadd IsValidLocale 2926 302db3b EnterCriticalSection 2924->2926 2927 302daec 2924->2927 2925->2906 2928 302db53 2926->2928 2929 302db00 2927->2929 2930 302daf5 2927->2930 2935 302db64 LeaveCriticalSection 2928->2935 3003 302d768 2929->3003 2990 302d964 GetThreadUILanguage 2930->2990 2933 302db09 GetSystemDefaultUILanguage 2933->2926 2934 302db13 2933->2934 2936 302db24 GetSystemDefaultUILanguage 2934->2936 2935->2925 2937 302d768 3 API calls 2936->2937 2938 302dafe 2937->2938 2938->2926 2941 302e21a 2939->2941 2940 302e295 2940->2908 2941->2940 3012 302e190 2941->3012 3017 3029f7c 2943->3017 2946 302e318 2947 302e190 2 API calls 2946->2947 2948 302e32c 2947->2948 2949 302e35a 2948->2949 2950 302e190 2 API calls 2948->2950 2949->2898 2950->2949 2952 302ddcb 2951->2952 2953 302dddf GetModuleFileNameW 2952->2953 2954 302ddf4 2952->2954 2953->2954 2955 302dfc3 2954->2955 2956 302de1c RegOpenKeyExW 2954->2956 2955->2918 2957 302de43 RegOpenKeyExW 2956->2957 2958 302dedd 2956->2958 2957->2958 2959 302de61 RegOpenKeyExW 2957->2959 2972 302dbc4 GetModuleHandleW 2958->2972 2959->2958 2961 302de7f RegOpenKeyExW 2959->2961 2961->2958 2963 302de9d RegOpenKeyExW 2961->2963 2962 302defb RegQueryValueExW 2964 302df4c RegQueryValueExW 2962->2964 2966 302df19 2962->2966 2963->2958 2965 302debb RegOpenKeyExW 2963->2965 2967 302df68 2964->2967 2971 302df4a 2964->2971 2965->2955 2965->2958 2969 302df21 RegQueryValueExW 2966->2969 2970 302df70 RegQueryValueExW 2967->2970 2968 302dfb2 RegCloseKey 2968->2918 2969->2971 2970->2971 2971->2968 2973 302dbfd 2972->2973 2974 302dbec GetProcAddress 2972->2974 2975 302dc13 2973->2975 2980 302dc5f 2973->2980 2984 302dba0 2973->2984 2974->2973 2975->2962 2978 302dba0 CharNextW 2978->2980 2979 302dba0 CharNextW 2979->2980 2980->2975 2980->2979 2981 302dce4 FindFirstFileW 2980->2981 2983 302dd4e lstrlenW 2980->2983 2981->2975 2982 302dd00 FindClose lstrlenW 2981->2982 2982->2975 2982->2980 2983->2980 2985 302dbae 2984->2985 2986 302dbbc 2985->2986 2987 302dba6 CharNextW 2985->2987 2986->2975 2986->2978 2987->2985 2989 3029e9e 2988->2989 2989->2924 2991 302d980 2990->2991 2992 302d9d9 2990->2992 3008 302d920 GetThreadPreferredUILanguages 2991->3008 2993 302d920 2 API calls 2992->2993 2996 302d9e1 2993->2996 2995 302d988 2995->2995 2998 302d9bd SetThreadPreferredUILanguages 2995->2998 2997 302da28 SetThreadPreferredUILanguages 2996->2997 3002 302da69 2996->3002 2999 302d920 2 API calls 2997->2999 2998->2992 3000 302da3e 2999->3000 3001 302da59 SetThreadPreferredUILanguages 3000->3001 3000->3002 3001->3002 3002->2938 3006 302d7a3 3003->3006 3004 302d80c IsValidLocale 3005 302d81f GetLocaleInfoW GetLocaleInfoW 3004->3005 3007 302d85a 3004->3007 3005->3007 3006->3004 3006->3007 3007->2933 3009 302d941 3008->3009 3010 302d95a 3008->3010 3011 302d94a GetThreadPreferredUILanguages 3009->3011 3010->2995 3011->3010 3013 302e1a5 3012->3013 3014 302e1c2 FindFirstFileW 3013->3014 3015 302e1d2 FindClose 3014->3015 3016 302e1d8 3014->3016 3015->3016 3016->2941 3018 3029f80 GetUserDefaultUILanguage GetLocaleInfoW 3017->3018 3018->2946 3020 30311f8 11 API calls 3019->3020 3021 3026fd9 3020->3021 3021->2881 3046 3029704 3047 3029715 3046->3047 3049 3029776 3046->3049 3048 302971e UnhandledExceptionFilter 3047->3048 3050 3029664 3047->3050 3048->3049 3048->3050 3050->3049 3053 3026fe0 3050->3053 3054 3029cbc 11 API calls 3053->3054 3055 3026feb 3054->3055 3056 302974a 3057 3029664 3056->3057 3058 3029776 3056->3058 3057->3058 3059 3026fe0 11 API calls 3057->3059 3060 30296fe 3059->3060 3061 31cc654 LoadLibraryW LoadLibraryW LoadLibraryW 3106 302f568 3109 302eea8 3106->3109 3108 302f57f 3110 302ee3c 13 API calls 3109->3110 3111 302eed8 3110->3111 3112 302ef35 3111->3112 3113 302ef4f 3111->3113 3117 302ef09 3111->3117 3114 302cd60 32 API calls 3112->3114 3115 302cd60 32 API calls 3113->3115 3116 302ef4a 3114->3116 3115->3116 3118 302ee54 2 API calls 3116->3118 3117->3108 3118->3117 3119 3026268 3120 30259d4 10 API calls 3119->3120 3121 3026274 3120->3121 3062 34e5740 3066 30278e8 3062->3066 3064 34e5770 VerSetConditionMask VerifyVersionInfoW 3065 34e57c1 3064->3065 3067 30278ef 3066->3067 3067->3064 3067->3067 3068 31cfa4c 3069 31cfa56 3068->3069 3072 31cfa6b 3068->3072 3070 31cfa5d 3069->3070 3071 31cfa7b 3069->3071 3070->3072 3075 31cf028 3070->3075 3080 31cf95c 3071->3080 3076 31cf036 VariantClear 3075->3076 3078 31cf043 3075->3078 3077 31cf041 3076->3077 3077->3072 3078->3077 3079 31cf0ae VariantClear VariantInit 3078->3079 3079->3077 3081 31cf96b 3080->3081 3082 31cf972 3080->3082 3083 31cf028 3 API calls 3081->3083 3084 31cf982 VariantCopy 3082->3084 3086 31cf993 3082->3086 3083->3082 3085 31cf98e 3084->3085 3085->3072 3086->3085 3087 31cfa3b VariantCopy 3086->3087 3087->3085 2487 34e525c LoadLibraryA GetProcAddress 2492 302cd60 2487->2492 2489 34e52af 2495 34e5104 2489->2495 2498 302cab8 2492->2498 2494 302cd6a 2494->2489 2726 34e509c 2495->2726 2499 302caf6 2498->2499 2503 302cadb 2498->2503 2500 302cb64 2499->2500 2502 302cc31 2499->2502 2508 302cbcb 2500->2508 2509 302ca74 2500->2509 2502->2508 2526 302c100 2502->2526 2503->2494 2504 302cab8 32 API calls 2504->2508 2506 302cb7c 2506->2508 2519 302bfd8 2506->2519 2508->2503 2508->2504 2530 30311f8 2509->2530 2511 302ca7d 2512 302ca93 2511->2512 2513 302ca85 2511->2513 2515 30311f8 11 API calls 2512->2515 2514 30311f8 11 API calls 2513->2514 2518 302ca8a 2514->2518 2516 302caa1 2515->2516 2517 30311f8 11 API calls 2516->2517 2517->2518 2518->2506 2520 302bff4 2519->2520 2521 302c038 2519->2521 2520->2521 2524 302c072 2520->2524 2525 302c0a1 2520->2525 2521->2508 2523 302bfd8 32 API calls 2523->2524 2524->2521 2524->2523 2525->2521 2573 302bcfc 2525->2573 2527 302c111 2526->2527 2528 302c109 2526->2528 2527->2508 2702 302bec0 2528->2702 2531 3031207 2530->2531 2532 303122d TlsGetValue 2530->2532 2531->2511 2533 3031212 2532->2533 2534 3031237 2532->2534 2538 30311b4 2533->2538 2534->2511 2537 3031226 2537->2511 2539 30311ba 2538->2539 2540 30311d3 2539->2540 2547 30311e8 TlsGetValue 2539->2547 2548 3029cc8 2539->2548 2551 30311a0 LocalAlloc 2540->2551 2543 30311da 2544 30311ea TlsSetValue 2543->2544 2545 30311de 2543->2545 2544->2547 2546 3029cc8 10 API calls 2545->2546 2546->2547 2547->2537 2552 3029cbc 2548->2552 2551->2543 2555 3029b8c 2552->2555 2557 3029ba8 2555->2557 2559 3029bb2 2555->2559 2556 3029bc2 GetCurrentThreadId 2561 3029bcf 2556->2561 2565 3029af4 2557->2565 2559->2556 2559->2561 2560 3026fa0 8 API calls 2560->2561 2561->2560 2562 3029c5f FreeLibrary 2561->2562 2563 3029c87 ExitProcess 2561->2563 2562->2561 2566 3029b5b 2565->2566 2567 3029afe GetStdHandle WriteFile 2565->2567 2566->2559 2571 302a91c 2567->2571 2570 3029b4b GetStdHandle WriteFile 2570->2559 2572 302a922 2571->2572 2572->2570 2574 302be9b 2573->2574 2576 302bd1f 2573->2576 2574->2525 2575 302bcfc 32 API calls 2575->2576 2576->2574 2576->2575 2577 302bfd8 32 API calls 2576->2577 2580 302f908 2576->2580 2586 302f8dc 2576->2586 2577->2576 2581 302f91a 2580->2581 2582 302f8dc 14 API calls 2581->2582 2583 302f92f 2582->2583 2590 302f870 2583->2590 2585 302f946 2585->2576 2587 302f901 2586->2587 2588 302f8e7 2586->2588 2587->2576 2691 302f8a8 2588->2691 2591 302f8a3 2590->2591 2592 302f87b 2590->2592 2591->2585 2594 302f4b0 2592->2594 2595 302f4d4 2594->2595 2596 302f4cc 2594->2596 2617 302f1f0 2595->2617 2606 302f34c 2596->2606 2599 302f53f 2632 302f258 2599->2632 2600 302f4fc 2600->2599 2621 302f2b8 2600->2621 2607 302f401 2606->2607 2608 302f365 2606->2608 2607->2595 2609 302f376 2608->2609 2636 30288d4 2608->2636 2640 3028a30 2609->2640 2612 302f3d4 2658 3028bc8 2612->2658 2616 302f3a5 2616->2612 2655 302f1dc 2616->2655 2618 302f203 2617->2618 2619 302f1f9 2617->2619 2618->2600 2620 3028a30 13 API calls 2619->2620 2620->2618 2622 302f2c0 2621->2622 2623 302f2c9 2622->2623 2687 302ed88 2622->2687 2625 302f06c 2623->2625 2626 302f086 2625->2626 2627 302f08f 2626->2627 2629 302f0a9 2626->2629 2628 302cd60 32 API calls 2627->2628 2631 302f0a4 2628->2631 2630 302cd60 32 API calls 2629->2630 2629->2631 2630->2631 2631->2599 2633 302f261 2632->2633 2634 302f268 2632->2634 2635 3028bc8 2 API calls 2633->2635 2634->2591 2635->2634 2637 30288e2 2636->2637 2638 30288dd 2636->2638 2637->2609 2663 30287a8 GetModuleHandleW GetProcAddress 2638->2663 2642 3028a3e 2640->2642 2643 3028a67 GetTickCount 2642->2643 2644 3028ad9 GetTickCount 2642->2644 2645 3028b10 GetTickCount 2642->2645 2646 3028a7f GetTickCount 2642->2646 2647 3028a8c 2642->2647 2650 3028aae GetCurrentThreadId 2642->2650 2669 3028ebc GetCurrentThreadId 2642->2669 2674 30286ec 2642->2674 2643->2642 2644->2642 2644->2647 2681 3028c28 2645->2681 2646->2642 2646->2647 2647->2616 2650->2647 2651 3028b3a GetTickCount 2652 3028b20 2651->2652 2652->2645 2652->2651 2653 3028ba4 2652->2653 2653->2647 2654 3028baa GetCurrentThreadId 2653->2654 2654->2647 2656 30288d4 5 API calls 2655->2656 2657 302f1e4 2656->2657 2657->2616 2685 30288bc GetCurrentThreadId 2658->2685 2660 3028bff 2660->2595 2661 3028bd3 2661->2660 2662 3028c28 Sleep 2661->2662 2662->2660 2664 30287d0 GetLogicalProcessorInformation 2663->2664 2668 3028818 2663->2668 2665 30287df GetLastError 2664->2665 2664->2668 2666 30287e9 2665->2666 2665->2668 2667 30287f1 GetLogicalProcessorInformation 2666->2667 2667->2668 2668->2637 2670 3028ec9 2669->2670 2672 3028ed0 2669->2672 2670->2642 2671 3028ef7 2671->2642 2672->2671 2673 3028ee4 GetCurrentThreadId 2672->2673 2673->2671 2675 30286f7 2674->2675 2676 3028745 2675->2676 2677 3028726 2675->2677 2678 302871d Sleep 2675->2678 2676->2642 2679 3028735 Sleep 2677->2679 2680 302873e SwitchToThread 2677->2680 2678->2676 2679->2676 2680->2676 2682 3028c81 2681->2682 2683 3028c3a 2681->2683 2682->2652 2683->2682 2684 3028c68 Sleep 2683->2684 2684->2683 2686 30288c9 2685->2686 2686->2661 2688 302ed93 2687->2688 2689 30288d4 5 API calls 2688->2689 2690 302ed9a 2689->2690 2690->2623 2692 302f8b9 2691->2692 2693 302f8ac 2691->2693 2692->2587 2695 302f588 2693->2695 2696 302f634 2695->2696 2697 302f5a8 2695->2697 2696->2692 2698 302f1f0 13 API calls 2697->2698 2699 302f5d0 2698->2699 2700 302f258 2 API calls 2699->2700 2701 302f60f 2700->2701 2701->2692 2703 302bed5 2702->2703 2711 302bef2 2702->2711 2704 302bf26 2703->2704 2705 302beda 2703->2705 2704->2711 2712 302a2ec 2704->2712 2707 302bf65 2705->2707 2708 302bee9 2705->2708 2705->2711 2709 302bec0 32 API calls 2707->2709 2707->2711 2708->2711 2719 302bb54 2708->2719 2709->2707 2711->2527 2713 302a313 2712->2713 2714 302a2f0 2712->2714 2713->2704 2715 3029e78 2714->2715 2716 302a303 SysReAllocStringLen 2714->2716 2717 3029ee6 SysFreeString 2715->2717 2718 3029ef4 2715->2718 2716->2713 2716->2715 2717->2718 2718->2704 2720 302bce3 2719->2720 2721 302bb79 2719->2721 2720->2708 2721->2720 2722 302f908 32 API calls 2721->2722 2723 302a2ec 2 API calls 2721->2723 2724 302bec0 32 API calls 2721->2724 2725 302bb54 32 API calls 2721->2725 2722->2721 2723->2721 2724->2721 2725->2721 2731 31cbdbc 2726->2731 2728 34e50bf 2729 31cbdbc 14 API calls 2728->2729 2730 34e50f1 2728->2730 2729->2730 2732 31cbde2 2731->2732 2737 31cc6cc 2732->2737 2734 31cbdf4 2735 31cbdf8 VirtualProtect 2734->2735 2736 31cbe11 2734->2736 2735->2736 2736->2728 2738 31cc6e3 2737->2738 2739 31cc878 2738->2739 2740 31cc73c LoadLibraryW 2738->2740 2741 31cc7fd LoadLibraryW 2738->2741 2742 31cc758 LoadLibraryW 2738->2742 2743 31cc774 LoadLibraryW 2738->2743 2744 31cc816 LoadLibraryW 2738->2744 2745 31cc790 LoadLibraryW 2738->2745 2746 31cc7ac LoadLibraryW 2738->2746 2747 31cc82f LoadLibraryW 2738->2747 2748 31cc7c8 LoadLibraryW 2738->2748 2749 31cc848 LoadLibraryW 2738->2749 2750 31cc7e4 LoadLibraryW 2738->2750 2751 31cc861 LoadLibraryW 2738->2751 2752 31cc880 2739->2752 2755 31cc89e 2739->2755 2740->2739 2741->2739 2742->2739 2743->2739 2744->2739 2745->2739 2746->2739 2747->2739 2748->2739 2749->2739 2750->2739 2751->2739 2756 31cc9e4 2752->2756 2754 31cc88b 2754->2755 2755->2734 2757 31cca00 2756->2757 2758 31ccb1c 2757->2758 2759 31ccaf7 LoadLibraryW 2757->2759 2758->2754 2759->2757 2760 3025f50 2761 3025f60 2760->2761 2762 3025fe8 2760->2762 2765 3025fa4 2761->2765 2766 3025f6d 2761->2766 2763 3025ff1 2762->2763 2764 3025888 2762->2764 2768 3026009 2763->2768 2781 3026118 2763->2781 2767 3026263 2764->2767 2773 302598b 2764->2773 2774 30258ac VirtualQuery 2764->2774 2769 30259d4 10 API calls 2765->2769 2770 3025f78 2766->2770 2771 30259d4 10 API calls 2766->2771 2777 302602c 2768->2777 2782 30260f0 2768->2782 2802 3026010 2768->2802 2787 3025fbb 2769->2787 2790 3025f85 2771->2790 2772 302617c 2776 30259d4 10 API calls 2772->2776 2796 3026195 2772->2796 2775 302593e 2773->2775 2779 30259d4 10 API calls 2773->2779 2784 3025953 2774->2784 2785 30258e5 2774->2785 2799 302622c 2776->2799 2789 302606c Sleep 2777->2789 2777->2802 2778 3025fe1 2800 30259a2 2779->2800 2780 3025f9d 2781->2772 2788 3026154 Sleep 2781->2788 2781->2796 2786 30259d4 10 API calls 2782->2786 2810 30259d4 2784->2810 2785->2784 2795 3025912 VirtualAlloc 2785->2795 2804 30260f9 2786->2804 2787->2778 2792 3025d58 10 API calls 2787->2792 2788->2772 2793 302616e Sleep 2788->2793 2794 3026084 Sleep 2789->2794 2789->2802 2790->2780 2797 3025d58 10 API calls 2790->2797 2792->2778 2793->2781 2794->2777 2795->2784 2801 3025928 VirtualAlloc 2795->2801 2797->2780 2798 3026111 2799->2796 2803 3025d58 10 API calls 2799->2803 2800->2775 2807 3025d58 10 API calls 2800->2807 2801->2775 2801->2784 2806 3026250 2803->2806 2804->2798 2805 3025d58 10 API calls 2804->2805 2805->2798 2807->2775 2808 302595a 2808->2775 2834 3025d58 2808->2834 2811 3025c34 2810->2811 2812 30259ec 2810->2812 2813 3025bf8 2811->2813 2814 3025d4c 2811->2814 2821 30259fe 2812->2821 2825 3025a89 Sleep 2812->2825 2823 3025c12 Sleep 2813->2823 2826 3025c52 2813->2826 2815 3025780 VirtualAlloc 2814->2815 2816 3025d55 2814->2816 2818 30257bb 2815->2818 2819 30257ab 2815->2819 2816->2808 2817 3025a0d 2817->2808 2818->2808 2854 3025734 2819->2854 2821->2817 2822 3025aec 2821->2822 2829 3025acd Sleep 2821->2829 2833 3025af8 2822->2833 2859 30256b8 2822->2859 2824 3025c28 Sleep 2823->2824 2823->2826 2824->2813 2825->2821 2827 3025a9f Sleep 2825->2827 2828 3025c70 2826->2828 2830 30256b8 VirtualAlloc 2826->2830 2827->2812 2828->2808 2829->2822 2832 3025ae3 Sleep 2829->2832 2830->2828 2832->2821 2833->2808 2835 3025e50 2834->2835 2836 3025d6d 2834->2836 2837 30257e4 2835->2837 2839 3025d73 2835->2839 2836->2839 2841 3025dea Sleep 2836->2841 2840 3025f4a 2837->2840 2842 3025734 2 API calls 2837->2842 2838 3025d7c 2838->2775 2839->2838 2844 3025e2e Sleep 2839->2844 2851 3025e65 2839->2851 2840->2775 2841->2839 2843 3025e04 Sleep 2841->2843 2845 30257f5 2842->2845 2843->2836 2846 3025e44 Sleep 2844->2846 2844->2851 2847 3025825 2845->2847 2848 302580b VirtualFree 2845->2848 2846->2839 2849 302581c 2847->2849 2850 302582e VirtualQuery VirtualFree 2847->2850 2848->2849 2849->2775 2850->2847 2850->2849 2852 3025ee4 VirtualFree 2851->2852 2853 3025e88 2851->2853 2852->2775 2853->2775 2855 302577c 2854->2855 2856 302573d 2854->2856 2855->2818 2856->2855 2857 3025748 Sleep 2856->2857 2857->2855 2858 3025762 Sleep 2857->2858 2858->2856 2863 302564c 2859->2863 2861 30256c1 VirtualAlloc 2862 30256d8 2861->2862 2862->2833 2864 30255ec 2863->2864 2864->2861 3122 34e583c 3123 30278e8 3122->3123 3124 34e585a GetVersionExW 3123->3124 3125 34e5899 3124->3125 3126 34e5875 3124->3126 3128 34e58c6 LoadLibraryW 3125->3128 3130 34e58e9 3125->3130 3127 34e5884 GetVersionExW 3126->3127 3127->3125 3131 3033758 3128->3131 3130->3130 3132 3033780 GetProcAddress 3131->3132 3133 303378c 3131->3133 3134 30337d8 3132->3134 3135 30337b1 GetProcAddress 3133->3135 3134->3130 3136 30337d0 3135->3136 3136->3130 3137 30317b0 3138 30317db 3137->3138 3139 303184c RaiseException 3138->3139 3140 3031874 3138->3140 3156 30318e1 3139->3156 3141 3031914 3140->3141 3142 3031909 LoadLibraryA 3140->3142 3145 3031987 3140->3145 3140->3156 3147 3031963 3141->3147 3148 3031918 GetLastError 3141->3148 3142->3141 3143 3031a13 3146 3031a17 GetLastError 3143->3146 3143->3156 3144 3031a07 GetProcAddress 3144->3143 3145->3143 3145->3144 3145->3156 3149 3031a28 3146->3149 3153 3031971 3147->3153 3154 30319a4 FreeLibrary 3147->3154 3150 3031929 3148->3150 3152 3031a3a RaiseException 3149->3152 3149->3156 3150->3147 3151 303193b RaiseException 3150->3151 3151->3156 3152->3156 3153->3145 3155 3031977 LocalAlloc 3153->3155 3154->3145 3155->3145 2865 3509144 WSAStartup GetLastError 3022 351d444 3025 3031764 GetModuleHandleW 3022->3025 3024 351d454 3026 303179f 3025->3026 3026->3024 3088 302f617 3089 302f634 3088->3089 3090 302f61d 3088->3090 3090->3089 3092 302ef98 3090->3092 3098 302ee3c 3092->3098 3097 302effc 3097->3089 3099 302ee50 3098->3099 3100 302ee45 3098->3100 3099->3097 3102 302ee54 3099->3102 3101 3028a30 13 API calls 3100->3101 3101->3099 3103 302ee65 3102->3103 3104 302ee5d 3102->3104 3103->3089 3105 3028bc8 2 API calls 3104->3105 3105->3103 3027 34da334 3028 34da377 3027->3028 3029 34da3d0 RegisterServiceCtrlHandlerExW 3028->3029 3030 34da3e4 SetServiceStatus 3029->3030 3032 34da445 3029->3032 3037 3029d58 3030->3037 3041 3029ee0 3032->3041 3033 34da42b 3035 34da432 Sleep 3033->3035 3035->3032 3035->3035 3038 3029d75 3037->3038 3039 3029d94 CreateThread 3038->3039 3040 3029dbd 3039->3040 3044 3029d20 3039->3044 3040->3033 3042 3029ee6 SysFreeString 3041->3042 3043 3029ef4 3041->3043 3042->3043 3045 3029d28 3044->3045

                          Control-flow Graph

                          APIs
                          • LoadLibraryA.KERNEL32(ntdll.dll,NtQueryVirtualMemory), ref: 034E527B
                          • GetProcAddress.KERNEL32(00000000,ntdll.dll), ref: 034E5281
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3883206719.0000000003039000.00000040.00001000.00020000.00000000.sdmp, Offset: 03020000, based on PE: true
                          • Associated: 00000000.00000002.3883188616.0000000003020000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3883206719.0000000003021000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3883206719.0000000003561000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3883206719.000000000356D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_3020000_gfehgfwveg.jbxd
                          Yara matches
                          Similarity
                          • API ID: AddressLibraryLoadProc
                          • String ID: NtQueryVirtualMemory$ntdll.dll
                          • API String ID: 2574300362-2623246514
                          • Opcode ID: d018db2471c2dd66edf6ea738a022f519387a6ed1c3bdfb002dd2034984b7d46
                          • Instruction ID: 1bdd33aa47b5f3d8ca04c19fa24a0d945ed76961df81339cd06de47926129421
                          • Opcode Fuzzy Hash: d018db2471c2dd66edf6ea738a022f519387a6ed1c3bdfb002dd2034984b7d46
                          • Instruction Fuzzy Hash: D801D6BCA05344AFD300EFA9EC42E4B77A2E746310F1440A5DC009F399E772AD05AF49

                          Control-flow Graph

                          APIs
                          • GetUserDefaultUILanguage.KERNEL32(00000003,?,00000004,00000000,0302E388,?,?), ref: 0302E2FA
                          • GetLocaleInfoW.KERNEL32(?,00000003,?,00000004,00000000,0302E388,?,?), ref: 0302E303
                            • Part of subcall function 0302E190: FindFirstFileW.KERNEL32(00000000,?,00000000,0302E1EE,?,00000001), ref: 0302E1C3
                            • Part of subcall function 0302E190: FindClose.KERNEL32(00000000,00000000,?,00000000,0302E1EE,?,00000001), ref: 0302E1D3
                          Memory Dump Source
                          • Source File: 00000000.00000002.3883206719.0000000003021000.00000040.00001000.00020000.00000000.sdmp, Offset: 03020000, based on PE: true
                          • Associated: 00000000.00000002.3883188616.0000000003020000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3883206719.0000000003039000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3883206719.0000000003561000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3883206719.000000000356D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_3020000_gfehgfwveg.jbxd
                          Yara matches
                          Similarity
                          • API ID: Find$CloseDefaultFileFirstInfoLanguageLocaleUser
                          • String ID:
                          • API String ID: 3216391948-0
                          • Opcode ID: 6a9ac70269c25ce92f911a52e2d54f064789b05d92058e513cd515be9e3908cd
                          • Instruction ID: 8f28c4519a72aa847a74510fc015968aa1a84f76f24ff4946df1c683fc4e2cd8
                          • Opcode Fuzzy Hash: 6a9ac70269c25ce92f911a52e2d54f064789b05d92058e513cd515be9e3908cd
                          • Instruction Fuzzy Hash: CD117F78A01329AFDF00EFA8C991AEEFBB8EF89300F504475A514AB250DB345E04C765

                          Control-flow Graph

                          APIs
                          • FindFirstFileW.KERNEL32(00000000,?,00000000,0302E1EE,?,00000001), ref: 0302E1C3
                          • FindClose.KERNEL32(00000000,00000000,?,00000000,0302E1EE,?,00000001), ref: 0302E1D3
                          Memory Dump Source
                          • Source File: 00000000.00000002.3883206719.0000000003021000.00000040.00001000.00020000.00000000.sdmp, Offset: 03020000, based on PE: true
                          • Associated: 00000000.00000002.3883188616.0000000003020000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3883206719.0000000003039000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3883206719.0000000003561000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3883206719.000000000356D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_3020000_gfehgfwveg.jbxd
                          Yara matches
                          Similarity
                          • API ID: Find$CloseFileFirst
                          • String ID:
                          • API String ID: 2295610775-0
                          • Opcode ID: a2d72ad6269bcd7a89b6793469d5388a6d9eac5415e682f77103d225cfce1cb2
                          • Instruction ID: 697c08b330afb92a25b50dd691c52056387c80e18a6f0b89b44a9b205a1354ed
                          • Opcode Fuzzy Hash: a2d72ad6269bcd7a89b6793469d5388a6d9eac5415e682f77103d225cfce1cb2
                          • Instruction Fuzzy Hash: DDF0E235541328AFDB50EBB8CC018CEFBECEB89310B5004B0A824D7550EB309E109714

                          Control-flow Graph

                          APIs
                          • GetModuleFileNameW.KERNEL32(00000000,?,00000105,00000000,0302DFD9,?,?), ref: 0302DDED
                          • RegOpenKeyExW.ADVAPI32(80000001,Software\Embarcadero\Locales,00000000,000F0019,?,00000000,0302DFD9,?,?), ref: 0302DE36
                          • RegOpenKeyExW.ADVAPI32(80000002,Software\Embarcadero\Locales,00000000,000F0019,?,80000001,Software\Embarcadero\Locales,00000000,000F0019,?,00000000,0302DFD9,?,?), ref: 0302DE58
                          • RegOpenKeyExW.ADVAPI32(80000001,Software\CodeGear\Locales,00000000,000F0019,?,80000002,Software\Embarcadero\Locales,00000000,000F0019,?,80000001,Software\Embarcadero\Locales,00000000,000F0019,?,00000000), ref: 0302DE76
                          • RegOpenKeyExW.ADVAPI32(80000002,Software\CodeGear\Locales,00000000,000F0019,?,80000001,Software\CodeGear\Locales,00000000,000F0019,?,80000002,Software\Embarcadero\Locales,00000000,000F0019,?,80000001), ref: 0302DE94
                          • RegOpenKeyExW.ADVAPI32(80000001,Software\Borland\Locales,00000000,000F0019,?,80000002,Software\CodeGear\Locales,00000000,000F0019,?,80000001,Software\CodeGear\Locales,00000000,000F0019,?,80000002), ref: 0302DEB2
                          • RegOpenKeyExW.ADVAPI32(80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,80000002,Software\CodeGear\Locales,00000000,000F0019,?,80000001), ref: 0302DED0
                          • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,00000000,?,00000000,0302DFBC,?,80000001,Software\Embarcadero\Locales,00000000,000F0019,?,00000000,0302DFD9), ref: 0302DF10
                          • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,?,00000000,00000000,00000000,?,00000000,0302DFBC,?,80000001), ref: 0302DF3B
                          • RegCloseKey.ADVAPI32(?,0302DFC3,00000000,00000000,?,?,?,00000000,00000000,00000000,?,00000000,0302DFBC,?,80000001,Software\Embarcadero\Locales), ref: 0302DFB6
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3883206719.0000000003021000.00000040.00001000.00020000.00000000.sdmp, Offset: 03020000, based on PE: true
                          • Associated: 00000000.00000002.3883188616.0000000003020000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3883206719.0000000003039000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3883206719.0000000003561000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3883206719.000000000356D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_3020000_gfehgfwveg.jbxd
                          Yara matches
                          Similarity
                          • API ID: Open$QueryValue$CloseFileModuleName
                          • String ID: Software\Borland\Delphi\Locales$Software\Borland\Locales$Software\CodeGear\Locales$Software\Embarcadero\Locales
                          • API String ID: 2701450724-3496071916
                          • Opcode ID: 1a278c69b610779cbf6ca74d470bad1da30e9d8d8b029fb1bc3e271a244aeb57
                          • Instruction ID: 905ecd8e4d05068b765baa183778abd509261f1ef2389a8332c586ca53e88099
                          • Opcode Fuzzy Hash: 1a278c69b610779cbf6ca74d470bad1da30e9d8d8b029fb1bc3e271a244aeb57
                          • Instruction Fuzzy Hash: 71514575A4132CBEEB50EB94CC41FEEBBFCEB49704F500461BA24EA581D6709E44CB58

                          Control-flow Graph

                          APIs
                          • Sleep.KERNEL32(00000000,?,?,00000000,030259CA), ref: 03025DEE
                          • Sleep.KERNEL32(0000000A,00000000,?,?,00000000,030259CA), ref: 03025E08
                          Memory Dump Source
                          • Source File: 00000000.00000002.3883206719.0000000003021000.00000040.00001000.00020000.00000000.sdmp, Offset: 03020000, based on PE: true
                          • Associated: 00000000.00000002.3883188616.0000000003020000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3883206719.0000000003039000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3883206719.0000000003561000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3883206719.000000000356D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_3020000_gfehgfwveg.jbxd
                          Yara matches
                          Similarity
                          • API ID: Sleep
                          • String ID:
                          • API String ID: 3472027048-0
                          • Opcode ID: 6ed5e6808b9a58be801bb3654ffeef2e1d50b6285f01ed8ded1d53a4de6adbd3
                          • Instruction ID: 8379101456e43860bdfd0cef33cbd417fd91cfb6f85fcce7acfb13e9a4e2a97a
                          • Opcode Fuzzy Hash: 6ed5e6808b9a58be801bb3654ffeef2e1d50b6285f01ed8ded1d53a4de6adbd3
                          • Instruction Fuzzy Hash: FB71E5316063208FD755DF28CD84B6AFFD5AF87320F1881AED8448F395D6B09845CB99

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 91 3025f50-3025f5a 92 3025f60-3025f6b 91->92 93 3025fe8-3025feb 91->93 96 3025fa4-3025fbd call 30259d4 92->96 97 3025f6d-3025f76 92->97 94 3025ff1-3026003 93->94 95 3026258-302625d 93->95 100 3026118-302611d 94->100 101 3026009-302600e 94->101 98 3026263-3026265 95->98 99 3025888-30258a6 95->99 120 3025fe3-3025fe6 96->120 121 3025fbf-3025fc5 96->121 103 3025f78-3025f7a 97->103 104 3025f7c-3025f87 call 30259d4 97->104 111 302598b-302598f 99->111 112 30258ac-30258b5 99->112 106 3026123-302612b 100->106 107 3026210-302622f call 30259d4 100->107 108 3026010-3026014 101->108 109 3026018-302601e 101->109 126 3025f89-3025f9d call 3025590 call 3025d58 104->126 127 3025f9f-3025fa1 104->127 106->107 116 3026131-3026138 106->116 150 3026202-3026206 107->150 151 3026231-3026237 107->151 118 3026020-3026026 109->118 119 3026035-3026050 109->119 113 3025991-3025999 111->113 114 302599b-30259a6 call 30259d4 111->114 122 30258b7-30258b9 112->122 123 30258bb 112->123 124 30259ca-30259d3 113->124 114->124 154 30259a8-30259ae 114->154 128 3026195-302619a 116->128 129 302613a-3026147 116->129 131 30260f0-30260fb call 30259d4 118->131 132 302602c-3026033 118->132 133 3026052-302605f 119->133 134 3026098-30260a5 119->134 135 3025fc7 121->135 136 3025fca-3025fe1 call 3025d58 121->136 137 30258bd-30258e3 VirtualQuery 122->137 123->137 126->127 141 30261a7-30261cb 128->141 142 302619c-30261a6 call 30255ac 128->142 139 3026149-3026152 129->139 140 302617c-3026189 129->140 185 3026113-3026117 131->185 186 30260fd-3026111 call 3025590 call 3025d58 131->186 132->108 132->119 143 3026090-3026095 133->143 144 3026061-302606a 133->144 147 30260b0-30260bf 134->147 148 30260a7-30260ad 134->148 135->136 136->120 145 3025953-302595e call 30259d4 137->145 146 30258e5-30258f7 137->146 139->129 155 3026154-302616c Sleep 139->155 156 302618b-3026193 140->156 157 3026209 140->157 160 30261d8-30261eb 141->160 161 30261cd-30261d4 141->161 142->141 143->134 144->133 159 302606c-3026082 Sleep 144->159 145->124 194 3025960-3025966 145->194 146->145 162 30258f9-302590e 146->162 163 30260c6-30260d6 147->163 164 30260c1 call 30255ac 147->164 148->163 167 3026239 151->167 168 302623c-3026256 call 3025560 call 3025d58 151->168 171 30259b0-30259b5 154->171 172 30259b8-30259c5 call 3025590 call 3025d58 154->172 155->140 173 302616e-3026179 Sleep 155->173 156->128 156->157 157->107 159->143 175 3026084-302608d Sleep 159->175 176 30261f4-3026200 160->176 179 30261ed-30261ef call 30255ec 160->179 161->176 177 3025912-3025926 VirtualAlloc 162->177 178 3025910 162->178 182 30260e2-30260ef 163->182 183 30260d8-30260dd call 30255ec 163->183 164->163 167->168 171->172 172->124 173->129 175->133 176->150 177->145 190 3025928-302593c VirtualAlloc 177->190 178->177 179->176 183->182 186->185 190->145 199 302593e-3025951 190->199 200 3025970-3025989 call 3025560 call 3025d58 194->200 201 3025968-302596d 194->201 199->124 200->124 201->200
                          Memory Dump Source
                          • Source File: 00000000.00000002.3883206719.0000000003021000.00000040.00001000.00020000.00000000.sdmp, Offset: 03020000, based on PE: true
                          • Associated: 00000000.00000002.3883188616.0000000003020000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3883206719.0000000003039000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3883206719.0000000003561000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3883206719.000000000356D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_3020000_gfehgfwveg.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 985e3a651a27c2821dcb5278c9e5c8016eab620e16a5255bb37f1ee8eef23637
                          • Instruction ID: e7918e315a565a543259704843a58896e9c70ca7440f3c110ba37fa04da877c6
                          • Opcode Fuzzy Hash: 985e3a651a27c2821dcb5278c9e5c8016eab620e16a5255bb37f1ee8eef23637
                          • Instruction Fuzzy Hash: 22C146727127240BD314EA7DDC847AEFBC69BC6221F5C827AE154CF395DBA5D8068388

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 211 30259d4-30259e6 212 3025c34-3025c39 211->212 213 30259ec-30259fc 211->213 214 3025c3f-3025c50 212->214 215 3025d4c-3025d4f 212->215 216 3025a54-3025a5d 213->216 217 30259fe-3025a0b 213->217 219 3025c52-3025c6e 214->219 220 3025bf8-3025c05 214->220 221 3025780-30257a9 VirtualAlloc 215->221 222 3025d55-3025d57 215->222 216->217 218 3025a5f-3025a6b 216->218 223 3025a24-3025a30 217->223 224 3025a0d-3025a1a 217->224 218->217 225 3025a6d-3025a79 218->225 226 3025c70-3025c78 219->226 227 3025c7c-3025c8b 219->227 220->219 232 3025c07-3025c10 220->232 228 30257db-30257e1 221->228 229 30257ab-30257d8 call 3025734 221->229 233 3025a32-3025a40 223->233 234 3025aa8-3025ab1 223->234 230 3025a44-3025a51 224->230 231 3025a1c-3025a20 224->231 225->217 235 3025a7b-3025a87 225->235 236 3025cd8-3025cee 226->236 238 3025ca4-3025cac 227->238 239 3025c8d-3025ca1 227->239 229->228 232->220 242 3025c12-3025c26 Sleep 232->242 240 3025ab3-3025ac0 234->240 241 3025aec-3025af6 234->241 235->216 244 3025a89-3025a99 Sleep 235->244 251 3025cf0-3025cfe 236->251 252 3025d07-3025d13 236->252 246 3025cc8-3025cca call 30256b8 238->246 247 3025cae-3025cc6 238->247 239->236 240->241 248 3025ac2-3025acb 240->248 249 3025b68-3025b74 241->249 250 3025af8-3025b23 241->250 242->219 243 3025c28-3025c2f Sleep 242->243 243->220 244->217 257 3025a9f-3025aa6 Sleep 244->257 258 3025ccf-3025cd7 246->258 247->258 248->240 259 3025acd-3025ae1 Sleep 248->259 255 3025b76-3025b88 249->255 256 3025b9c-3025bab call 30256b8 249->256 261 3025b25-3025b33 250->261 262 3025b3c-3025b4a 250->262 251->252 263 3025d00 251->263 253 3025d34 252->253 254 3025d15-3025d28 252->254 267 3025d39-3025d4b 253->267 266 3025d2a-3025d2f call 30255ec 254->266 254->267 268 3025b8a 255->268 269 3025b8c-3025b9a 255->269 275 3025bbd-3025bf6 256->275 279 3025bad-3025bb7 256->279 257->216 259->241 271 3025ae3-3025aea Sleep 259->271 261->262 272 3025b35 261->272 264 3025bb8 262->264 265 3025b4c-3025b66 call 30255ec 262->265 263->252 264->275 265->275 266->267 268->269 269->275 271->240 272->262
                          APIs
                          • Sleep.KERNEL32(00000000,FFFFFFDC,030259A2), ref: 03025A8B
                          • Sleep.KERNEL32(0000000A,00000000,FFFFFFDC,030259A2), ref: 03025AA1
                          • Sleep.KERNEL32(00000000,?,?,FFFFFFDC,030259A2), ref: 03025ACF
                          • Sleep.KERNEL32(0000000A,00000000,?,?,FFFFFFDC,030259A2), ref: 03025AE5
                          Memory Dump Source
                          • Source File: 00000000.00000002.3883206719.0000000003021000.00000040.00001000.00020000.00000000.sdmp, Offset: 03020000, based on PE: true
                          • Associated: 00000000.00000002.3883188616.0000000003020000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3883206719.0000000003039000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3883206719.0000000003561000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3883206719.000000000356D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_3020000_gfehgfwveg.jbxd
                          Yara matches
                          Similarity
                          • API ID: Sleep
                          • String ID:
                          • API String ID: 3472027048-0
                          • Opcode ID: a9a1fc6987f14514e6cf48fbe143e6457f534c571ef5b359c21d4ee475a1c51f
                          • Instruction ID: 245ae5f5f586cfc05f39e3db2f2c7f29bb32b10efd6a2c41525dfb3c06832d1e
                          • Opcode Fuzzy Hash: a9a1fc6987f14514e6cf48fbe143e6457f534c571ef5b359c21d4ee475a1c51f
                          • Instruction Fuzzy Hash: 7FC126725033218FD715DF28D894B59FFE0AB87320F1882AED8558F399D7B0A44ACB84

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 287 31cbdbc-31cbdf6 call 302a364 call 31cc6cc 292 31cbdf8-31cbe0e VirtualProtect 287->292 293 31cbe11-31cbe26 call 3029ebc 287->293 292->293
                          APIs
                          • VirtualProtect.KERNEL32(?,?,?,?,00000000,031CBE27), ref: 031CBE08
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3883206719.0000000003039000.00000040.00001000.00020000.00000000.sdmp, Offset: 03020000, based on PE: true
                          • Associated: 00000000.00000002.3883188616.0000000003020000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3883206719.0000000003021000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3883206719.0000000003561000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3883206719.000000000356D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_3020000_gfehgfwveg.jbxd
                          Yara matches
                          Similarity
                          • API ID: ProtectVirtual
                          • String ID: VirtualProtect
                          • API String ID: 544645111-268857135
                          • Opcode ID: 28cc32ef508df308789a2090d07979db7ee2439df67041d29b1465297c5dedd0
                          • Instruction ID: 54ba10a6ddd1028aad3ce95d9b56f9a8c3f1c7f6488148b5c5579bb2e4629c93
                          • Opcode Fuzzy Hash: 28cc32ef508df308789a2090d07979db7ee2439df67041d29b1465297c5dedd0
                          • Instruction Fuzzy Hash: E2F08C79614348AFCB04EFA8D851C9E7BF8FB4D710F508064F904D7390DB309A218B91

                          Control-flow Graph

                          APIs
                          • GetUserDefaultUILanguage.KERNEL32(00000000,0302E4AB,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,0302E532,00000000,?,00000105), ref: 0302E43F
                          • GetSystemDefaultUILanguage.KERNEL32(00000000,0302E4AB,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,0302E532,00000000,?,00000105), ref: 0302E467
                          Memory Dump Source
                          • Source File: 00000000.00000002.3883206719.0000000003021000.00000040.00001000.00020000.00000000.sdmp, Offset: 03020000, based on PE: true
                          • Associated: 00000000.00000002.3883188616.0000000003020000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3883206719.0000000003039000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3883206719.0000000003561000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3883206719.000000000356D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_3020000_gfehgfwveg.jbxd
                          Yara matches
                          Similarity
                          • API ID: DefaultLanguage$SystemUser
                          • String ID:
                          • API String ID: 384301227-0
                          • Opcode ID: e061fc02de2f9f229cb6055f79860cea6cdb16358c7be1f547f9fd0331ffd960
                          • Instruction ID: 5fdb75e80461d3b666d1ce234626164c0fbf1ffbccc4984b9361a2fd2eba3055
                          • Opcode Fuzzy Hash: e061fc02de2f9f229cb6055f79860cea6cdb16358c7be1f547f9fd0331ffd960
                          • Instruction Fuzzy Hash: 35314134A423399FDF50EB98C881AEEBFF5EF84300F504965D411ABA50DB74AD85CB94

                          Control-flow Graph

                          APIs
                          • GetModuleFileNameW.KERNEL32(00000000,?,00000105,00000000,0302E572,?,00400000,0351EC1C,?,0302D270,00400000,?,0000020A,00400000,0351EC1C,0302D2B0), ref: 0302E4F4
                          • LoadLibraryExW.KERNEL32(00000000,00000000,00000002,00000000,?,00000105,00000000,0302E572,?,00400000,0351EC1C,?,0302D270,00400000,?,0000020A), ref: 0302E545
                          Memory Dump Source
                          • Source File: 00000000.00000002.3883206719.0000000003021000.00000040.00001000.00020000.00000000.sdmp, Offset: 03020000, based on PE: true
                          • Associated: 00000000.00000002.3883188616.0000000003020000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3883206719.0000000003039000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3883206719.0000000003561000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3883206719.000000000356D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_3020000_gfehgfwveg.jbxd
                          Yara matches
                          Similarity
                          • API ID: FileLibraryLoadModuleName
                          • String ID:
                          • API String ID: 1159719554-0
                          • Opcode ID: 01b90ea04761ee7de3150024e5fa686096fe63e7165bc0cbeceea9baadb28763
                          • Instruction ID: 27fcd6cb1b66bd6222d1f95628790f7f6717b0916fa58af16b8f187e90b9a55e
                          • Opcode Fuzzy Hash: 01b90ea04761ee7de3150024e5fa686096fe63e7165bc0cbeceea9baadb28763
                          • Instruction Fuzzy Hash: BA11A775A4132C9FDB10EB54CC85FDEBBB8EB44700F5140A5A4189B690EB745F84CFA5

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 382 3509144-3509169 WSAStartup GetLastError
                          APIs
                          • WSAStartup.WS2_32(00000101,?), ref: 03509159
                          • GetLastError.KERNEL32(?,03510A5F,00000000,03510DED), ref: 0350915E
                          Memory Dump Source
                          • Source File: 00000000.00000002.3883206719.0000000003039000.00000040.00001000.00020000.00000000.sdmp, Offset: 03020000, based on PE: true
                          • Associated: 00000000.00000002.3883188616.0000000003020000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3883206719.0000000003021000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3883206719.0000000003561000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3883206719.000000000356D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_3020000_gfehgfwveg.jbxd
                          Yara matches
                          Similarity
                          • API ID: ErrorLastStartup
                          • String ID:
                          • API String ID: 1235836516-0
                          • Opcode ID: 6266be6b7c08fc3311064974d2a3c3bcd0f69c775ccd94063cda746f7cd61952
                          • Instruction ID: 53531ef3cc14c4403df2aa7b9285016ee1fc5bdcb70fe2472b55ec080ad355ae
                          • Opcode Fuzzy Hash: 6266be6b7c08fc3311064974d2a3c3bcd0f69c775ccd94063cda746f7cd61952
                          • Instruction Fuzzy Hash: 16C0803495170CDFD750FBD85C429D9735C8740300F0001E15D0CC6281F9F21A5006D2

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 383 3029d58-3029d73 384 3029d83-3029d91 call 3026edc 383->384 385 3029d75-3029d81 383->385 389 3029d94-3029dbb CreateThread 384->389 385->389 390 3029dc4-3029dcc 389->390 391 3029dbd-3029dbf call 3026ef8 389->391 391->390
                          APIs
                          • CreateThread.KERNEL32(?,?,03029D20,00000000,?,?), ref: 03029DB2
                          Memory Dump Source
                          • Source File: 00000000.00000002.3883206719.0000000003021000.00000040.00001000.00020000.00000000.sdmp, Offset: 03020000, based on PE: true
                          • Associated: 00000000.00000002.3883188616.0000000003020000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3883206719.0000000003039000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3883206719.0000000003561000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3883206719.000000000356D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_3020000_gfehgfwveg.jbxd
                          Yara matches
                          Similarity
                          • API ID: CreateThread
                          • String ID:
                          • API String ID: 2422867632-0
                          • Opcode ID: fae1095963026c1cc143eba1694c9544c7eb47da41ea3c577ef3bfaf13613cee
                          • Instruction ID: fabfa073502ea116aa906f0bba0206a30a462bf4a6820371adf7075cbfa6fe47
                          • Opcode Fuzzy Hash: fae1095963026c1cc143eba1694c9544c7eb47da41ea3c577ef3bfaf13613cee
                          • Instruction Fuzzy Hash: F8018476A06228AFCB00DB9CD840B8EBBECEB49250F144066F908DB351D7719D01D7A4

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 393 302d244-302d252 394 302d254-302d26b GetModuleFileNameW call 302e4b8 393->394 395 302d27f-302d28a 393->395 397 302d270-302d277 394->397 397->395 398 302d279-302d27c 397->398 398->395
                          APIs
                          • GetModuleFileNameW.KERNEL32(00400000,?,0000020A,00400000,0351EC1C,0302D2B0,?,?,030300C0), ref: 0302D262
                            • Part of subcall function 0302E4B8: GetModuleFileNameW.KERNEL32(00000000,?,00000105,00000000,0302E572,?,00400000,0351EC1C,?,0302D270,00400000,?,0000020A,00400000,0351EC1C,0302D2B0), ref: 0302E4F4
                            • Part of subcall function 0302E4B8: LoadLibraryExW.KERNEL32(00000000,00000000,00000002,00000000,?,00000105,00000000,0302E572,?,00400000,0351EC1C,?,0302D270,00400000,?,0000020A), ref: 0302E545
                          Memory Dump Source
                          • Source File: 00000000.00000002.3883206719.0000000003021000.00000040.00001000.00020000.00000000.sdmp, Offset: 03020000, based on PE: true
                          • Associated: 00000000.00000002.3883188616.0000000003020000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3883206719.0000000003039000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3883206719.0000000003561000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3883206719.000000000356D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_3020000_gfehgfwveg.jbxd
                          Yara matches
                          Similarity
                          • API ID: FileModuleName$LibraryLoad
                          • String ID:
                          • API String ID: 4113206344-0
                          • Opcode ID: 7c1ee64858cc89b131c1bcaaf4c5d23a408bec5d341bc7def07cd761b0403ce4
                          • Instruction ID: 0f415ff478dc1b8b44029503e0f56185a631094cf9f41ce8ebf6749f2c5321b2
                          • Opcode Fuzzy Hash: 7c1ee64858cc89b131c1bcaaf4c5d23a408bec5d341bc7def07cd761b0403ce4
                          • Instruction Fuzzy Hash: 6FE06DB1A023208BDF14DE6CC8C0A467BE8AB18654F040590EC28CF386D370CD1487E1

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 399 30256b8-30256d6 call 302564c VirtualAlloc 402 3025726-3025731 399->402 403 30256d8-3025725 399->403
                          APIs
                          • VirtualAlloc.KERNEL32(00000000,0013FFF0,00001000,00000004,?,?,03025CCF,FFFFFFDC,030259A2), ref: 030256CF
                          Memory Dump Source
                          • Source File: 00000000.00000002.3883206719.0000000003021000.00000040.00001000.00020000.00000000.sdmp, Offset: 03020000, based on PE: true
                          • Associated: 00000000.00000002.3883188616.0000000003020000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3883206719.0000000003039000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3883206719.0000000003561000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3883206719.000000000356D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_3020000_gfehgfwveg.jbxd
                          Yara matches
                          Similarity
                          • API ID: AllocVirtual
                          • String ID:
                          • API String ID: 4275171209-0
                          • Opcode ID: 05c2fa95e8d537993454116efb04f148f89b3d1bf6825aeedd4bdb18ae4a2e7b
                          • Instruction ID: 24ba2669cf2784f74a140c406007d57e3bd259902f217c48f3036c777ed613fc
                          • Opcode Fuzzy Hash: 05c2fa95e8d537993454116efb04f148f89b3d1bf6825aeedd4bdb18ae4a2e7b
                          • Instruction Fuzzy Hash: D7F064B2B013114BE714EE78AA50B42AFE4A74A350F10423EED09EB698E6B098069784
                          APIs
                          • GetModuleHandleW.KERNEL32(kernel32.dll,?,?,?,?,0302DEFB,00000000,0302DFBC,?,80000001,Software\Embarcadero\Locales,00000000,000F0019,?,00000000,0302DFD9), ref: 0302DBE1
                          • GetProcAddress.KERNEL32(00000000,GetLongPathNameW), ref: 0302DBF2
                          • FindFirstFileW.KERNEL32(?,?,kernel32.dll,?,?,?,?,0302DEFB,00000000,0302DFBC,?,80000001,Software\Embarcadero\Locales,00000000,000F0019,?), ref: 0302DCF2
                          • FindClose.KERNEL32(?,?,?,kernel32.dll,?,?,?,?,0302DEFB,00000000,0302DFBC,?,80000001,Software\Embarcadero\Locales,00000000,000F0019), ref: 0302DD04
                          • lstrlenW.KERNEL32(?,?,?,?,kernel32.dll,?,?,?,?,0302DEFB,00000000,0302DFBC,?,80000001,Software\Embarcadero\Locales,00000000), ref: 0302DD10
                          • lstrlenW.KERNEL32(?,?,?,?,?,kernel32.dll,?,?,?,?,0302DEFB,00000000,0302DFBC,?,80000001,Software\Embarcadero\Locales), ref: 0302DD55
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3883206719.0000000003021000.00000040.00001000.00020000.00000000.sdmp, Offset: 03020000, based on PE: true
                          • Associated: 00000000.00000002.3883188616.0000000003020000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3883206719.0000000003039000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3883206719.0000000003561000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3883206719.000000000356D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_3020000_gfehgfwveg.jbxd
                          Yara matches
                          Similarity
                          • API ID: Findlstrlen$AddressCloseFileFirstHandleModuleProc
                          • String ID: GetLongPathNameW$\$kernel32.dll
                          • API String ID: 1930782624-3908791685
                          • Opcode ID: d0aa9cc40bc2840c7f014a4621bbab2edafb64f7bc1515db46e59637b7855b96
                          • Instruction ID: 791225d2a2bd8bfe2465d1e95497905c18d79527775da0235510ed558e79d716
                          • Opcode Fuzzy Hash: d0aa9cc40bc2840c7f014a4621bbab2edafb64f7bc1515db46e59637b7855b96
                          • Instruction Fuzzy Hash: 6041D475E02A39CBCB10EB98CC84BDDFBB5EF85310F1885A5D424EB254E7B49E458B44
                          APIs
                          • GetVersionExW.KERNEL32(?,?,?,?,?,034E5AB9), ref: 034E5867
                          • GetVersionExW.KERNEL32(?,?,?,?,?,?,034E5AB9), ref: 034E5891
                          • LoadLibraryW.KERNEL32(ntdll.dll,RtlGetVersion,00000000,034E59F1,?,?,?,?,?,?,034E5AB9), ref: 034E58DE
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3883206719.0000000003039000.00000040.00001000.00020000.00000000.sdmp, Offset: 03020000, based on PE: true
                          • Associated: 00000000.00000002.3883188616.0000000003020000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3883206719.0000000003021000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3883206719.0000000003561000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3883206719.000000000356D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_3020000_gfehgfwveg.jbxd
                          Yara matches
                          Similarity
                          • API ID: Version$LibraryLoad
                          • String ID: RtlGetVersion$ntdll.dll
                          • API String ID: 192404683-1489217083
                          • Opcode ID: f20456f13d8bce78a33d55e399e008fcfcf02a7474297d4f6baf692cabc1dbaa
                          • Instruction ID: 628a90ba042186d15b20b5843f31b199a77317aa15aa6fc47398d70b2691af30
                          • Opcode Fuzzy Hash: f20456f13d8bce78a33d55e399e008fcfcf02a7474297d4f6baf692cabc1dbaa
                          • Instruction Fuzzy Hash: CB51C078A04208EFCB14DBA8D585AEEB7F5EF4A315F2584EAE408AB351D7309E40DB54
                          APIs
                          • IsValidLocale.KERNEL32(?,00000002,00000000,0302D8CD,?,?,?,00000000), ref: 0302D812
                          • GetLocaleInfoW.KERNEL32(00000000,00000059,?,00000055,?,00000002,00000000,0302D8CD,?,?,?,00000000), ref: 0302D82E
                          • GetLocaleInfoW.KERNEL32(00000000,0000005A,?,00000055,00000000,00000059,?,00000055,?,00000002,00000000,0302D8CD,?,?,?,00000000), ref: 0302D83F
                          Memory Dump Source
                          • Source File: 00000000.00000002.3883206719.0000000003021000.00000040.00001000.00020000.00000000.sdmp, Offset: 03020000, based on PE: true
                          • Associated: 00000000.00000002.3883188616.0000000003020000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3883206719.0000000003039000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3883206719.0000000003561000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3883206719.000000000356D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_3020000_gfehgfwveg.jbxd
                          Yara matches
                          Similarity
                          • API ID: Locale$Info$Valid
                          • String ID:
                          • API String ID: 1826331170-0
                          • Opcode ID: edca63fe28cf7ce2a62a39f8f2836c3bab8dfe33281f0abb6ad897f0ea5d3573
                          • Instruction ID: b23dc2888b355dc4f1a409ee2e605bd31cb7acacc6a1a5d779c759b185002a91
                          • Opcode Fuzzy Hash: edca63fe28cf7ce2a62a39f8f2836c3bab8dfe33281f0abb6ad897f0ea5d3573
                          • Instruction Fuzzy Hash: 2D319E35A01728AFDB20DB54CC85BDEBBB9EB84701F5004A5E919AA2A0D6345E858F10
                          APIs
                          • LoadLibraryW.KERNEL32(user32.dll), ref: 031CC741
                          • LoadLibraryW.KERNEL32(ntdll.dll,user32.dll), ref: 031CC75D
                          • LoadLibraryW.KERNEL32(advapi32.dll,ntdll.dll,user32.dll), ref: 031CC779
                          • LoadLibraryW.KERNEL32(shell32.dll,advapi32.dll,ntdll.dll,user32.dll), ref: 031CC795
                          • LoadLibraryW.KERNEL32(ws2_32.dll,shell32.dll,advapi32.dll,ntdll.dll,user32.dll), ref: 031CC7B1
                          • LoadLibraryW.KERNEL32(ole32.dll,ws2_32.dll,shell32.dll,advapi32.dll,ntdll.dll,user32.dll), ref: 031CC7CD
                          • LoadLibraryW.KERNEL32(wininet.dll,ole32.dll,ws2_32.dll,shell32.dll,advapi32.dll,ntdll.dll,user32.dll), ref: 031CC7E9
                          • LoadLibraryW.KERNEL32(wtsapi32.dll,wininet.dll,ole32.dll,ws2_32.dll,shell32.dll,advapi32.dll,ntdll.dll,user32.dll), ref: 031CC802
                          • LoadLibraryW.KERNEL32(crypt32.dll,wtsapi32.dll,wininet.dll,ole32.dll,ws2_32.dll,shell32.dll,advapi32.dll,ntdll.dll,user32.dll), ref: 031CC81B
                          • LoadLibraryW.KERNEL32(PSAPI.dll,crypt32.dll,wtsapi32.dll,wininet.dll,ole32.dll,ws2_32.dll,shell32.dll,advapi32.dll,ntdll.dll,user32.dll), ref: 031CC834
                          • LoadLibraryW.KERNEL32(gdi32.dll,PSAPI.dll,crypt32.dll,wtsapi32.dll,wininet.dll,ole32.dll,ws2_32.dll,shell32.dll,advapi32.dll,ntdll.dll,user32.dll), ref: 031CC84D
                          • LoadLibraryW.KERNEL32(Iphlpapi.dll,gdi32.dll,PSAPI.dll,crypt32.dll,wtsapi32.dll,wininet.dll,ole32.dll,ws2_32.dll,shell32.dll,advapi32.dll,ntdll.dll,user32.dll), ref: 031CC866
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3883206719.0000000003039000.00000040.00001000.00020000.00000000.sdmp, Offset: 03020000, based on PE: true
                          • Associated: 00000000.00000002.3883188616.0000000003020000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3883206719.0000000003021000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3883206719.0000000003561000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3883206719.000000000356D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_3020000_gfehgfwveg.jbxd
                          Yara matches
                          Similarity
                          • API ID: LibraryLoad
                          • String ID: Iphlpapi.dll$PSAPI.dll$advapi32.dll$crypt32.dll$gdi32.dll$ntdll.dll$ole32.dll$shell32.dll$user32.dll$wininet.dll$ws2_32.dll$wtsapi32.dll
                          • API String ID: 1029625771-1098239973
                          • Opcode ID: 332827f802219ace51d9d62850a8d7b0e633d2a632840c116f6aa4acc64f7b71
                          • Instruction ID: 4f2601d8db2cab749f37326d99f0c52c52ab3e549c0170cb06bac8d0768a62e1
                          • Opcode Fuzzy Hash: 332827f802219ace51d9d62850a8d7b0e633d2a632840c116f6aa4acc64f7b71
                          • Instruction Fuzzy Hash: 2D411778912784EFC750EFA8D540A9DBBF4FB6E301F5440A9E409A7254E3308A46EF90
                          APIs
                          • EnterCriticalSection.KERNEL32(0355EC14,00000000,0302DB84,?,?,?,00000000,?,0302E44C,00000000,0302E4AB,?,?,00000000,00000000,00000000), ref: 0302DA9E
                          • LeaveCriticalSection.KERNEL32(0355EC14,0355EC14,00000000,0302DB84,?,?,?,00000000,?,0302E44C,00000000,0302E4AB,?,?,00000000,00000000), ref: 0302DAC2
                          • LeaveCriticalSection.KERNEL32(0355EC14,0355EC14,00000000,0302DB84,?,?,?,00000000,?,0302E44C,00000000,0302E4AB,?,?,00000000,00000000), ref: 0302DAD1
                          • IsValidLocale.KERNEL32(00000000,00000002,0355EC14,0355EC14,00000000,0302DB84,?,?,?,00000000,?,0302E44C,00000000,0302E4AB), ref: 0302DAE3
                          • EnterCriticalSection.KERNEL32(0355EC14,00000000,00000002,0355EC14,0355EC14,00000000,0302DB84,?,?,?,00000000,?,0302E44C,00000000,0302E4AB), ref: 0302DB40
                          • LeaveCriticalSection.KERNEL32(0355EC14,0355EC14,00000000,00000002,0355EC14,0355EC14,00000000,0302DB84,?,?,?,00000000,?,0302E44C,00000000,0302E4AB), ref: 0302DB69
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3883206719.0000000003021000.00000040.00001000.00020000.00000000.sdmp, Offset: 03020000, based on PE: true
                          • Associated: 00000000.00000002.3883188616.0000000003020000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3883206719.0000000003039000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3883206719.0000000003561000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3883206719.000000000356D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_3020000_gfehgfwveg.jbxd
                          Yara matches
                          Similarity
                          • API ID: CriticalSection$Leave$Enter$LocaleValid
                          • String ID: en-GB,en,en-US,
                          • API String ID: 975949045-3021119265
                          • Opcode ID: a2e30d3fb220fae9ae569ebb89a980849562c691c4af04926fbb3dea2e9a9fbf
                          • Instruction ID: 46d062d36e2f4ffec0a422b5fb3665e8376b5d0674d53efd9f361b203a57ba93
                          • Opcode Fuzzy Hash: a2e30d3fb220fae9ae569ebb89a980849562c691c4af04926fbb3dea2e9a9fbf
                          • Instruction Fuzzy Hash: 8021D8283023309EDB11F7689C72ADD7DD8ABC7600F544462F860DF255DEA4DE4587A7
                          APIs
                          • GetModuleHandleW.KERNEL32(kernel32.dll,GetLogicalProcessorInformation), ref: 030287BD
                          • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 030287C3
                          • GetLogicalProcessorInformation.KERNEL32(00000000,?,GetLogicalProcessorInformation), ref: 030287D6
                          • GetLastError.KERNEL32(00000000,?,GetLogicalProcessorInformation), ref: 030287DF
                          • GetLogicalProcessorInformation.KERNEL32(?,?,00000000,03028856,?,00000000,?,GetLogicalProcessorInformation), ref: 0302880A
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3883206719.0000000003021000.00000040.00001000.00020000.00000000.sdmp, Offset: 03020000, based on PE: true
                          • Associated: 00000000.00000002.3883188616.0000000003020000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3883206719.0000000003039000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3883206719.0000000003561000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3883206719.000000000356D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_3020000_gfehgfwveg.jbxd
                          Yara matches
                          Similarity
                          • API ID: InformationLogicalProcessor$AddressErrorHandleLastModuleProc
                          • String ID: @$GetLogicalProcessorInformation$kernel32.dll
                          • API String ID: 1184211438-79381301
                          • Opcode ID: 5a0aa27e939cbf2b445bccd2fa5c599f37cb986823a0173980a9386dff657026
                          • Instruction ID: cfef8b8805dcab093beb9f94d64213a6c658323d65c142e0061cbd2a7354740b
                          • Opcode Fuzzy Hash: 5a0aa27e939cbf2b445bccd2fa5c599f37cb986823a0173980a9386dff657026
                          • Instruction Fuzzy Hash: 9711B178D02328AFDF50EBE4D805A9DBFF8EB81700F58C4A5EC249B541E7789A40CB10
                          APIs
                          • RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 03031868
                          Memory Dump Source
                          • Source File: 00000000.00000002.3883206719.0000000003021000.00000040.00001000.00020000.00000000.sdmp, Offset: 03020000, based on PE: true
                          • Associated: 00000000.00000002.3883188616.0000000003020000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3883206719.0000000003039000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3883206719.0000000003561000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3883206719.000000000356D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_3020000_gfehgfwveg.jbxd
                          Yara matches
                          Similarity
                          • API ID: ExceptionRaise
                          • String ID:
                          • API String ID: 3997070919-0
                          • Opcode ID: 346cedf9feaaccf9aba1f8817147001b8c3d30839046576f795801c7af1e0dcc
                          • Instruction ID: ac56aaadd23734b8d4e89faba9c79ae535ac65afe3edac123ab70eeacf140ecc
                          • Opcode Fuzzy Hash: 346cedf9feaaccf9aba1f8817147001b8c3d30839046576f795801c7af1e0dcc
                          • Instruction Fuzzy Hash: 95A18F75A02709DFDB18EFA8C880BEEB7F9BF8E310F144119E505AB294D770A945CB50
                          APIs
                            • Part of subcall function 03028EBC: GetCurrentThreadId.KERNEL32 ref: 03028EBF
                          • GetTickCount.KERNEL32 ref: 03028A67
                          • GetTickCount.KERNEL32 ref: 03028A7F
                          • GetCurrentThreadId.KERNEL32 ref: 03028AAE
                          • GetTickCount.KERNEL32 ref: 03028AD9
                          • GetTickCount.KERNEL32 ref: 03028B10
                          • GetTickCount.KERNEL32 ref: 03028B3A
                          • GetCurrentThreadId.KERNEL32 ref: 03028BAA
                          Memory Dump Source
                          • Source File: 00000000.00000002.3883206719.0000000003021000.00000040.00001000.00020000.00000000.sdmp, Offset: 03020000, based on PE: true
                          • Associated: 00000000.00000002.3883188616.0000000003020000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3883206719.0000000003039000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3883206719.0000000003561000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3883206719.000000000356D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_3020000_gfehgfwveg.jbxd
                          Yara matches
                          Similarity
                          • API ID: CountTick$CurrentThread
                          • String ID:
                          • API String ID: 3968769311-0
                          • Opcode ID: a8c25fc96b3cd543ab0f578f111379ab041e43556de281359690d43265133683
                          • Instruction ID: 4a665c9f4f434f7f4be64b713fc4c7008455de08d7cdda91fe9d66f4f8504bc9
                          • Opcode Fuzzy Hash: a8c25fc96b3cd543ab0f578f111379ab041e43556de281359690d43265133683
                          • Instruction Fuzzy Hash: 5341A37820A3619EE762EE7CC88035EBFD1AF85354F1DCD6CE4E887281EB7494848742
                          APIs
                          • GetStdHandle.KERNEL32(000000F5,Runtime error at 00000000,0000001D,?,00000000,?,03029BB2,?,?,00000000,00000000,03029CC6,03029CE0,?,?,030311E8), ref: 03029B2D
                          • WriteFile.KERNEL32(00000000,000000F5,Runtime error at 00000000,0000001D,?,00000000,?,03029BB2,?,?,00000000,00000000,03029CC6,03029CE0), ref: 03029B33
                          • GetStdHandle.KERNEL32(000000F5,00000000,00000002,?,00000000,00000000,000000F5,Runtime error at 00000000,0000001D,?,00000000,?,03029BB2,?,?,00000000), ref: 03029B4E
                          • WriteFile.KERNEL32(00000000,000000F5,00000000,00000002,?,00000000,00000000,000000F5,Runtime error at 00000000,0000001D,?,00000000,?,03029BB2,?,?), ref: 03029B54
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3883206719.0000000003021000.00000040.00001000.00020000.00000000.sdmp, Offset: 03020000, based on PE: true
                          • Associated: 00000000.00000002.3883188616.0000000003020000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3883206719.0000000003039000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3883206719.0000000003561000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3883206719.000000000356D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_3020000_gfehgfwveg.jbxd
                          Yara matches
                          Similarity
                          • API ID: FileHandleWrite
                          • String ID: Error$Runtime error at 00000000
                          • API String ID: 3320372497-2970929446
                          • Opcode ID: 0371e2688264a20f76fe922684ebd08468dc14d15df6f9e7b217364f59c182a3
                          • Instruction ID: ba2edc9ceed26c8dbebbf9b81edbacc7322795ec6acde00724dd89dcd96cf3a3
                          • Opcode Fuzzy Hash: 0371e2688264a20f76fe922684ebd08468dc14d15df6f9e7b217364f59c182a3
                          • Instruction Fuzzy Hash: 58F046A424233879FA00F3685C87FAE2E9CA7C5F10F080144BA20AD0E9C7A44088D721
                          APIs
                          • LoadLibraryW.KERNEL32(user32.dll,03510A4B,00000000,03510DED), ref: 031CC659
                          • LoadLibraryW.KERNEL32(kernel32.dll,user32.dll,03510A4B,00000000,03510DED), ref: 031CC668
                          • LoadLibraryW.KERNEL32(ntdll.dll,kernel32.dll,user32.dll,03510A4B,00000000,03510DED), ref: 031CC677
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3883206719.0000000003039000.00000040.00001000.00020000.00000000.sdmp, Offset: 03020000, based on PE: true
                          • Associated: 00000000.00000002.3883188616.0000000003020000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3883206719.0000000003021000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3883206719.0000000003561000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3883206719.000000000356D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_3020000_gfehgfwveg.jbxd
                          Yara matches
                          Similarity
                          • API ID: LibraryLoad
                          • String ID: kernel32.dll$ntdll.dll$user32.dll
                          • API String ID: 1029625771-3818928520
                          • Opcode ID: 44eca97afbb3ef58402fdd7426a6a10456df3384c624489fc3b7343cc361848d
                          • Instruction ID: dd94bebaded2a68288d416cbecfcda9c1552f1ae2529bd0f508fb442afd42aa9
                          • Opcode Fuzzy Hash: 44eca97afbb3ef58402fdd7426a6a10456df3384c624489fc3b7343cc361848d
                          • Instruction Fuzzy Hash: 99C012ACD53B906FC6B0FB7055518AC3568D5B7703B441069901C6F755D77408066FD1
                          APIs
                          • GetThreadUILanguage.KERNEL32(?,00000000), ref: 0302D975
                          • SetThreadPreferredUILanguages.KERNEL32(00000004,?,?), ref: 0302D9D3
                          • SetThreadPreferredUILanguages.KERNEL32(00000000,00000000,?), ref: 0302DA30
                          • SetThreadPreferredUILanguages.KERNEL32(00000008,?,?), ref: 0302DA63
                            • Part of subcall function 0302D920: GetThreadPreferredUILanguages.KERNEL32(00000038,?,00000000,?,?,00000000,?,?,0302D9E1), ref: 0302D937
                            • Part of subcall function 0302D920: GetThreadPreferredUILanguages.KERNEL32(00000038,?,00000000,?,?,?,0302D9E1), ref: 0302D954
                          Memory Dump Source
                          • Source File: 00000000.00000002.3883206719.0000000003021000.00000040.00001000.00020000.00000000.sdmp, Offset: 03020000, based on PE: true
                          • Associated: 00000000.00000002.3883188616.0000000003020000.00000004.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3883206719.0000000003039000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3883206719.0000000003561000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000000.00000002.3883206719.000000000356D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_3020000_gfehgfwveg.jbxd
                          Yara matches
                          Similarity
                          • API ID: Thread$LanguagesPreferred$Language
                          • String ID:
                          • API String ID: 2255706666-0
                          • Opcode ID: 51c3768e3b12c6c237558fb1aa910df07d5d7804ac33d7d0f44ac4de2fbf2f10
                          • Instruction ID: 97168761d46b502fb99801d15a4f18e6228953c9241be94eb041281530cc2618
                          • Opcode Fuzzy Hash: 51c3768e3b12c6c237558fb1aa910df07d5d7804ac33d7d0f44ac4de2fbf2f10
                          • Instruction Fuzzy Hash: 7E316D35A0122E9BDB10EBE9C884AEEBBF8FF44300F1445A5E565EB294DB749E058B50