Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
intro.avi.exe

Overview

General Information

Sample name:intro.avi.exe
Analysis ID:1583245
MD5:d219d94cabaa00e5abffc599bdeef75d
SHA1:123e511de20beab7bfa2bea5c2206422bc5e8241
SHA256:3cc847687e60acda504fc35577f36eedd0bca559a4de915d6dd88db9178567d4
Tags:exeQuasarRATuser-lontze7
Infos:

Detection

Quasar
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Quasar RAT
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Installs a global keyboard hook
Machine Learning detection for dropped file
Machine Learning detection for sample
Uses dynamic DNS services
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Generic Downloader
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Add Scheduled Task Parent
Sigma detected: Suspicious Schtasks From Env Var Folder
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • intro.avi.exe (PID: 7560 cmdline: "C:\Users\user\Desktop\intro.avi.exe" MD5: D219D94CABAA00E5ABFFC599BDEEF75D)
    • schtasks.exe (PID: 7692 cmdline: "schtasks" /create /tn "System Ware" /sc ONLOGON /tr "C:\Users\user\Desktop\intro.avi.exe" /rl HIGHEST /f MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 7700 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • systemware.exe (PID: 7740 cmdline: "C:\Users\user\AppData\Roaming\system\systemware.exe" MD5: D219D94CABAA00E5ABFFC599BDEEF75D)
      • schtasks.exe (PID: 7808 cmdline: "schtasks" /create /tn "System Ware" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\system\systemware.exe" /rl HIGHEST /f MD5: 48C2FE20575769DE916F48EF0676A965)
        • conhost.exe (PID: 7816 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • cmd.exe (PID: 7904 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\7jSSwThVwFwB.bat" " MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • conhost.exe (PID: 7920 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • chcp.com (PID: 7996 cmdline: chcp 65001 MD5: 20A59FB950D8A191F7D35C4CA7DA9CAF)
        • PING.EXE (PID: 8040 cmdline: ping -n 10 localhost MD5: B3624DD758CCECF93A1226CEF252CA12)
        • systemware.exe (PID: 7312 cmdline: "C:\Users\user\AppData\Roaming\system\systemware.exe" MD5: D219D94CABAA00E5ABFFC599BDEEF75D)
      • WerFault.exe (PID: 8056 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7740 -s 2312 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • intro.avi.exe (PID: 7824 cmdline: C:\Users\user\Desktop\intro.avi.exe MD5: D219D94CABAA00E5ABFFC599BDEEF75D)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Quasar RAT, QuasarRATQuasar RAT is a malware family written in .NET which is used by a variety of attackers. The malware is fully functional and open source, and is often packed to make analysis of the source more difficult.
  • APT33
  • Dropping Elephant
  • Stone Panda
  • The Gorgon Group
https://malpedia.caad.fkie.fraunhofer.de/details/win.quasar_rat
{"Host:Port": "X&\\ @p)8I)-qX$", "InstallName": "/A: _2C<Q", "MutexName": "vc%\\uNjM", "StartupKey": "-<>.&r", "Tag": "MhIs>", "ServerSignature": "(\"Dy{{(/Q4", "ServerCertificate": "u?9:$PNPb"}
SourceRuleDescriptionAuthorStrings
intro.avi.exeJoeSecurity_QuasarYara detected Quasar RATJoe Security
    intro.avi.exeJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
      intro.avi.exeWindows_Trojan_Quasarrat_e52df647unknownunknown
      • 0x3ec19:$a1: GetKeyloggerLogsResponse
      • 0x3e37a:$a2: DoDownloadAndExecute
      • 0x50800:$a3: http://api.ipify.org/
      • 0x4e309:$a4: Domain: {1}{0}Cookie Name: {2}{0}Value: {3}{0}Path: {4}{0}Expired: {5}{0}HttpOnly: {6}{0}Secure: {7}
      • 0x4f657:$a5: " /sc ONLOGON /tr "
      intro.avi.exeQuasar_RAT_1Detects Quasar RATFlorian Roth
      • 0x3e136:$s1: DoUploadAndExecute
      • 0x3e37a:$s2: DoDownloadAndExecute
      • 0x3defb:$s3: DoShellExecute
      • 0x3e332:$s4: set_Processname
      • 0x5a24:$op1: 04 1E FE 02 04 16 FE 01 60
      • 0x5948:$op2: 00 17 03 1F 20 17 19 15 28
      • 0x63ae:$op3: 00 04 03 69 91 1B 40
      • 0x6bfe:$op3: 00 04 03 69 91 1B 40
      intro.avi.exeQuasar_RAT_2Detects Quasar RATFlorian Roth
      • 0x3ec19:$x1: GetKeyloggerLogsResponse
      • 0x3ee59:$s1: DoShellExecuteResponse
      • 0x3e7c8:$s2: GetPasswordsResponse
      • 0x3ed2c:$s3: GetStartupItemsResponse
      • 0x3e14a:$s5: RunHidden
      • 0x3e168:$s5: RunHidden
      • 0x3e176:$s5: RunHidden
      • 0x3e18a:$s5: RunHidden
      Click to see the 8 entries
      SourceRuleDescriptionAuthorStrings
      C:\Users\user\AppData\Roaming\system\systemware.exeJoeSecurity_QuasarYara detected Quasar RATJoe Security
        C:\Users\user\AppData\Roaming\system\systemware.exeJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
          C:\Users\user\AppData\Roaming\system\systemware.exeWindows_Trojan_Quasarrat_e52df647unknownunknown
          • 0x3ec19:$a1: GetKeyloggerLogsResponse
          • 0x3e37a:$a2: DoDownloadAndExecute
          • 0x50800:$a3: http://api.ipify.org/
          • 0x4e309:$a4: Domain: {1}{0}Cookie Name: {2}{0}Value: {3}{0}Path: {4}{0}Expired: {5}{0}HttpOnly: {6}{0}Secure: {7}
          • 0x4f657:$a5: " /sc ONLOGON /tr "
          C:\Users\user\AppData\Roaming\system\systemware.exeQuasar_RAT_1Detects Quasar RATFlorian Roth
          • 0x3e136:$s1: DoUploadAndExecute
          • 0x3e37a:$s2: DoDownloadAndExecute
          • 0x3defb:$s3: DoShellExecute
          • 0x3e332:$s4: set_Processname
          • 0x5a24:$op1: 04 1E FE 02 04 16 FE 01 60
          • 0x5948:$op2: 00 17 03 1F 20 17 19 15 28
          • 0x63ae:$op3: 00 04 03 69 91 1B 40
          • 0x6bfe:$op3: 00 04 03 69 91 1B 40
          C:\Users\user\AppData\Roaming\system\systemware.exeQuasar_RAT_2Detects Quasar RATFlorian Roth
          • 0x3ec19:$x1: GetKeyloggerLogsResponse
          • 0x3ee59:$s1: DoShellExecuteResponse
          • 0x3e7c8:$s2: GetPasswordsResponse
          • 0x3ed2c:$s3: GetStartupItemsResponse
          • 0x3e14a:$s5: RunHidden
          • 0x3e168:$s5: RunHidden
          • 0x3e176:$s5: RunHidden
          • 0x3e18a:$s5: RunHidden
          Click to see the 8 entries
          SourceRuleDescriptionAuthorStrings
          00000000.00000000.1349274211.00000000005F2000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_QuasarYara detected Quasar RATJoe Security
            00000000.00000000.1349274211.00000000005F2000.00000002.00000001.01000000.00000003.sdmpWindows_Trojan_Quasarrat_e52df647unknownunknown
            • 0x3ea19:$a1: GetKeyloggerLogsResponse
            • 0x3e17a:$a2: DoDownloadAndExecute
            • 0x50600:$a3: http://api.ipify.org/
            • 0x4e109:$a4: Domain: {1}{0}Cookie Name: {2}{0}Value: {3}{0}Path: {4}{0}Expired: {5}{0}HttpOnly: {6}{0}Secure: {7}
            • 0x4f457:$a5: " /sc ONLOGON /tr "
            00000000.00000000.1349274211.00000000005F2000.00000002.00000001.01000000.00000003.sdmpQuasar_RAT_1Detects Quasar RATFlorian Roth
            • 0x3df36:$s1: DoUploadAndExecute
            • 0x3e17a:$s2: DoDownloadAndExecute
            • 0x3dcfb:$s3: DoShellExecute
            • 0x3e132:$s4: set_Processname
            • 0x5824:$op1: 04 1E FE 02 04 16 FE 01 60
            • 0x5748:$op2: 00 17 03 1F 20 17 19 15 28
            • 0x61ae:$op3: 00 04 03 69 91 1B 40
            • 0x69fe:$op3: 00 04 03 69 91 1B 40
            00000000.00000000.1349274211.00000000005F2000.00000002.00000001.01000000.00000003.sdmpimplant_win_quasarratDetect QuasarRAT (reted from samples 2023-03)Sekoia.io
            • 0x4f600:$: 63 00 68 00 63 00 70 00 20 00 36 00 35 00 30 00 30 00 31 00
            • 0x4f749:$: 63 00 68 00 63 00 70 00 20 00 36 00 35 00 30 00 30 00 31 00
            • 0x4f618:$: 65 00 63 00 68 00 6F 00 20 00 44 00 4F 00 4E 00 54 00 20 00 43 00 4C 00 4F 00 53 00 45 00 20 00 54 00 48 00 49 00 53 00 20 00 57 00 49 00 4E 00 44 00 4F 00 57 00 21 00
            • 0x4f761:$: 65 00 63 00 68 00 6F 00 20 00 44 00 4F 00 4E 00 54 00 20 00 43 00 4C 00 4F 00 53 00 45 00 20 00 54 00 48 00 49 00 53 00 20 00 57 00 49 00 4E 00 44 00 4F 00 57 00 21 00
            • 0x4f654:$: 70 00 69 00 6E 00 67 00 20 00 2D 00 6E 00 20 00 31 00 30 00 20 00 6C 00 6F 00 63 00 61 00 6C 00 68 00 6F 00 73 00 74 00 20 00 3E 00 20 00 6E 00 75 00 6C 00
            • 0x4f79d:$: 70 00 69 00 6E 00 67 00 20 00 2D 00 6E 00 20 00 31 00 30 00 20 00 6C 00 6F 00 63 00 61 00 6C 00 68 00 6F 00 73 00 74 00 20 00 3E 00 20 00 6E 00 75 00 6C 00
            • 0x4f68c:$: 64 00 65 00 6C 00 20 00 2F 00 61 00 20 00 2F 00 71 00 20 00 2F 00 66 00 20 00 22 00
            • 0x4f6d2:$: 64 00 65 00 6C 00 20 00 2F 00 61 00 20 00 2F 00 71 00 20 00 2F 00 66 00 20 00 22 00
            • 0x3dcfb:$: DoShellExecute
            • 0x3ec59:$: DoShellExecute
            • 0x3dc43:$: DoDownloadFile
            • 0x3dc52:$: DoDownloadFile
            • 0x3e887:$: DoDownloadFile
            00000000.00000000.1349274211.00000000005F2000.00000002.00000001.01000000.00000003.sdmpQuasardetect Remcos in memoryJPCERT/CC Incident Response Group
            • 0x4ee16:$quasarstr1: [PRIVATE KEY LOCATION: "{0}"]
            • 0x4ea2a:$quasarstr2: User: {0}{3}Pass: {1}{3}Host: {2}
            • 0x33dd0:$class: Core.MouseKeyHook.WinApi
            Click to see the 1 entries
            SourceRuleDescriptionAuthorStrings
            0.0.intro.avi.exe.5f0000.0.unpackJoeSecurity_QuasarYara detected Quasar RATJoe Security
              0.0.intro.avi.exe.5f0000.0.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                0.0.intro.avi.exe.5f0000.0.unpackWindows_Trojan_Quasarrat_e52df647unknownunknown
                • 0x3ec19:$a1: GetKeyloggerLogsResponse
                • 0x3e37a:$a2: DoDownloadAndExecute
                • 0x50800:$a3: http://api.ipify.org/
                • 0x4e309:$a4: Domain: {1}{0}Cookie Name: {2}{0}Value: {3}{0}Path: {4}{0}Expired: {5}{0}HttpOnly: {6}{0}Secure: {7}
                • 0x4f657:$a5: " /sc ONLOGON /tr "
                0.0.intro.avi.exe.5f0000.0.unpackQuasar_RAT_1Detects Quasar RATFlorian Roth
                • 0x3e136:$s1: DoUploadAndExecute
                • 0x3e37a:$s2: DoDownloadAndExecute
                • 0x3defb:$s3: DoShellExecute
                • 0x3e332:$s4: set_Processname
                • 0x5a24:$op1: 04 1E FE 02 04 16 FE 01 60
                • 0x5948:$op2: 00 17 03 1F 20 17 19 15 28
                • 0x63ae:$op3: 00 04 03 69 91 1B 40
                • 0x6bfe:$op3: 00 04 03 69 91 1B 40
                0.0.intro.avi.exe.5f0000.0.unpackQuasar_RAT_2Detects Quasar RATFlorian Roth
                • 0x3ec19:$x1: GetKeyloggerLogsResponse
                • 0x3ee59:$s1: DoShellExecuteResponse
                • 0x3e7c8:$s2: GetPasswordsResponse
                • 0x3ed2c:$s3: GetStartupItemsResponse
                • 0x3e14a:$s5: RunHidden
                • 0x3e168:$s5: RunHidden
                • 0x3e176:$s5: RunHidden
                • 0x3e18a:$s5: RunHidden
                Click to see the 8 entries

                System Summary

                barindex
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "schtasks" /create /tn "System Ware" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\system\systemware.exe" /rl HIGHEST /f, CommandLine: "schtasks" /create /tn "System Ware" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\system\systemware.exe" /rl HIGHEST /f, CommandLine|base64offset|contains: j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\AppData\Roaming\system\systemware.exe", ParentImage: C:\Users\user\AppData\Roaming\system\systemware.exe, ParentProcessId: 7740, ParentProcessName: systemware.exe, ProcessCommandLine: "schtasks" /create /tn "System Ware" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\system\systemware.exe" /rl HIGHEST /f, ProcessId: 7808, ProcessName: schtasks.exe
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "schtasks" /create /tn "System Ware" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\system\systemware.exe" /rl HIGHEST /f, CommandLine: "schtasks" /create /tn "System Ware" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\system\systemware.exe" /rl HIGHEST /f, CommandLine|base64offset|contains: j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\AppData\Roaming\system\systemware.exe", ParentImage: C:\Users\user\AppData\Roaming\system\systemware.exe, ParentProcessId: 7740, ParentProcessName: systemware.exe, ProcessCommandLine: "schtasks" /create /tn "System Ware" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\system\systemware.exe" /rl HIGHEST /f, ProcessId: 7808, ProcessName: schtasks.exe
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-02T09:25:09.395784+010020363831A Network Trojan was detected192.168.2.949743208.95.112.180TCP
                2025-01-02T09:25:11.739551+010020363831A Network Trojan was detected192.168.2.949754208.95.112.180TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: intro.avi.exeAvira: detected
                Source: C:\Users\user\AppData\Local\Temp\7jSSwThVwFwB.batAvira: detection malicious, Label: BAT/Delbat.C
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeAvira: detection malicious, Label: HEUR/AGEN.1307418
                Source: intro.avi.exeMalware Configuration Extractor: Quasar {"Host:Port": "X&\\ @p)8I)-qX$", "InstallName": "/A: _2C<Q", "MutexName": "vc%\\uNjM", "StartupKey": "-<>.&r", "Tag": "MhIs>", "ServerSignature": "(\"Dy{{(/Q4", "ServerCertificate": "u?9:$PNPb"}
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeReversingLabs: Detection: 84%
                Source: intro.avi.exeVirustotal: Detection: 84%Perma Link
                Source: intro.avi.exeReversingLabs: Detection: 84%
                Source: Yara matchFile source: intro.avi.exe, type: SAMPLE
                Source: Yara matchFile source: 0.0.intro.avi.exe.5f0000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000000.1349274211.00000000005F2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: intro.avi.exe PID: 7560, type: MEMORYSTR
                Source: Yara matchFile source: C:\Users\user\AppData\Roaming\system\systemware.exe, type: DROPPED
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeJoe Sandbox ML: detected
                Source: intro.avi.exeJoe Sandbox ML: detected
                Source: intro.avi.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: intro.avi.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: Binary string: System.Runtime.Serialization.ni.pdb source: WER24CC.tmp.dmp.14.dr
                Source: Binary string: System.Xml.ni.pdb source: WER24CC.tmp.dmp.14.dr
                Source: Binary string: System.ServiceModel.Internals.pdb source: WER24CC.tmp.dmp.14.dr
                Source: Binary string: System.Runtime.Serialization.ni.pdbRSDSg@h source: WER24CC.tmp.dmp.14.dr
                Source: Binary string: \??\C:\Users\user\AppData\Roaming\system\systemware.PDB source: systemware.exe, 00000004.00000002.1615832564.000000000512F000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: C:\Windows\System.pdbpdbtem.pdb source: systemware.exe, 00000004.00000002.1615832564.000000000512F000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: Accessibility.pdb source: WER24CC.tmp.dmp.14.dr
                Source: Binary string: System.ni.pdbRSDS source: WER24CC.tmp.dmp.14.dr
                Source: Binary string: System.pdbN|2h|2 Z|2_CorDllMainmscoree.dll source: systemware.exe, 00000004.00000002.1602907003.0000000000E09000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: C:\Users\user\AppData\Roaming\system\systemware.PDB source: systemware.exe, 00000004.00000002.1602361908.0000000000AF8000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: SMDiagnostics.pdb source: WER24CC.tmp.dmp.14.dr
                Source: Binary string: System.Configuration.ni.pdb source: WER24CC.tmp.dmp.14.dr
                Source: Binary string: mscorlib.ni.pdbRSDS source: WER24CC.tmp.dmp.14.dr
                Source: Binary string: System.Configuration.pdb source: WER24CC.tmp.dmp.14.dr
                Source: Binary string: \??\C:\Windows\symbols\dll\System.pdb~ source: systemware.exe, 00000004.00000002.1615832564.0000000005108000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: System.Windows.Forms.pdbSystem.Management.ni.dll source: WER24CC.tmp.dmp.14.dr
                Source: Binary string: System.Xml.pdb source: WER24CC.tmp.dmp.14.dr
                Source: Binary string: System.pdb source: systemware.exe, 00000004.00000002.1602907003.0000000000E09000.00000004.00000020.00020000.00000000.sdmp, WER24CC.tmp.dmp.14.dr
                Source: Binary string: System.Xml.ni.pdbRSDS# source: WER24CC.tmp.dmp.14.dr
                Source: Binary string: System.Core.ni.pdb source: WER24CC.tmp.dmp.14.dr
                Source: Binary string: System.Windows.Forms.pdb source: WER24CC.tmp.dmp.14.dr
                Source: Binary string: mscorlib.pdb source: WER24CC.tmp.dmp.14.dr
                Source: Binary string: System.Runtime.Serialization.pdbAccessibility.dllAccessibility.dllSMDiagnostics.dllSMDiagnostics.dll@W source: WER24CC.tmp.dmp.14.dr
                Source: Binary string: System.Management.ni.pdbRSDSJ< source: WER24CC.tmp.dmp.14.dr
                Source: Binary string: \??\C:\Windows\System.pdb= source: systemware.exe, 00000004.00000002.1615664818.0000000005090000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: System.Management.pdb source: WER24CC.tmp.dmp.14.dr
                Source: Binary string: System.Drawing.pdb source: WER24CC.tmp.dmp.14.dr
                Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.pdb source: systemware.exe, 00000004.00000002.1602907003.0000000000DDF000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: mscorlib.ni.pdb source: WER24CC.tmp.dmp.14.dr
                Source: Binary string: System.Management.ni.pdb source: WER24CC.tmp.dmp.14.dr
                Source: Binary string: HPXo,C:\Windows\System.pdb source: systemware.exe, 00000004.00000002.1602361908.0000000000AF8000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: System.Core.pdb source: WER24CC.tmp.dmp.14.dr
                Source: Binary string: System.Runtime.Serialization.pdb source: WER24CC.tmp.dmp.14.dr
                Source: Binary string: System.Xml.pdbL0Tw# source: WER24CC.tmp.dmp.14.dr
                Source: Binary string: System.pdb< source: WER24CC.tmp.dmp.14.dr
                Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WER24CC.tmp.dmp.14.dr
                Source: Binary string: System.ni.pdb source: WER24CC.tmp.dmp.14.dr
                Source: Binary string: System.Core.ni.pdbRSDS source: WER24CC.tmp.dmp.14.dr

                Networking

                barindex
                Source: Network trafficSuricata IDS: 2036383 - Severity 1 - ET MALWARE Common RAT Connectivity Check Observed : 192.168.2.9:49754 -> 208.95.112.1:80
                Source: Network trafficSuricata IDS: 2036383 - Severity 1 - ET MALWARE Common RAT Connectivity Check Observed : 192.168.2.9:49743 -> 208.95.112.1:80
                Source: Malware configuration extractorURLs: X&\ @p)8I)-qX$
                Source: unknownDNS query: name: erbaevbann3.ddns.net
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping -n 10 localhost
                Source: Yara matchFile source: intro.avi.exe, type: SAMPLE
                Source: Yara matchFile source: 0.0.intro.avi.exe.5f0000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: C:\Users\user\AppData\Roaming\system\systemware.exe, type: DROPPED
                Source: Joe Sandbox ViewIP Address: 208.95.112.1 208.95.112.1
                Source: unknownDNS query: name: ip-api.com
                Source: global trafficHTTP traffic detected: GET /json/ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.3; rv:48.0) Gecko/20100101 Firefox/48.0Host: ip-api.comConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /json/ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.3; rv:48.0) Gecko/20100101 Firefox/48.0Host: ip-api.comConnection: Keep-Alive
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: global trafficHTTP traffic detected: GET /json/ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.3; rv:48.0) Gecko/20100101 Firefox/48.0Host: ip-api.comConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /json/ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.3; rv:48.0) Gecko/20100101 Firefox/48.0Host: ip-api.comConnection: Keep-Alive
                Source: global trafficDNS traffic detected: DNS query: ip-api.com
                Source: global trafficDNS traffic detected: DNS query: erbaevbann3.ddns.net
                Source: intro.avi.exe, systemware.exe.0.drString found in binary or memory: http://api.ipify.org/
                Source: intro.avi.exe, systemware.exe.0.drString found in binary or memory: http://freegeoip.net/xml/
                Source: intro.avi.exe, 00000000.00000002.1376092522.00000000029A7000.00000004.00000800.00020000.00000000.sdmp, intro.avi.exe, 00000000.00000002.1376092522.00000000029BA000.00000004.00000800.00020000.00000000.sdmp, systemware.exe, 00000004.00000002.1604487334.0000000002B47000.00000004.00000800.00020000.00000000.sdmp, systemware.exe, 00000004.00000002.1604487334.0000000002B5A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com
                Source: intro.avi.exe, systemware.exe.0.drString found in binary or memory: http://ip-api.com/json/
                Source: intro.avi.exe, 00000000.00000002.1376092522.00000000029BA000.00000004.00000800.00020000.00000000.sdmp, systemware.exe, 00000004.00000002.1604487334.0000000002B5A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.datacontract.org/2004/07/
                Source: intro.avi.exe, 00000000.00000002.1376092522.00000000029A7000.00000004.00000800.00020000.00000000.sdmp, systemware.exe, 00000004.00000002.1604487334.0000000002B47000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: Amcache.hve.14.drString found in binary or memory: http://upx.sf.net

                Key, Mouse, Clipboard, Microphone and Screen Capturing

                barindex
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeWindows user hook set: 0 keyboard low level C:\Users\user\AppData\Roaming\system\systemware.exeJump to behavior

                E-Banking Fraud

                barindex
                Source: Yara matchFile source: intro.avi.exe, type: SAMPLE
                Source: Yara matchFile source: 0.0.intro.avi.exe.5f0000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000000.1349274211.00000000005F2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: intro.avi.exe PID: 7560, type: MEMORYSTR
                Source: Yara matchFile source: C:\Users\user\AppData\Roaming\system\systemware.exe, type: DROPPED

                System Summary

                barindex
                Source: intro.avi.exe, type: SAMPLEMatched rule: Windows_Trojan_Quasarrat_e52df647 Author: unknown
                Source: intro.avi.exe, type: SAMPLEMatched rule: Detects Quasar RAT Author: Florian Roth
                Source: intro.avi.exe, type: SAMPLEMatched rule: Detects Quasar RAT Author: Florian Roth
                Source: intro.avi.exe, type: SAMPLEMatched rule: Detects QuasarRAT malware Author: Florian Roth
                Source: intro.avi.exe, type: SAMPLEMatched rule: Detects Vermin Keylogger Author: Florian Roth
                Source: intro.avi.exe, type: SAMPLEMatched rule: Detects Patchwork malware Author: Florian Roth
                Source: intro.avi.exe, type: SAMPLEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
                Source: intro.avi.exe, type: SAMPLEMatched rule: Detect QuasarRAT (reted from samples 2023-03) Author: Sekoia.io
                Source: intro.avi.exe, type: SAMPLEMatched rule: detect Remcos in memory Author: JPCERT/CC Incident Response Group
                Source: intro.avi.exe, type: SAMPLEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: intro.avi.exe, type: SAMPLEMatched rule: QuasarRAT payload Author: ditekSHen
                Source: 0.0.intro.avi.exe.5f0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Quasarrat_e52df647 Author: unknown
                Source: 0.0.intro.avi.exe.5f0000.0.unpack, type: UNPACKEDPEMatched rule: Detects Quasar RAT Author: Florian Roth
                Source: 0.0.intro.avi.exe.5f0000.0.unpack, type: UNPACKEDPEMatched rule: Detects Quasar RAT Author: Florian Roth
                Source: 0.0.intro.avi.exe.5f0000.0.unpack, type: UNPACKEDPEMatched rule: Detects QuasarRAT malware Author: Florian Roth
                Source: 0.0.intro.avi.exe.5f0000.0.unpack, type: UNPACKEDPEMatched rule: Detects Vermin Keylogger Author: Florian Roth
                Source: 0.0.intro.avi.exe.5f0000.0.unpack, type: UNPACKEDPEMatched rule: Detects Patchwork malware Author: Florian Roth
                Source: 0.0.intro.avi.exe.5f0000.0.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
                Source: 0.0.intro.avi.exe.5f0000.0.unpack, type: UNPACKEDPEMatched rule: Detect QuasarRAT (reted from samples 2023-03) Author: Sekoia.io
                Source: 0.0.intro.avi.exe.5f0000.0.unpack, type: UNPACKEDPEMatched rule: detect Remcos in memory Author: JPCERT/CC Incident Response Group
                Source: 0.0.intro.avi.exe.5f0000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 0.0.intro.avi.exe.5f0000.0.unpack, type: UNPACKEDPEMatched rule: QuasarRAT payload Author: ditekSHen
                Source: 00000000.00000000.1349274211.00000000005F2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Quasarrat_e52df647 Author: unknown
                Source: 00000000.00000000.1349274211.00000000005F2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Detects Quasar RAT Author: Florian Roth
                Source: 00000000.00000000.1349274211.00000000005F2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Detect QuasarRAT (reted from samples 2023-03) Author: Sekoia.io
                Source: 00000000.00000000.1349274211.00000000005F2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: detect Remcos in memory Author: JPCERT/CC Incident Response Group
                Source: C:\Users\user\AppData\Roaming\system\systemware.exe, type: DROPPEDMatched rule: Windows_Trojan_Quasarrat_e52df647 Author: unknown
                Source: C:\Users\user\AppData\Roaming\system\systemware.exe, type: DROPPEDMatched rule: Detects Quasar RAT Author: Florian Roth
                Source: C:\Users\user\AppData\Roaming\system\systemware.exe, type: DROPPEDMatched rule: Detects Quasar RAT Author: Florian Roth
                Source: C:\Users\user\AppData\Roaming\system\systemware.exe, type: DROPPEDMatched rule: Detects QuasarRAT malware Author: Florian Roth
                Source: C:\Users\user\AppData\Roaming\system\systemware.exe, type: DROPPEDMatched rule: Detects Vermin Keylogger Author: Florian Roth
                Source: C:\Users\user\AppData\Roaming\system\systemware.exe, type: DROPPEDMatched rule: Detects Patchwork malware Author: Florian Roth
                Source: C:\Users\user\AppData\Roaming\system\systemware.exe, type: DROPPEDMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
                Source: C:\Users\user\AppData\Roaming\system\systemware.exe, type: DROPPEDMatched rule: Detect QuasarRAT (reted from samples 2023-03) Author: Sekoia.io
                Source: C:\Users\user\AppData\Roaming\system\systemware.exe, type: DROPPEDMatched rule: detect Remcos in memory Author: JPCERT/CC Incident Response Group
                Source: C:\Users\user\AppData\Roaming\system\systemware.exe, type: DROPPEDMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: C:\Users\user\AppData\Roaming\system\systemware.exe, type: DROPPEDMatched rule: QuasarRAT payload Author: ditekSHen
                Source: C:\Users\user\Desktop\intro.avi.exeCode function: 0_2_00F7A5500_2_00F7A550
                Source: C:\Users\user\Desktop\intro.avi.exeCode function: 0_2_00F79C800_2_00F79C80
                Source: C:\Users\user\Desktop\intro.avi.exeCode function: 0_2_00F799380_2_00F79938
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeCode function: 4_2_02A3A5504_2_02A3A550
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeCode function: 4_2_02A39C804_2_02A39C80
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeCode function: 4_2_02A399384_2_02A39938
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeCode function: 4_2_0559DBA84_2_0559DBA8
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeCode function: 4_2_0559B7804_2_0559B780
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeCode function: 4_2_068450204_2_06845020
                Source: C:\Users\user\Desktop\intro.avi.exeCode function: 7_2_0103A5507_2_0103A550
                Source: C:\Users\user\Desktop\intro.avi.exeCode function: 7_2_01039C807_2_01039C80
                Source: C:\Users\user\Desktop\intro.avi.exeCode function: 7_2_0103D3247_2_0103D324
                Source: C:\Users\user\Desktop\intro.avi.exeCode function: 7_2_0103D3287_2_0103D328
                Source: C:\Users\user\Desktop\intro.avi.exeCode function: 7_2_010399387_2_01039938
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeCode function: 16_2_0557A55016_2_0557A550
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeCode function: 16_2_05579C8016_2_05579C80
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeCode function: 16_2_0557D31916_2_0557D319
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeCode function: 16_2_0557D32816_2_0557D328
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeCode function: 16_2_0557993816_2_05579938
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7740 -s 2312
                Source: intro.avi.exe, 00000000.00000000.1349315846.000000000064A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamexTSR-build.exe$ vs intro.avi.exe
                Source: intro.avi.exeBinary or memory string: OriginalFilenamexTSR-build.exe$ vs intro.avi.exe
                Source: intro.avi.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: intro.avi.exe, type: SAMPLEMatched rule: Windows_Trojan_Quasarrat_e52df647 reference_sample = a58efd253a25cc764d63476931da2ddb305a0328253a810515f6735a6690de1d, os = windows, severity = x86, creation_date = 2021-06-27, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Quasarrat, fingerprint = c888f0856c6568b83ab60193f8144a61e758e6ff53f6ead8565282ae8b3a9815, id = e52df647-c197-4790-b051-8951fba80c3b, last_modified = 2021-08-23
                Source: intro.avi.exe, type: SAMPLEMatched rule: Quasar_RAT_1 date = 2017-04-07, hash4 = f08db220df716de3d4f63f3007a03f902601b9b32099d6a882da87312f263f34, hash3 = 515c1a68995557035af11d818192f7866ef6a2018aa13112fefbe08395732e89, hash2 = 1ce40a89ef9d56fd32c00db729beecc17d54f4f7c27ff22f708a957cd3f9a4ec, hash1 = 0774d25e33ca2b1e2ee2fafe3fdbebecefbf1d4dd99e6460f0bc8713dd0fd740, author = Florian Roth, description = Detects Quasar RAT, reference = https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: intro.avi.exe, type: SAMPLEMatched rule: Quasar_RAT_2 date = 2017-04-07, hash3 = f08db220df716de3d4f63f3007a03f902601b9b32099d6a882da87312f263f34, hash2 = 515c1a68995557035af11d818192f7866ef6a2018aa13112fefbe08395732e89, author = Florian Roth, description = Detects Quasar RAT, reference = https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf, license = https://creativecommons.org/licenses/by-nc/4.0/, super_rule = 0774d25e33ca2b1e2ee2fafe3fdbebecefbf1d4dd99e6460f0bc8713dd0fd740
                Source: intro.avi.exe, type: SAMPLEMatched rule: MAL_QuasarRAT_May19_1 date = 2019-05-27, hash1 = 0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded, author = Florian Roth, description = Detects QuasarRAT malware, reference = https://blog.ensilo.com/uncovering-new-activity-by-apt10
                Source: intro.avi.exe, type: SAMPLEMatched rule: Vermin_Keylogger_Jan18_1 date = 2018-01-29, hash5 = 24956d8edcf2a1fd26805ec58cfd1ee7498e1a59af8cc2f4b832a7ab34948c18, hash4 = 4c5e019e0e55a3fe378aa339d52c235c06ecc5053625a5d54d65c4ae38c6e3da, hash3 = 0157b43eb3c20928b77f8700ad8eb279a0aa348921df074cd22ebaff01edaae6, hash2 = e1d917769267302d58a2fd00bc49d4aee5a472227a75f9366b46ce243e9cbef7, hash1 = 74ba162eef84bf13d1d79cb26192a4692c09fed57f321230ddb7668a88e3935d, author = Florian Roth, description = Detects Vermin Keylogger, hash6 = 2963c5eacaad13ace807edd634a4a5896cb5536f961f43afcf8c1f25c08a5eef, reference = https://researchcenter.paloaltonetworks.com/2018/01/unit42-vermin-quasar-rat-custom-malware-used-ukraine/, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: intro.avi.exe, type: SAMPLEMatched rule: xRAT_1 date = 2017-12-11, hash2 = f1a45adcf907e660ec848c6086e28c9863b7b70d0d38417dd05a4261973c955a, hash1 = 92be93ec4cbe76182404af0b180871fbbfa3c7b34e4df6745dbcde480b8b4b3b, author = Florian Roth, description = Detects Patchwork malware, reference = https://goo.gl/Pg3P4W, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: intro.avi.exe, type: SAMPLEMatched rule: CN_disclosed_20180208_KeyLogger_1 date = 2018-02-08, hash1 = c492889e1d271a98e15264acbb21bfca9795466882520d55dc714c4899ed2fcf, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://www.virustotal.com/graph/#/selected/n120z79z208z189/drawer/graph-details, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: intro.avi.exe, type: SAMPLEMatched rule: implant_win_quasarrat author = Sekoia.io, description = Detect QuasarRAT (reted from samples 2023-03), creation_date = 2023-03-17, classification = TLP:CLEAR, version = 1.0, reference = https://blog.alyac.co.kr/5103, id = 492fdffc-8e5f-4225-a2eb-cd6d80e6bcb8
                Source: intro.avi.exe, type: SAMPLEMatched rule: Quasar hash1 = 390c1530ff62d8f4eddff0ac13bc264cbf4183e7e3d6accf8f721ffc5250e724, author = JPCERT/CC Incident Response Group, description = detect Remcos in memory, rule_usage = memory scan
                Source: intro.avi.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: intro.avi.exe, type: SAMPLEMatched rule: MALWARE_Win_QuasarRAT author = ditekSHen, description = QuasarRAT payload
                Source: 0.0.intro.avi.exe.5f0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Quasarrat_e52df647 reference_sample = a58efd253a25cc764d63476931da2ddb305a0328253a810515f6735a6690de1d, os = windows, severity = x86, creation_date = 2021-06-27, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Quasarrat, fingerprint = c888f0856c6568b83ab60193f8144a61e758e6ff53f6ead8565282ae8b3a9815, id = e52df647-c197-4790-b051-8951fba80c3b, last_modified = 2021-08-23
                Source: 0.0.intro.avi.exe.5f0000.0.unpack, type: UNPACKEDPEMatched rule: Quasar_RAT_1 date = 2017-04-07, hash4 = f08db220df716de3d4f63f3007a03f902601b9b32099d6a882da87312f263f34, hash3 = 515c1a68995557035af11d818192f7866ef6a2018aa13112fefbe08395732e89, hash2 = 1ce40a89ef9d56fd32c00db729beecc17d54f4f7c27ff22f708a957cd3f9a4ec, hash1 = 0774d25e33ca2b1e2ee2fafe3fdbebecefbf1d4dd99e6460f0bc8713dd0fd740, author = Florian Roth, description = Detects Quasar RAT, reference = https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 0.0.intro.avi.exe.5f0000.0.unpack, type: UNPACKEDPEMatched rule: Quasar_RAT_2 date = 2017-04-07, hash3 = f08db220df716de3d4f63f3007a03f902601b9b32099d6a882da87312f263f34, hash2 = 515c1a68995557035af11d818192f7866ef6a2018aa13112fefbe08395732e89, author = Florian Roth, description = Detects Quasar RAT, reference = https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf, license = https://creativecommons.org/licenses/by-nc/4.0/, super_rule = 0774d25e33ca2b1e2ee2fafe3fdbebecefbf1d4dd99e6460f0bc8713dd0fd740
                Source: 0.0.intro.avi.exe.5f0000.0.unpack, type: UNPACKEDPEMatched rule: MAL_QuasarRAT_May19_1 date = 2019-05-27, hash1 = 0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded, author = Florian Roth, description = Detects QuasarRAT malware, reference = https://blog.ensilo.com/uncovering-new-activity-by-apt10
                Source: 0.0.intro.avi.exe.5f0000.0.unpack, type: UNPACKEDPEMatched rule: Vermin_Keylogger_Jan18_1 date = 2018-01-29, hash5 = 24956d8edcf2a1fd26805ec58cfd1ee7498e1a59af8cc2f4b832a7ab34948c18, hash4 = 4c5e019e0e55a3fe378aa339d52c235c06ecc5053625a5d54d65c4ae38c6e3da, hash3 = 0157b43eb3c20928b77f8700ad8eb279a0aa348921df074cd22ebaff01edaae6, hash2 = e1d917769267302d58a2fd00bc49d4aee5a472227a75f9366b46ce243e9cbef7, hash1 = 74ba162eef84bf13d1d79cb26192a4692c09fed57f321230ddb7668a88e3935d, author = Florian Roth, description = Detects Vermin Keylogger, hash6 = 2963c5eacaad13ace807edd634a4a5896cb5536f961f43afcf8c1f25c08a5eef, reference = https://researchcenter.paloaltonetworks.com/2018/01/unit42-vermin-quasar-rat-custom-malware-used-ukraine/, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 0.0.intro.avi.exe.5f0000.0.unpack, type: UNPACKEDPEMatched rule: xRAT_1 date = 2017-12-11, hash2 = f1a45adcf907e660ec848c6086e28c9863b7b70d0d38417dd05a4261973c955a, hash1 = 92be93ec4cbe76182404af0b180871fbbfa3c7b34e4df6745dbcde480b8b4b3b, author = Florian Roth, description = Detects Patchwork malware, reference = https://goo.gl/Pg3P4W, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 0.0.intro.avi.exe.5f0000.0.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_KeyLogger_1 date = 2018-02-08, hash1 = c492889e1d271a98e15264acbb21bfca9795466882520d55dc714c4899ed2fcf, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://www.virustotal.com/graph/#/selected/n120z79z208z189/drawer/graph-details, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 0.0.intro.avi.exe.5f0000.0.unpack, type: UNPACKEDPEMatched rule: implant_win_quasarrat author = Sekoia.io, description = Detect QuasarRAT (reted from samples 2023-03), creation_date = 2023-03-17, classification = TLP:CLEAR, version = 1.0, reference = https://blog.alyac.co.kr/5103, id = 492fdffc-8e5f-4225-a2eb-cd6d80e6bcb8
                Source: 0.0.intro.avi.exe.5f0000.0.unpack, type: UNPACKEDPEMatched rule: Quasar hash1 = 390c1530ff62d8f4eddff0ac13bc264cbf4183e7e3d6accf8f721ffc5250e724, author = JPCERT/CC Incident Response Group, description = detect Remcos in memory, rule_usage = memory scan
                Source: 0.0.intro.avi.exe.5f0000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 0.0.intro.avi.exe.5f0000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_QuasarRAT author = ditekSHen, description = QuasarRAT payload
                Source: 00000000.00000000.1349274211.00000000005F2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Quasarrat_e52df647 reference_sample = a58efd253a25cc764d63476931da2ddb305a0328253a810515f6735a6690de1d, os = windows, severity = x86, creation_date = 2021-06-27, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Quasarrat, fingerprint = c888f0856c6568b83ab60193f8144a61e758e6ff53f6ead8565282ae8b3a9815, id = e52df647-c197-4790-b051-8951fba80c3b, last_modified = 2021-08-23
                Source: 00000000.00000000.1349274211.00000000005F2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Quasar_RAT_1 date = 2017-04-07, hash4 = f08db220df716de3d4f63f3007a03f902601b9b32099d6a882da87312f263f34, hash3 = 515c1a68995557035af11d818192f7866ef6a2018aa13112fefbe08395732e89, hash2 = 1ce40a89ef9d56fd32c00db729beecc17d54f4f7c27ff22f708a957cd3f9a4ec, hash1 = 0774d25e33ca2b1e2ee2fafe3fdbebecefbf1d4dd99e6460f0bc8713dd0fd740, author = Florian Roth, description = Detects Quasar RAT, reference = https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 00000000.00000000.1349274211.00000000005F2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: implant_win_quasarrat author = Sekoia.io, description = Detect QuasarRAT (reted from samples 2023-03), creation_date = 2023-03-17, classification = TLP:CLEAR, version = 1.0, reference = https://blog.alyac.co.kr/5103, id = 492fdffc-8e5f-4225-a2eb-cd6d80e6bcb8
                Source: 00000000.00000000.1349274211.00000000005F2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Quasar hash1 = 390c1530ff62d8f4eddff0ac13bc264cbf4183e7e3d6accf8f721ffc5250e724, author = JPCERT/CC Incident Response Group, description = detect Remcos in memory, rule_usage = memory scan
                Source: C:\Users\user\AppData\Roaming\system\systemware.exe, type: DROPPEDMatched rule: Windows_Trojan_Quasarrat_e52df647 reference_sample = a58efd253a25cc764d63476931da2ddb305a0328253a810515f6735a6690de1d, os = windows, severity = x86, creation_date = 2021-06-27, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Quasarrat, fingerprint = c888f0856c6568b83ab60193f8144a61e758e6ff53f6ead8565282ae8b3a9815, id = e52df647-c197-4790-b051-8951fba80c3b, last_modified = 2021-08-23
                Source: C:\Users\user\AppData\Roaming\system\systemware.exe, type: DROPPEDMatched rule: Quasar_RAT_1 date = 2017-04-07, hash4 = f08db220df716de3d4f63f3007a03f902601b9b32099d6a882da87312f263f34, hash3 = 515c1a68995557035af11d818192f7866ef6a2018aa13112fefbe08395732e89, hash2 = 1ce40a89ef9d56fd32c00db729beecc17d54f4f7c27ff22f708a957cd3f9a4ec, hash1 = 0774d25e33ca2b1e2ee2fafe3fdbebecefbf1d4dd99e6460f0bc8713dd0fd740, author = Florian Roth, description = Detects Quasar RAT, reference = https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: C:\Users\user\AppData\Roaming\system\systemware.exe, type: DROPPEDMatched rule: Quasar_RAT_2 date = 2017-04-07, hash3 = f08db220df716de3d4f63f3007a03f902601b9b32099d6a882da87312f263f34, hash2 = 515c1a68995557035af11d818192f7866ef6a2018aa13112fefbe08395732e89, author = Florian Roth, description = Detects Quasar RAT, reference = https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf, license = https://creativecommons.org/licenses/by-nc/4.0/, super_rule = 0774d25e33ca2b1e2ee2fafe3fdbebecefbf1d4dd99e6460f0bc8713dd0fd740
                Source: C:\Users\user\AppData\Roaming\system\systemware.exe, type: DROPPEDMatched rule: MAL_QuasarRAT_May19_1 date = 2019-05-27, hash1 = 0644e561225ab696a97ba9a77583dcaab4c26ef0379078c65f9ade684406eded, author = Florian Roth, description = Detects QuasarRAT malware, reference = https://blog.ensilo.com/uncovering-new-activity-by-apt10
                Source: C:\Users\user\AppData\Roaming\system\systemware.exe, type: DROPPEDMatched rule: Vermin_Keylogger_Jan18_1 date = 2018-01-29, hash5 = 24956d8edcf2a1fd26805ec58cfd1ee7498e1a59af8cc2f4b832a7ab34948c18, hash4 = 4c5e019e0e55a3fe378aa339d52c235c06ecc5053625a5d54d65c4ae38c6e3da, hash3 = 0157b43eb3c20928b77f8700ad8eb279a0aa348921df074cd22ebaff01edaae6, hash2 = e1d917769267302d58a2fd00bc49d4aee5a472227a75f9366b46ce243e9cbef7, hash1 = 74ba162eef84bf13d1d79cb26192a4692c09fed57f321230ddb7668a88e3935d, author = Florian Roth, description = Detects Vermin Keylogger, hash6 = 2963c5eacaad13ace807edd634a4a5896cb5536f961f43afcf8c1f25c08a5eef, reference = https://researchcenter.paloaltonetworks.com/2018/01/unit42-vermin-quasar-rat-custom-malware-used-ukraine/, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: C:\Users\user\AppData\Roaming\system\systemware.exe, type: DROPPEDMatched rule: xRAT_1 date = 2017-12-11, hash2 = f1a45adcf907e660ec848c6086e28c9863b7b70d0d38417dd05a4261973c955a, hash1 = 92be93ec4cbe76182404af0b180871fbbfa3c7b34e4df6745dbcde480b8b4b3b, author = Florian Roth, description = Detects Patchwork malware, reference = https://goo.gl/Pg3P4W, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: C:\Users\user\AppData\Roaming\system\systemware.exe, type: DROPPEDMatched rule: CN_disclosed_20180208_KeyLogger_1 date = 2018-02-08, hash1 = c492889e1d271a98e15264acbb21bfca9795466882520d55dc714c4899ed2fcf, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://www.virustotal.com/graph/#/selected/n120z79z208z189/drawer/graph-details, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: C:\Users\user\AppData\Roaming\system\systemware.exe, type: DROPPEDMatched rule: implant_win_quasarrat author = Sekoia.io, description = Detect QuasarRAT (reted from samples 2023-03), creation_date = 2023-03-17, classification = TLP:CLEAR, version = 1.0, reference = https://blog.alyac.co.kr/5103, id = 492fdffc-8e5f-4225-a2eb-cd6d80e6bcb8
                Source: C:\Users\user\AppData\Roaming\system\systemware.exe, type: DROPPEDMatched rule: Quasar hash1 = 390c1530ff62d8f4eddff0ac13bc264cbf4183e7e3d6accf8f721ffc5250e724, author = JPCERT/CC Incident Response Group, description = detect Remcos in memory, rule_usage = memory scan
                Source: C:\Users\user\AppData\Roaming\system\systemware.exe, type: DROPPEDMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: C:\Users\user\AppData\Roaming\system\systemware.exe, type: DROPPEDMatched rule: MALWARE_Win_QuasarRAT author = ditekSHen, description = QuasarRAT payload
                Source: intro.avi.exe, -------.csBase64 encoded string: 'wpc4i3jGJFKYLVxyxGaLL27fjpIrdIQHv5hjv5o726VOAX4BS0vxT62TQDbkGzxq+tEPlLqP1h57lIngR52ISw==', 's0Xs09pXFDJcJYxa0tOpN96Thj+9aVkIrrJk41FoWTonSZko8yNZYj6/naSfwiS0Dexe7BWheSPW7ApOH7hrqw==', 'ppW7gC14+li12gQDJXkAmjL4/ENhW5fghxtkQjuU6hTcq9rvjaAa5QewDMqAbFyaqfgzd35D4Q3JkOvpHZ2DUw==', 'p9n2yx69vn6093ZmrvikMUD2+5cnZZ3Olgcfp7cwDhXJBCMxaut5BcQrGJCxAFJW3WRByXKs4LNsQmv8Ii0yWYiKb1sZkaeO+6b8gl8H860=', 'WJmsY0ZyzdePtM5DfeccMqOIT3i7QRPSpbZqdoSALbBqHqWOf3q0ypRQFt4/KXSaaKo5k2bjgpWxj/l2id4Dpg==', 'uMQR90lGHe58u+RlE/KGkjfSEmqvxPG3XRAFAAfXZPYbEu14imhrS0OE1DU3hnfdh8CxzVw8YMfi/bY/cbikvg==', 'OON3hkf2dDZzCzAbWq7iDUJUeaBxX1LfLyyuW9ZiUCBbOLn/3nxsdZAkH6RKMwaxpvh7AvPX25BuzIj93Ff7eQ=='
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@21/11@2/1
                Source: C:\Users\user\Desktop\intro.avi.exeFile created: C:\Users\user\AppData\Roaming\systemJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeMutant created: NULL
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeMutant created: \Sessions\1\BaseNamedObjects\xTSR_MUTEX_tDOmSpZY0vhNMbdmkR
                Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7740
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7700:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7816:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7920:120:WilError_03
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeFile created: C:\Users\user\AppData\Local\Temp\7jSSwThVwFwB.batJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\7jSSwThVwFwB.bat" "
                Source: intro.avi.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: intro.avi.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: intro.avi.exeVirustotal: Detection: 84%
                Source: intro.avi.exeReversingLabs: Detection: 84%
                Source: C:\Users\user\Desktop\intro.avi.exeFile read: C:\Users\user\Desktop\intro.avi.exeJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\intro.avi.exe "C:\Users\user\Desktop\intro.avi.exe"
                Source: C:\Users\user\Desktop\intro.avi.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "schtasks" /create /tn "System Ware" /sc ONLOGON /tr "C:\Users\user\Desktop\intro.avi.exe" /rl HIGHEST /f
                Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\intro.avi.exeProcess created: C:\Users\user\AppData\Roaming\system\systemware.exe "C:\Users\user\AppData\Roaming\system\systemware.exe"
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "schtasks" /create /tn "System Ware" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\system\systemware.exe" /rl HIGHEST /f
                Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: unknownProcess created: C:\Users\user\Desktop\intro.avi.exe C:\Users\user\Desktop\intro.avi.exe
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\7jSSwThVwFwB.bat" "
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\chcp.com chcp 65001
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping -n 10 localhost
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7740 -s 2312
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Roaming\system\systemware.exe "C:\Users\user\AppData\Roaming\system\systemware.exe"
                Source: C:\Users\user\Desktop\intro.avi.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "schtasks" /create /tn "System Ware" /sc ONLOGON /tr "C:\Users\user\Desktop\intro.avi.exe" /rl HIGHEST /fJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeProcess created: C:\Users\user\AppData\Roaming\system\systemware.exe "C:\Users\user\AppData\Roaming\system\systemware.exe"Jump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "schtasks" /create /tn "System Ware" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\system\systemware.exe" /rl HIGHEST /fJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\7jSSwThVwFwB.bat" "Jump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\chcp.com chcp 65001Jump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping -n 10 localhostJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Roaming\system\systemware.exe "C:\Users\user\AppData\Roaming\system\systemware.exe" Jump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeSection loaded: rasapi32.dllJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeSection loaded: rasman.dllJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeSection loaded: rtutils.dllJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: xmllite.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeSection loaded: rasapi32.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeSection loaded: rasman.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeSection loaded: rtutils.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeSection loaded: edputil.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeSection loaded: appresolver.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeSection loaded: bcp47langs.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeSection loaded: slc.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeSection loaded: sppc.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: xmllite.dllJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dllJump to behavior
                Source: C:\Windows\SysWOW64\chcp.comSection loaded: ulib.dllJump to behavior
                Source: C:\Windows\SysWOW64\chcp.comSection loaded: fsutilext.dllJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXESection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXESection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXESection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXESection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXESection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\SysWOW64\PING.EXESection loaded: winnsi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                Source: intro.avi.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: intro.avi.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: Binary string: System.Runtime.Serialization.ni.pdb source: WER24CC.tmp.dmp.14.dr
                Source: Binary string: System.Xml.ni.pdb source: WER24CC.tmp.dmp.14.dr
                Source: Binary string: System.ServiceModel.Internals.pdb source: WER24CC.tmp.dmp.14.dr
                Source: Binary string: System.Runtime.Serialization.ni.pdbRSDSg@h source: WER24CC.tmp.dmp.14.dr
                Source: Binary string: \??\C:\Users\user\AppData\Roaming\system\systemware.PDB source: systemware.exe, 00000004.00000002.1615832564.000000000512F000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: C:\Windows\System.pdbpdbtem.pdb source: systemware.exe, 00000004.00000002.1615832564.000000000512F000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: Accessibility.pdb source: WER24CC.tmp.dmp.14.dr
                Source: Binary string: System.ni.pdbRSDS source: WER24CC.tmp.dmp.14.dr
                Source: Binary string: System.pdbN|2h|2 Z|2_CorDllMainmscoree.dll source: systemware.exe, 00000004.00000002.1602907003.0000000000E09000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: C:\Users\user\AppData\Roaming\system\systemware.PDB source: systemware.exe, 00000004.00000002.1602361908.0000000000AF8000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: SMDiagnostics.pdb source: WER24CC.tmp.dmp.14.dr
                Source: Binary string: System.Configuration.ni.pdb source: WER24CC.tmp.dmp.14.dr
                Source: Binary string: mscorlib.ni.pdbRSDS source: WER24CC.tmp.dmp.14.dr
                Source: Binary string: System.Configuration.pdb source: WER24CC.tmp.dmp.14.dr
                Source: Binary string: \??\C:\Windows\symbols\dll\System.pdb~ source: systemware.exe, 00000004.00000002.1615832564.0000000005108000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: System.Windows.Forms.pdbSystem.Management.ni.dll source: WER24CC.tmp.dmp.14.dr
                Source: Binary string: System.Xml.pdb source: WER24CC.tmp.dmp.14.dr
                Source: Binary string: System.pdb source: systemware.exe, 00000004.00000002.1602907003.0000000000E09000.00000004.00000020.00020000.00000000.sdmp, WER24CC.tmp.dmp.14.dr
                Source: Binary string: System.Xml.ni.pdbRSDS# source: WER24CC.tmp.dmp.14.dr
                Source: Binary string: System.Core.ni.pdb source: WER24CC.tmp.dmp.14.dr
                Source: Binary string: System.Windows.Forms.pdb source: WER24CC.tmp.dmp.14.dr
                Source: Binary string: mscorlib.pdb source: WER24CC.tmp.dmp.14.dr
                Source: Binary string: System.Runtime.Serialization.pdbAccessibility.dllAccessibility.dllSMDiagnostics.dllSMDiagnostics.dll@W source: WER24CC.tmp.dmp.14.dr
                Source: Binary string: System.Management.ni.pdbRSDSJ< source: WER24CC.tmp.dmp.14.dr
                Source: Binary string: \??\C:\Windows\System.pdb= source: systemware.exe, 00000004.00000002.1615664818.0000000005090000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: System.Management.pdb source: WER24CC.tmp.dmp.14.dr
                Source: Binary string: System.Drawing.pdb source: WER24CC.tmp.dmp.14.dr
                Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.pdb source: systemware.exe, 00000004.00000002.1602907003.0000000000DDF000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: mscorlib.ni.pdb source: WER24CC.tmp.dmp.14.dr
                Source: Binary string: System.Management.ni.pdb source: WER24CC.tmp.dmp.14.dr
                Source: Binary string: HPXo,C:\Windows\System.pdb source: systemware.exe, 00000004.00000002.1602361908.0000000000AF8000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: System.Core.pdb source: WER24CC.tmp.dmp.14.dr
                Source: Binary string: System.Runtime.Serialization.pdb source: WER24CC.tmp.dmp.14.dr
                Source: Binary string: System.Xml.pdbL0Tw# source: WER24CC.tmp.dmp.14.dr
                Source: Binary string: System.pdb< source: WER24CC.tmp.dmp.14.dr
                Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WER24CC.tmp.dmp.14.dr
                Source: Binary string: System.ni.pdb source: WER24CC.tmp.dmp.14.dr
                Source: Binary string: System.Core.ni.pdbRSDS source: WER24CC.tmp.dmp.14.dr
                Source: C:\Users\user\Desktop\intro.avi.exeCode function: 0_2_00F797C6 pushad ; retf 0_2_00F797C9
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeCode function: 4_2_06844FF1 push es; ret 4_2_06845000
                Source: C:\Users\user\Desktop\intro.avi.exeFile created: C:\Users\user\AppData\Roaming\system\systemware.exeJump to dropped file

                Boot Survival

                barindex
                Source: C:\Users\user\Desktop\intro.avi.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "schtasks" /create /tn "System Ware" /sc ONLOGON /tr "C:\Users\user\Desktop\intro.avi.exe" /rl HIGHEST /f

                Hooking and other Techniques for Hiding and Protection

                barindex
                Source: C:\Users\user\Desktop\intro.avi.exeFile opened: C:\Users\user\Desktop\intro.avi.exe:Zone.Identifier read attributes | deleteJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeFile opened: C:\Users\user\AppData\Roaming\system\systemware.exe:Zone.Identifier read attributes | deleteJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeFile opened: C:\Users\user\AppData\Roaming\system\systemware.exe:Zone.Identifier read attributes | deleteJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping -n 10 localhost
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping -n 10 localhostJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeMemory allocated: F70000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeMemory allocated: 2940000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeMemory allocated: 4940000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeMemory allocated: D70000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeMemory allocated: 2AE0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeMemory allocated: 10A0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeMemory allocated: D50000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeMemory allocated: 2AA0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeMemory allocated: F90000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeMemory allocated: 3030000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeMemory allocated: 3230000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeMemory allocated: 3080000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeWindow / User API: threadDelayed 1199Jump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeWindow / User API: threadDelayed 479Jump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exe TID: 7640Thread sleep time: -30000s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exe TID: 7580Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exe TID: 7872Thread sleep time: -4611686018427385s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exe TID: 7876Thread sleep count: 1199 > 30Jump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exe TID: 7876Thread sleep count: 479 > 30Jump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exe TID: 7896Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exe TID: 7384Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeLast function: Thread delayed
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\SysWOW64\PING.EXELast function: Thread delayed
                Source: C:\Users\user\Desktop\intro.avi.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: Amcache.hve.14.drBinary or memory string: VMware
                Source: Amcache.hve.14.drBinary or memory string: VMware Virtual USB Mouse
                Source: Amcache.hve.14.drBinary or memory string: vmci.syshbin
                Source: Amcache.hve.14.drBinary or memory string: VMware, Inc.
                Source: Amcache.hve.14.drBinary or memory string: VMware20,1hbin@
                Source: Amcache.hve.14.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
                Source: Amcache.hve.14.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                Source: Amcache.hve.14.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
                Source: Amcache.hve.14.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                Source: systemware.exe, 00000004.00000002.1615832564.0000000005108000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Prod_VMware_SATA_CD0
                Source: Amcache.hve.14.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
                Source: systemware.exe, 00000004.00000002.1602907003.0000000000E09000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\y&
                Source: Amcache.hve.14.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
                Source: Amcache.hve.14.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                Source: systemware.exe, 00000004.00000002.1602907003.0000000000E09000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: intro.avi.exe, 00000000.00000002.1375285314.0000000000C15000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllw
                Source: Amcache.hve.14.drBinary or memory string: vmci.sys
                Source: Amcache.hve.14.drBinary or memory string: vmci.syshbin`
                Source: Amcache.hve.14.drBinary or memory string: \driver\vmci,\driver\pci
                Source: Amcache.hve.14.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                Source: Amcache.hve.14.drBinary or memory string: VMware20,1
                Source: Amcache.hve.14.drBinary or memory string: Microsoft Hyper-V Generation Counter
                Source: Amcache.hve.14.drBinary or memory string: NECVMWar VMware SATA CD00
                Source: Amcache.hve.14.drBinary or memory string: VMware Virtual disk SCSI Disk Device
                Source: Amcache.hve.14.drBinary or memory string: VMware-42 27 c7 3b 45 a3 e4 a4-61 bc 19 7c 28 5c 10 19
                Source: Amcache.hve.14.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
                Source: Amcache.hve.14.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
                Source: Amcache.hve.14.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
                Source: Amcache.hve.14.drBinary or memory string: VMware PCI VMCI Bus Device
                Source: Amcache.hve.14.drBinary or memory string: VMware VMCI Bus Device
                Source: Amcache.hve.14.drBinary or memory string: VMware Virtual RAM
                Source: Amcache.hve.14.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
                Source: Amcache.hve.14.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeProcess queried: DebugPortJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeProcess queried: DebugPortJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeMemory allocated: page read and write | page guardJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "schtasks" /create /tn "System Ware" /sc ONLOGON /tr "C:\Users\user\Desktop\intro.avi.exe" /rl HIGHEST /fJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeProcess created: C:\Users\user\AppData\Roaming\system\systemware.exe "C:\Users\user\AppData\Roaming\system\systemware.exe"Jump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "schtasks" /create /tn "System Ware" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\system\systemware.exe" /rl HIGHEST /fJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\7jSSwThVwFwB.bat" "Jump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\chcp.com chcp 65001Jump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping -n 10 localhostJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Roaming\system\systemware.exe "C:\Users\user\AppData\Roaming\system\systemware.exe" Jump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeQueries volume information: C:\Users\user\Desktop\intro.avi.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\SMDiagnostics\v4.0_4.0.0.0__b77a5c561934e089\SMDiagnostics.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel.Internals\v4.0_4.0.0.0__31bf3856ad364e35\System.ServiceModel.Internals.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeQueries volume information: C:\Users\user\AppData\Roaming\system\systemware.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\SMDiagnostics\v4.0_4.0.0.0__b77a5c561934e089\SMDiagnostics.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel.Internals\v4.0_4.0.0.0__31bf3856ad364e35\System.ServiceModel.Internals.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeQueries volume information: C:\Users\user\Desktop\intro.avi.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeQueries volume information: C:\Users\user\AppData\Roaming\system\systemware.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\system\systemware.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\intro.avi.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                Source: Amcache.hve.14.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
                Source: Amcache.hve.14.drBinary or memory string: msmpeng.exe
                Source: Amcache.hve.14.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
                Source: Amcache.hve.14.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
                Source: Amcache.hve.14.drBinary or memory string: MsMpEng.exe

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: intro.avi.exe, type: SAMPLE
                Source: Yara matchFile source: 0.0.intro.avi.exe.5f0000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000000.1349274211.00000000005F2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: intro.avi.exe PID: 7560, type: MEMORYSTR
                Source: Yara matchFile source: C:\Users\user\AppData\Roaming\system\systemware.exe, type: DROPPED

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: intro.avi.exe, type: SAMPLE
                Source: Yara matchFile source: 0.0.intro.avi.exe.5f0000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000000.1349274211.00000000005F2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: intro.avi.exe PID: 7560, type: MEMORYSTR
                Source: Yara matchFile source: C:\Users\user\AppData\Roaming\system\systemware.exe, type: DROPPED
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity Information1
                Scripting
                Valid Accounts1
                Scheduled Task/Job
                1
                Scheduled Task/Job
                11
                Process Injection
                1
                Masquerading
                11
                Input Capture
                121
                Security Software Discovery
                Remote Services11
                Input Capture
                1
                Encrypted Channel
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault AccountsScheduled Task/Job1
                Scripting
                1
                Scheduled Task/Job
                1
                Disable or Modify Tools
                LSASS Memory41
                Virtualization/Sandbox Evasion
                Remote Desktop Protocol1
                Archive Collected Data
                1
                Ingress Tool Transfer
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAt1
                DLL Side-Loading
                1
                DLL Side-Loading
                41
                Virtualization/Sandbox Evasion
                Security Account Manager1
                Application Window Discovery
                SMB/Windows Admin SharesData from Network Shared Drive2
                Non-Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
                Process Injection
                NTDS1
                Remote System Discovery
                Distributed Component Object ModelInput Capture212
                Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                Hidden Files and Directories
                LSA Secrets11
                System Network Configuration Discovery
                SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts11
                Obfuscated Files or Information
                Cached Domain Credentials1
                File and Directory Discovery
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                DLL Side-Loading
                DCSync12
                System Information Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1583245 Sample: intro.avi.exe Startdate: 02/01/2025 Architecture: WINDOWS Score: 100 47 erbaevbann3.ddns.net 2->47 49 ip-api.com 2->49 61 Suricata IDS alerts for network traffic 2->61 63 Found malware configuration 2->63 65 Malicious sample detected (through community Yara rule) 2->65 69 8 other signatures 2->69 9 intro.avi.exe 15 5 2->9         started        14 intro.avi.exe 2 2->14         started        signatures3 67 Uses dynamic DNS services 47->67 process4 dnsIp5 51 ip-api.com 208.95.112.1, 49743, 49754, 80 TUT-ASUS United States 9->51 43 C:\Users\user\AppData\...\systemware.exe, PE32 9->43 dropped 45 C:\Users\user\AppData\...\intro.avi.exe.log, ASCII 9->45 dropped 75 Uses schtasks.exe or at.exe to add and modify task schedules 9->75 77 Hides that the sample has been downloaded from the Internet (zone.identifier) 9->77 16 systemware.exe 14 6 9->16         started        20 schtasks.exe 1 9->20         started        file6 signatures7 process8 file9 41 C:\Users\user\AppData\...\7jSSwThVwFwB.bat, DOS 16->41 dropped 53 Antivirus detection for dropped file 16->53 55 Multi AV Scanner detection for dropped file 16->55 57 Machine Learning detection for dropped file 16->57 59 2 other signatures 16->59 22 cmd.exe 1 16->22         started        25 schtasks.exe 1 16->25         started        27 WerFault.exe 19 16 16->27         started        29 conhost.exe 20->29         started        signatures10 process11 signatures12 71 Uses ping.exe to sleep 22->71 73 Uses ping.exe to check the status of other devices and networks 22->73 31 systemware.exe 3 22->31         started        33 conhost.exe 22->33         started        35 PING.EXE 1 22->35         started        37 chcp.com 1 22->37         started        39 conhost.exe 25->39         started        process13

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                intro.avi.exe85%VirustotalBrowse
                intro.avi.exe84%ReversingLabsByteCode-MSIL.Backdoor.Quasar
                intro.avi.exe100%AviraHEUR/AGEN.1307418
                intro.avi.exe100%Joe Sandbox ML
                SourceDetectionScannerLabelLink
                C:\Users\user\AppData\Local\Temp\7jSSwThVwFwB.bat100%AviraBAT/Delbat.C
                C:\Users\user\AppData\Roaming\system\systemware.exe100%AviraHEUR/AGEN.1307418
                C:\Users\user\AppData\Roaming\system\systemware.exe100%Joe Sandbox ML
                C:\Users\user\AppData\Roaming\system\systemware.exe84%ReversingLabsByteCode-MSIL.Backdoor.Quasar
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                NameIPActiveMaliciousAntivirus DetectionReputation
                s-part-0017.t-0009.t-msedge.net
                13.107.246.45
                truefalse
                  high
                  ip-api.com
                  208.95.112.1
                  truefalse
                    high
                    erbaevbann3.ddns.net
                    unknown
                    unknowntrue
                      unknown
                      NameMaliciousAntivirus DetectionReputation
                      X&\ @p)8I)-qX$true
                        unknown
                        http://ip-api.com/json/false
                          high
                          NameSourceMaliciousAntivirus DetectionReputation
                          http://api.ipify.org/intro.avi.exe, systemware.exe.0.drfalse
                            high
                            http://freegeoip.net/xml/intro.avi.exe, systemware.exe.0.drfalse
                              high
                              http://upx.sf.netAmcache.hve.14.drfalse
                                high
                                http://schemas.datacontract.org/2004/07/intro.avi.exe, 00000000.00000002.1376092522.00000000029BA000.00000004.00000800.00020000.00000000.sdmp, systemware.exe, 00000004.00000002.1604487334.0000000002B5A000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameintro.avi.exe, 00000000.00000002.1376092522.00000000029A7000.00000004.00000800.00020000.00000000.sdmp, systemware.exe, 00000004.00000002.1604487334.0000000002B47000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://ip-api.comintro.avi.exe, 00000000.00000002.1376092522.00000000029A7000.00000004.00000800.00020000.00000000.sdmp, intro.avi.exe, 00000000.00000002.1376092522.00000000029BA000.00000004.00000800.00020000.00000000.sdmp, systemware.exe, 00000004.00000002.1604487334.0000000002B47000.00000004.00000800.00020000.00000000.sdmp, systemware.exe, 00000004.00000002.1604487334.0000000002B5A000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      • No. of IPs < 25%
                                      • 25% < No. of IPs < 50%
                                      • 50% < No. of IPs < 75%
                                      • 75% < No. of IPs
                                      IPDomainCountryFlagASNASN NameMalicious
                                      208.95.112.1
                                      ip-api.comUnited States
                                      53334TUT-ASUSfalse
                                      Joe Sandbox version:41.0.0 Charoite
                                      Analysis ID:1583245
                                      Start date and time:2025-01-02 09:24:11 +01:00
                                      Joe Sandbox product:CloudBasic
                                      Overall analysis duration:0h 6m 17s
                                      Hypervisor based Inspection enabled:false
                                      Report type:full
                                      Cookbook file name:default.jbs
                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                      Number of analysed new started processes analysed:21
                                      Number of new started drivers analysed:0
                                      Number of existing processes analysed:0
                                      Number of existing drivers analysed:0
                                      Number of injected processes analysed:0
                                      Technologies:
                                      • HCA enabled
                                      • EGA enabled
                                      • AMSI enabled
                                      Analysis Mode:default
                                      Analysis stop reason:Timeout
                                      Sample name:intro.avi.exe
                                      Detection:MAL
                                      Classification:mal100.troj.spyw.evad.winEXE@21/11@2/1
                                      EGA Information:
                                      • Successful, ratio: 100%
                                      HCA Information:
                                      • Successful, ratio: 99%
                                      • Number of executed functions: 55
                                      • Number of non-executed functions: 3
                                      Cookbook Comments:
                                      • Found application associated with file extension: .exe
                                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                      • Excluded IPs from analysis (whitelisted): 52.168.117.173, 13.107.246.45, 20.190.159.68, 52.149.20.212
                                      • Excluded domains from analysis (whitelisted): onedsblobprdeus16.eastus.cloudapp.azure.com, login.live.com, slscr.update.microsoft.com, otelrules.azureedge.net, otelrules.afd.azureedge.net, blobcollector.events.data.trafficmanager.net, azureedge-t-prod.trafficmanager.net, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                                      • Not all processes where analyzed, report is missing behavior information
                                      • Report size exceeded maximum capacity and may have missing behavior information.
                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                      • Report size getting too big, too many NtReadVirtualMemory calls found.
                                      • Report size getting too big, too many NtSetInformationFile calls found.
                                      TimeTypeDescription
                                      03:25:08API Interceptor1x Sleep call for process: intro.avi.exe modified
                                      03:25:11API Interceptor10x Sleep call for process: systemware.exe modified
                                      03:25:31API Interceptor1x Sleep call for process: WerFault.exe modified
                                      08:25:10Task SchedulerRun new task: System Ware path: C:\Users\user\Desktop\intro.avi.exe
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      208.95.112.1AimStar.exeGet hashmaliciousBlank GrabberBrowse
                                      • ip-api.com/json/?fields=225545
                                      L988Ph5sKX.exeGet hashmaliciousXWormBrowse
                                      • ip-api.com/line/?fields=hosting
                                      kj93GnZHBS.exeGet hashmaliciousAsyncRAT, XWormBrowse
                                      • ip-api.com/line/?fields=hosting
                                      ANuh30XoVu.exeGet hashmaliciousXWormBrowse
                                      • ip-api.com/line/?fields=hosting
                                      rivalsanticheat.exeGet hashmaliciousXWormBrowse
                                      • ip-api.com/line/?fields=hosting
                                      rename_me_before.exeGet hashmaliciousPython Stealer, Exela StealerBrowse
                                      • ip-api.com/json
                                      vEtDFkAZjO.exeGet hashmaliciousRL STEALER, StormKittyBrowse
                                      • ip-api.com/xml
                                      Fizzy Loader.exeGet hashmaliciousBlank Grabber, Umbral StealerBrowse
                                      • ip-api.com/json/?fields=225545
                                      Extreme Injector v3.exeGet hashmaliciousXWormBrowse
                                      • ip-api.com/line/?fields=hosting
                                      VegaStealer_v2.exeGet hashmaliciousAdes Stealer, BlackGuard, NitroStealer, VEGA StealerBrowse
                                      • ip-api.com/json/?fields=61439
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      s-part-0017.t-0009.t-msedge.netrandom(6).exeGet hashmaliciousStealcBrowse
                                      • 13.107.246.45
                                      1.exeGet hashmaliciousXWormBrowse
                                      • 13.107.246.45
                                      installer64v7.1.0.msiGet hashmaliciousUnknownBrowse
                                      • 13.107.246.45
                                      hcxmivKYfL.exeGet hashmaliciousRedLineBrowse
                                      • 13.107.246.45
                                      01012025.htmlGet hashmaliciousHTMLPhisherBrowse
                                      • 13.107.246.45
                                      http://l.instagram.com/?0bfd7a413579bfc47b11c1f19890162e=f171d759fb3a033e4eb430517cad3aef&e=ATP3gbWvTZYJbEDeh7rUkhPx4FjctqZcqx8JLHQOt3eCFNBI8ssZ853B2RmMWetLJ63KaZJU&s=1&u=https%3A%2F%2Fbusiness.instagram.com%2Fmicro_site%2Furl%2F%3Fevent_type%3Dclick%26site%3Digb%26desusertion%3Dhttps%253A%252F%252Fwww.facebook.com%252Fads%252Fig_redirect%252F%253Fd%253DAd8U5WMN2AM7K-NrvRBs3gyfr9DHeZ3ist33ENX9eJBJWMRBAaOOij4rbjtu42P4dXhL8YyD-jl0LZtS1wkFu-DRtZrPI1zyuzAYXXYv3uJfsc2GuuhHJZr0iVcLluY7-XzYStW8tPCtY7q5OaN0ZR5NezqONJHNCe212u1Fk3V5I6c8mMsj53lfF9nQIFCpMtE%2526a%253D1%2526hash%253DAd_y5usHyEC86F8XGet hashmaliciousUnknownBrowse
                                      • 13.107.246.45
                                      https://t.co/YjyGioQuKTGet hashmaliciousUnknownBrowse
                                      • 13.107.246.45
                                      installer64v9.3.4.msiGet hashmaliciousUnknownBrowse
                                      • 13.107.246.45
                                      TieLoader.exeGet hashmaliciousUnknownBrowse
                                      • 13.107.246.45
                                      https://password-changes.phishwall.net/XMzUzaXgwTnBGZU9XbU9kQnFIZk0vQ3hhQlNtUXJwaExCOTNDYnhpMG92ZHRNQjI5SHhmNUlLTC9JcmVVS2sraDgvUVZtd2YwVFROeGxlbDR0UXBkeGJOUkN3UGliUUNGVHZXWVJ2ek5hZ0FNV290djROWFRxN3JNazM1WlhNOUVLdnlqOEVlbXFaaFROMlltRDFFKzhmU3A0eEl4cE1tMFJmazVYOE5hc25oTjNIR0Q1UzJyNW5wTkNBPT0tLUdCVnp5RnltanNuQnVQWkgtLVA0Uy9TcENHeDltOGdwd282cnZiaEE9PQ==?cid=2317630324Get hashmaliciousHTMLPhisher, KnowBe4Browse
                                      • 13.107.246.45
                                      ip-api.comAimStar.exeGet hashmaliciousBlank GrabberBrowse
                                      • 208.95.112.1
                                      L988Ph5sKX.exeGet hashmaliciousXWormBrowse
                                      • 208.95.112.1
                                      kj93GnZHBS.exeGet hashmaliciousAsyncRAT, XWormBrowse
                                      • 208.95.112.1
                                      ANuh30XoVu.exeGet hashmaliciousXWormBrowse
                                      • 208.95.112.1
                                      rivalsanticheat.exeGet hashmaliciousXWormBrowse
                                      • 208.95.112.1
                                      rename_me_before.exeGet hashmaliciousPython Stealer, Exela StealerBrowse
                                      • 208.95.112.1
                                      vEtDFkAZjO.exeGet hashmaliciousRL STEALER, StormKittyBrowse
                                      • 208.95.112.1
                                      Fizzy Loader.exeGet hashmaliciousBlank Grabber, Umbral StealerBrowse
                                      • 208.95.112.1
                                      Extreme Injector v3.exeGet hashmaliciousXWormBrowse
                                      • 208.95.112.1
                                      VegaStealer_v2.exeGet hashmaliciousAdes Stealer, BlackGuard, NitroStealer, VEGA StealerBrowse
                                      • 208.95.112.1
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      TUT-ASUSAimStar.exeGet hashmaliciousBlank GrabberBrowse
                                      • 208.95.112.1
                                      L988Ph5sKX.exeGet hashmaliciousXWormBrowse
                                      • 208.95.112.1
                                      kj93GnZHBS.exeGet hashmaliciousAsyncRAT, XWormBrowse
                                      • 208.95.112.1
                                      ANuh30XoVu.exeGet hashmaliciousXWormBrowse
                                      • 208.95.112.1
                                      rivalsanticheat.exeGet hashmaliciousXWormBrowse
                                      • 208.95.112.1
                                      rename_me_before.exeGet hashmaliciousPython Stealer, Exela StealerBrowse
                                      • 208.95.112.1
                                      vEtDFkAZjO.exeGet hashmaliciousRL STEALER, StormKittyBrowse
                                      • 208.95.112.1
                                      Fizzy Loader.exeGet hashmaliciousBlank Grabber, Umbral StealerBrowse
                                      • 208.95.112.1
                                      Extreme Injector v3.exeGet hashmaliciousXWormBrowse
                                      • 208.95.112.1
                                      VegaStealer_v2.exeGet hashmaliciousAdes Stealer, BlackGuard, NitroStealer, VEGA StealerBrowse
                                      • 208.95.112.1
                                      No context
                                      No context
                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):65536
                                      Entropy (8bit):1.3453711910818968
                                      Encrypted:false
                                      SSDEEP:192:fDUTzCv/A60BU/HwbaSJKYxO3yoyVRzuiFRZ24IO83j:ITzCv/OBU/Ca53yomzuiFRY4IO8T
                                      MD5:73C77CCD2A50AA10F87969F4461AB710
                                      SHA1:33FB16CD0FD5FAFAE4457FBFF2D4E8EB6F30D509
                                      SHA-256:B77BCB99B1B6E198D896487F5A20A35AE075AD567346EE16D573DAC84237FE73
                                      SHA-512:651E429C5214FE3E25C567790EAC5F1976451466925767DCE5B7C5704775518005A567B33004B338BE43FA51F845E399E9E7AEC539019BC4F59423C0CC8787D4
                                      Malicious:false
                                      Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.C.L.R.2.0.r.3.....E.v.e.n.t.T.i.m.e.=.1.3.3.8.0.2.7.9.9.1.2.5.3.3.1.9.1.7.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.8.0.2.7.9.9.1.3.3.4.5.6.7.3.3.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.b.e.9.e.a.b.7.6.-.e.a.b.3.-.4.d.9.0.-.b.7.4.8.-.c.1.4.8.2.5.b.1.3.a.f.b.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.c.1.a.5.c.7.b.c.-.d.9.7.c.-.4.5.b.8.-.a.3.c.c.-.7.b.a.4.a.1.7.f.3.0.3.6.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.s.y.s.t.e.m.w.a.r.e...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.x.T.S.R.-.b.u.i.l.d...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.e.3.c.-.0.0.0.1.-.0.0.1.4.-.2.8.7.2.-.8.9.d.5.e.f.5.c.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.b.c.5.f.1.e.b.4.2.0.c.0.0.a.0.9.b.5.d.0.e.f.e.4.b.2.5.7.e.4.c.3.0.0.0.0.0.0.0.0.!.0.0.0.0.1.2.3.e.5.1.1.d.e.2.0.b.e.a.b.7.b.f.a.2.b.e.a.5.c.2.2.0.6.4.2.2.b.c.
                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                      File Type:Mini DuMP crash report, 15 streams, Thu Jan 2 08:25:12 2025, 0x1205a4 type
                                      Category:dropped
                                      Size (bytes):370440
                                      Entropy (8bit):3.4975131378558695
                                      Encrypted:false
                                      SSDEEP:3072:ik9qcsk+kMjBFAJV18QvKuUGb2gO4uEqN8wLTgGyvBhje14:ik9RsPAX1xXnO4MTgGyZhj1
                                      MD5:360F11C4ECFCA1AA6AD8C5A917F8A142
                                      SHA1:6B312CB894B74D35ADB965E0FDB5FCCD855D9FFD
                                      SHA-256:11403BBA0E5FF3DF0108A1FD70E35053B229661F28748CDAAFF8DE7BCBFAE161
                                      SHA-512:E0EC0B5F0BF948F15ABC72824032929F392484BC821B73A398F898ACBEFD48868DE8B36A1ABEB2052499FFD2FE67EA9AA7E9E95106826E8F7D3AFA46F183E970
                                      Malicious:false
                                      Preview:MDMP..a..... .......hMvg............d............(..x.......<....2.......3...w..........`.......8...........T........... Y...M...........2...........4..............................................................................eJ......P5......GenuineIntel............T.......<...dMvg.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                      File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):8372
                                      Entropy (8bit):3.689154830308844
                                      Encrypted:false
                                      SSDEEP:192:R6l7wVeJxR626YG565ZRgmfZNmprV89bp+sfbDm:R6lXJn626YY63RgmfT5p9fO
                                      MD5:C7CB1E369C2E14FA6A5958FC236446EF
                                      SHA1:CA8FF6F64FCE94E7111CB3AB52F2326A9F4C89E9
                                      SHA-256:0A7885B1DEDC836C68A0F14A1A3F7C727417541E2EBA506F8F96D5BAD7C63815
                                      SHA-512:E112B9426E14D365B181788B4DF9820DC7F25FD3A2A76C1DAC2136EAFA9743CC297645BDCFD3B43DEC2FCDBB4468EFE717248D8D607D223FD0D68C08839198BF
                                      Malicious:false
                                      Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.7.4.0.<./.P.i.
                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):4751
                                      Entropy (8bit):4.450580389789792
                                      Encrypted:false
                                      SSDEEP:48:cvIwWl8zseJg77aI9SkgWpW8VY1c0Ym8M4Jd16Fu2+q8vP1I6a6vttjzd:uIjfUI7FZ7V+WJwKO6Vvjjzd
                                      MD5:E062F75667BE9874654753ADC31D31E5
                                      SHA1:39ACB642242751EFC9AB905EE3D15C7B9BD85C4E
                                      SHA-256:A321CF6A36CD797568E4FB873658F74F264995470933C2D65D881DCA0C785002
                                      SHA-512:E6C30047866B5C2EB7F58C5173C458C5319B9D11CEB20723098A148D935FB44A2CB6EBC8FD718E1678B2C72815B0A20921A2B64296E458CD95A0950CA72A8C21
                                      Malicious:false
                                      Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="658047" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                      Process:C:\Users\user\Desktop\intro.avi.exe
                                      File Type:ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):1682
                                      Entropy (8bit):5.350187081398599
                                      Encrypted:false
                                      SSDEEP:48:MIHK5HKH1qHiYHKh3okHZHKJHKntHo6hAHKzetTH3:Pq5qHwCYqh3ok5qJqntI6eqzIX
                                      MD5:AE7F2402D6C6DD5CF582BB8A9AB7D8F0
                                      SHA1:82E5A0C6F7F00154651327157E4BE6DF7AB3CEB6
                                      SHA-256:2F09AEFCAFBB43457F64CDCD43992C51562214AC95CFAA7DEB0E9202E3E816A6
                                      SHA-512:2FD6464EB55D5C175FE6C90AC1A037AAF0DD0B3ECDEA55862387436AF4D4833B1CCC763C19F80DCAF49D57D57B37087955EED5B7BF1B962FE9A4F7BE0D1DC5FE
                                      Malicious:true
                                      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Management, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Management\96012833bebd5f21714fc508603cda97\System.Management.ni.dll",0..3,"System.Runtime.Serialization, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Runteb92aa12#\a3127
                                      Process:C:\Users\user\AppData\Roaming\system\systemware.exe
                                      File Type:ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):826
                                      Entropy (8bit):5.353295152847208
                                      Encrypted:false
                                      SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhBsXE4qdKm:MIHK5HKH1qHiYHKh3okHA
                                      MD5:CBC102AE9B2B802A4E451ED79E09DEB5
                                      SHA1:7102EB28C2A703B2AA74F5E419A2D72C66B97896
                                      SHA-256:0763878B1A8876F16EE532AB23C36782096C2A8CD770C18C6CB1156121734EFB
                                      SHA-512:CDB7367250343E2DD31876C3B337A0FF6A6E2A7E37FF71C0C8AE7072302FC014BBDE14689C16E25E80D2B1587DFC75FA6BE50AFD0D06083A2A09BD0D256151C7
                                      Malicious:false
                                      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Management, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Management\96012833bebd5f21714fc508603cda97\System.Management.ni.dll",0..
                                      Process:C:\Users\user\AppData\Roaming\system\systemware.exe
                                      File Type:DOS batch file, ASCII text, with CRLF line terminators
                                      Category:modified
                                      Size (bytes):209
                                      Entropy (8bit):5.319082875244265
                                      Encrypted:false
                                      SSDEEP:6:hC47bxrBeLuVFOOr+DE1qLTwiaZ5QWUovKOZG1qLTwi23fFy:d5r+uVEOCDEqwNHDjwZQ
                                      MD5:EF68A86AA0AB72C8E7E88F70D3E787D3
                                      SHA1:01D2E6D9A749FF2ADDD532C5AAABEB7562EADF55
                                      SHA-256:09102FDCFF800FBB49E3133FC79AC95ECE2B21C8B57330130A413FF23CD9ADA9
                                      SHA-512:79D984A9EDAEC99DAEC517D8869CE39E940F4497F2256012C61A356D236B95F20F79224511B60DAE323240DBD39BCB8FF54232FB468C9D65070A7F8111AE490B
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: Avira, Detection: 100%
                                      Preview:@echo off..chcp 65001..echo DONT CLOSE THIS WINDOW!..ping -n 10 localhost > nul..start "" "C:\Users\user\AppData\Roaming\system\systemware.exe"..del /a /q /f "C:\Users\user\AppData\Local\Temp\7jSSwThVwFwB.bat"
                                      Process:C:\Users\user\AppData\Roaming\system\systemware.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):224
                                      Entropy (8bit):7.009167477774236
                                      Encrypted:false
                                      SSDEEP:6:d1cQL3Lw4x/SK4QD7rfZdDTG9giaw5NN/cIsfaid:dA4x/e6ldDTu5QIVid
                                      MD5:4512C40AFCB3597FE82CDFA9C151DEA1
                                      SHA1:9AFBF0123F947887C015442EFE6BEE6C74E7EBAE
                                      SHA-256:24205732A2B2C0C35132E65284F2BD578409C06011EDF008F15091247B758654
                                      SHA-512:C7939BEFA22B9ED4CE5F96A8F679221135FB5A898A931B29E2D7B9C54E619100C0CF4A7A6343CE5DDE1C81C9D0139E79FA13B5114D7917BF3535B5F86DE7D330
                                      Malicious:false
                                      Preview:f?K..W......{.........}....b2...w.H`>.z!.7P..{..[U/..h.M.....s...-9>....f.>.|....6."A.}.....^.C|_.Vgj..#{........)m..ZBY.!HU...st;.......l.G{.....Ys.O..LV...r.|.|.)....oG.L.w.S...yt..+..>zX...v..lVT..#l(.Z......
                                      Process:C:\Users\user\Desktop\intro.avi.exe
                                      File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Category:dropped
                                      Size (bytes):356352
                                      Entropy (8bit):6.428476781574683
                                      Encrypted:false
                                      SSDEEP:6144:0I6bPXhLApfpMMoDMWZVGZV+RzbLirAeMB2Wku:FmhApypOrAeMB2/u
                                      MD5:D219D94CABAA00E5ABFFC599BDEEF75D
                                      SHA1:123E511DE20BEAB7BFA2BEA5C2206422BC5E8241
                                      SHA-256:3CC847687E60ACDA504FC35577F36EEDD0BCA559A4DE915D6DD88DB9178567D4
                                      SHA-512:82DBB2484E3E42FCD6C3914DA4EBFC540E135B8B57BF240A28A3E9FCEB6409D8A9B1F9CA9B4BF545D05A10FD9B1672A2A6A05D963AAA33F4905E74CC1C068734
                                      Malicious:true
                                      Yara Hits:
                                      • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: C:\Users\user\AppData\Roaming\system\systemware.exe, Author: Joe Security
                                      • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: C:\Users\user\AppData\Roaming\system\systemware.exe, Author: Joe Security
                                      • Rule: Windows_Trojan_Quasarrat_e52df647, Description: unknown, Source: C:\Users\user\AppData\Roaming\system\systemware.exe, Author: unknown
                                      • Rule: Quasar_RAT_1, Description: Detects Quasar RAT, Source: C:\Users\user\AppData\Roaming\system\systemware.exe, Author: Florian Roth
                                      • Rule: Quasar_RAT_2, Description: Detects Quasar RAT, Source: C:\Users\user\AppData\Roaming\system\systemware.exe, Author: Florian Roth
                                      • Rule: MAL_QuasarRAT_May19_1, Description: Detects QuasarRAT malware, Source: C:\Users\user\AppData\Roaming\system\systemware.exe, Author: Florian Roth
                                      • Rule: Vermin_Keylogger_Jan18_1, Description: Detects Vermin Keylogger, Source: C:\Users\user\AppData\Roaming\system\systemware.exe, Author: Florian Roth
                                      • Rule: xRAT_1, Description: Detects Patchwork malware, Source: C:\Users\user\AppData\Roaming\system\systemware.exe, Author: Florian Roth
                                      • Rule: CN_disclosed_20180208_KeyLogger_1, Description: Detects malware from disclosed CN malware set, Source: C:\Users\user\AppData\Roaming\system\systemware.exe, Author: Florian Roth
                                      • Rule: implant_win_quasarrat, Description: Detect QuasarRAT (reted from samples 2023-03), Source: C:\Users\user\AppData\Roaming\system\systemware.exe, Author: Sekoia.io
                                      • Rule: Quasar, Description: detect Remcos in memory, Source: C:\Users\user\AppData\Roaming\system\systemware.exe, Author: JPCERT/CC Incident Response Group
                                      • Rule: INDICATOR_SUSPICIOUS_GENInfoStealer, Description: Detects executables containing common artifcats observed in infostealers, Source: C:\Users\user\AppData\Roaming\system\systemware.exe, Author: ditekSHen
                                      • Rule: MALWARE_Win_QuasarRAT, Description: QuasarRAT payload, Source: C:\Users\user\AppData\Roaming\system\systemware.exe, Author: ditekSHen
                                      Antivirus:
                                      • Antivirus: Avira, Detection: 100%
                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                      • Antivirus: ReversingLabs, Detection: 84%
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......^.................b............... ........@.. ....................................@.................................`...K.................................................................................... ............... ..H............text....a... ...b.................. ..`.rsrc................d..............@..@.reloc...............n..............@..B........................H...........P...............H............................................0..K.......(.....(....(...........s....o....(....,.(....,.(;...-.~....o@...(....(....*.n~....-.(....,.(....*.(....*.0..=........o....,4(......(....,.*s....%.o....%.o....%.o....(....&(....*....0..N.......(....~....,.~....o....~....,.~....o....~....,.~....o....~....o..........(....*...0..n.......~....(....sz....~....(....,..oy...-.~....(....,..*~....~....(....~....~....(....,.r...p+.~....r...p(....~....(..
                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                      File Type:MS Windows registry file, NT/2000 or above
                                      Category:dropped
                                      Size (bytes):1835008
                                      Entropy (8bit):4.394147284571219
                                      Encrypted:false
                                      SSDEEP:6144:ul4fiJoH0ncNXiUjt10qIG/gaocYGBoaUMMhA2NX4WABlBuNAlOBSqa:u4vFIMYQUMM6VFYSlU
                                      MD5:1A1DBC0BEA41DAA76CCBBF46DF1C8119
                                      SHA1:95C8B779C6D2DEFC8CDDB6B0EB2DE9C18ABC311D
                                      SHA-256:6B759F05E9C35F21E422FD9A7859CD071A9892DAA3498AFA375EF4B7050062E9
                                      SHA-512:D31BE3EA14454F922CDB4E8F8DE33E80A215BE96B536669015D2156D6F05CF76A8997281776CE56761E91E98FC5D49A40F30E7504AD790A4AD3524D4B249769F
                                      Malicious:false
                                      Preview:regfG...G....\.Z.................... ....`......\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm.Q...\..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Windows\SysWOW64\PING.EXE
                                      File Type:ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):502
                                      Entropy (8bit):4.620443687137824
                                      Encrypted:false
                                      SSDEEP:12:P85pTcgTcgTcgTcgTcgTcgTcgTcgTcgTLs4oS/AFSkIrxMVlmJHaVzvv:2dUOAokItULVDv
                                      MD5:E657565E43A32E9BF009FB85D0E5FBA7
                                      SHA1:30194532C99B88ABDB7B0E6F15FA2BEC890E3176
                                      SHA-256:E025DDDFCBCCF6DF8627C54454938BBFA79A61B6304318B78FEFBF49A042440A
                                      SHA-512:C4295AAB84357A6EE845B64B254C247E2CF8564F383CACD2E34B6FC74288234852FF7D3F4213C79E4617C86B653C6643D1927F31275620D7E15D18EAF5BE4FBF
                                      Malicious:false
                                      Preview:..Pinging 707748 [::1] with 32 bytes of data:..Reply from ::1: time<1ms ..Reply from ::1: time<1ms ..Reply from ::1: time<1ms ..Reply from ::1: time<1ms ..Reply from ::1: time<1ms ..Reply from ::1: time<1ms ..Reply from ::1: time<1ms ..Reply from ::1: time<1ms ..Reply from ::1: time<1ms ..Reply from ::1: time<1ms ....Ping statistics for ::1:.. Packets: Sent = 10, Received = 10, Lost = 0 (0% loss),..Approximate round trip times in milli-seconds:.. Minimum = 0ms, Maximum = 0ms, Average = 0ms..
                                      File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Entropy (8bit):6.428476781574683
                                      TrID:
                                      • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                      • Win32 Executable (generic) a (10002005/4) 49.75%
                                      • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                      • Windows Screen Saver (13104/52) 0.07%
                                      • Generic Win/DOS Executable (2004/3) 0.01%
                                      File name:intro.avi.exe
                                      File size:356'352 bytes
                                      MD5:d219d94cabaa00e5abffc599bdeef75d
                                      SHA1:123e511de20beab7bfa2bea5c2206422bc5e8241
                                      SHA256:3cc847687e60acda504fc35577f36eedd0bca559a4de915d6dd88db9178567d4
                                      SHA512:82dbb2484e3e42fcd6c3914da4ebfc540e135b8b57bf240a28a3e9fceb6409d8a9b1f9ca9b4bf545d05a10fd9b1672a2a6a05d963aaa33f4905e74cc1c068734
                                      SSDEEP:6144:0I6bPXhLApfpMMoDMWZVGZV+RzbLirAeMB2Wku:FmhApypOrAeMB2/u
                                      TLSH:47747C2377A4EE3BD1BE277AF432051447B0D44BB616E38B5A6855F82C233868D907B7
                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......^.................b............... ........@.. ....................................@................................
                                      Icon Hash:00928e8e8686b000
                                      Entrypoint:0x4581ae
                                      Entrypoint Section:.text
                                      Digitally signed:false
                                      Imagebase:0x400000
                                      Subsystem:windows gui
                                      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                      Time Stamp:0x5EB119F5 [Tue May 5 07:47:01 2020 UTC]
                                      TLS Callbacks:
                                      CLR (.Net) Version:
                                      OS Version Major:4
                                      OS Version Minor:0
                                      File Version Major:4
                                      File Version Minor:0
                                      Subsystem Version Major:4
                                      Subsystem Version Minor:0
                                      Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                      Instruction
                                      jmp dword ptr [00402000h]
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      NameVirtual AddressVirtual Size Is in Section
                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x581600x4b.text
                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x5a0000xa00.rsrc
                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x5c0000xc.reloc
                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                      .text0x20000x561b40x56200664d020825ea7d481fc023a0fdff5c2eFalse0.5132126496734397data6.44528477979618IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                      .rsrc0x5a0000xa000xa00035b89cb323e59652dce8def98c7c00bFalse0.3546875data4.237788371045753IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      .reloc0x5c0000xc0x200bd28a940eee11fd64e88302faf080856False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                      RT_VERSION0x5a0a00x308data0.4497422680412371
                                      RT_MANIFEST0x5a3a80x478exported SGML document, Unicode text, UTF-8 (with BOM) text0.4423076923076923
                                      DLLImport
                                      mscoree.dll_CorExeMain
                                      TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                      2025-01-02T09:25:09.395784+01002036383ET MALWARE Common RAT Connectivity Check Observed1192.168.2.949743208.95.112.180TCP
                                      2025-01-02T09:25:11.739551+01002036383ET MALWARE Common RAT Connectivity Check Observed1192.168.2.949754208.95.112.180TCP
                                      TimestampSource PortDest PortSource IPDest IP
                                      Jan 2, 2025 09:25:08.801822901 CET4974380192.168.2.9208.95.112.1
                                      Jan 2, 2025 09:25:08.806643963 CET8049743208.95.112.1192.168.2.9
                                      Jan 2, 2025 09:25:08.806824923 CET4974380192.168.2.9208.95.112.1
                                      Jan 2, 2025 09:25:08.807089090 CET4974380192.168.2.9208.95.112.1
                                      Jan 2, 2025 09:25:08.811933041 CET8049743208.95.112.1192.168.2.9
                                      Jan 2, 2025 09:25:09.339253902 CET8049743208.95.112.1192.168.2.9
                                      Jan 2, 2025 09:25:09.395783901 CET4974380192.168.2.9208.95.112.1
                                      Jan 2, 2025 09:25:09.953116894 CET4974380192.168.2.9208.95.112.1
                                      Jan 2, 2025 09:25:11.198254108 CET4975480192.168.2.9208.95.112.1
                                      Jan 2, 2025 09:25:11.207022905 CET8049754208.95.112.1192.168.2.9
                                      Jan 2, 2025 09:25:11.210035086 CET4975480192.168.2.9208.95.112.1
                                      Jan 2, 2025 09:25:11.210459948 CET4975480192.168.2.9208.95.112.1
                                      Jan 2, 2025 09:25:11.215617895 CET8049754208.95.112.1192.168.2.9
                                      Jan 2, 2025 09:25:11.693846941 CET8049754208.95.112.1192.168.2.9
                                      Jan 2, 2025 09:25:11.739551067 CET4975480192.168.2.9208.95.112.1
                                      Jan 2, 2025 09:25:34.253534079 CET4975480192.168.2.9208.95.112.1
                                      TimestampSource PortDest PortSource IPDest IP
                                      Jan 2, 2025 09:25:08.785389900 CET6219053192.168.2.91.1.1.1
                                      Jan 2, 2025 09:25:08.792172909 CET53621901.1.1.1192.168.2.9
                                      Jan 2, 2025 09:25:12.881759882 CET5832653192.168.2.91.1.1.1
                                      Jan 2, 2025 09:25:12.890490055 CET53583261.1.1.1192.168.2.9
                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                      Jan 2, 2025 09:25:08.785389900 CET192.168.2.91.1.1.10x6c33Standard query (0)ip-api.comA (IP address)IN (0x0001)false
                                      Jan 2, 2025 09:25:12.881759882 CET192.168.2.91.1.1.10xd49fStandard query (0)erbaevbann3.ddns.netA (IP address)IN (0x0001)false
                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                      Jan 2, 2025 09:25:02.138863087 CET1.1.1.1192.168.2.90xebd6No error (0)shed.dual-low.s-part-0017.t-0009.t-msedge.nets-part-0017.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
                                      Jan 2, 2025 09:25:02.138863087 CET1.1.1.1192.168.2.90xebd6No error (0)s-part-0017.t-0009.t-msedge.net13.107.246.45A (IP address)IN (0x0001)false
                                      Jan 2, 2025 09:25:08.792172909 CET1.1.1.1192.168.2.90x6c33No error (0)ip-api.com208.95.112.1A (IP address)IN (0x0001)false
                                      • ip-api.com
                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      0192.168.2.949743208.95.112.1807560C:\Users\user\Desktop\intro.avi.exe
                                      TimestampBytes transferredDirectionData
                                      Jan 2, 2025 09:25:08.807089090 CET144OUTGET /json/ HTTP/1.1
                                      User-Agent: Mozilla/5.0 (Windows NT 6.3; rv:48.0) Gecko/20100101 Firefox/48.0
                                      Host: ip-api.com
                                      Connection: Keep-Alive
                                      Jan 2, 2025 09:25:09.339253902 CET483INHTTP/1.1 200 OK
                                      Date: Thu, 02 Jan 2025 08:25:09 GMT
                                      Content-Type: application/json; charset=utf-8
                                      Content-Length: 306
                                      Access-Control-Allow-Origin: *
                                      X-Ttl: 60
                                      X-Rl: 44
                                      Data Raw: 7b 22 73 74 61 74 75 73 22 3a 22 73 75 63 63 65 73 73 22 2c 22 63 6f 75 6e 74 72 79 22 3a 22 55 6e 69 74 65 64 20 53 74 61 74 65 73 22 2c 22 63 6f 75 6e 74 72 79 43 6f 64 65 22 3a 22 55 53 22 2c 22 72 65 67 69 6f 6e 22 3a 22 4e 59 22 2c 22 72 65 67 69 6f 6e 4e 61 6d 65 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 22 63 69 74 79 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 22 7a 69 70 22 3a 22 31 30 31 32 33 22 2c 22 6c 61 74 22 3a 34 30 2e 37 31 32 38 2c 22 6c 6f 6e 22 3a 2d 37 34 2e 30 30 36 2c 22 74 69 6d 65 7a 6f 6e 65 22 3a 22 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 22 2c 22 69 73 70 22 3a 22 4c 65 76 65 6c 20 33 22 2c 22 6f 72 67 22 3a 22 43 65 6e 74 75 72 79 4c 69 6e 6b 20 43 6f 6d 6d 75 6e 69 63 61 74 69 6f 6e 73 2c 20 4c 4c 43 22 2c 22 61 73 22 3a 22 41 53 33 33 35 36 20 4c 65 76 65 6c 20 33 20 50 61 72 65 6e 74 2c 20 4c 4c 43 22 2c 22 71 75 65 72 79 22 3a 22 38 2e 34 36 2e 31 32 33 2e 31 38 39 22 7d
                                      Data Ascii: {"status":"success","country":"United States","countryCode":"US","region":"NY","regionName":"New York","city":"New York","zip":"10123","lat":40.7128,"lon":-74.006,"timezone":"America/New_York","isp":"Level 3","org":"CenturyLink Communications, LLC","as":"AS3356 Level 3 Parent, LLC","query":"8.46.123.189"}


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      1192.168.2.949754208.95.112.1807740C:\Users\user\AppData\Roaming\system\systemware.exe
                                      TimestampBytes transferredDirectionData
                                      Jan 2, 2025 09:25:11.210459948 CET144OUTGET /json/ HTTP/1.1
                                      User-Agent: Mozilla/5.0 (Windows NT 6.3; rv:48.0) Gecko/20100101 Firefox/48.0
                                      Host: ip-api.com
                                      Connection: Keep-Alive
                                      Jan 2, 2025 09:25:11.693846941 CET483INHTTP/1.1 200 OK
                                      Date: Thu, 02 Jan 2025 08:25:10 GMT
                                      Content-Type: application/json; charset=utf-8
                                      Content-Length: 306
                                      Access-Control-Allow-Origin: *
                                      X-Ttl: 60
                                      X-Rl: 44
                                      Data Raw: 7b 22 73 74 61 74 75 73 22 3a 22 73 75 63 63 65 73 73 22 2c 22 63 6f 75 6e 74 72 79 22 3a 22 55 6e 69 74 65 64 20 53 74 61 74 65 73 22 2c 22 63 6f 75 6e 74 72 79 43 6f 64 65 22 3a 22 55 53 22 2c 22 72 65 67 69 6f 6e 22 3a 22 4e 59 22 2c 22 72 65 67 69 6f 6e 4e 61 6d 65 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 22 63 69 74 79 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 22 7a 69 70 22 3a 22 31 30 31 32 33 22 2c 22 6c 61 74 22 3a 34 30 2e 37 31 32 38 2c 22 6c 6f 6e 22 3a 2d 37 34 2e 30 30 36 2c 22 74 69 6d 65 7a 6f 6e 65 22 3a 22 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 22 2c 22 69 73 70 22 3a 22 4c 65 76 65 6c 20 33 22 2c 22 6f 72 67 22 3a 22 43 65 6e 74 75 72 79 4c 69 6e 6b 20 43 6f 6d 6d 75 6e 69 63 61 74 69 6f 6e 73 2c 20 4c 4c 43 22 2c 22 61 73 22 3a 22 41 53 33 33 35 36 20 4c 65 76 65 6c 20 33 20 50 61 72 65 6e 74 2c 20 4c 4c 43 22 2c 22 71 75 65 72 79 22 3a 22 38 2e 34 36 2e 31 32 33 2e 31 38 39 22 7d
                                      Data Ascii: {"status":"success","country":"United States","countryCode":"US","region":"NY","regionName":"New York","city":"New York","zip":"10123","lat":40.7128,"lon":-74.006,"timezone":"America/New_York","isp":"Level 3","org":"CenturyLink Communications, LLC","as":"AS3356 Level 3 Parent, LLC","query":"8.46.123.189"}


                                      Click to jump to process

                                      Click to jump to process

                                      Click to dive into process behavior distribution

                                      Click to jump to process

                                      Target ID:0
                                      Start time:03:25:06
                                      Start date:02/01/2025
                                      Path:C:\Users\user\Desktop\intro.avi.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Users\user\Desktop\intro.avi.exe"
                                      Imagebase:0x5f0000
                                      File size:356'352 bytes
                                      MD5 hash:D219D94CABAA00E5ABFFC599BDEEF75D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: 00000000.00000000.1349274211.00000000005F2000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                      • Rule: Windows_Trojan_Quasarrat_e52df647, Description: unknown, Source: 00000000.00000000.1349274211.00000000005F2000.00000002.00000001.01000000.00000003.sdmp, Author: unknown
                                      • Rule: Quasar_RAT_1, Description: Detects Quasar RAT, Source: 00000000.00000000.1349274211.00000000005F2000.00000002.00000001.01000000.00000003.sdmp, Author: Florian Roth
                                      • Rule: implant_win_quasarrat, Description: Detect QuasarRAT (reted from samples 2023-03), Source: 00000000.00000000.1349274211.00000000005F2000.00000002.00000001.01000000.00000003.sdmp, Author: Sekoia.io
                                      • Rule: Quasar, Description: detect Remcos in memory, Source: 00000000.00000000.1349274211.00000000005F2000.00000002.00000001.01000000.00000003.sdmp, Author: JPCERT/CC Incident Response Group
                                      Reputation:low
                                      Has exited:true

                                      Target ID:2
                                      Start time:03:25:08
                                      Start date:02/01/2025
                                      Path:C:\Windows\SysWOW64\schtasks.exe
                                      Wow64 process (32bit):true
                                      Commandline:"schtasks" /create /tn "System Ware" /sc ONLOGON /tr "C:\Users\user\Desktop\intro.avi.exe" /rl HIGHEST /f
                                      Imagebase:0xd00000
                                      File size:187'904 bytes
                                      MD5 hash:48C2FE20575769DE916F48EF0676A965
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:3
                                      Start time:03:25:08
                                      Start date:02/01/2025
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff70f010000
                                      File size:862'208 bytes
                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:4
                                      Start time:03:25:08
                                      Start date:02/01/2025
                                      Path:C:\Users\user\AppData\Roaming\system\systemware.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Users\user\AppData\Roaming\system\systemware.exe"
                                      Imagebase:0x6b0000
                                      File size:356'352 bytes
                                      MD5 hash:D219D94CABAA00E5ABFFC599BDEEF75D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: JoeSecurity_Quasar, Description: Yara detected Quasar RAT, Source: C:\Users\user\AppData\Roaming\system\systemware.exe, Author: Joe Security
                                      • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: C:\Users\user\AppData\Roaming\system\systemware.exe, Author: Joe Security
                                      • Rule: Windows_Trojan_Quasarrat_e52df647, Description: unknown, Source: C:\Users\user\AppData\Roaming\system\systemware.exe, Author: unknown
                                      • Rule: Quasar_RAT_1, Description: Detects Quasar RAT, Source: C:\Users\user\AppData\Roaming\system\systemware.exe, Author: Florian Roth
                                      • Rule: Quasar_RAT_2, Description: Detects Quasar RAT, Source: C:\Users\user\AppData\Roaming\system\systemware.exe, Author: Florian Roth
                                      • Rule: MAL_QuasarRAT_May19_1, Description: Detects QuasarRAT malware, Source: C:\Users\user\AppData\Roaming\system\systemware.exe, Author: Florian Roth
                                      • Rule: Vermin_Keylogger_Jan18_1, Description: Detects Vermin Keylogger, Source: C:\Users\user\AppData\Roaming\system\systemware.exe, Author: Florian Roth
                                      • Rule: xRAT_1, Description: Detects Patchwork malware, Source: C:\Users\user\AppData\Roaming\system\systemware.exe, Author: Florian Roth
                                      • Rule: CN_disclosed_20180208_KeyLogger_1, Description: Detects malware from disclosed CN malware set, Source: C:\Users\user\AppData\Roaming\system\systemware.exe, Author: Florian Roth
                                      • Rule: implant_win_quasarrat, Description: Detect QuasarRAT (reted from samples 2023-03), Source: C:\Users\user\AppData\Roaming\system\systemware.exe, Author: Sekoia.io
                                      • Rule: Quasar, Description: detect Remcos in memory, Source: C:\Users\user\AppData\Roaming\system\systemware.exe, Author: JPCERT/CC Incident Response Group
                                      • Rule: INDICATOR_SUSPICIOUS_GENInfoStealer, Description: Detects executables containing common artifcats observed in infostealers, Source: C:\Users\user\AppData\Roaming\system\systemware.exe, Author: ditekSHen
                                      • Rule: MALWARE_Win_QuasarRAT, Description: QuasarRAT payload, Source: C:\Users\user\AppData\Roaming\system\systemware.exe, Author: ditekSHen
                                      Antivirus matches:
                                      • Detection: 100%, Avira
                                      • Detection: 100%, Joe Sandbox ML
                                      • Detection: 84%, ReversingLabs
                                      Reputation:low
                                      Has exited:true

                                      Target ID:5
                                      Start time:03:25:10
                                      Start date:02/01/2025
                                      Path:C:\Windows\SysWOW64\schtasks.exe
                                      Wow64 process (32bit):true
                                      Commandline:"schtasks" /create /tn "System Ware" /sc ONLOGON /tr "C:\Users\user\AppData\Roaming\system\systemware.exe" /rl HIGHEST /f
                                      Imagebase:0xd00000
                                      File size:187'904 bytes
                                      MD5 hash:48C2FE20575769DE916F48EF0676A965
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:6
                                      Start time:03:25:10
                                      Start date:02/01/2025
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff70f010000
                                      File size:862'208 bytes
                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:7
                                      Start time:03:25:10
                                      Start date:02/01/2025
                                      Path:C:\Users\user\Desktop\intro.avi.exe
                                      Wow64 process (32bit):true
                                      Commandline:C:\Users\user\Desktop\intro.avi.exe
                                      Imagebase:0x690000
                                      File size:356'352 bytes
                                      MD5 hash:D219D94CABAA00E5ABFFC599BDEEF75D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:low
                                      Has exited:true

                                      Target ID:8
                                      Start time:03:25:11
                                      Start date:02/01/2025
                                      Path:C:\Windows\SysWOW64\cmd.exe
                                      Wow64 process (32bit):true
                                      Commandline:C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\7jSSwThVwFwB.bat" "
                                      Imagebase:0xc50000
                                      File size:236'544 bytes
                                      MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:9
                                      Start time:03:25:11
                                      Start date:02/01/2025
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff70f010000
                                      File size:862'208 bytes
                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:11
                                      Start time:03:25:12
                                      Start date:02/01/2025
                                      Path:C:\Windows\SysWOW64\chcp.com
                                      Wow64 process (32bit):true
                                      Commandline:chcp 65001
                                      Imagebase:0x90000
                                      File size:12'800 bytes
                                      MD5 hash:20A59FB950D8A191F7D35C4CA7DA9CAF
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:moderate
                                      Has exited:true

                                      Target ID:13
                                      Start time:03:25:12
                                      Start date:02/01/2025
                                      Path:C:\Windows\SysWOW64\PING.EXE
                                      Wow64 process (32bit):true
                                      Commandline:ping -n 10 localhost
                                      Imagebase:0xdb0000
                                      File size:18'944 bytes
                                      MD5 hash:B3624DD758CCECF93A1226CEF252CA12
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:14
                                      Start time:03:25:12
                                      Start date:02/01/2025
                                      Path:C:\Windows\SysWOW64\WerFault.exe
                                      Wow64 process (32bit):true
                                      Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7740 -s 2312
                                      Imagebase:0xdd0000
                                      File size:483'680 bytes
                                      MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:16
                                      Start time:03:25:21
                                      Start date:02/01/2025
                                      Path:C:\Users\user\AppData\Roaming\system\systemware.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Users\user\AppData\Roaming\system\systemware.exe"
                                      Imagebase:0xda0000
                                      File size:356'352 bytes
                                      MD5 hash:D219D94CABAA00E5ABFFC599BDEEF75D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Reset < >

                                        Execution Graph

                                        Execution Coverage:9.6%
                                        Dynamic/Decrypted Code Coverage:100%
                                        Signature Coverage:0%
                                        Total number of Nodes:54
                                        Total number of Limit Nodes:5
                                        execution_graph 13725 f70848 13726 f70852 13725->13726 13730 f721a0 13725->13730 13727 f7089e 13726->13727 13735 f7af40 13726->13735 13731 f721c5 13730->13731 13748 f722a1 13731->13748 13752 f722b0 13731->13752 13737 f7af5d 13735->13737 13736 f7b003 13736->13727 13737->13736 13760 f7fc30 13737->13760 13764 f7fbca 13737->13764 13772 f7fc20 13737->13772 13738 f7b0ab 13740 f7b0d3 13738->13740 13776 f7fdf7 13738->13776 13780 f7fd70 13738->13780 13784 f7fee7 13738->13784 13788 f7fd62 13738->13788 13739 f7b248 13739->13727 13740->13727 13750 f722af 13748->13750 13749 f723b4 13749->13749 13750->13749 13756 f71978 13750->13756 13754 f722d7 13752->13754 13753 f723b4 13753->13753 13754->13753 13755 f71978 CreateActCtxA 13754->13755 13755->13753 13757 f73340 CreateActCtxA 13756->13757 13759 f73403 13757->13759 13759->13759 13761 f7fc3c 13760->13761 13763 f7fc45 13761->13763 13792 f7f928 13761->13792 13763->13738 13765 f7fbce 13764->13765 13766 f7fbee 13764->13766 13765->13766 13769 f7fc4c DeleteFileW 13765->13769 13767 f7f928 DeleteFileW 13766->13767 13768 f7fc45 13766->13768 13767->13766 13768->13738 13771 f7fcd7 13769->13771 13771->13738 13774 f7fc30 13772->13774 13773 f7f928 DeleteFileW 13773->13774 13774->13773 13775 f7fc45 13774->13775 13775->13738 13778 f7fe05 13776->13778 13777 f7fc30 DeleteFileW 13779 f7fef7 13777->13779 13778->13777 13779->13739 13781 f7fd9b 13780->13781 13782 f7fc30 DeleteFileW 13781->13782 13783 f7fef7 13782->13783 13783->13739 13785 f7feec 13784->13785 13786 f7fc30 DeleteFileW 13785->13786 13787 f7fef7 13786->13787 13787->13739 13789 f7fd6b 13788->13789 13790 f7fc30 DeleteFileW 13789->13790 13791 f7fef7 13790->13791 13791->13739 13793 f7fc58 DeleteFileW 13792->13793 13795 f7fcd7 13793->13795 13795->13761

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1230 f79c80-f79ce6 1232 f79d30-f79d32 1230->1232 1233 f79ce8-f79cf3 1230->1233 1234 f79d34-f79d4d 1232->1234 1233->1232 1235 f79cf5-f79d01 1233->1235 1241 f79d4f-f79d5b 1234->1241 1242 f79d99-f79d9b 1234->1242 1236 f79d24-f79d2e 1235->1236 1237 f79d03-f79d0d 1235->1237 1236->1234 1239 f79d11-f79d20 1237->1239 1240 f79d0f 1237->1240 1239->1239 1243 f79d22 1239->1243 1240->1239 1241->1242 1244 f79d5d-f79d69 1241->1244 1245 f79d9d-f79df5 1242->1245 1243->1236 1246 f79d8c-f79d97 1244->1246 1247 f79d6b-f79d75 1244->1247 1254 f79df7-f79e02 1245->1254 1255 f79e3f-f79e41 1245->1255 1246->1245 1248 f79d77 1247->1248 1249 f79d79-f79d88 1247->1249 1248->1249 1249->1249 1251 f79d8a 1249->1251 1251->1246 1254->1255 1256 f79e04-f79e10 1254->1256 1257 f79e43-f79e5b 1255->1257 1258 f79e33-f79e3d 1256->1258 1259 f79e12-f79e1c 1256->1259 1264 f79ea5-f79ea7 1257->1264 1265 f79e5d-f79e68 1257->1265 1258->1257 1260 f79e20-f79e2f 1259->1260 1261 f79e1e 1259->1261 1260->1260 1263 f79e31 1260->1263 1261->1260 1263->1258 1267 f79ea9-f79efa 1264->1267 1265->1264 1266 f79e6a-f79e76 1265->1266 1268 f79e99-f79ea3 1266->1268 1269 f79e78-f79e82 1266->1269 1275 f79f00-f79f0e 1267->1275 1268->1267 1270 f79e86-f79e95 1269->1270 1271 f79e84 1269->1271 1270->1270 1273 f79e97 1270->1273 1271->1270 1273->1268 1276 f79f17-f79f77 1275->1276 1277 f79f10-f79f16 1275->1277 1284 f79f87-f79f8b 1276->1284 1285 f79f79-f79f7d 1276->1285 1277->1276 1287 f79f8d-f79f91 1284->1287 1288 f79f9b-f79f9f 1284->1288 1285->1284 1286 f79f7f 1285->1286 1286->1284 1287->1288 1289 f79f93 1287->1289 1290 f79fa1-f79fa5 1288->1290 1291 f79faf-f79fb3 1288->1291 1289->1288 1290->1291 1292 f79fa7-f79faa call f70428 1290->1292 1293 f79fb5-f79fb9 1291->1293 1294 f79fc3-f79fc7 1291->1294 1292->1291 1293->1294 1296 f79fbb-f79fbe call f70428 1293->1296 1297 f79fd7-f79fdb 1294->1297 1298 f79fc9-f79fcd 1294->1298 1296->1294 1301 f79fdd-f79fe1 1297->1301 1302 f79feb-f79fef 1297->1302 1298->1297 1300 f79fcf-f79fd2 call f70428 1298->1300 1300->1297 1301->1302 1303 f79fe3 1301->1303 1304 f79ff1-f79ff5 1302->1304 1305 f79fff 1302->1305 1303->1302 1304->1305 1307 f79ff7 1304->1307 1308 f7a000 1305->1308 1307->1305 1308->1308
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1375862936.0000000000F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_f70000_intro.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 31bf7ebb96c79c40221eec7a7056f56dd3b3cd00193521c6d4d71461330ad7c0
                                        • Instruction ID: 06f6cfa17851676145e63657bf70eeb370ac33d8bce49e4c1443a06917002090
                                        • Opcode Fuzzy Hash: 31bf7ebb96c79c40221eec7a7056f56dd3b3cd00193521c6d4d71461330ad7c0
                                        • Instruction Fuzzy Hash: EFB13071E04209CFDB10CFA9D8857DEBBF2AF88314F14C52AD419E7254EBB49845DB92

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1388 f7a550-f7a5b6 1390 f7a600-f7a602 1388->1390 1391 f7a5b8-f7a5c3 1388->1391 1393 f7a604-f7a61d 1390->1393 1391->1390 1392 f7a5c5-f7a5d1 1391->1392 1394 f7a5f4-f7a5fe 1392->1394 1395 f7a5d3-f7a5dd 1392->1395 1399 f7a61f-f7a62b 1393->1399 1400 f7a669-f7a66b 1393->1400 1394->1393 1396 f7a5e1-f7a5f0 1395->1396 1397 f7a5df 1395->1397 1396->1396 1401 f7a5f2 1396->1401 1397->1396 1399->1400 1402 f7a62d-f7a639 1399->1402 1403 f7a66d-f7a685 1400->1403 1401->1394 1404 f7a65c-f7a667 1402->1404 1405 f7a63b-f7a645 1402->1405 1410 f7a687-f7a692 1403->1410 1411 f7a6cf-f7a6d1 1403->1411 1404->1403 1406 f7a647 1405->1406 1407 f7a649-f7a658 1405->1407 1406->1407 1407->1407 1409 f7a65a 1407->1409 1409->1404 1410->1411 1413 f7a694-f7a6a0 1410->1413 1412 f7a6d3-f7a6eb 1411->1412 1420 f7a735-f7a737 1412->1420 1421 f7a6ed-f7a6f8 1412->1421 1414 f7a6c3-f7a6cd 1413->1414 1415 f7a6a2-f7a6ac 1413->1415 1414->1412 1417 f7a6b0-f7a6bf 1415->1417 1418 f7a6ae 1415->1418 1417->1417 1419 f7a6c1 1417->1419 1418->1417 1419->1414 1423 f7a739-f7a7ac 1420->1423 1421->1420 1422 f7a6fa-f7a706 1421->1422 1424 f7a729-f7a733 1422->1424 1425 f7a708-f7a712 1422->1425 1432 f7a7b2-f7a7c0 1423->1432 1424->1423 1427 f7a716-f7a725 1425->1427 1428 f7a714 1425->1428 1427->1427 1429 f7a727 1427->1429 1428->1427 1429->1424 1433 f7a7c2-f7a7c8 1432->1433 1434 f7a7c9-f7a829 1432->1434 1433->1434 1441 f7a82b-f7a82f 1434->1441 1442 f7a839-f7a83d 1434->1442 1441->1442 1443 f7a831 1441->1443 1444 f7a83f-f7a843 1442->1444 1445 f7a84d-f7a851 1442->1445 1443->1442 1444->1445 1446 f7a845 1444->1446 1447 f7a853-f7a857 1445->1447 1448 f7a861-f7a865 1445->1448 1446->1445 1447->1448 1451 f7a859 1447->1451 1449 f7a867-f7a86b 1448->1449 1450 f7a875-f7a879 1448->1450 1449->1450 1452 f7a86d 1449->1452 1453 f7a87b-f7a87f 1450->1453 1454 f7a889-f7a88d 1450->1454 1451->1448 1452->1450 1453->1454 1455 f7a881-f7a884 call f70428 1453->1455 1456 f7a88f-f7a893 1454->1456 1457 f7a89d 1454->1457 1455->1454 1456->1457 1459 f7a895-f7a898 call f70428 1456->1459 1461 f7a89e 1457->1461 1459->1457 1461->1461
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1375862936.0000000000F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_f70000_intro.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 365473d3497190e72ce05a617c52f5e42482a2e95d6691a59d63ea38cd3102e3
                                        • Instruction ID: 1931655cdb88dca6f7fed96e20574189575157d577fdf4d451889368edcc7629
                                        • Opcode Fuzzy Hash: 365473d3497190e72ce05a617c52f5e42482a2e95d6691a59d63ea38cd3102e3
                                        • Instruction Fuzzy Hash: 0EB16071E00209CFDB14CFA9D88579EBBF2AF88310F19C52AD419E7254EB749846DB83

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 0 6470048-6470068 1 647006f-6470071 0->1 2 6470073-6470079 1->2 3 6470089-64700bd 1->3 4 647007d-647007f 2->4 5 647007b 2->5 8 64700c0-64700c4 3->8 4->3 5->3 9 64700c6-64700cb 8->9 10 64700cd-64700d2 8->10 11 64700d8-64700db 9->11 10->11 12 6470db7-6470dc1 11->12 13 64700e1-64700f5 11->13 13->8 15 64700f7 13->15 16 6470484-6470493 15->16 17 64703a2-64703b1 15->17 18 64702c0-64702cf 15->18 19 64700fe-647010b 15->19 20 64701de-64701ed 15->20 21 6470d3f-6470d63 16->21 22 6470499-64704bf 16->22 17->21 23 64703b7-64703dd 17->23 18->21 24 64702d5-64702fb 18->24 19->21 26 6470111-6470137 19->26 20->21 25 64701f3-6470219 20->25 39 6470f32-6470f37 21->39 40 6470d69-6470d70 21->40 47 64704c1-64704c6 22->47 48 64704c8-64704cf 22->48 49 64703e6-64703ed 23->49 50 64703df-64703e4 23->50 51 6470304-647030b 24->51 52 64702fd-6470302 24->52 54 6470222-6470229 25->54 55 647021b-6470220 25->55 56 6470140-6470147 26->56 57 6470139-647013e 26->57 40->39 41 6470d76-6470d91 40->41 41->39 74 6470d97-6470d9f 41->74 62 6470534-6470561 47->62 63 64704f5-6470519 48->63 64 64704d1-64704f3 48->64 66 6470413-6470437 49->66 67 64703ef-6470411 49->67 65 6470452-647047f 50->65 69 6470331-6470355 51->69 70 647030d-647032f 51->70 68 6470370-647039d 52->68 72 647024f-6470273 54->72 73 647022b-647024d 54->73 71 647028e-64702bb 55->71 59 647016d-6470191 56->59 60 6470149-647016b 56->60 58 64701ac-64701d9 57->58 58->8 114 6470193-6470199 59->114 115 64701a9 59->115 60->58 62->8 106 6470531 63->106 107 647051b-6470521 63->107 64->62 65->8 108 647044f 66->108 109 6470439-647043f 66->109 67->65 68->8 110 6470357-647035d 69->110 111 647036d 69->111 70->68 71->8 112 6470275-647027b 72->112 113 647028b 72->113 73->71 74->39 77 6470da5-6470dae 74->77 77->12 106->62 116 6470525-6470527 107->116 117 6470523 107->117 108->65 118 6470443-6470445 109->118 119 6470441 109->119 120 6470361-6470363 110->120 121 647035f 110->121 111->68 122 647027f-6470281 112->122 123 647027d 112->123 113->71 124 647019d-647019f 114->124 125 647019b 114->125 115->58 116->106 117->106 118->108 119->108 120->111 121->111 122->113 123->113 124->115 125->115
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1379402345.0000000006470000.00000040.00000800.00020000.00000000.sdmp, Offset: 06470000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6470000_intro.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: ?
                                        • API String ID: 0-1684325040
                                        • Opcode ID: f6c7d542b6e8bce9f0e60a6cec27e2798395cdef3392e24c8cfe827f4e82bf66
                                        • Instruction ID: a5589337b69b6e994f2ddcabcd626ee5a263121868b858c62978814939c5dffd
                                        • Opcode Fuzzy Hash: f6c7d542b6e8bce9f0e60a6cec27e2798395cdef3392e24c8cfe827f4e82bf66
                                        • Instruction Fuzzy Hash: 1EF1B0B4B01205CFEB55DBA5C844BAEBBB2FF88704F14841AE4069B391DB75EC42CB91

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 126 f73334-f73339 127 f73342-f73401 CreateActCtxA 126->127 128 f7333b 126->128 130 f73403-f73409 127->130 131 f7340a-f73464 127->131 128->127 130->131 138 f73466-f73469 131->138 139 f73473-f73477 131->139 138->139 140 f73479-f73485 139->140 141 f73488 139->141 140->141 143 f73489 141->143 143->143
                                        APIs
                                        • CreateActCtxA.KERNEL32(?), ref: 00F733F1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1375862936.0000000000F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_f70000_intro.jbxd
                                        Similarity
                                        • API ID: Create
                                        • String ID:
                                        • API String ID: 2289755597-0
                                        • Opcode ID: c1a9a409c11970b57874852cb9f66e64f4589924d980b677295b03fd7460275e
                                        • Instruction ID: d746a20472a01c3d034b3602645706e21dbc2a8b35e866b906e9ef1a8ca09af7
                                        • Opcode Fuzzy Hash: c1a9a409c11970b57874852cb9f66e64f4589924d980b677295b03fd7460275e
                                        • Instruction Fuzzy Hash: B341EDB0C00759CFDB25CFA9C844BDEBBB1BF49304F20806AD408AB251DBB56A46DF91

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 144 f71978-f73401 CreateActCtxA 147 f73403-f73409 144->147 148 f7340a-f73464 144->148 147->148 155 f73466-f73469 148->155 156 f73473-f73477 148->156 155->156 157 f73479-f73485 156->157 158 f73488 156->158 157->158 160 f73489 158->160 160->160
                                        APIs
                                        • CreateActCtxA.KERNEL32(?), ref: 00F733F1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1375862936.0000000000F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_f70000_intro.jbxd
                                        Similarity
                                        • API ID: Create
                                        • String ID:
                                        • API String ID: 2289755597-0
                                        • Opcode ID: b663f88b8976d56260259962a5b9f648c49ce8ce6bc5f48bff710caa9702ca99
                                        • Instruction ID: 51915ffd3a54958abc948856e4a758480482cd80c9bdd0519da541858c9a0726
                                        • Opcode Fuzzy Hash: b663f88b8976d56260259962a5b9f648c49ce8ce6bc5f48bff710caa9702ca99
                                        • Instruction Fuzzy Hash: D641FFB0C00759DFDB24CFAAC844B9EFBB1BF49704F20806AD408AB255DBB56946DF91

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 161 f7fbca-f7fbcc 162 f7fbce-f7fbdc 161->162 163 f7fc2c-f7fc33 161->163 164 f7fbde-f7fbec 162->164 165 f7fc3c-f7fc3e 162->165 163->165 168 f7fbee-f7fbff 164->168 169 f7fc4c-f7fca2 164->169 167 f7fc3f-f7fc41 call f7f928 165->167 174 f7fc45-f7fc46 167->174 168->163 176 f7fca4-f7fca7 169->176 177 f7fcaa-f7fcd5 DeleteFileW 169->177 176->177 178 f7fcd7-f7fcdd 177->178 179 f7fcde-f7fd06 177->179 178->179
                                        APIs
                                        • DeleteFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,00F7FC45), ref: 00F7FCC8
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1375862936.0000000000F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_f70000_intro.jbxd
                                        Similarity
                                        • API ID: DeleteFile
                                        • String ID:
                                        • API String ID: 4033686569-0
                                        • Opcode ID: 6d899edacfd7493b3bf6bdb78af9faeadbc030e8e5a6ef269a92a970760f0150
                                        • Instruction ID: 631f4d8a1e44835ae8b79a229687ea4c033f941dc6dd72bbdb1cc71989b37861
                                        • Opcode Fuzzy Hash: 6d899edacfd7493b3bf6bdb78af9faeadbc030e8e5a6ef269a92a970760f0150
                                        • Instruction Fuzzy Hash: ED31E4B2D143899FCB01DB65D4507AEBFF4EF09310F08846AD448A7252D3745906CFA2

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 182 f7f928-f7fca2 185 f7fca4-f7fca7 182->185 186 f7fcaa-f7fcd5 DeleteFileW 182->186 185->186 187 f7fcd7-f7fcdd 186->187 188 f7fcde-f7fd06 186->188 187->188
                                        APIs
                                        • DeleteFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,00F7FC45), ref: 00F7FCC8
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1375862936.0000000000F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_f70000_intro.jbxd
                                        Similarity
                                        • API ID: DeleteFile
                                        • String ID:
                                        • API String ID: 4033686569-0
                                        • Opcode ID: 55278bf4b131d0fd9e28b73a7e3e890ea3537c383e9b2205722898bbdd1bd71d
                                        • Instruction ID: eb334f282e40f4548cb8716fdc3bf744f2a011189fc3dd1956c3b622726732d6
                                        • Opcode Fuzzy Hash: 55278bf4b131d0fd9e28b73a7e3e890ea3537c383e9b2205722898bbdd1bd71d
                                        • Instruction Fuzzy Hash: 44213BB5C006599BCB14CF9AD5447AEFBF4EF48320F14856AD818A7740D374AA45CFE1

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 191 6470012-6470014 192 6470016-6470024 191->192 193 6470025-6470043 191->193 192->193 194 6470048-6470068 193->194 195 647006f-6470071 194->195 196 6470073-6470079 195->196 197 6470089-64700bd 195->197 198 647007d-647007f 196->198 199 647007b 196->199 202 64700c0-64700c4 197->202 198->197 199->197 203 64700c6-64700cb 202->203 204 64700cd-64700d2 202->204 205 64700d8-64700db 203->205 204->205 206 6470db7-6470dc1 205->206 207 64700e1-64700f5 205->207 207->202 209 64700f7 207->209 210 6470484-6470493 209->210 211 64703a2-64703b1 209->211 212 64702c0-64702cf 209->212 213 64700fe-647010b 209->213 214 64701de-64701ed 209->214 215 6470d3f-6470d63 210->215 216 6470499-64704bf 210->216 211->215 217 64703b7-64703dd 211->217 212->215 218 64702d5-64702fb 212->218 213->215 220 6470111-6470137 213->220 214->215 219 64701f3-6470219 214->219 233 6470f32-6470f37 215->233 234 6470d69-6470d70 215->234 241 64704c1-64704c6 216->241 242 64704c8-64704cf 216->242 243 64703e6-64703ed 217->243 244 64703df-64703e4 217->244 245 6470304-647030b 218->245 246 64702fd-6470302 218->246 248 6470222-6470229 219->248 249 647021b-6470220 219->249 250 6470140-6470147 220->250 251 6470139-647013e 220->251 234->233 235 6470d76-6470d91 234->235 235->233 268 6470d97-6470d9f 235->268 256 6470534-6470561 241->256 257 64704f5-6470519 242->257 258 64704d1-64704f3 242->258 260 6470413-6470437 243->260 261 64703ef-6470411 243->261 259 6470452-647047f 244->259 263 6470331-6470355 245->263 264 647030d-647032f 245->264 262 6470370-647039d 246->262 266 647024f-6470273 248->266 267 647022b-647024d 248->267 265 647028e-64702bb 249->265 253 647016d-6470191 250->253 254 6470149-647016b 250->254 252 64701ac-64701d9 251->252 252->202 308 6470193-6470199 253->308 309 64701a9 253->309 254->252 256->202 300 6470531 257->300 301 647051b-6470521 257->301 258->256 259->202 302 647044f 260->302 303 6470439-647043f 260->303 261->259 262->202 304 6470357-647035d 263->304 305 647036d 263->305 264->262 265->202 306 6470275-647027b 266->306 307 647028b 266->307 267->265 268->233 271 6470da5-6470dae 268->271 271->206 300->256 310 6470525-6470527 301->310 311 6470523 301->311 302->259 312 6470443-6470445 303->312 313 6470441 303->313 314 6470361-6470363 304->314 315 647035f 304->315 305->262 316 647027f-6470281 306->316 317 647027d 306->317 307->265 318 647019d-647019f 308->318 319 647019b 308->319 309->252 310->300 311->300 312->302 313->302 314->305 315->305 316->307 317->307 318->309 319->309
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1379402345.0000000006470000.00000040.00000800.00020000.00000000.sdmp, Offset: 06470000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_6470000_intro.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: ?
                                        • API String ID: 0-1684325040
                                        • Opcode ID: b1a4343a1cb2ea3394f6414e3b29fd30a1f08d001908adbc253b8a1958dfc08d
                                        • Instruction ID: feffd980eef331f3a812d41341dbfebba7f0a1440fbae015cb0d19f0d9f8319b
                                        • Opcode Fuzzy Hash: b1a4343a1cb2ea3394f6414e3b29fd30a1f08d001908adbc253b8a1958dfc08d
                                        • Instruction Fuzzy Hash: 0C91E1B0B013458FEB159B69C850BAEBBB2FF85704F148566D502DB3E2DA75EC028B91
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1375682964.0000000000F1D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F1D000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_f1d000_intro.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 3d1c009373ababce74cb0cf067180ef5838f9f3513048c8857c9c3ae82ee716a
                                        • Instruction ID: 29d3327b12ef9aba71d6b4727344297adedc3b28aea5f08c1eec7e9835aeb868
                                        • Opcode Fuzzy Hash: 3d1c009373ababce74cb0cf067180ef5838f9f3513048c8857c9c3ae82ee716a
                                        • Instruction Fuzzy Hash: F9213A72900344DFDB04DF14D9C0B56BF76FB98328F28856DE8090B256C336D896EBA2
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1375682964.0000000000F1D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F1D000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_f1d000_intro.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f4ddf6aab7a4ec5fdcafc4d9db3305c30ac7726daeb53e4266b93089bec5e780
                                        • Instruction ID: 60bef254be5e2b5015912460c64efd1a27f6a3103f35d47f0984c2a282966607
                                        • Opcode Fuzzy Hash: f4ddf6aab7a4ec5fdcafc4d9db3305c30ac7726daeb53e4266b93089bec5e780
                                        • Instruction Fuzzy Hash: E111E676904240CFCF15CF10D5C4B56BF72FB94328F28C6A9D8090B656C33AD896DBA1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1375862936.0000000000F70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F70000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_f70000_intro.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: bf3be4f9a3cc0257617f4e28540b2698c8adfa464c4bda05d388af88e860ff36
                                        • Instruction ID: 3a8224f8c172f663fe2354fd1c5d4b899f2d0584dfc9dbefb1040891022b24c2
                                        • Opcode Fuzzy Hash: bf3be4f9a3cc0257617f4e28540b2698c8adfa464c4bda05d388af88e860ff36
                                        • Instruction Fuzzy Hash: 74916D71E04209CFDF10CFA9D8857DEBBF2AF88714F14C12AD409A7294EBB49945DB92

                                        Execution Graph

                                        Execution Coverage:9%
                                        Dynamic/Decrypted Code Coverage:100%
                                        Signature Coverage:0%
                                        Total number of Nodes:121
                                        Total number of Limit Nodes:10
                                        execution_graph 34683 559fe48 34684 559fe5c 34683->34684 34685 5594fe8 4 API calls 34684->34685 34686 559fe78 34684->34686 34685->34686 34687 684ab10 34688 684ab6d 34687->34688 34689 684abb8 GetCurrentThreadId 34688->34689 34690 684abab 34688->34690 34692 684abb3 34688->34692 34693 684abe6 34689->34693 34695 6849888 34690->34695 34692->34692 34693->34692 34694 6843d68 4 API calls 34693->34694 34694->34692 34696 6849893 PostThreadMessageW 34695->34696 34698 684ae7b 34696->34698 34698->34692 34600 559625f 34601 5596295 34600->34601 34602 559647c 34601->34602 34603 55964d7 34601->34603 34608 5598108 34601->34608 34613 5598080 34601->34613 34602->34603 34618 6845020 34602->34618 34624 6845011 34602->34624 34609 5598129 34608->34609 34610 559814d 34609->34610 34630 55982b8 34609->34630 34636 55982a8 34609->34636 34610->34602 34614 5598129 34613->34614 34615 559814d 34614->34615 34616 55982b8 4 API calls 34614->34616 34617 55982a8 4 API calls 34614->34617 34615->34602 34616->34615 34617->34615 34620 6845085 34618->34620 34619 68450d2 34619->34603 34620->34619 34621 68452b1 34620->34621 34622 68454e8 WaitMessage 34620->34622 34659 6843d68 34621->34659 34622->34620 34628 6845085 34624->34628 34625 68452b1 34627 6843d68 4 API calls 34625->34627 34626 68454e8 WaitMessage 34626->34628 34629 68450d2 34627->34629 34628->34625 34628->34626 34628->34629 34629->34603 34631 55982c5 34630->34631 34642 5594fe8 34631->34642 34635 55982fe 34635->34610 34638 55982b8 34636->34638 34637 5594fe8 4 API calls 34639 55982f3 34637->34639 34638->34637 34640 55982fe 34639->34640 34641 5596e24 4 API calls 34639->34641 34640->34610 34641->34640 34643 5594ff8 34642->34643 34644 5595015 34643->34644 34650 5594b44 GetCurrentProcess GetCurrentThread GetCurrentProcess GetCurrentThreadId 34643->34650 34644->34635 34646 5596e24 34644->34646 34647 5596e2f 34646->34647 34649 5598370 34647->34649 34651 5596e58 34647->34651 34649->34649 34650->34644 34652 5596e63 34651->34652 34655 5596e68 34652->34655 34654 55983df 34654->34649 34656 5596e73 34655->34656 34657 55997d9 34656->34657 34658 5598108 4 API calls 34656->34658 34657->34654 34658->34657 34660 6843d73 34659->34660 34666 684b018 34660->34666 34672 684b028 34660->34672 34661 684afb3 34678 68498d8 GetCurrentThreadId 34661->34678 34663 684afc2 34663->34619 34667 684b028 GetCurrentThreadId 34666->34667 34669 684b0bd 34667->34669 34679 684992c 34669->34679 34673 684b077 GetCurrentThreadId 34672->34673 34675 684b0bd 34673->34675 34676 684992c EnumThreadWindows 34675->34676 34677 684b0f8 34676->34677 34677->34661 34678->34663 34680 684b118 EnumThreadWindows 34679->34680 34682 684b0f8 34680->34682 34682->34661 34699 559d530 34700 559d578 GetModuleHandleW 34699->34700 34701 559d572 34699->34701 34702 559d5a5 34700->34702 34701->34700 34703 559f6b0 34704 559f718 CreateWindowExW 34703->34704 34706 559f7d4 34704->34706 34707 2a30848 34708 2a30852 34707->34708 34712 2a321a0 34707->34712 34711 2a3089e 34708->34711 34717 2a3af40 34708->34717 34713 2a321c5 34712->34713 34723 2a322a1 34713->34723 34728 2a322b0 34713->34728 34720 2a3af87 34717->34720 34718 2a3b003 34718->34711 34719 2a3b0ab 34719->34711 34720->34718 34736 2a3fc30 34720->34736 34740 2a3fba7 34720->34740 34724 2a321cf 34723->34724 34726 2a322af 34723->34726 34724->34708 34725 2a323b4 34725->34725 34726->34725 34732 2a31978 34726->34732 34730 2a322d7 34728->34730 34729 2a323b4 34729->34729 34730->34729 34731 2a31978 CreateActCtxA 34730->34731 34731->34729 34733 2a33340 CreateActCtxA 34732->34733 34735 2a33403 34733->34735 34737 2a3fc3e 34736->34737 34748 2a3f928 34737->34748 34747 2a3fbae 34740->34747 34741 2a3fc0d 34742 2a3f928 DeleteFileW 34741->34742 34745 2a3fc45 34742->34745 34743 2a3fc6c DeleteFileW 34746 2a3fcd7 34743->34746 34745->34719 34746->34719 34747->34741 34747->34743 34749 2a3fc58 DeleteFileW 34748->34749 34751 2a3fc45 34749->34751 34751->34719 34752 68421fb 34753 6842203 34752->34753 34754 6842113 34752->34754 34755 684211b CallWindowProcW 34754->34755 34757 684219b 34754->34757 34756 6842144 34755->34756

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 0 6845020-6845083 1 6845085-68450af 0->1 2 68450b2-68450d0 0->2 1->2 7 68450d2-68450d4 2->7 8 68450d9-6845110 2->8 9 6845592-68455a7 7->9 12 6845116-684512a 8->12 13 6845541 8->13 14 684512c-6845156 12->14 15 6845159-6845178 12->15 16 6845546-684555c 13->16 14->15 22 6845190-6845192 15->22 23 684517a-6845180 15->23 16->9 27 6845194-68451ac 22->27 28 68451b1-68451ba 22->28 25 6845184-6845186 23->25 26 6845182 23->26 25->22 26->22 27->16 29 68451c2-68451c9 28->29 30 68451d3-68451da 29->30 31 68451cb-68451d1 29->31 33 68451e4 30->33 34 68451dc-68451e2 30->34 32 68451e7-6845204 call 6843d38 31->32 37 6845359-684535d 32->37 38 684520a-6845211 32->38 33->32 34->32 40 6845363-6845367 37->40 41 684552c-684553f 37->41 38->13 39 6845217-6845254 38->39 49 6845522-6845526 39->49 50 684525a-684525f 39->50 42 6845381-684538a 40->42 43 6845369-684537c 40->43 41->16 44 684538c-68453b6 42->44 45 68453b9-68453c0 42->45 43->16 44->45 47 68453c6-68453cd 45->47 48 684545f-6845474 45->48 52 68453fc-684541e 47->52 53 68453cf-68453f9 47->53 48->49 62 684547a-684547c 48->62 49->29 49->41 54 6845291-68452a6 call 6843d5c 50->54 55 6845261-684526f call 6843d44 50->55 52->48 90 6845420-684542a 52->90 53->52 60 68452ab-68452af 54->60 55->54 69 6845271-684528f call 6843d50 55->69 65 6845320-684532d 60->65 66 68452b1-68452ba call 6843d68 60->66 67 684547e-68454b7 62->67 68 68454c9-68454e6 call 6843d38 62->68 65->49 82 6845333-684533d call 6843d78 65->82 91 68452bf-68452c3 66->91 85 68454c0-68454c7 67->85 86 68454b9-68454bf 67->86 68->49 81 68454e8-6845514 WaitMessage 68->81 69->60 87 6845516 81->87 88 684551b 81->88 96 684534c-6845354 call 6843d90 82->96 97 684533f-6845347 call 6843d84 82->97 85->49 86->85 87->88 88->49 101 6845442-684545d 90->101 102 684542c-6845432 90->102 93 68452c5-68452f5 91->93 94 6845303-684531b 91->94 108 68452f7 93->108 109 68452fc 93->109 94->16 96->49 97->49 101->48 101->90 106 6845434 102->106 107 6845436-6845438 102->107 106->101 107->101 108->109 109->94
                                        Memory Dump Source
                                        • Source File: 00000004.00000002.1617581110.0000000006840000.00000040.00000800.00020000.00000000.sdmp, Offset: 06840000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_6840000_systemware.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: af9f35316b0275beba29c07d8f42c0969fa1fc39df060c17b560b5ebcd4f80a4
                                        • Instruction ID: 26bfe1d05e35a9cf0471044b79e55e1a2addcd6d034e7e85851f42142f5a6572
                                        • Opcode Fuzzy Hash: af9f35316b0275beba29c07d8f42c0969fa1fc39df060c17b560b5ebcd4f80a4
                                        • Instruction Fuzzy Hash: 77F12930E00209CFEB54EFA9C944BADBBF2BF48304F158559E509EF265DB74A945CB82

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 112 6530048-6530068 113 653006f-6530071 112->113 114 6530073-6530079 113->114 115 6530089-65300bd 113->115 116 653007b 114->116 117 653007d-653007f 114->117 120 65300c0-65300c4 115->120 116->115 117->115 121 65300c6-65300cb 120->121 122 65300cd-65300d2 120->122 123 65300d8-65300db 121->123 122->123 124 65300e1-65300f5 123->124 125 6530db7-6530dc1 123->125 124->120 127 65300f7 124->127 128 65303a2-65303b1 127->128 129 65302c0-65302cf 127->129 130 6530484-6530493 127->130 131 65300fe-653010b 127->131 132 65301de-65301ed 127->132 134 6530d3f-6530d63 128->134 138 65303b7-65303dd 128->138 133 65302d5-65302fb 129->133 129->134 130->134 137 6530499-65304bf 130->137 131->134 136 6530111-6530137 131->136 132->134 135 65301f3-6530219 132->135 163 6530304-653030b 133->163 164 65302fd-6530302 133->164 151 6530f32-6530f37 134->151 152 6530d69-6530d70 134->152 166 6530222-6530229 135->166 167 653021b-6530220 135->167 168 6530140-6530147 136->168 169 6530139-653013e 136->169 159 65304c1-65304c6 137->159 160 65304c8-65304cf 137->160 161 65303e6-65303ed 138->161 162 65303df-65303e4 138->162 152->151 158 6530d76-6530d91 152->158 158->151 186 6530d97-6530d9f 158->186 171 6530534-6530561 159->171 172 65304d1-65304f3 160->172 173 65304f5-6530519 160->173 175 6530413-6530437 161->175 176 65303ef-6530411 161->176 174 6530452-653047f 162->174 178 6530331-6530355 163->178 179 653030d-653032f 163->179 177 6530370-653039d 164->177 181 653022b-653024d 166->181 182 653024f-6530273 166->182 180 653028e-65302bb 167->180 184 6530149-653016b 168->184 185 653016d-6530191 168->185 183 65301ac-65301d9 169->183 171->120 172->171 226 6530531 173->226 227 653051b-6530521 173->227 174->120 218 6530439-653043f 175->218 219 653044f 175->219 176->174 177->120 220 6530357-653035d 178->220 221 653036d 178->221 179->177 180->120 181->180 222 6530275-653027b 182->222 223 653028b 182->223 183->120 184->183 224 6530193-6530199 185->224 225 65301a9 185->225 186->151 195 6530da5-6530dae 186->195 195->125 230 6530443-6530445 218->230 231 6530441 218->231 219->174 232 6530361-6530363 220->232 233 653035f 220->233 221->177 234 653027f-6530281 222->234 235 653027d 222->235 223->180 236 653019b 224->236 237 653019d-653019f 224->237 225->183 226->171 228 6530523 227->228 229 6530525-6530527 227->229 228->226 229->226 230->219 231->219 232->221 233->221 234->223 235->223 236->225 237->225
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000004.00000002.1617297078.0000000006530000.00000040.00000800.00020000.00000000.sdmp, Offset: 06530000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_6530000_systemware.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: ?
                                        • API String ID: 0-1684325040
                                        • Opcode ID: 31a2241e07bffcdfdf66e27f250d4167296c2698baae36620d837ba8504eec49
                                        • Instruction ID: 49cd7d7452d5f7e8467e574268bfd1aeed116ddfa0bf4e14a02f6ebe659c0165
                                        • Opcode Fuzzy Hash: 31a2241e07bffcdfdf66e27f250d4167296c2698baae36620d837ba8504eec49
                                        • Instruction Fuzzy Hash: FFF18A30B003198FEB55DBA5C954BAEBBB2BF88B00F148459E4069B395DB75EC42CB91

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 238 684ab10-684ab6b 239 684ab72-684ab8e 238->239 240 684ab6d 238->240 242 684ab94-684aba9 239->242 243 684ad81-684adae 239->243 240->239 244 684abb8-684abe4 GetCurrentThreadId 242->244 245 684abab-684abae call 6849888 242->245 252 684adaf 243->252 248 684abe6-684abec 244->248 249 684abed-684ac02 244->249 253 684abb3 245->253 248->249 250 684ac04-684ac0b 249->250 251 684ac5d-684ac96 249->251 254 684ac15-684ac18 call 6843d68 250->254 255 684ac0d 250->255 260 684ac98-684aca8 251->260 261 684acab-684acb2 251->261 252->252 256 684ad79 253->256 262 684ac1d-684ac44 254->262 255->254 256->243 260->261 263 684acb4 261->263 264 684acba-684ace0 261->264 272 684ac46-684ac4c 262->272 273 684ac5a 262->273 263->264 268 684ace7-684acf2 264->268 269 684ace2 264->269 274 684acf7-684ad30 268->274 269->268 272->273 275 684ac4e-684ac55 call 6849898 272->275 273->251 280 684ad32 274->280 281 684ad3a-684ad3c 274->281 275->273 280->281 281->274 284 684ad3e-684ad57 281->284 286 684ad61-684ad6f 284->286 287 684ad59-684ad5b 284->287 291 684ad71-684ad78 286->291 292 684ad38 286->292 287->286 291->256 292->281
                                        APIs
                                        • GetCurrentThreadId.KERNEL32 ref: 0684ABD0
                                        Memory Dump Source
                                        • Source File: 00000004.00000002.1617581110.0000000006840000.00000040.00000800.00020000.00000000.sdmp, Offset: 06840000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_6840000_systemware.jbxd
                                        Similarity
                                        • API ID: CurrentThread
                                        • String ID:
                                        • API String ID: 2882836952-0
                                        • Opcode ID: f23c201df0750949243dfadbd7a0744cf94eb711e5df5d6511dbe3e833a3a126
                                        • Instruction ID: d96cdc682aaf570a88c30c7048d2e983f98fd8cfe09c69422a1c86e09b577e42
                                        • Opcode Fuzzy Hash: f23c201df0750949243dfadbd7a0744cf94eb711e5df5d6511dbe3e833a3a126
                                        • Instruction Fuzzy Hash: 86612674E4021DDFEB58EF99D494BADBBB1BF48304F148059E811AB394CB799885CB90

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 293 2a33334-2a33339 294 2a332e6-2a33301 293->294 295 2a3333b-2a33401 CreateActCtxA 293->295 300 2a33303-2a33309 294->300 301 2a3330a-2a3332b 294->301 298 2a33403-2a33409 295->298 299 2a3340a-2a33464 295->299 298->299 309 2a33473-2a33477 299->309 310 2a33466-2a33469 299->310 300->301 311 2a33479-2a33485 309->311 312 2a33488 309->312 310->309 311->312 314 2a33489 312->314 314->314
                                        APIs
                                        • CreateActCtxA.KERNEL32(?), ref: 02A333F1
                                        Memory Dump Source
                                        • Source File: 00000004.00000002.1603781527.0000000002A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_2a30000_systemware.jbxd
                                        Similarity
                                        • API ID: Create
                                        • String ID:
                                        • API String ID: 2289755597-0
                                        • Opcode ID: a21668852376c7aca3bb90bb3ea7a3c1e5ef7fe01260ef32c285301c1ab6ffe8
                                        • Instruction ID: 4f53f66edc9a08c5b0005de19dd56ccfb095160a6aeb6c6b83ca3411b0bb74bd
                                        • Opcode Fuzzy Hash: a21668852376c7aca3bb90bb3ea7a3c1e5ef7fe01260ef32c285301c1ab6ffe8
                                        • Instruction Fuzzy Hash: F341FE71C046598FEB21CFA9C8447DEFBB1AF88314F2080AAD408AB251DB75594ACF90

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 315 559f6a5-559f716 316 559f718-559f71e 315->316 317 559f721-559f728 315->317 316->317 318 559f72a-559f730 317->318 319 559f733-559f76b 317->319 318->319 320 559f773-559f7d2 CreateWindowExW 319->320 321 559f7db-559f813 320->321 322 559f7d4-559f7da 320->322 326 559f820 321->326 327 559f815-559f818 321->327 322->321 328 559f821 326->328 327->326 328->328
                                        APIs
                                        • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0559F7C2
                                        Memory Dump Source
                                        • Source File: 00000004.00000002.1616879550.0000000005590000.00000040.00000800.00020000.00000000.sdmp, Offset: 05590000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_5590000_systemware.jbxd
                                        Similarity
                                        • API ID: CreateWindow
                                        • String ID:
                                        • API String ID: 716092398-0
                                        • Opcode ID: 3fc89d4a714ae9652fff17b80b319e1c6cb387e6339de2a6f78579d5c810504a
                                        • Instruction ID: 2e54b1d653c94763d883ef068a58961de650a39b5f7da0a817cfdee6305d448b
                                        • Opcode Fuzzy Hash: 3fc89d4a714ae9652fff17b80b319e1c6cb387e6339de2a6f78579d5c810504a
                                        • Instruction Fuzzy Hash: EC51C1B5D143499FDF15CFA9C884ADEBBB1BF48314F24822AE419AB250D7749885CF90

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 329 559f6b0-559f716 330 559f718-559f71e 329->330 331 559f721-559f728 329->331 330->331 332 559f72a-559f730 331->332 333 559f733-559f7d2 CreateWindowExW 331->333 332->333 335 559f7db-559f813 333->335 336 559f7d4-559f7da 333->336 340 559f820 335->340 341 559f815-559f818 335->341 336->335 342 559f821 340->342 341->340 342->342
                                        APIs
                                        • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0559F7C2
                                        Memory Dump Source
                                        • Source File: 00000004.00000002.1616879550.0000000005590000.00000040.00000800.00020000.00000000.sdmp, Offset: 05590000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_5590000_systemware.jbxd
                                        Similarity
                                        • API ID: CreateWindow
                                        • String ID:
                                        • API String ID: 716092398-0
                                        • Opcode ID: b052199d0b4518d161ee78657d0835c4468c8ba95e7744d48ca3cb2be2c120ca
                                        • Instruction ID: 1c55a6feee4b72a449f11537115ac8ff022f877ede57f3f1f0a2d959a09da1be
                                        • Opcode Fuzzy Hash: b052199d0b4518d161ee78657d0835c4468c8ba95e7744d48ca3cb2be2c120ca
                                        • Instruction Fuzzy Hash: 9C41C0B5D10309AFDF15CF99C884ADEBBB5FF48310F24812AE819AB210D774A885CF90

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 343 2a3fba7-2a3fbac 344 2a3fbae-2a3fbd0 343->344 345 2a3fc0c 343->345 356 2a3fbd2-2a3fc02 344->356 357 2a3fc07-2a3fc0b 344->357 346 2a3fc0d-2a3fc40 call 2a3f928 345->346 347 2a3fc6c-2a3fca2 345->347 355 2a3fc45-2a3fc46 346->355 353 2a3fca4-2a3fca7 347->353 354 2a3fcaa-2a3fcd5 DeleteFileW 347->354 353->354 358 2a3fcd7-2a3fcdd 354->358 359 2a3fcde-2a3fd06 354->359 356->357 357->345 358->359
                                        Memory Dump Source
                                        • Source File: 00000004.00000002.1603781527.0000000002A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_2a30000_systemware.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 622b9ec9dae13bc2e81eb5ab0881c037afd27dcc4cec6692fc2595427120dbbf
                                        • Instruction ID: fce4e2b85ac0e0b1c4541a96158ddf85708f0100859ad7f51ddbf9ab8210d3a9
                                        • Opcode Fuzzy Hash: 622b9ec9dae13bc2e81eb5ab0881c037afd27dcc4cec6692fc2595427120dbbf
                                        • Instruction Fuzzy Hash: 4B41D172C293958FE702CF78D8A07D9BFB0EF06214F05819BD484DB252D7389949CB96

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 366 2a31978-2a33401 CreateActCtxA 369 2a33403-2a33409 366->369 370 2a3340a-2a33464 366->370 369->370 377 2a33473-2a33477 370->377 378 2a33466-2a33469 370->378 379 2a33479-2a33485 377->379 380 2a33488 377->380 378->377 379->380 382 2a33489 380->382 382->382
                                        APIs
                                        • CreateActCtxA.KERNEL32(?), ref: 02A333F1
                                        Memory Dump Source
                                        • Source File: 00000004.00000002.1603781527.0000000002A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_2a30000_systemware.jbxd
                                        Similarity
                                        • API ID: Create
                                        • String ID:
                                        • API String ID: 2289755597-0
                                        • Opcode ID: 1fbf3e9e304afd0fd7a49745fc1c1b536499a6cf4097c11612f0735be4511809
                                        • Instruction ID: b85bd4cf8c263a13eb2a1d3b5526f72ee4c2c44cb86b14ef7f722d7afa0e869f
                                        • Opcode Fuzzy Hash: 1fbf3e9e304afd0fd7a49745fc1c1b536499a6cf4097c11612f0735be4511809
                                        • Instruction Fuzzy Hash: 5A41D1B0C04719DFEB25CFA9C844B9EFBB5BF49704F2080AAD409AB251DB756945CF90

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 383 6842070-68420ac 384 68420b2-68420b7 383->384 385 684215c-684217c 383->385 386 68420b9-68420f0 384->386 387 684210a-684211a 384->387 393 684217f-684218c 385->393 394 68420f2-68420f8 386->394 395 68420f9-6842108 386->395 388 684211b-6842142 CallWindowProcW 387->388 390 6842144-684214a 388->390 391 684214b-684215a 388->391 390->391 391->393 394->395 395->393
                                        APIs
                                        • CallWindowProcW.USER32(?,?,?,?,?), ref: 06842131
                                        Memory Dump Source
                                        • Source File: 00000004.00000002.1617581110.0000000006840000.00000040.00000800.00020000.00000000.sdmp, Offset: 06840000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_6840000_systemware.jbxd
                                        Similarity
                                        • API ID: CallProcWindow
                                        • String ID:
                                        • API String ID: 2714655100-0
                                        • Opcode ID: 4d4d478dfc2dff0911a5d8bb4d41d85516bc4dc398fd67c084df1fcdc877802e
                                        • Instruction ID: b27f4d0a35cd8962bdd7bf3af44c298b9961163e4092afc37245ce99f3aade6e
                                        • Opcode Fuzzy Hash: 4d4d478dfc2dff0911a5d8bb4d41d85516bc4dc398fd67c084df1fcdc877802e
                                        • Instruction Fuzzy Hash: C54129B4A002098FDB14DF59C848A9EFBF5FF88314F24C459E518A7321D775A941CFA0

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 398 684b018-684b0bb GetCurrentThreadId 403 684b0c4-684b0f3 call 684992c 398->403 404 684b0bd-684b0c3 398->404 408 684b0f8-684b105 403->408 404->403
                                        APIs
                                        • GetCurrentThreadId.KERNEL32 ref: 0684B0AA
                                        Memory Dump Source
                                        • Source File: 00000004.00000002.1617581110.0000000006840000.00000040.00000800.00020000.00000000.sdmp, Offset: 06840000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_6840000_systemware.jbxd
                                        Similarity
                                        • API ID: CurrentThread
                                        • String ID:
                                        • API String ID: 2882836952-0
                                        • Opcode ID: 4a31894d7afdb234166ff7b2ad473750697cbd2d10f149efc3dba0ec22497808
                                        • Instruction ID: 7de0389b4cb00530037e9143f05275a1d260e037d86e1425c7a33243855aa592
                                        • Opcode Fuzzy Hash: 4a31894d7afdb234166ff7b2ad473750697cbd2d10f149efc3dba0ec22497808
                                        • Instruction Fuzzy Hash: 433178B490024A8FDB10DF99D840A9EFBF0FF48304F148559D454AB311D774A944CFA1

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 409 684b028-684b0bb GetCurrentThreadId 413 684b0c4-684b0f3 call 684992c 409->413 414 684b0bd-684b0c3 409->414 418 684b0f8-684b105 413->418 414->413
                                        APIs
                                        • GetCurrentThreadId.KERNEL32 ref: 0684B0AA
                                        Memory Dump Source
                                        • Source File: 00000004.00000002.1617581110.0000000006840000.00000040.00000800.00020000.00000000.sdmp, Offset: 06840000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_6840000_systemware.jbxd
                                        Similarity
                                        • API ID: CurrentThread
                                        • String ID:
                                        • API String ID: 2882836952-0
                                        • Opcode ID: 32d74f5c3f1afe3053fc4a1c447340c5bc4d6a233dddfec054ce617188b4c0c5
                                        • Instruction ID: 27237ebb5ced8cdde894e7f4a9de26dd3205d3c054912a17ed255468d4399011
                                        • Opcode Fuzzy Hash: 32d74f5c3f1afe3053fc4a1c447340c5bc4d6a233dddfec054ce617188b4c0c5
                                        • Instruction Fuzzy Hash: 5A2153B890024A8FDB10DFAAD844B9EFBF0FF48314F148559D419AB311D774A948CFA2

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 419 684992c-684b15a 421 684b166-684b196 EnumThreadWindows 419->421 422 684b15c-684b164 419->422 423 684b19f-684b1cc 421->423 424 684b198-684b19e 421->424 422->421 424->423
                                        APIs
                                        • EnumThreadWindows.USER32(?,00000000,058BD49E,?,?,?,00000E20,?,?,0684B0F8,03AE42D8,02B994B4), ref: 0684B189
                                        Memory Dump Source
                                        • Source File: 00000004.00000002.1617581110.0000000006840000.00000040.00000800.00020000.00000000.sdmp, Offset: 06840000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_6840000_systemware.jbxd
                                        Similarity
                                        • API ID: EnumThreadWindows
                                        • String ID:
                                        • API String ID: 2941952884-0
                                        • Opcode ID: 046f324ff729b9e2a844184b93c8eba84dcd84fc599cb8bcfc98213341f792d0
                                        • Instruction ID: dcc62ee2092c0092fdafabe8f9cd0848a5cfb7345c3a9666a237285e7f93c18d
                                        • Opcode Fuzzy Hash: 046f324ff729b9e2a844184b93c8eba84dcd84fc599cb8bcfc98213341f792d0
                                        • Instruction Fuzzy Hash: 3A211371D002099FDB50DFAAC844BEEFBF5FB88320F14842AD558A3250D778A944CFA5

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 428 559d528-559d52d 429 559d52f-559d570 428->429 430 559d4b0-559d4f0 428->430 433 559d578-559d5a3 GetModuleHandleW 429->433 434 559d572-559d575 429->434 430->428 435 559d5ac-559d5c0 433->435 436 559d5a5-559d5ab 433->436 434->433 436->435
                                        APIs
                                        • GetModuleHandleW.KERNEL32(00000000), ref: 0559D596
                                        Memory Dump Source
                                        • Source File: 00000004.00000002.1616879550.0000000005590000.00000040.00000800.00020000.00000000.sdmp, Offset: 05590000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_5590000_systemware.jbxd
                                        Similarity
                                        • API ID: HandleModule
                                        • String ID:
                                        • API String ID: 4139908857-0
                                        • Opcode ID: a823767b8ed62f80ed030faae8a4327205906c195b90c3b4aeed2bea2207a6d8
                                        • Instruction ID: 9711b1ea8ffa664b40e60ffb716974e641d0e6ef6c5c1459ed4c93582cf1988b
                                        • Opcode Fuzzy Hash: a823767b8ed62f80ed030faae8a4327205906c195b90c3b4aeed2bea2207a6d8
                                        • Instruction Fuzzy Hash: 162177B5C042498FDB20CFAAC844A9EFBF4FB49214F14855AD459A7250C379A145CFA1

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 438 2a3f928-2a3fca2 441 2a3fca4-2a3fca7 438->441 442 2a3fcaa-2a3fcd5 DeleteFileW 438->442 441->442 443 2a3fcd7-2a3fcdd 442->443 444 2a3fcde-2a3fd06 442->444 443->444
                                        APIs
                                        • DeleteFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,02A3FC45), ref: 02A3FCC8
                                        Memory Dump Source
                                        • Source File: 00000004.00000002.1603781527.0000000002A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_2a30000_systemware.jbxd
                                        Similarity
                                        • API ID: DeleteFile
                                        • String ID:
                                        • API String ID: 4033686569-0
                                        • Opcode ID: d56b1ffbc90e7fa39feb19912a4b487065c0b745efce31374ea59480da99e29f
                                        • Instruction ID: 7f5a99ce4f36d078e75ef6afb8b17b6d3525d61df8b52239067c4dde9ca05c83
                                        • Opcode Fuzzy Hash: d56b1ffbc90e7fa39feb19912a4b487065c0b745efce31374ea59480da99e29f
                                        • Instruction Fuzzy Hash: F22144B5C1065A9FDB14CF9AC5447AEFBB4EB48320F14816AE818A7740D778A905CFA1

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 447 684b110-684b15a 449 684b166-684b196 EnumThreadWindows 447->449 450 684b15c-684b164 447->450 451 684b19f-684b1cc 449->451 452 684b198-684b19e 449->452 450->449 452->451
                                        APIs
                                        • EnumThreadWindows.USER32(?,00000000,058BD49E,?,?,?,00000E20,?,?,0684B0F8,03AE42D8,02B994B4), ref: 0684B189
                                        Memory Dump Source
                                        • Source File: 00000004.00000002.1617581110.0000000006840000.00000040.00000800.00020000.00000000.sdmp, Offset: 06840000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_6840000_systemware.jbxd
                                        Similarity
                                        • API ID: EnumThreadWindows
                                        • String ID:
                                        • API String ID: 2941952884-0
                                        • Opcode ID: 5f673da9351852461aec0b2c4ff3644b3a74b545eab1bb80ddf72c3d0a50f37b
                                        • Instruction ID: caa2dae37a0cd0bd5a8f7b75aaed147e97b207b471e7c2cc8ee5921caf0b0e0b
                                        • Opcode Fuzzy Hash: 5f673da9351852461aec0b2c4ff3644b3a74b545eab1bb80ddf72c3d0a50f37b
                                        • Instruction Fuzzy Hash: 4F211575D002499FDB14DFAAC884BEEFBF5EB88320F14842AD458A7250D778A944CF61
                                        APIs
                                        • DeleteFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,02A3FC45), ref: 02A3FCC8
                                        Memory Dump Source
                                        • Source File: 00000004.00000002.1603781527.0000000002A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A30000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_2a30000_systemware.jbxd
                                        Similarity
                                        • API ID: DeleteFile
                                        • String ID:
                                        • API String ID: 4033686569-0
                                        • Opcode ID: 1ce03d26c28e8394645fca68b0750d214a586bfa5c0a299ff21bf3484a0166c1
                                        • Instruction ID: 300bea0e8dda23fcc08c0451e4611806eb96f972e2a61b8274f90f5f9f68262c
                                        • Opcode Fuzzy Hash: 1ce03d26c28e8394645fca68b0750d214a586bfa5c0a299ff21bf3484a0166c1
                                        • Instruction Fuzzy Hash: FD2147B6C1061A9FDB10CFA9C5457DEFBB0EF48210F15812AD818A7640D338A905CFA1
                                        APIs
                                        • CallWindowProcW.USER32(?,?,?,?,?), ref: 06842131
                                        Memory Dump Source
                                        • Source File: 00000004.00000002.1617581110.0000000006840000.00000040.00000800.00020000.00000000.sdmp, Offset: 06840000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_6840000_systemware.jbxd
                                        Similarity
                                        • API ID: CallProcWindow
                                        • String ID:
                                        • API String ID: 2714655100-0
                                        • Opcode ID: 48f644699c139bc540cb18d263db474770999c32ad193799030fb04c061cb6c2
                                        • Instruction ID: e8b9f12fef44442526158bc6a242390bad14027040f744a2ec5694039f1d1cce
                                        • Opcode Fuzzy Hash: 48f644699c139bc540cb18d263db474770999c32ad193799030fb04c061cb6c2
                                        • Instruction Fuzzy Hash: DE11CE70D0830ADFDB50EF64E8547EEBBF4EB45314F10854AE25897652C736A641CBA0
                                        APIs
                                        • GetModuleHandleW.KERNEL32(00000000), ref: 0559D596
                                        Memory Dump Source
                                        • Source File: 00000004.00000002.1616879550.0000000005590000.00000040.00000800.00020000.00000000.sdmp, Offset: 05590000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_5590000_systemware.jbxd
                                        Similarity
                                        • API ID: HandleModule
                                        • String ID:
                                        • API String ID: 4139908857-0
                                        • Opcode ID: b635637cb7b5fcfe0cab4fe74e15bf0759cf45f28f52c0f4b5e42c71b2113d7f
                                        • Instruction ID: 502c34c5b4ceb9e89c1bf42bae296ec83c35d5096defbcaa826b1f9b8427a077
                                        • Opcode Fuzzy Hash: b635637cb7b5fcfe0cab4fe74e15bf0759cf45f28f52c0f4b5e42c71b2113d7f
                                        • Instruction Fuzzy Hash: 3611E0B5C006498FDB14DF9AC444BDEFBF4BB88324F14842AD819B7610D379A545CFA1
                                        APIs
                                        • PostThreadMessageW.USER32(?,00000012,00000000,00000000), ref: 0684AE68
                                        Memory Dump Source
                                        • Source File: 00000004.00000002.1617581110.0000000006840000.00000040.00000800.00020000.00000000.sdmp, Offset: 06840000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_6840000_systemware.jbxd
                                        Similarity
                                        • API ID: MessagePostThread
                                        • String ID:
                                        • API String ID: 1836367815-0
                                        • Opcode ID: a32eef7e6e28257b076e0db61b56cda9f967bea3462868636b5123aeb78c1789
                                        • Instruction ID: 564f1b0845f8ac20c7046cff44f3de82e39abfc53e22709a3bec7335a40eeff8
                                        • Opcode Fuzzy Hash: a32eef7e6e28257b076e0db61b56cda9f967bea3462868636b5123aeb78c1789
                                        • Instruction Fuzzy Hash: 581149B5C043898FDB20CF99C945BDEBFF0BB08314F24445AD6A4AB291C3B96544CF91
                                        APIs
                                        • PostThreadMessageW.USER32(?,00000012,00000000,00000000), ref: 0684AE68
                                        Memory Dump Source
                                        • Source File: 00000004.00000002.1617581110.0000000006840000.00000040.00000800.00020000.00000000.sdmp, Offset: 06840000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_6840000_systemware.jbxd
                                        Similarity
                                        • API ID: MessagePostThread
                                        • String ID:
                                        • API String ID: 1836367815-0
                                        • Opcode ID: de4db7192aac81353e4a37d501380d2770f30bf8b478165617c60b515769f5b9
                                        • Instruction ID: 31c51922caf059d0a5f45fe1adf14e5e4b41c840b1cb335a4c599eb114abfafa
                                        • Opcode Fuzzy Hash: de4db7192aac81353e4a37d501380d2770f30bf8b478165617c60b515769f5b9
                                        • Instruction Fuzzy Hash: 4A1113758402499FEB10DF89C986BDEBBF4EB08314F10880AD565AB240C3B96944CFA5
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000004.00000002.1617297078.0000000006530000.00000040.00000800.00020000.00000000.sdmp, Offset: 06530000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_6530000_systemware.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: ?
                                        • API String ID: 0-1684325040
                                        • Opcode ID: 90872b4f93ce2f48c9928c2f3d0557484b9c9b823982f6b2c1824d341bdc3595
                                        • Instruction ID: 8a964ce6d89a1048cff1dc3b170b2a3fc08418f093a83be2bc19ea4295a9f1f4
                                        • Opcode Fuzzy Hash: 90872b4f93ce2f48c9928c2f3d0557484b9c9b823982f6b2c1824d341bdc3595
                                        • Instruction Fuzzy Hash: 1691FF70B403158FEB158B68C890BAE77B6BF85704F188966D501EF3E2DA75ED02CB91
                                        Memory Dump Source
                                        • Source File: 00000004.00000002.1602610908.0000000000CCD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CCD000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_ccd000_systemware.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 87c7b66d50ccda618286ad69e76d28af360c7f1e4eff31c25162b23907185d18
                                        • Instruction ID: cc5bebef52f12118449be8e7abf37ba831b683f5067fa573af1f23cfd738f686
                                        • Opcode Fuzzy Hash: 87c7b66d50ccda618286ad69e76d28af360c7f1e4eff31c25162b23907185d18
                                        • Instruction Fuzzy Hash: D02103B1500344DFDB05DF10D9C0F26BB65FB98318F24817DE90A0B256C336D956CBA2
                                        Memory Dump Source
                                        • Source File: 00000004.00000002.1602655551.0000000000CDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CDD000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_cdd000_systemware.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 4e39a44ec606fa2117192b560ea2a5c03a18197ecd6c72432babb3cf9de9743c
                                        • Instruction ID: e500eba433b2c1f4eeb8e6554b9b70670bf22743a017929f098fe1190f535fbf
                                        • Opcode Fuzzy Hash: 4e39a44ec606fa2117192b560ea2a5c03a18197ecd6c72432babb3cf9de9743c
                                        • Instruction Fuzzy Hash: BE21C271A04344DFDB04DF50D9C4B26BB65FB94314F24C5AEEA0A4B396C376DC46CA61
                                        Memory Dump Source
                                        • Source File: 00000004.00000002.1602610908.0000000000CCD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CCD000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_ccd000_systemware.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f4ddf6aab7a4ec5fdcafc4d9db3305c30ac7726daeb53e4266b93089bec5e780
                                        • Instruction ID: 0c4404d071442411d43269b56caed04efa21f0a6a0ff34a5b01b88728977fdd3
                                        • Opcode Fuzzy Hash: f4ddf6aab7a4ec5fdcafc4d9db3305c30ac7726daeb53e4266b93089bec5e780
                                        • Instruction Fuzzy Hash: D811D3B6504240DFCB15CF10D9C4B56BF71FB94318F24C6ADD80A0B656C33AD956CBA1
                                        Memory Dump Source
                                        • Source File: 00000004.00000002.1602655551.0000000000CDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CDD000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_cdd000_systemware.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 0571d9b095afed8b546122286ae05565a289416437c47d1601190cbee81fcf2c
                                        • Instruction ID: 9ac89eb0c369e818a212b51777d7d72ef5bb2fcf5aa22a19c87e3ead85d4477a
                                        • Opcode Fuzzy Hash: 0571d9b095afed8b546122286ae05565a289416437c47d1601190cbee81fcf2c
                                        • Instruction Fuzzy Hash: E811DD75904284CFCB01CF50D5C4B15BBA1FB84314F28C6AADD0A4B796C33AD84ACB61
                                        APIs
                                        • GetCurrentProcess.KERNEL32 ref: 05595266
                                        • GetCurrentThread.KERNEL32 ref: 055952A3
                                        • GetCurrentProcess.KERNEL32 ref: 055952E0
                                        • GetCurrentThreadId.KERNEL32 ref: 05595339
                                        Memory Dump Source
                                        • Source File: 00000004.00000002.1616879550.0000000005590000.00000040.00000800.00020000.00000000.sdmp, Offset: 05590000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_5590000_systemware.jbxd
                                        Similarity
                                        • API ID: Current$ProcessThread
                                        • String ID:
                                        • API String ID: 2063062207-0
                                        • Opcode ID: ef73b4b8080c38fd6016b60d8b2ad092ee0d52d526ce59b821a87e98101854e0
                                        • Instruction ID: 65d549839fbe9d159fce376ffd0463685c576a32853f4f7413489ca106312bd1
                                        • Opcode Fuzzy Hash: ef73b4b8080c38fd6016b60d8b2ad092ee0d52d526ce59b821a87e98101854e0
                                        • Instruction Fuzzy Hash: 3B5198B09057498FDB05CFA9D948B9EBBF0FF48300F24849AE049A72A1DB789944CB65
                                        APIs
                                        • GetCurrentProcess.KERNEL32 ref: 05595266
                                        • GetCurrentThread.KERNEL32 ref: 055952A3
                                        • GetCurrentProcess.KERNEL32 ref: 055952E0
                                        • GetCurrentThreadId.KERNEL32 ref: 05595339
                                        Memory Dump Source
                                        • Source File: 00000004.00000002.1616879550.0000000005590000.00000040.00000800.00020000.00000000.sdmp, Offset: 05590000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_4_2_5590000_systemware.jbxd
                                        Similarity
                                        • API ID: Current$ProcessThread
                                        • String ID:
                                        • API String ID: 2063062207-0
                                        • Opcode ID: a62378bba717d3eff58dc8eb5f13620c6e8f74b51f75b0224acdbd69cd073f48
                                        • Instruction ID: 173c9191162c1d65df44679a868e42d2cd552449717510506e3e746c793ca7a4
                                        • Opcode Fuzzy Hash: a62378bba717d3eff58dc8eb5f13620c6e8f74b51f75b0224acdbd69cd073f48
                                        • Instruction Fuzzy Hash: CD5155B090170A8FDB04DFAAD548B9EFBF1FF88304F208459E409A73A0DB789944CB65

                                        Execution Graph

                                        Execution Coverage:7.8%
                                        Dynamic/Decrypted Code Coverage:100%
                                        Signature Coverage:0%
                                        Total number of Nodes:44
                                        Total number of Limit Nodes:4
                                        execution_graph 10976 103c620 10977 103c666 GetCurrentProcess 10976->10977 10979 103c6b8 GetCurrentThread 10977->10979 10982 103c6b1 10977->10982 10980 103c6f5 GetCurrentProcess 10979->10980 10981 103c6ee 10979->10981 10983 103c72b 10980->10983 10981->10980 10982->10979 10984 103c753 GetCurrentThreadId 10983->10984 10985 103c784 10984->10985 11028 103e6f0 CloseHandle 11029 103e757 11028->11029 10986 103ce28 10987 103ce3d 10986->10987 10993 103ce50 10987->10993 10994 103c498 10987->10994 10989 103ce5e 10990 103c498 OleInitialize 10989->10990 10989->10993 10991 103ce8f 10990->10991 10991->10993 10998 103c56c 10991->10998 10995 103c4a3 10994->10995 10996 103c56c OleInitialize 10995->10996 10997 103cf19 10995->10997 10996->10997 10997->10989 11000 103c577 10998->11000 10999 103d253 10999->10993 11000->10999 11002 103c588 11000->11002 11003 103d288 OleInitialize 11002->11003 11004 103d2ec 11003->11004 11004->10999 11005 1030848 11006 1030852 11005->11006 11008 10321a0 11005->11008 11009 10321c5 11008->11009 11013 10322a1 11009->11013 11018 10322b0 11009->11018 11014 10321cf 11013->11014 11016 10322af 11013->11016 11014->11006 11015 10323b4 11015->11015 11016->11015 11022 1031978 11016->11022 11020 10322d7 11018->11020 11019 10323b4 11020->11019 11021 1031978 CreateActCtxA 11020->11021 11021->11019 11023 1033340 CreateActCtxA 11022->11023 11025 1033403 11023->11025 11026 103c868 DuplicateHandle 11027 103c8fe 11026->11027

                                        Control-flow Graph

                                        APIs
                                        • GetCurrentProcess.KERNEL32 ref: 0103C69E
                                        • GetCurrentThread.KERNEL32 ref: 0103C6DB
                                        • GetCurrentProcess.KERNEL32 ref: 0103C718
                                        • GetCurrentThreadId.KERNEL32 ref: 0103C771
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1428559530.0000000001030000.00000040.00000800.00020000.00000000.sdmp, Offset: 01030000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_1030000_intro.jbxd
                                        Similarity
                                        • API ID: Current$ProcessThread
                                        • String ID:
                                        • API String ID: 2063062207-0
                                        • Opcode ID: 71f4dcd62b15c8539ea37902e9eba8bdcd83d2d840384d15e30c6d63adf32e45
                                        • Instruction ID: 281ff9288f546607888aaca7ce8c5f08e6db6b86cc30b25e5e6e3d79d86cc70c
                                        • Opcode Fuzzy Hash: 71f4dcd62b15c8539ea37902e9eba8bdcd83d2d840384d15e30c6d63adf32e45
                                        • Instruction Fuzzy Hash: 875188B49007498FEB14DFA9D948BDEBBF1EF88314F20849AD408B7390CB74A844CB65

                                        Control-flow Graph

                                        APIs
                                        • GetCurrentProcess.KERNEL32 ref: 0103C69E
                                        • GetCurrentThread.KERNEL32 ref: 0103C6DB
                                        • GetCurrentProcess.KERNEL32 ref: 0103C718
                                        • GetCurrentThreadId.KERNEL32 ref: 0103C771
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1428559530.0000000001030000.00000040.00000800.00020000.00000000.sdmp, Offset: 01030000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_1030000_intro.jbxd
                                        Similarity
                                        • API ID: Current$ProcessThread
                                        • String ID:
                                        • API String ID: 2063062207-0
                                        • Opcode ID: 843cc152bf32c846fda726fc7561cd1f270af69a22003cef1da2333711b192c1
                                        • Instruction ID: 87dcaa008d47ed05272a227b8192373a8e4d06ef40977aaa6601c900abe61f4a
                                        • Opcode Fuzzy Hash: 843cc152bf32c846fda726fc7561cd1f270af69a22003cef1da2333711b192c1
                                        • Instruction Fuzzy Hash: 905179B49007498FEB14DFAAD948B9EBBF1FF88304F20845AD409B7390DB74A944CB65

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 45 1033334-1033339 46 103333b-1033401 CreateActCtxA 45->46 47 1033329-103332b 45->47 49 1033403-1033409 46->49 50 103340a-1033464 46->50 49->50 57 1033473-1033477 50->57 58 1033466-1033469 50->58 59 1033479-1033485 57->59 60 1033488 57->60 58->57 59->60 62 1033489 60->62 62->62
                                        APIs
                                        • CreateActCtxA.KERNEL32(?), ref: 010333F1
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1428559530.0000000001030000.00000040.00000800.00020000.00000000.sdmp, Offset: 01030000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_1030000_intro.jbxd
                                        Similarity
                                        • API ID: Create
                                        • String ID:
                                        • API String ID: 2289755597-0
                                        • Opcode ID: 20c9d43a502798775180d6b1eaf70a89e76d62f5bed877184648a85d20180374
                                        • Instruction ID: ba51d35dfa6347789fa745ded77176d6ee61dc188d99f69b1650406b06e2e6d8
                                        • Opcode Fuzzy Hash: 20c9d43a502798775180d6b1eaf70a89e76d62f5bed877184648a85d20180374
                                        • Instruction Fuzzy Hash: 5941D2B4C007598BEB25CFA9C8847DEFBF5BB89304F20806AD448AB251DB756946CF90

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 63 1031978-1033401 CreateActCtxA 66 1033403-1033409 63->66 67 103340a-1033464 63->67 66->67 74 1033473-1033477 67->74 75 1033466-1033469 67->75 76 1033479-1033485 74->76 77 1033488 74->77 75->74 76->77 79 1033489 77->79 79->79
                                        APIs
                                        • CreateActCtxA.KERNEL32(?), ref: 010333F1
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1428559530.0000000001030000.00000040.00000800.00020000.00000000.sdmp, Offset: 01030000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_1030000_intro.jbxd
                                        Similarity
                                        • API ID: Create
                                        • String ID:
                                        • API String ID: 2289755597-0
                                        • Opcode ID: 1f99b244077d265d699230386293a28ba1b96e7f15a444909cedafa43ec119b0
                                        • Instruction ID: 8d10af9ca16756415c557609bc0c77fe95bc93a6866e71f01ae3a054bbd46527
                                        • Opcode Fuzzy Hash: 1f99b244077d265d699230386293a28ba1b96e7f15a444909cedafa43ec119b0
                                        • Instruction Fuzzy Hash: C941E0B4C00719CBEB24DFA9C884B9EFBF5BF89304F20806AD448AB251DB756945CF90

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 80 103c861-103c8fc DuplicateHandle 81 103c905-103c922 80->81 82 103c8fe-103c904 80->82 82->81
                                        APIs
                                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0103C8EF
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1428559530.0000000001030000.00000040.00000800.00020000.00000000.sdmp, Offset: 01030000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_1030000_intro.jbxd
                                        Similarity
                                        • API ID: DuplicateHandle
                                        • String ID:
                                        • API String ID: 3793708945-0
                                        • Opcode ID: ad69220215980c9eedc09a1200347e3ebd3862256603a15449c49e1dcfebaf89
                                        • Instruction ID: c09ba16509d3d0df0a3f97e029c70a60fb3f3eb910ee387f7191adbe03566fc4
                                        • Opcode Fuzzy Hash: ad69220215980c9eedc09a1200347e3ebd3862256603a15449c49e1dcfebaf89
                                        • Instruction Fuzzy Hash: 0221E4B5D002499FDB10CFAAD584ADEBBF4FB48320F14802AE958B7350D378A955CFA5

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 85 103c868-103c8fc DuplicateHandle 86 103c905-103c922 85->86 87 103c8fe-103c904 85->87 87->86
                                        APIs
                                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0103C8EF
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1428559530.0000000001030000.00000040.00000800.00020000.00000000.sdmp, Offset: 01030000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_1030000_intro.jbxd
                                        Similarity
                                        • API ID: DuplicateHandle
                                        • String ID:
                                        • API String ID: 3793708945-0
                                        • Opcode ID: 149ebcebd10dbd2d6b04e78a6b45c39fb1c0933f73312b23febc38865a4822e3
                                        • Instruction ID: ea924feabd0668a5a128666efe1f73697e90077008edac667e0c915675f4e9c9
                                        • Opcode Fuzzy Hash: 149ebcebd10dbd2d6b04e78a6b45c39fb1c0933f73312b23febc38865a4822e3
                                        • Instruction Fuzzy Hash: 0821E4B5D002499FDB10CF9AD584ADEBBF8FB48310F14801AE954B3350D374A950CFA5

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 90 103c588-103d2ea OleInitialize 92 103d2f3-103d310 90->92 93 103d2ec-103d2f2 90->93 93->92
                                        APIs
                                        • OleInitialize.OLE32(00000000), ref: 0103D2DD
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1428559530.0000000001030000.00000040.00000800.00020000.00000000.sdmp, Offset: 01030000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_1030000_intro.jbxd
                                        Similarity
                                        • API ID: Initialize
                                        • String ID:
                                        • API String ID: 2538663250-0
                                        • Opcode ID: 8b2381bea24a7d316f92d5264dadb8294d44816b2ea8a7fcd0e149c6f7b48c3e
                                        • Instruction ID: e60bde5f0299b702c6d9c79d69638afd2dc96356034ab0ae5e8093d0943d2d18
                                        • Opcode Fuzzy Hash: 8b2381bea24a7d316f92d5264dadb8294d44816b2ea8a7fcd0e149c6f7b48c3e
                                        • Instruction Fuzzy Hash: B41112B5C003498FDB20DF9AD444BDEFBF8EB88220F20845AD558A7740D378A944CFA5

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 96 103d280-103d2ea OleInitialize 97 103d2f3-103d310 96->97 98 103d2ec-103d2f2 96->98 98->97
                                        APIs
                                        • OleInitialize.OLE32(00000000), ref: 0103D2DD
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1428559530.0000000001030000.00000040.00000800.00020000.00000000.sdmp, Offset: 01030000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_1030000_intro.jbxd
                                        Similarity
                                        • API ID: Initialize
                                        • String ID:
                                        • API String ID: 2538663250-0
                                        • Opcode ID: 27ff809ad2cc81d9558b14c58ec75e1bab2c60ac30f07303fb56c2b0066dab7d
                                        • Instruction ID: 3f034e4c10a7aaf523db4c8eb925a56b9b09dcfb0e4df798afe163487149e5af
                                        • Opcode Fuzzy Hash: 27ff809ad2cc81d9558b14c58ec75e1bab2c60ac30f07303fb56c2b0066dab7d
                                        • Instruction Fuzzy Hash: 811142B4C003498FDB20CFAAD445BCEBBF8EB48320F20845AD558A3700C378A940CFA5

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 176 103e6e8-103e755 CloseHandle 178 103e757-103e75d 176->178 179 103e75e-103e786 176->179 178->179
                                        APIs
                                        • CloseHandle.KERNELBASE(?), ref: 0103E748
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1428559530.0000000001030000.00000040.00000800.00020000.00000000.sdmp, Offset: 01030000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_1030000_intro.jbxd
                                        Similarity
                                        • API ID: CloseHandle
                                        • String ID:
                                        • API String ID: 2962429428-0
                                        • Opcode ID: d95738a33ab93e62d4e998d1a73f33d7df0d1b8aeb36cf587b85aeb36062368e
                                        • Instruction ID: c6f589606ed7e5b3cd7cba5852123d3826ca6e408087da09afbbd307c984e2ef
                                        • Opcode Fuzzy Hash: d95738a33ab93e62d4e998d1a73f33d7df0d1b8aeb36cf587b85aeb36062368e
                                        • Instruction Fuzzy Hash: 001125B58003498FDB20DF9AD445BDEBBF4EB48320F20846AD558A7240D379A545CFA5

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 182 103e6f0-103e755 CloseHandle 183 103e757-103e75d 182->183 184 103e75e-103e786 182->184 183->184
                                        APIs
                                        • CloseHandle.KERNELBASE(?), ref: 0103E748
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1428559530.0000000001030000.00000040.00000800.00020000.00000000.sdmp, Offset: 01030000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_1030000_intro.jbxd
                                        Similarity
                                        • API ID: CloseHandle
                                        • String ID:
                                        • API String ID: 2962429428-0
                                        • Opcode ID: b057fdaf9942939ce61513dda92a1963945ba59260ac69d7278943e4e0bd9495
                                        • Instruction ID: 53dee3acd43116c648033295408d286266fb6e70b1ad0fd59e2b6ab3156ab159
                                        • Opcode Fuzzy Hash: b057fdaf9942939ce61513dda92a1963945ba59260ac69d7278943e4e0bd9495
                                        • Instruction Fuzzy Hash: A11145B5800349CFDB20CF9AC445BDEBBF4EB48320F10846AD558A7380D378A544CFA5
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1427035225.0000000000CBD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CBD000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_cbd000_intro.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f53884ac580f5719c03a22217e227b5e5b7620be70fabe7c2ec0a78c0e5c7181
                                        • Instruction ID: e03eb829efd4a2aa56c00a5a537105eec4a0cd7f2f7d626d0becfa79dc2251ee
                                        • Opcode Fuzzy Hash: f53884ac580f5719c03a22217e227b5e5b7620be70fabe7c2ec0a78c0e5c7181
                                        • Instruction Fuzzy Hash: 7E2137B1500344DFDB25DF10D9C0B66BB65FB98318F248169E80B0B256D336D95ACBA2
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1427035225.0000000000CBD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CBD000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_cbd000_intro.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f4ddf6aab7a4ec5fdcafc4d9db3305c30ac7726daeb53e4266b93089bec5e780
                                        • Instruction ID: 0999fbeb250e50289b040cef4f887e8437c4bad383756b7658888747ec1223a7
                                        • Opcode Fuzzy Hash: f4ddf6aab7a4ec5fdcafc4d9db3305c30ac7726daeb53e4266b93089bec5e780
                                        • Instruction Fuzzy Hash: 5D11E6B6504240CFCF15CF10D5C4B56BF71FB94318F24C6A9D80A0B656C33AD95ACBA2

                                        Execution Graph

                                        Execution Coverage:7.7%
                                        Dynamic/Decrypted Code Coverage:100%
                                        Signature Coverage:0%
                                        Total number of Nodes:41
                                        Total number of Limit Nodes:3
                                        execution_graph 10876 557c620 10877 557c666 GetCurrentProcess 10876->10877 10879 557c6b1 10877->10879 10880 557c6b8 GetCurrentThread 10877->10880 10879->10880 10881 557c6f5 GetCurrentProcess 10880->10881 10882 557c6ee 10880->10882 10883 557c72b 10881->10883 10882->10881 10884 557c753 GetCurrentThreadId 10883->10884 10885 557c784 10884->10885 10886 5570848 10887 5570852 10886->10887 10889 55721a0 10886->10889 10890 55721c5 10889->10890 10894 55722a1 10890->10894 10898 55722b0 10890->10898 10895 55722b0 10894->10895 10896 55723b4 10895->10896 10902 5571978 10895->10902 10896->10896 10899 55722d7 10898->10899 10900 55723b4 10899->10900 10901 5571978 CreateActCtxA 10899->10901 10900->10900 10901->10900 10903 5573340 CreateActCtxA 10902->10903 10905 5573403 10903->10905 10905->10905 10906 557c868 DuplicateHandle 10907 557c8fe 10906->10907 10908 557ce28 10909 557ce3d 10908->10909 10915 557ce50 10909->10915 10916 557c498 10909->10916 10911 557ce5e 10912 557c498 OleInitialize 10911->10912 10911->10915 10913 557ce8f 10912->10913 10913->10915 10920 557c56c 10913->10920 10917 557c4a3 10916->10917 10918 557c56c OleInitialize 10917->10918 10919 557cf19 10917->10919 10918->10919 10919->10911 10921 557c577 10920->10921 10923 557d253 10921->10923 10924 557c588 10921->10924 10923->10915 10925 557d288 OleInitialize 10924->10925 10926 557d2ec 10925->10926 10926->10923

                                        Control-flow Graph

                                        APIs
                                        • GetCurrentProcess.KERNEL32 ref: 0557C69E
                                        • GetCurrentThread.KERNEL32 ref: 0557C6DB
                                        • GetCurrentProcess.KERNEL32 ref: 0557C718
                                        • GetCurrentThreadId.KERNEL32 ref: 0557C771
                                        Memory Dump Source
                                        • Source File: 00000010.00000002.1517942593.0000000005570000.00000040.00000800.00020000.00000000.sdmp, Offset: 05570000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_16_2_5570000_systemware.jbxd
                                        Similarity
                                        • API ID: Current$ProcessThread
                                        • String ID:
                                        • API String ID: 2063062207-0
                                        • Opcode ID: f8c0a62b8e5eb7d8495377ace1c4d88b59ac0a85abfd976dfeb43ff2821c3f59
                                        • Instruction ID: 11acb3ca4f5622d142713b1a917c2a5675efd1f5be4ebc3ea0a0711e9311f1c0
                                        • Opcode Fuzzy Hash: f8c0a62b8e5eb7d8495377ace1c4d88b59ac0a85abfd976dfeb43ff2821c3f59
                                        • Instruction Fuzzy Hash: F35145B09107498FDB14CFAAD588B9EBBF1FF48304F24809EE409AB290DB749944CF65

                                        Control-flow Graph

                                        APIs
                                        • GetCurrentProcess.KERNEL32 ref: 0557C69E
                                        • GetCurrentThread.KERNEL32 ref: 0557C6DB
                                        • GetCurrentProcess.KERNEL32 ref: 0557C718
                                        • GetCurrentThreadId.KERNEL32 ref: 0557C771
                                        Memory Dump Source
                                        • Source File: 00000010.00000002.1517942593.0000000005570000.00000040.00000800.00020000.00000000.sdmp, Offset: 05570000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_16_2_5570000_systemware.jbxd
                                        Similarity
                                        • API ID: Current$ProcessThread
                                        • String ID:
                                        • API String ID: 2063062207-0
                                        • Opcode ID: a0f2da8ab4382361cf7168954d903e7a2c5a93631a4d2cdea79f5b8d9df3bcb7
                                        • Instruction ID: 5981e32ee656d4306ef7def6df9327f83fac125057c3bb51ef15165a4d7363c9
                                        • Opcode Fuzzy Hash: a0f2da8ab4382361cf7168954d903e7a2c5a93631a4d2cdea79f5b8d9df3bcb7
                                        • Instruction Fuzzy Hash: 0A5134B0D106498FDB18CFAAD548B9EBBF1BF88314F24809EE409A7390DB749944CF65

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 62 5573334-5573401 CreateActCtxA 64 5573403-5573409 62->64 65 557340a-5573464 62->65 64->65 72 5573466-5573469 65->72 73 5573473-5573477 65->73 72->73 74 5573479-5573485 73->74 75 5573488 73->75 74->75 77 5573489 75->77 77->77
                                        APIs
                                        • CreateActCtxA.KERNEL32(?), ref: 055733F1
                                        Memory Dump Source
                                        • Source File: 00000010.00000002.1517942593.0000000005570000.00000040.00000800.00020000.00000000.sdmp, Offset: 05570000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_16_2_5570000_systemware.jbxd
                                        Similarity
                                        • API ID: Create
                                        • String ID:
                                        • API String ID: 2289755597-0
                                        • Opcode ID: 2ad0db2b39539b0a232fe6cb3e4f0f2e4e92e8238c35d83308ecdeb671135d98
                                        • Instruction ID: ce0e945575417d91574618d3e444737194872c8539c7003e672db14cab2f5612
                                        • Opcode Fuzzy Hash: 2ad0db2b39539b0a232fe6cb3e4f0f2e4e92e8238c35d83308ecdeb671135d98
                                        • Instruction Fuzzy Hash: FA41FFB0C00719CBDB24CFA9D848BDEBBB2BF48304F20846AC008AB250DB755946CF90

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 45 5571978-5573401 CreateActCtxA 48 5573403-5573409 45->48 49 557340a-5573464 45->49 48->49 56 5573466-5573469 49->56 57 5573473-5573477 49->57 56->57 58 5573479-5573485 57->58 59 5573488 57->59 58->59 61 5573489 59->61 61->61
                                        APIs
                                        • CreateActCtxA.KERNEL32(?), ref: 055733F1
                                        Memory Dump Source
                                        • Source File: 00000010.00000002.1517942593.0000000005570000.00000040.00000800.00020000.00000000.sdmp, Offset: 05570000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_16_2_5570000_systemware.jbxd
                                        Similarity
                                        • API ID: Create
                                        • String ID:
                                        • API String ID: 2289755597-0
                                        • Opcode ID: 539f160644549b66f63c368235080c54108c9d351db74aaf4aff139fcd2d6a55
                                        • Instruction ID: 4e8a7a3456fb51971134bc73e67866baeb278af015a49dbbe073fe800d93c360
                                        • Opcode Fuzzy Hash: 539f160644549b66f63c368235080c54108c9d351db74aaf4aff139fcd2d6a55
                                        • Instruction Fuzzy Hash: DF41DFB0C0075DCBDB24CFA9D848B9EBBB6FF49314F20846AD408AB251DB756946CF90

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 78 557c861-557c862 79 557c868-557c8fc DuplicateHandle 78->79 80 557c905-557c922 79->80 81 557c8fe-557c904 79->81 81->80
                                        APIs
                                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0557C8EF
                                        Memory Dump Source
                                        • Source File: 00000010.00000002.1517942593.0000000005570000.00000040.00000800.00020000.00000000.sdmp, Offset: 05570000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_16_2_5570000_systemware.jbxd
                                        Similarity
                                        • API ID: DuplicateHandle
                                        • String ID:
                                        • API String ID: 3793708945-0
                                        • Opcode ID: 651cac70527d8b68a3d5244330a92ec3e9ee4f39ee04255608e342293be7d23a
                                        • Instruction ID: 62e35fbc25cea1bd9e9cd6fb40013a1e7f19fcbbfce96c0a3a9fcbdb901c393c
                                        • Opcode Fuzzy Hash: 651cac70527d8b68a3d5244330a92ec3e9ee4f39ee04255608e342293be7d23a
                                        • Instruction Fuzzy Hash: C821E3B5D00349AFDB10CFAAD584ADEBBF8FB48310F14801AE914A3350D378A950CF64

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 84 557c868-557c8fc DuplicateHandle 85 557c905-557c922 84->85 86 557c8fe-557c904 84->86 86->85
                                        APIs
                                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0557C8EF
                                        Memory Dump Source
                                        • Source File: 00000010.00000002.1517942593.0000000005570000.00000040.00000800.00020000.00000000.sdmp, Offset: 05570000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_16_2_5570000_systemware.jbxd
                                        Similarity
                                        • API ID: DuplicateHandle
                                        • String ID:
                                        • API String ID: 3793708945-0
                                        • Opcode ID: 032269236e9ef39bdfa7a513e33e75b3b7e44fa361f201a0300edb5671dbf727
                                        • Instruction ID: 7a36c411fa86ef7172a1c6114905483183e9b98ade6e322da6e2134274af2f1b
                                        • Opcode Fuzzy Hash: 032269236e9ef39bdfa7a513e33e75b3b7e44fa361f201a0300edb5671dbf727
                                        • Instruction Fuzzy Hash: 2521C4B5D00249AFDB10CF9AD584ADEBBF9FB48310F14841AE914A3350D374A954CF65

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 89 557c588-557d2ea OleInitialize 91 557d2f3-557d310 89->91 92 557d2ec-557d2f2 89->92 92->91
                                        APIs
                                        • OleInitialize.OLE32(00000000), ref: 0557D2DD
                                        Memory Dump Source
                                        • Source File: 00000010.00000002.1517942593.0000000005570000.00000040.00000800.00020000.00000000.sdmp, Offset: 05570000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_16_2_5570000_systemware.jbxd
                                        Similarity
                                        • API ID: Initialize
                                        • String ID:
                                        • API String ID: 2538663250-0
                                        • Opcode ID: 71489fe3ec3aa436389768db2f1f137a2eca8be8ca9174bcf348508016e43c71
                                        • Instruction ID: 0dc80077d1a23eff581f6e0184c49e1cdc58b765691123dcfa543382e734efd3
                                        • Opcode Fuzzy Hash: 71489fe3ec3aa436389768db2f1f137a2eca8be8ca9174bcf348508016e43c71
                                        • Instruction Fuzzy Hash: C01100B5C043498FDB20DF9AE448BDEFBF8FB48224F20845AD519A7600D778A944CFA5

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 95 557d280-557d2ea OleInitialize 96 557d2f3-557d310 95->96 97 557d2ec-557d2f2 95->97 97->96
                                        APIs
                                        • OleInitialize.OLE32(00000000), ref: 0557D2DD
                                        Memory Dump Source
                                        • Source File: 00000010.00000002.1517942593.0000000005570000.00000040.00000800.00020000.00000000.sdmp, Offset: 05570000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_16_2_5570000_systemware.jbxd
                                        Similarity
                                        • API ID: Initialize
                                        • String ID:
                                        • API String ID: 2538663250-0
                                        • Opcode ID: 40dfa55c849a9dfc952235c54debb0016ea578e03b65983c3b0289866d4b8749
                                        • Instruction ID: ca1a6cdf9964cc735e2d00b64c02a6117fc2438da198aa389a1035de48e6fa91
                                        • Opcode Fuzzy Hash: 40dfa55c849a9dfc952235c54debb0016ea578e03b65983c3b0289866d4b8749
                                        • Instruction Fuzzy Hash: D61130B5C003498FDB10CFA9D549BCEBBF4AB08220F20841AD018B3600D378A640CFA0