Edit tour

Windows Analysis Report
MEMZ-Clean.exe

Overview

General Information

Sample name:MEMZ-Clean.exe
Analysis ID:1671575
MD5:df027834a1deae36a1641f6554291a2f
SHA1:d3c5b5712dc83d1c3c55496a7f4305936411d2fb
SHA256:ae0446c03013c95ee19e28feda0d4ee3d445ae5e8981cdb32cc77834c3afad85
Tags:exeuser-FelloBoiYuuka
Infos:

Detection

Score:56
Range:0 - 100
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
May sleep (evasive loops) to hinder dynamic analysis
Potential key logger detected (key state polling based)
Sample execution stops while process was sleeping (likely an evasion)
Sleep loop found (likely to delay execution)
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • MEMZ-Clean.exe (PID: 8072 cmdline: "C:\Users\user\Desktop\MEMZ-Clean.exe" MD5: DF027834A1DEAE36A1641F6554291A2F)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: MEMZ-Clean.exeAvira: detected
Source: MEMZ-Clean.exeVirustotal: Detection: 60%Perma Link
Source: MEMZ-Clean.exeReversingLabs: Detection: 61%
Source: C:\Users\user\Desktop\MEMZ-Clean.exeCode function: 0_2_008323F0 CryptAcquireContextW,ExitProcess,CryptGenRandom,0_2_008323F0
Source: MEMZ-Clean.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED
Source: MEMZ-Clean.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: c.pki.goog
Source: MEMZ-Clean.exeString found in binary or memory: http://google.co.ck/search?q=batch
Source: MEMZ-Clean.exeString found in binary or memory: http://google.co.ck/search?q=best
Source: MEMZ-Clean.exeString found in binary or memory: http://google.co.ck/search?q=bonzi
Source: MEMZ-Clean.exeString found in binary or memory: http://google.co.ck/search?q=dank
Source: MEMZ-Clean.exeString found in binary or memory: http://google.co.ck/search?q=facebook
Source: MEMZ-Clean.exeString found in binary or memory: http://google.co.ck/search?q=g3t
Source: MEMZ-Clean.exeString found in binary or memory: http://google.co.ck/search?q=half
Source: MEMZ-Clean.exeString found in binary or memory: http://google.co.ck/search?q=how
Source: MEMZ-Clean.exeString found in binary or memory: http://google.co.ck/search?q=internet
Source: MEMZ-Clean.exeString found in binary or memory: http://google.co.ck/search?q=is
Source: MEMZ-Clean.exeString found in binary or memory: http://google.co.ck/search?q=john
Source: MEMZ-Clean.exeString found in binary or memory: http://google.co.ck/search?q=mcafee
Source: MEMZ-Clean.exeString found in binary or memory: http://google.co.ck/search?q=minecraft
Source: MEMZ-Clean.exeString found in binary or memory: http://google.co.ck/search?q=montage
Source: MEMZ-Clean.exeString found in binary or memory: http://google.co.ck/search?q=my
Source: MEMZ-Clean.exeString found in binary or memory: http://google.co.ck/search?q=skrillex
Source: MEMZ-Clean.exeString found in binary or memory: http://google.co.ck/search?q=stanky
Source: MEMZ-Clean.exeString found in binary or memory: http://google.co.ck/search?q=the
Source: MEMZ-Clean.exeString found in binary or memory: http://google.co.ck/search?q=vinesauce
Source: MEMZ-Clean.exeString found in binary or memory: http://google.co.ck/search?q=virus
Source: MEMZ-Clean.exeString found in binary or memory: http://google.co.ck/search?q=virus.exe
Source: MEMZ-Clean.exeString found in binary or memory: http://google.co.ck/search?q=virus.exehttp://google.co.ck/search?q=internet
Source: MEMZ-Clean.exeString found in binary or memory: http://google.co.ck/search?q=what
Source: MEMZ-Clean.exeString found in binary or memory: http://motherboard.vice.com/read/watch-this-malware-turn-a-computer-into-a-digital-hellscape
Source: MEMZ-Clean.exeString found in binary or memory: http://pcoptimizerpro.com
Source: MEMZ-Clean.exeString found in binary or memory: http://play.clubpenguin.com
Source: MEMZ-Clean.exeString found in binary or memory: http://softonic.com
Source: C:\Users\user\Desktop\MEMZ-Clean.exeCode function: 0_2_00831000 GetKeyState,GetKeyState,GetKeyState,RedrawWindow,GetDesktopWindow,GetWindowRect,RedrawWindow,EnumWindows,RedrawWindow,GetKeyState,GetKeyState,Sleep,GetKeyState,GetKeyState,GetKeyState,GetKeyState,Sleep,SendMessageW,0_2_00831000
Source: MEMZ-Clean.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED
Source: classification engineClassification label: mal56.winEXE@1/0@1/0
Source: MEMZ-Clean.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\MEMZ-Clean.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: MEMZ-Clean.exeVirustotal: Detection: 60%
Source: MEMZ-Clean.exeReversingLabs: Detection: 61%
Source: C:\Users\user\Desktop\MEMZ-Clean.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\MEMZ-Clean.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Desktop\MEMZ-Clean.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\MEMZ-Clean.exeSection loaded: winmmbase.dllJump to behavior
Source: C:\Users\user\Desktop\MEMZ-Clean.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\MEMZ-Clean.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\MEMZ-Clean.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\MEMZ-Clean.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\MEMZ-Clean.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\MEMZ-Clean.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\MEMZ-Clean.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\MEMZ-Clean.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\MEMZ-Clean.exeSection loaded: mmdevapi.dllJump to behavior
Source: C:\Users\user\Desktop\MEMZ-Clean.exeSection loaded: devobj.dllJump to behavior
Source: C:\Users\user\Desktop\MEMZ-Clean.exeSection loaded: ksuser.dllJump to behavior
Source: C:\Users\user\Desktop\MEMZ-Clean.exeSection loaded: avrt.dllJump to behavior
Source: C:\Users\user\Desktop\MEMZ-Clean.exeSection loaded: audioses.dllJump to behavior
Source: C:\Users\user\Desktop\MEMZ-Clean.exeSection loaded: powrprof.dllJump to behavior
Source: C:\Users\user\Desktop\MEMZ-Clean.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Users\user\Desktop\MEMZ-Clean.exeSection loaded: msacm32.dllJump to behavior
Source: C:\Users\user\Desktop\MEMZ-Clean.exeSection loaded: midimap.dllJump to behavior
Source: C:\Users\user\Desktop\MEMZ-Clean.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\MEMZ-Clean.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BCDE0395-E52F-467C-8E3D-C4579291692E}\InprocServer32Jump to behavior
Source: C:\Users\user\Desktop\MEMZ-Clean.exeWindow detected: Number of UI elements: 11
Source: MEMZ-Clean.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT
Source: C:\Users\user\Desktop\MEMZ-Clean.exeCode function: 0_2_0083146B push ecx; mov dword ptr [esp], ebx0_2_0083187D
Source: C:\Users\user\Desktop\MEMZ-Clean.exeWindow / User API: threadDelayed 2245Jump to behavior
Source: C:\Users\user\Desktop\MEMZ-Clean.exeWindow / User API: threadDelayed 1352Jump to behavior
Source: C:\Users\user\Desktop\MEMZ-Clean.exeWindow / User API: threadDelayed 4694Jump to behavior
Source: C:\Users\user\Desktop\MEMZ-Clean.exe TID: 8168Thread sleep time: -46940s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\MEMZ-Clean.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\MEMZ-Clean.exeThread sleep count: Count: 2245 delay: -10Jump to behavior
Source: C:\Users\user\Desktop\MEMZ-Clean.exeThread sleep count: Count: 1352 delay: -10Jump to behavior
Source: C:\Users\user\Desktop\MEMZ-Clean.exeThread sleep count: Count: 4694 delay: -10Jump to behavior
Source: C:\Users\user\Desktop\MEMZ-Clean.exeAPI call chain: ExitProcess graph end nodegraph_0-252
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
DLL Side-Loading
2
Virtualization/Sandbox Evasion
1
Input Capture
2
Virtualization/Sandbox Evasion
Remote Services1
Input Capture
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
DLL Side-Loading
LSASS Memory1
Application Window Discovery
Remote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Obfuscated Files or Information
Security Account Manager1
System Information Discovery
SMB/Windows Admin SharesData from Network Shared Drive1
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1671575 Sample: MEMZ-Clean.exe Startdate: 23/04/2025 Architecture: WINDOWS Score: 56 8 pki-goog.l.google.com 2->8 10 c.pki.goog 2->10 12 Antivirus / Scanner detection for submitted sample 2->12 14 Multi AV Scanner detection for submitted file 2->14 6 MEMZ-Clean.exe 2->6         started        signatures3 process4

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
MEMZ-Clean.exe60%VirustotalBrowse
MEMZ-Clean.exe61%ReversingLabsWin32.Trojan.Zmem
MEMZ-Clean.exe100%AviraTR/Zmem.bksjp
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches

Download Network PCAP: filteredfull

NameIPActiveMaliciousAntivirus DetectionReputation
edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com
84.201.221.38
truefalse
    high
    pki-goog.l.google.com
    192.178.49.195
    truefalse
      high
      c.pki.goog
      unknown
      unknownfalse
        high
        NameSourceMaliciousAntivirus DetectionReputation
        http://google.co.ck/search?q=batchMEMZ-Clean.exefalse
          high
          http://google.co.ck/search?q=facebookMEMZ-Clean.exefalse
            high
            http://google.co.ck/search?q=montageMEMZ-Clean.exefalse
              high
              http://google.co.ck/search?q=johnMEMZ-Clean.exefalse
                high
                http://google.co.ck/search?q=stankyMEMZ-Clean.exefalse
                  high
                  http://play.clubpenguin.comMEMZ-Clean.exefalse
                    high
                    http://google.co.ck/search?q=virus.exeMEMZ-Clean.exefalse
                      high
                      http://softonic.comMEMZ-Clean.exefalse
                        high
                        http://google.co.ck/search?q=theMEMZ-Clean.exefalse
                          high
                          http://google.co.ck/search?q=bestMEMZ-Clean.exefalse
                            high
                            http://google.co.ck/search?q=mcafeeMEMZ-Clean.exefalse
                              high
                              http://google.co.ck/search?q=internetMEMZ-Clean.exefalse
                                high
                                http://google.co.ck/search?q=virusMEMZ-Clean.exefalse
                                  high
                                  http://motherboard.vice.com/read/watch-this-malware-turn-a-computer-into-a-digital-hellscapeMEMZ-Clean.exefalse
                                    high
                                    http://google.co.ck/search?q=halfMEMZ-Clean.exefalse
                                      high
                                      http://google.co.ck/search?q=minecraftMEMZ-Clean.exefalse
                                        high
                                        http://google.co.ck/search?q=g3tMEMZ-Clean.exefalse
                                          high
                                          http://pcoptimizerpro.comMEMZ-Clean.exefalse
                                            high
                                            http://google.co.ck/search?q=bonziMEMZ-Clean.exefalse
                                              high
                                              http://google.co.ck/search?q=whatMEMZ-Clean.exefalse
                                                high
                                                http://google.co.ck/search?q=dankMEMZ-Clean.exefalse
                                                  high
                                                  http://google.co.ck/search?q=howMEMZ-Clean.exefalse
                                                    high
                                                    http://google.co.ck/search?q=isMEMZ-Clean.exefalse
                                                      high
                                                      http://google.co.ck/search?q=virus.exehttp://google.co.ck/search?q=internetMEMZ-Clean.exefalse
                                                        high
                                                        http://google.co.ck/search?q=myMEMZ-Clean.exefalse
                                                          high
                                                          http://google.co.ck/search?q=skrillexMEMZ-Clean.exefalse
                                                            high
                                                            http://google.co.ck/search?q=vinesauceMEMZ-Clean.exefalse
                                                              high
                                                              No contacted IP infos
                                                              Joe Sandbox version:42.0.0 Malachite
                                                              Analysis ID:1671575
                                                              Start date and time:2025-04-23 02:04:52 +02:00
                                                              Joe Sandbox product:CloudBasic
                                                              Overall analysis duration:0h 4m 19s
                                                              Hypervisor based Inspection enabled:false
                                                              Report type:full
                                                              Cookbook file name:default.jbs
                                                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 134, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                              Number of analysed new started processes analysed:6
                                                              Number of new started drivers analysed:0
                                                              Number of existing processes analysed:0
                                                              Number of existing drivers analysed:0
                                                              Number of injected processes analysed:0
                                                              Technologies:
                                                              • HCA enabled
                                                              • EGA enabled
                                                              • AMSI enabled
                                                              Analysis Mode:default
                                                              Analysis stop reason:Timeout
                                                              Sample name:MEMZ-Clean.exe
                                                              Detection:MAL
                                                              Classification:mal56.winEXE@1/0@1/0
                                                              EGA Information:
                                                              • Successful, ratio: 100%
                                                              HCA Information:
                                                              • Successful, ratio: 100%
                                                              • Number of executed functions: 6
                                                              • Number of non-executed functions: 5
                                                              Cookbook Comments:
                                                              • Found application associated with file extension: .exe
                                                              • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                                              • Excluded IPs from analysis (whitelisted): 4.175.87.197, 150.171.28.254
                                                              • Excluded domains from analysis (whitelisted): c2a9c95e369881c67228a6591cac2686.clo.footprintdns.com, ax-ring.msedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, ctldl.windowsupdate.com, wu-b-net.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
                                                              • Not all processes where analyzed, report is missing behavior information
                                                              TimeTypeDescription
                                                              20:06:41API Interceptor48563x Sleep call for process: MEMZ-Clean.exe modified
                                                              No context
                                                              No context
                                                              No context
                                                              No context
                                                              No context
                                                              No created / dropped files found
                                                              File type:PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                                                              Entropy (8bit):5.284064968257939
                                                              TrID:
                                                              • Win32 Executable (generic) a (10002005/4) 99.94%
                                                              • Win16/32 Executable Delphi generic (2074/23) 0.02%
                                                              • Generic Win/DOS Executable (2004/3) 0.02%
                                                              • DOS Executable Generic (2002/1) 0.02%
                                                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                              File name:MEMZ-Clean.exe
                                                              File size:15'360 bytes
                                                              MD5:df027834a1deae36a1641f6554291a2f
                                                              SHA1:d3c5b5712dc83d1c3c55496a7f4305936411d2fb
                                                              SHA256:ae0446c03013c95ee19e28feda0d4ee3d445ae5e8981cdb32cc77834c3afad85
                                                              SHA512:f4c0685ecc2b4871cbea5fc0bd9615adb51fa018b1e55c6fba1b012fdc551b75d0a8086813deb007b9959f9aac890aa87c1aa390f708cf6582f0056ada736c7b
                                                              SSDEEP:192:5SKETE4lwO9OALSnhOiMUrONpBfMgVy9DyhnGhnlIBfMTR9N7:tETE8F9OYEovf1QRIBEV9
                                                              TLSH:B862855BFED76466EDA54D7024B2B63F8D257CA28C78CC0FE8804E576CD5CB6A012722
                                                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..../.f...............%....."......k........0....@.................................7.....@... ............................
                                                              Icon Hash:90cececece8e8eb0
                                                              Entrypoint:0x40146b
                                                              Entrypoint Section:.text
                                                              Digitally signed:false
                                                              Imagebase:0x400000
                                                              Subsystem:windows gui
                                                              Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED
                                                              DLL Characteristics:DYNAMIC_BASE, NX_COMPAT
                                                              Time Stamp:0x66F02F8D [Sun Sep 22 14:54:05 2024 UTC]
                                                              TLS Callbacks:
                                                              CLR (.Net) Version:
                                                              OS Version Major:4
                                                              OS Version Minor:0
                                                              File Version Major:4
                                                              File Version Minor:0
                                                              Subsystem Version Major:4
                                                              Subsystem Version Minor:0
                                                              Import Hash:45a290c211fb5cb4e33ea5c2443f4837
                                                              Instruction
                                                              push ebp
                                                              mov ebp, esp
                                                              push edi
                                                              push esi
                                                              push ebx
                                                              sub esp, 0000010Ch
                                                              call dword ptr [004061C0h]
                                                              mov dword ptr [00405000h], 00000000h
                                                              mov dword ptr [esp], 00000011h
                                                              call dword ptr [004061D4h]
                                                              push ecx
                                                              lea edx, dword ptr [ebp-74h]
                                                              mov dword ptr [esp+08h], edx
                                                              mov dword ptr [esp+04h], 0000005Ch
                                                              mov dword ptr [esp], eax
                                                              call dword ptr [004061D0h]
                                                              sub esp, 0Ch
                                                              lea eax, dword ptr [ebp-58h]
                                                              mov dword ptr [esp+34h], eax
                                                              movzx eax, byte ptr [ebp-59h]
                                                              mov dword ptr [esp+30h], eax
                                                              movzx eax, byte ptr [ebp-5Ah]
                                                              mov dword ptr [esp+2Ch], eax
                                                              movzx eax, byte ptr [ebp-5Bh]
                                                              mov dword ptr [esp+28h], eax
                                                              movzx eax, byte ptr [ebp-5Ch]
                                                              mov dword ptr [esp+24h], eax
                                                              movzx eax, byte ptr [ebp-5Dh]
                                                              mov dword ptr [esp+20h], eax
                                                              movzx eax, byte ptr [ebp-5Eh]
                                                              mov dword ptr [esp+1Ch], eax
                                                              movzx eax, byte ptr [ebp-5Fh]
                                                              mov dword ptr [esp+18h], eax
                                                              movzx eax, byte ptr [ebp-60h]
                                                              mov dword ptr [esp+14h], eax
                                                              mov eax, dword ptr [ebp-64h]
                                                              mov dword ptr [esp+10h], eax
                                                              mov eax, dword ptr [ebp-68h]
                                                              mov dword ptr [esp+0Ch], eax
                                                              mov eax, dword ptr [ebp-6Ch]
                                                              mov dword ptr [esp+08h], eax
                                                              mov eax, dword ptr [ebp-70h]
                                                              mov dword ptr [esp+04h], eax
                                                              mov eax, dword ptr [ebp-74h]
                                                              mov dword ptr [esp], eax
                                                              call dword ptr [004061CCh]
                                                              sub esp, 38h
                                                              mov dword ptr [00405004h], eax
                                                              mov dword ptr [ebp-000000A4h], 00000030h
                                                              mov dword ptr [ebp+00000000h], 00000000h
                                                              NameVirtual AddressVirtual Size Is in Section
                                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_IMPORT0x60000x828.idata
                                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x70000x204.reloc
                                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_IAT0x61b40x114.idata
                                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                              .text0x10000x14e00x160021002354ff5b0196d920bc907b390970False0.4850852272727273data5.558653981049518IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                              .data0x30000x2c00x400013bc9a7122c0757a8e7fb0e2334779fFalse0.25390625Windows Precompiled iNF, version 0.1, InfStyle 1, src URL, at 0 "\001",, LanguageID 02.0345544686707315IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                              .rdata0x40000xf1c0x1000dd01f4b41f1321bab9a24984b6641f6dFalse0.360107421875data4.8968855857643385IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                              .bss0x50000x100x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                              .idata0x60000x8280xa00930c7a1318929a1c90b2679ccd0f3615False0.36171875data4.127541473274507IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                              .reloc0x70000x2040x4008b1b8807fd12041e797f97f4d1085ee2False0.486328125data3.9348161289428107IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                              DLLImport
                                                              ADVAPI32.dllCryptAcquireContextW, CryptGenRandom
                                                              COMCTL32.DLLInitCommonControls
                                                              GDI32.dllBitBlt, CreateFontW, GetObjectW, GetStockObject, SelectObject, StretchBlt, TextOutW
                                                              KERNEL32.dllCreateThread, ExitProcess, FormatMessageW, GetCurrentProcessId, GetCurrentThreadId, GetModuleHandleW, GlobalAlloc, GlobalFree, LocalAlloc, Sleep, lstrlenW
                                                              SHELL32.dllShellExecuteA
                                                              USER32.dllAdjustWindowRect, BeginPaint, CallNextHookEx, CreateWindowExW, DefWindowProcW, DispatchMessageW, DrawIcon, EndPaint, EnumChildWindows, EnumWindows, GetCursorPos, GetDesktopWindow, GetKeyState, GetMessageW, GetSystemMetrics, GetWindowDC, GetWindowLongW, GetWindowRect, GetWindowThreadProcessId, IsDialogMessageW, LoadIconW, MessageBoxA, MessageBoxW, RedrawWindow, RegisterClassExW, SendInput, SendMessageTimeoutW, SendMessageW, SetCursorPos, SetWindowsHookExW, ShowWindow, TranslateMessage, UnhookWindowsHookEx, UpdateWindow
                                                              WINMM.DLLPlaySoundA, waveOutOpen, waveOutPause, waveOutPrepareHeader, waveOutReset, waveOutWrite

                                                              Download Network PCAP: filteredfull

                                                              TimestampSource PortDest PortSource IPDest IP
                                                              Apr 23, 2025 02:05:45.620446920 CEST5604053192.168.2.51.1.1.1
                                                              Apr 23, 2025 02:05:45.760752916 CEST53560401.1.1.1192.168.2.5
                                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                              Apr 23, 2025 02:05:45.620446920 CEST192.168.2.51.1.1.10xde2dStandard query (0)c.pki.googA (IP address)IN (0x0001)false
                                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                              Apr 23, 2025 02:05:44.367940903 CEST1.1.1.1192.168.2.50x8808No error (0)edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com84.201.221.38A (IP address)IN (0x0001)false
                                                              Apr 23, 2025 02:05:44.367940903 CEST1.1.1.1192.168.2.50x8808No error (0)edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com84.201.221.21A (IP address)IN (0x0001)false
                                                              Apr 23, 2025 02:05:44.367940903 CEST1.1.1.1192.168.2.50x8808No error (0)edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com84.201.221.22A (IP address)IN (0x0001)false
                                                              Apr 23, 2025 02:05:44.367940903 CEST1.1.1.1192.168.2.50x8808No error (0)edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com84.201.221.37A (IP address)IN (0x0001)false
                                                              Apr 23, 2025 02:05:44.367940903 CEST1.1.1.1192.168.2.50x8808No error (0)edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com84.201.221.26A (IP address)IN (0x0001)false
                                                              Apr 23, 2025 02:05:44.367940903 CEST1.1.1.1192.168.2.50x8808No error (0)edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com84.201.221.25A (IP address)IN (0x0001)false
                                                              Apr 23, 2025 02:05:44.367940903 CEST1.1.1.1192.168.2.50x8808No error (0)edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com84.201.221.36A (IP address)IN (0x0001)false
                                                              Apr 23, 2025 02:05:44.367940903 CEST1.1.1.1192.168.2.50x8808No error (0)edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com84.201.221.23A (IP address)IN (0x0001)false
                                                              Apr 23, 2025 02:05:45.760752916 CEST1.1.1.1192.168.2.50xde2dNo error (0)c.pki.googpki-goog.l.google.comCNAME (Canonical name)IN (0x0001)false
                                                              Apr 23, 2025 02:05:45.760752916 CEST1.1.1.1192.168.2.50xde2dNo error (0)pki-goog.l.google.com192.178.49.195A (IP address)IN (0x0001)false
                                                              050100s020406080100

                                                              Click to jump to process

                                                              050100s0.0051015MB

                                                              Click to jump to process

                                                              Target ID:0
                                                              Start time:20:05:47
                                                              Start date:22/04/2025
                                                              Path:C:\Users\user\Desktop\MEMZ-Clean.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Users\user\Desktop\MEMZ-Clean.exe"
                                                              Imagebase:0x830000
                                                              File size:15'360 bytes
                                                              MD5 hash:DF027834A1DEAE36A1641F6554291A2F
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:low
                                                              Has exited:false
                                                              There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                                                              There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                                                              There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                                                              There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                                                              There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                                                              There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                                                              There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                                                              There is hidden Windows Behavior. Click on Show Windows Behavior to show it.

                                                              Execution Graph

                                                              Execution Coverage

                                                              Dynamic/Packed Code Coverage

                                                              Signature Coverage

                                                              Execution Coverage:36.3%
                                                              Dynamic/Decrypted Code Coverage:0%
                                                              Signature Coverage:10.9%
                                                              Total number of Nodes:147
                                                              Total number of Limit Nodes:3
                                                              Show Legend
                                                              Hide Nodes/Edges
                                                              execution_graph 253 831ae0 254 831af3 GetCursorPos 253->254 255 831b74 253->255 256 8323f0 3 API calls 254->256 257 831b08 256->257 258 8323f0 3 API calls 257->258 259 831b0f 258->259 260 8323f0 3 API calls 259->260 261 831b45 260->261 262 8323f0 3 API calls 261->262 263 831b4c SetCursorPos 262->263 263->255 264 831d40 265 831d95 264->265 266 831d4f BitBlt 264->266 266->265 267 832180 268 832193 267->268 269 832225 267->269 270 8323f0 3 API calls 268->270 271 832198 270->271 272 8323f0 3 API calls 271->272 273 8321ac 272->273 274 8323f0 3 API calls 273->274 275 8321c0 274->275 276 8323f0 3 API calls 275->276 277 8321ca 276->277 278 8323f0 3 API calls 277->278 279 8321d5 278->279 280 8323f0 3 API calls 279->280 281 8321dc BitBlt 280->281 281->269 282 832260 283 8322aa 282->283 284 83226d GetModuleHandleW 282->284 285 8323f0 3 API calls 283->285 286 8323f0 3 API calls 284->286 288 8322af 285->288 287 832282 PlaySoundA 286->287 287->283 289 8322c0 290 832323 289->290 291 8322d5 StretchBlt 289->291 291->290 292 831e66 293 831e72 CreateThread 292->293 294 831eaa 292->294 293->294 295 8323f0 3 API calls 294->295 296 831eaf 295->296 297 831b84 298 831b97 GetSystemMetrics GetSystemMetrics GetCursorPos LoadIconW DrawIcon 297->298 299 831c95 297->299 300 8323f0 3 API calls 298->300 301 831c14 300->301 301->299 302 831c4c LoadIconW 301->302 303 8323f0 3 API calls 302->303 304 831c66 303->304 305 8323f0 3 API calls 304->305 306 831c75 DrawIcon 305->306 306->299 307 831ca4 308 831cb0 307->308 309 831cf8 307->309 310 8323f0 3 API calls 308->310 311 8323f0 3 API calls 309->311 313 831cb5 ShellExecuteA 310->313 312 831cfd 311->312 313->309 208 83146b 8 API calls 209 8316a0 208->209 210 8316b1 GetWindowLongW CreateWindowExW SendMessageW CreateThread 209->210 211 8317b7 SendMessageW ShowWindow 209->211 210->209 230 831fe4 210->230 234 832084 GetDesktopWindow GetWindowDC GetWindowRect 210->234 238 8318a8 waveOutOpen LocalAlloc waveOutPrepareHeader 210->238 212 831803 CreateThread 211->212 213 83183c KiUserCallbackDispatcher 212->213 218 831000 212->218 214 83186a 213->214 215 83189e 213->215 214->213 216 831873 TranslateMessage DispatchMessageW 214->216 217 831889 IsDialogMessageW 214->217 216->213 217->214 217->216 219 831008 GetKeyState GetKeyState 218->219 220 8310e8 GetKeyState GetKeyState GetKeyState 219->220 221 83102d 219->221 224 831122 220->224 225 83110f Sleep 220->225 222 831043 GetDesktopWindow GetWindowRect RedrawWindow EnumWindows 221->222 223 831098 RedrawWindow 221->223 226 8310bd GetKeyState GetKeyState 222->226 223->226 224->225 228 83113a SendMessageW 224->228 225->219 226->225 227 8310d8 Sleep 226->227 227->226 229 831164 228->229 229->224 233 831fee 230->233 231 831ff7 SendMessageW 231->233 232 832071 Sleep 232->233 233->231 233->232 237 8320c7 234->237 235 8320d4 SendMessageW 235->237 236 83216b Sleep 236->237 237->235 237->236 239 831965 238->239 240 831972 SendMessageW 239->240 241 831acc Sleep 239->241 243 831a13 waveOutReset waveOutWrite 239->243 244 831a55 waveOutPause 239->244 245 8319b7 239->245 246 831a63 SendMessageW 239->246 240->239 240->241 241->239 243->239 244->239 245->239 247 831a9d SendMessageW 245->247 249 8323f0 245->249 246->239 248 831a8d Sleep 246->248 247->244 247->245 248->239 250 832440 CryptGenRandom 249->250 251 8323ff CryptAcquireContextW 249->251 250->245 251->250 252 832433 ExitProcess 251->252 314 831408 GetWindowThreadProcessId 315 831428 GetCurrentProcessId 314->315 316 83145f 314->316 315->316 317 831433 315->317 317->316 318 83143b SendMessageW 317->318 318->316 319 831fac 320 831fda 319->320 321 831fb8 GetDesktopWindow EnumChildWindows 319->321 321->320 194 831191 195 8311ae 194->195 196 8311cc 194->196 197 8311d1 ExitProcess 196->197 198 8311de 196->198 199 8312c2 198->199 200 8311e9 198->200 201 8313e3 DefWindowProcW 199->201 202 8312cb BeginPaint SelectObject 199->202 200->195 203 8311f1 SendMessageW 200->203 201->195 204 831301 202->204 205 831306 FormatMessageW lstrlenW TextOutW TextOutW EndPaint 202->205 203->195 206 83121c 203->206 204->205 205->195 206->195 207 831268 MessageBoxA 206->207 207->206 322 831ef4 GlobalAlloc SendMessageTimeoutW 323 831f93 GlobalFree 322->323 324 831f57 322->324 327 83246c lstrlenW 324->327 328 831f5f SendMessageTimeoutW 327->328 328->323 329 831df8 GetCurrentThreadId SetWindowsHookExW MessageBoxW UnhookWindowsHookEx 330 832358 331 8323c1 CallNextHookEx 330->331 332 832367 330->332 332->331 333 8323f0 3 API calls 332->333 334 83237e GetSystemMetrics 333->334 335 8323f0 3 API calls 334->335 336 8323a2 GetSystemMetrics 335->336 336->331 337 831d9c 338 831de2 337->338 339 831da8 337->339 341 8323f0 3 API calls 338->341 340 8323f0 3 API calls 339->340 342 831db4 SendInput 340->342 343 831de7 341->343 342->338

                                                              Callgraph

                                                              Hide Legend
                                                              • Executed
                                                              • Not Executed
                                                              • Opacity -> Relevance
                                                              • Disassembly available
                                                              callgraph 0 Function_00831000 1 Function_00831AE0 17 Function_008323F0 1->17 2 Function_00831D40 3 Function_00832180 3->17 4 Function_00832260 4->17 5 Function_008322C0 6 Function_00831E66 6->17 7 Function_00831FE4 8 Function_00832084 9 Function_00831B84 9->17 10 Function_00831CA4 10->17 11 Function_0083146B 11->0 11->7 11->8 12 Function_008318A8 11->12 12->17 13 Function_00831408 14 Function_0083246C 15 Function_00831FAC 16 Function_00831191 18 Function_00831EF4 18->14 19 Function_00831DF8 20 Function_00832358 20->17 21 Function_00831D9C 21->17

                                                              Executed Functions

                                                              Control-flow Graph

                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2581689425.0000000000831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00830000, based on PE: true
                                                              • Associated: 00000000.00000002.2581670188.0000000000830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2581710062.0000000000833000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2581731275.0000000000834000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2581753602.0000000000836000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2581773561.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_830000_MEMZ-Clean.jbxd
                                                              Similarity
                                                              • API ID: State$Window$RedrawSleep$DesktopEnumMessageRectSendWindows
                                                              • String ID:
                                                              • API String ID: 2632062852-0
                                                              • Opcode ID: 9a7444a67e20152d2efd9d2cd30ae5a0dd26f8a390af998c4a0eefdfe99a158c
                                                              • Instruction ID: a6246dad886ca0cb8fb8c0ab86abb630a6b2a14ab5ed12f4c39f98b68c771b23
                                                              • Opcode Fuzzy Hash: 9a7444a67e20152d2efd9d2cd30ae5a0dd26f8a390af998c4a0eefdfe99a158c
                                                              • Instruction Fuzzy Hash: F0410EB4408705AFEB14AF68C99876BBBE4FF84748F01C91CE8C487251D77988848FE2

                                                              Control-flow Graph

                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2581689425.0000000000831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00830000, based on PE: true
                                                              • Associated: 00000000.00000002.2581670188.0000000000830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2581710062.0000000000833000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2581731275.0000000000834000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2581753602.0000000000836000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2581773561.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_830000_MEMZ-Clean.jbxd
                                                              Similarity
                                                              • API ID: CreateMessageWindow$CallbackDispatcherObjectSendThreadUser$AdjustClassCommonControlsDialogDispatchFontHandleInitLongModuleRectRegisterShowStockTranslate
                                                              • String ID: 0$0$2$2$BUTTON$MEMZ Clean Version - Payload Panel$MEMZPanel$D+v
                                                              • API String ID: 372181788-1584942865
                                                              • Opcode ID: 58fd8a9076fc08daceec25847521ef143b7025c2a2d5afd2d6b530ea58dbb22c
                                                              • Instruction ID: d98ab499d392cd2dd2ea8bca7c06956bc92da24cfe5bbfd7fd24254115cda771
                                                              • Opcode Fuzzy Hash: 58fd8a9076fc08daceec25847521ef143b7025c2a2d5afd2d6b530ea58dbb22c
                                                              • Instruction Fuzzy Hash: 53C103B19093049FD700DFA9D99875EBFF0FB88304F00896DE4989B251E7B98588CF92

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 11 831191-8311ac 12 8311ae-8311b0 11->12 13 8311cc-8311cf 11->13 14 8311b2-8311bc 12->14 15 8311c1-8311c7 12->15 16 8311d1-8311d8 ExitProcess 13->16 17 8311de-8311e3 13->17 18 8313fc-831405 14->18 15->18 19 8312c2-8312c5 17->19 20 8311e9-8311eb 17->20 21 8313e3-8313f6 DefWindowProcW 19->21 22 8312cb-8312ff BeginPaint SelectObject 19->22 20->18 23 8311f1-831216 SendMessageW 20->23 21->18 24 831301 22->24 25 831306-8313e1 FormatMessageW lstrlenW TextOutW * 2 EndPaint 22->25 23->18 26 83121c-831221 23->26 24->25 25->18 27 831228-831231 26->27 27->18 28 831237-83123a 27->28 29 8312b7-8312bd 28->29 30 83123c-831240 28->30 29->27 30->29 31 831242-831295 MessageBoxA 30->31 31->29 33 831297-8312b4 31->33 33->29
                                                              APIs
                                                              Strings
                                                              • MEMZ, xrefs: 00831273
                                                              • ENABLED, xrefs: 008312F3
                                                              • DISABLED, xrefs: 00831301
                                                              • This payload is considered semi-harmful.This means, it should be safe to use, but can still cause data loss or other things you might not want.If you have productive data on your system or signed in to online accounts, it is recommended to run this paylo, xrefs: 0083127B
                                                              • Press CTRL+SHIFT+S to skip some time (makes some payloads faster), xrefs: 008313AD
                                                              • 4, xrefs: 0083126B
                                                              • A, xrefs: 008313A5
                                                              • Payloads are currently %1. Press SHIFT+ESC to toggle all payloads!, xrefs: 0083132F
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2581689425.0000000000831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00830000, based on PE: true
                                                              • Associated: 00000000.00000002.2581670188.0000000000830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2581710062.0000000000833000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2581731275.0000000000834000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2581753602.0000000000836000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2581773561.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_830000_MEMZ-Clean.jbxd
                                                              Similarity
                                                              • API ID: ExitProcess
                                                              • String ID: 4$A$DISABLED$ENABLED$MEMZ$Payloads are currently %1. Press SHIFT+ESC to toggle all payloads!$Press CTRL+SHIFT+S to skip some time (makes some payloads faster)$This payload is considered semi-harmful.This means, it should be safe to use, but can still cause data loss or other things you might not want.If you have productive data on your system or signed in to online accounts, it is recommended to run this paylo
                                                              • API String ID: 621844428-349616585
                                                              • Opcode ID: edf9adb19d218f72f685c680b229c17ff50a6b21716604374ad0a6afedb64cc8
                                                              • Instruction ID: b32c6ecb30c9a428cba9d64bf5441e3a2d2e8d550e55561c473d8d36dfd52f4a
                                                              • Opcode Fuzzy Hash: edf9adb19d218f72f685c680b229c17ff50a6b21716604374ad0a6afedb64cc8
                                                              • Instruction Fuzzy Hash: 776134B09087049FCB04DF68D84879EBBF5FBC4714F10C92EE5988B251E37998588F82

                                                              Control-flow Graph

                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2581689425.0000000000831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00830000, based on PE: true
                                                              • Associated: 00000000.00000002.2581670188.0000000000830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2581710062.0000000000833000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2581731275.0000000000834000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2581753602.0000000000836000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2581773561.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_830000_MEMZ-Clean.jbxd
                                                              Similarity
                                                              • API ID: wave$MessageSend$Sleep$AllocHeaderLocalOpenPausePrepareResetWrite
                                                              • String ID:
                                                              • API String ID: 2799926116-3916222277
                                                              • Opcode ID: 15a470f84ddeef24644c65f308a61b0bf2753e1ea2d9149ea29bd245a5b1cb8c
                                                              • Instruction ID: b3f337da81042c166e789296cec2b857dea06133bf1e3302bdedd661f9f0f191
                                                              • Opcode Fuzzy Hash: 15a470f84ddeef24644c65f308a61b0bf2753e1ea2d9149ea29bd245a5b1cb8c
                                                              • Instruction Fuzzy Hash: 67513AB09093099FDB009FA9C55C79EBFF0FF84704F41881DE894AB251D3B98848CB92

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 72 832084-8320c4 GetDesktopWindow GetWindowDC GetWindowRect 73 8320c7-8320ce 72->73 74 832156-832164 73->74 75 8320d4-8320fc SendMessageW 73->75 77 83216b-832179 Sleep 74->77 75->74 76 8320fe-83210a 75->76 78 832151-832154 76->78 79 83210c-83214a 76->79 77->73 78->77 79->78
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2581689425.0000000000831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00830000, based on PE: true
                                                              • Associated: 00000000.00000002.2581670188.0000000000830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2581710062.0000000000833000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2581731275.0000000000834000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2581753602.0000000000836000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2581773561.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_830000_MEMZ-Clean.jbxd
                                                              Similarity
                                                              • API ID: Window$DesktopMessageRectSendSleep
                                                              • String ID:
                                                              • API String ID: 2444003871-0
                                                              • Opcode ID: 977feed272f83c1114404d512936527b88ad6c1d61b6f6e4142e2ada97faa52c
                                                              • Instruction ID: 702824c6f5d45cf977bb516153909cfb7f15f4d54c4724934e0507a949e3ef06
                                                              • Opcode Fuzzy Hash: 977feed272f83c1114404d512936527b88ad6c1d61b6f6e4142e2ada97faa52c
                                                              • Instruction Fuzzy Hash: C931B2B09043059FCB04DF68D58869ABBF4FF88300F118959E889AB315E734E955CFA1

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 81 831fe4-831feb 82 831fee-831ff5 81->82 83 831ff7-83201f SendMessageW 82->83 84 83205c-83206a 82->84 83->84 86 832021-83202d 83->86 85 832071-83207f Sleep 84->85 85->82 87 832057-83205a 86->87 88 83202f-832050 86->88 87->85 88->87
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2581689425.0000000000831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00830000, based on PE: true
                                                              • Associated: 00000000.00000002.2581670188.0000000000830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2581710062.0000000000833000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2581731275.0000000000834000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2581753602.0000000000836000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2581773561.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_830000_MEMZ-Clean.jbxd
                                                              Similarity
                                                              • API ID: MessageSendSleep
                                                              • String ID:
                                                              • API String ID: 1161321871-0
                                                              • Opcode ID: e3264026b2eb7e1dcc7be6ee90f85098f2146b9ca1b0ec9090c3ecda4c843296
                                                              • Instruction ID: 61e5753c96c746b65a84fc9906ccd5a5dfb4b329ef742de6203d03ce261ca3c1
                                                              • Opcode Fuzzy Hash: e3264026b2eb7e1dcc7be6ee90f85098f2146b9ca1b0ec9090c3ecda4c843296
                                                              • Instruction Fuzzy Hash: 401193B0508605DFDB08DF18C1987177BE0FB84308F118998DC898B25AD779D559CBD2

                                                              Non-executed Functions

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 109 8323f0-8323fd 110 832440-832469 CryptGenRandom 109->110 111 8323ff-832431 CryptAcquireContextW 109->111 111->110 112 832433-83243a ExitProcess 111->112
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2581689425.0000000000831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00830000, based on PE: true
                                                              • Associated: 00000000.00000002.2581670188.0000000000830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2581710062.0000000000833000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2581731275.0000000000834000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2581753602.0000000000836000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2581773561.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_830000_MEMZ-Clean.jbxd
                                                              Similarity
                                                              • API ID: Crypt$AcquireContextExitProcessRandom
                                                              • String ID: @
                                                              • API String ID: 999881550-2766056989
                                                              • Opcode ID: cd37b7c42e32561615260274856c9872e0141abada5d5a32936cb374e11de0f2
                                                              • Instruction ID: 6e1f6885dc41f409fe1600aa062f745698bf49c143c508d6ec44f1777e6ce689
                                                              • Opcode Fuzzy Hash: cd37b7c42e32561615260274856c9872e0141abada5d5a32936cb374e11de0f2
                                                              • Instruction Fuzzy Hash: EFF0A4B0804705EFD700AF68D95931EBBF4FB80348F00C91DE9958B2A5E7BA9458CF96

                                                              Control-flow Graph

                                                              APIs
                                                              • GetSystemMetrics.USER32 ref: 00831BA4
                                                              • GetSystemMetrics.USER32 ref: 00831BB9
                                                              • GetCursorPos.USER32(762B4920), ref: 00831BC7
                                                              • LoadIconW.USER32(00000002), ref: 00831BE3
                                                              • DrawIcon.USER32 ref: 00831C0A
                                                                • Part of subcall function 008323F0: CryptAcquireContextW.ADVAPI32 ref: 00832426
                                                                • Part of subcall function 008323F0: ExitProcess.KERNEL32 ref: 0083243A
                                                              • LoadIconW.USER32 ref: 00831C5B
                                                                • Part of subcall function 008323F0: CryptGenRandom.ADVAPI32 ref: 00832457
                                                              • DrawIcon.USER32 ref: 00831C90
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2581689425.0000000000831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00830000, based on PE: true
                                                              • Associated: 00000000.00000002.2581670188.0000000000830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2581710062.0000000000833000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2581731275.0000000000834000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2581753602.0000000000836000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2581773561.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_830000_MEMZ-Clean.jbxd
                                                              Similarity
                                                              • API ID: Icon$CryptDrawLoadMetricsSystem$AcquireContextCursorExitProcessRandom
                                                              • String ID:
                                                              • API String ID: 1154174717-0
                                                              • Opcode ID: 0ab4f50bf0a991ee95ee64105b8a3f9ea37c576b86fb496b96192cac70fbf150
                                                              • Instruction ID: 0c4ceeed7c009b7835c079115942406333c770a462b8217bd4ce14b2fe687d1d
                                                              • Opcode Fuzzy Hash: 0ab4f50bf0a991ee95ee64105b8a3f9ea37c576b86fb496b96192cac70fbf150
                                                              • Instruction Fuzzy Hash: 3D315EB0905218AFDB00EFADD8446AEBBF5FF88310F01891DE88897351E7799850CB91

                                                              Control-flow Graph

                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2581689425.0000000000831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00830000, based on PE: true
                                                              • Associated: 00000000.00000002.2581670188.0000000000830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2581710062.0000000000833000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2581731275.0000000000834000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2581753602.0000000000836000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2581773561.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_830000_MEMZ-Clean.jbxd
                                                              Similarity
                                                              • API ID: HookWindows$CurrentMessageThreadUnhook
                                                              • String ID: Still using this computer?$lol
                                                              • API String ID: 329392933-3014242478
                                                              • Opcode ID: 506811b1f22cc482b8312de89e2226e5c6298ffad642dfa67f58f4bb03058f80
                                                              • Instruction ID: 34ddaa31ad3b91f52239a08e749dccf6fc79e86aee0e6affd46030d204571c96
                                                              • Opcode Fuzzy Hash: 506811b1f22cc482b8312de89e2226e5c6298ffad642dfa67f58f4bb03058f80
                                                              • Instruction Fuzzy Hash: F7F0B7B0108305AFD700AFA8D54861FBFF4FB84349F42C81CE59987251E7B894588F92

                                                              Control-flow Graph

                                                              APIs
                                                              • GlobalAlloc.KERNEL32 ref: 00831F0F
                                                              • SendMessageTimeoutW.USER32 ref: 00831F4E
                                                              • GlobalFree.KERNEL32 ref: 00831F96
                                                                • Part of subcall function 0083246C: lstrlenW.KERNEL32(?,?,00000000,762BAE40,?,?,00831F5F), ref: 0083247B
                                                              • SendMessageTimeoutW.USER32 ref: 00831F8E
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2581689425.0000000000831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00830000, based on PE: true
                                                              • Associated: 00000000.00000002.2581670188.0000000000830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2581710062.0000000000833000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2581731275.0000000000834000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2581753602.0000000000836000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2581773561.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_830000_MEMZ-Clean.jbxd
                                                              Similarity
                                                              • API ID: GlobalMessageSendTimeout$AllocFreelstrlen
                                                              • String ID: d
                                                              • API String ID: 2955749784-2564639436
                                                              • Opcode ID: 7fab49539098659acc478fadf916d5ef2befb2d988f497e71720db04c83fddf7
                                                              • Instruction ID: 34c2b1d65819ddfd0efd40b4886f329b92c6899d7d7c55e1335bcee2d87c8ea0
                                                              • Opcode Fuzzy Hash: 7fab49539098659acc478fadf916d5ef2befb2d988f497e71720db04c83fddf7
                                                              • Instruction Fuzzy Hash: E411A2B1408301AFE700AF69D98971BBFE4FF84754F01881DE5D88B291D3BA8558CBA2

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 106 8322c0-8322d3 107 832323-832357 106->107 108 8322d5-832320 StretchBlt 106->108 108->107
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2581689425.0000000000831000.00000020.00000001.01000000.00000003.sdmp, Offset: 00830000, based on PE: true
                                                              • Associated: 00000000.00000002.2581670188.0000000000830000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2581710062.0000000000833000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2581731275.0000000000834000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2581753602.0000000000836000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2581773561.0000000000837000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_830000_MEMZ-Clean.jbxd
                                                              Similarity
                                                              • API ID: Stretch
                                                              • String ID: $2$2
                                                              • API String ID: 3460941471-912482728
                                                              • Opcode ID: d8e330ecba1559fc65330fe871feaaca9562adbbbe82b26c0e3b1b864bfbb0f7
                                                              • Instruction ID: dec7557a437299ea7c2a01f9a5b6505f602795397dfb49263862b3198e93ed2b
                                                              • Opcode Fuzzy Hash: d8e330ecba1559fc65330fe871feaaca9562adbbbe82b26c0e3b1b864bfbb0f7
                                                              • Instruction Fuzzy Hash: 831127B0808349DFDB04DF65D50428EBBF0FF84748F509958E89466354D3BA8955CF86