Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
mail.txt .exe

Overview

General Information

Sample name:mail.txt .exe
Analysis ID:1410988
MD5:edf4ff0bc5da6dabd5e7b78113d73bd8
SHA1:af49d2935b75627f6f748256f10c555d54040f2e
SHA256:e16d377c12b63acb694601b4bde36d61839054409e7fae1661fb051892d2ed36
Tags:exe
Infos:

Detection

MyDoom
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Suspicious Double Extension File Execution
Yara detected MyDoom
Connects to many different private IPs (likely to spread or exploit)
Drops PE files with benign system names
Drops executables to the windows directory (C:\Windows) and starts them
Exploit detected, runtime environment dropped PE file
Exploit detected, runtime environment starts unknown processes
Found evasive API chain (may stop execution after checking mutex)
Machine Learning detection for dropped file
Machine Learning detection for sample
PE file has a writeable .text section
Sigma detected: Files With System Process Name In Unsuspected Locations
Sigma detected: System File Execution Location Anomaly
Uses an obfuscated file name to hide its real file extension (a lot of spaces)
Uses an obfuscated file name to hide its real file extension (double extension)
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Contains functionality to dynamically determine API calls
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to search for IE or Outlook window (often done to steal information)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Creates processes with suspicious names
Deletes files inside the Windows folder
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found decision node followed by non-executed suspicious APIs
Found dropped PE file which has not been started or loaded
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
PE file contains sections with non-standard names
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Wow6432Node CurrentVersion Autorun Keys Modification
Tries to load missing DLLs
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Uses the system / local time for branch decision (may execute only at specific dates)

Classification

  • System is w10x64
  • mail.txt .exe (PID: 6968 cmdline: C:\Users\user\Desktop\mail.txt .exe MD5: EDF4FF0BC5DA6DABD5E7B78113D73BD8)
    • services.exe (PID: 6180 cmdline: C:\Windows\services.exe MD5: B0FE74719B1B647E2056641931907F4A)
    • WerFault.exe (PID: 1576 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6968 -s 1264 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • java.exe (PID: 3664 cmdline: "C:\Windows\java.exe" MD5: EDF4FF0BC5DA6DABD5E7B78113D73BD8)
    • services.exe (PID: 2604 cmdline: C:\Users\user\AppData\Local\Temp\services.exe MD5: B0FE74719B1B647E2056641931907F4A)
  • services.exe (PID: 4568 cmdline: "C:\Windows\services.exe" MD5: B0FE74719B1B647E2056641931907F4A)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000003.00000002.4465723940.0000000000501000.00000040.00000001.01000000.00000006.sdmpJoeSecurity_MyDoomYara detected MyDoomJoe Security
    00000000.00000002.2729074743.0000000000501000.00000040.00000001.01000000.00000003.sdmpJoeSecurity_MyDoomYara detected MyDoomJoe Security
      Process Memory Space: mail.txt .exe PID: 6968JoeSecurity_MyDoomYara detected MyDoomJoe Security
        Process Memory Space: java.exe PID: 3664JoeSecurity_MyDoomYara detected MyDoomJoe Security
          SourceRuleDescriptionAuthorStrings
          0.2.mail.txt .exe.500000.0.unpackJoeSecurity_MyDoomYara detected MyDoomJoe Security
            3.2.java.exe.500000.0.unpackJoeSecurity_MyDoomYara detected MyDoomJoe Security

              System Summary

              barindex
              Source: Process startedAuthor: Florian Roth (Nextron Systems), @blu3_team (idea), Nasreddine Bencherchali (Nextron Systems): Data: Command: C:\Users\user\Desktop\mail.txt .exe, CommandLine: C:\Users\user\Desktop\mail.txt .exe, CommandLine|base64offset|contains: , Image: C:\Users\user\Desktop\mail.txt .exe, NewProcessName: C:\Users\user\Desktop\mail.txt .exe, OriginalFileName: C:\Users\user\Desktop\mail.txt .exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2504, ProcessCommandLine: C:\Users\user\Desktop\mail.txt .exe, ProcessId: 6968, ProcessName: mail.txt .exe
              Source: File createdAuthor: Sander Wiebing, Tim Shelton, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Users\user\Desktop\mail.txt .exe, ProcessId: 6968, TargetFilename: C:\Windows\services.exe
              Source: Process startedAuthor: Florian Roth (Nextron Systems), Patrick Bareiss, Anton Kutepov, oscd.community, Nasreddine Bencherchali: Data: Command: C:\Windows\services.exe, CommandLine: C:\Windows\services.exe, CommandLine|base64offset|contains: , Image: C:\Windows\services.exe, NewProcessName: C:\Windows\services.exe, OriginalFileName: C:\Windows\services.exe, ParentCommandLine: C:\Users\user\Desktop\mail.txt .exe, ParentImage: C:\Users\user\Desktop\mail.txt .exe, ParentProcessId: 6968, ParentProcessName: mail.txt .exe, ProcessCommandLine: C:\Windows\services.exe, ProcessId: 6180, ProcessName: services.exe
              Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Windows\java.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\mail.txt .exe, ProcessId: 6968, TargetObject: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\JavaVM
              Source: Process startedAuthor: vburov: Data: Command: C:\Windows\services.exe, CommandLine: C:\Windows\services.exe, CommandLine|base64offset|contains: , Image: C:\Windows\services.exe, NewProcessName: C:\Windows\services.exe, OriginalFileName: C:\Windows\services.exe, ParentCommandLine: C:\Users\user\Desktop\mail.txt .exe, ParentImage: C:\Users\user\Desktop\mail.txt .exe, ParentProcessId: 6968, ParentProcessName: mail.txt .exe, ProcessCommandLine: C:\Windows\services.exe, ProcessId: 6180, ProcessName: services.exe
              No Snort rule has matched

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: mail.txt .exeAvira: detected
              Source: C:\Users\user\AppData\Local\Temp\services.exeAvira: detection malicious, Label: BDS/Backdoor.fszhy
              Source: C:\Windows\java.exeAvira: detection malicious, Label: TR/Spy.Banker.Gen
              Source: C:\Users\user\AppData\Local\Temp\tmp4F4F.tmpAvira: detection malicious, Label: TR/Spy.Banker.Gen
              Source: C:\Windows\services.exeAvira: detection malicious, Label: BDS/Backdoor.fszhy
              Source: C:\Users\user\AppData\Local\Temp\services.exeReversingLabs: Detection: 100%
              Source: C:\Windows\java.exeReversingLabs: Detection: 73%
              Source: C:\Windows\services.exeReversingLabs: Detection: 100%
              Source: mail.txt .exeReversingLabs: Detection: 73%
              Source: C:\Users\user\AppData\Local\Temp\services.exeJoe Sandbox ML: detected
              Source: C:\Windows\java.exeJoe Sandbox ML: detected
              Source: C:\Windows\services.exeJoe Sandbox ML: detected
              Source: mail.txt .exeJoe Sandbox ML: detected

              Exploits

              barindex
              Source: global trafficTCP traffic: 192.168.2.18:1034Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.9:1034Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.13:1034Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.12:1034Jump to behavior
              Source: mail.txt .exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE

              Spreading

              barindex
              Source: Yara matchFile source: 0.2.mail.txt .exe.500000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 3.2.java.exe.500000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000003.00000002.4465723940.0000000000501000.00000040.00000001.01000000.00000006.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.2729074743.0000000000501000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: mail.txt .exe PID: 6968, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: java.exe PID: 3664, type: MEMORYSTR
              Source: C:\Users\user\Desktop\mail.txt .exeCode function: 0_2_005052AD lstrcat,Sleep,lstrcpy,lstrcpy,lstrlen,lstrcat,lstrcat,memset,FindFirstFileA,FindNextFileA,lstrcpy,lstrlen,lstrcat,lstrcat,Sleep,FindClose,0_2_005052AD
              Source: C:\Windows\java.exeCode function: 3_2_005052AD lstrcat,Sleep,lstrcpy,lstrcpy,lstrlen,lstrcat,lstrcat,memset,FindFirstFileA,FindNextFileA,lstrcpy,lstrlen,lstrcat,lstrcat,Sleep,FindClose,3_2_005052AD
              Source: C:\Users\user\Desktop\mail.txt .exeFile opened: C:\Documents and Settings\user\AppData\Local\Adobe\Acrobat\Jump to behavior
              Source: C:\Users\user\Desktop\mail.txt .exeFile opened: C:\Documents and Settings\user\AppData\Local\Adobe\Acrobat\DC\Jump to behavior
              Source: C:\Users\user\Desktop\mail.txt .exeFile opened: C:\Documents and Settings\user\AppData\Local\Adobe\Jump to behavior
              Source: C:\Users\user\Desktop\mail.txt .exeFile opened: C:\Documents and Settings\user\AppData\Local\Adobe\Acrobat\DC\Cache\Jump to behavior
              Source: C:\Users\user\Desktop\mail.txt .exeFile opened: C:\Documents and Settings\user\AppData\Local\Jump to behavior
              Source: C:\Users\user\Desktop\mail.txt .exeFile opened: C:\Documents and Settings\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Jump to behavior

              Software Vulnerabilities

              barindex
              Source: C:\Windows\java.exeProcess created: C:\Users\user\AppData\Local\Temp\services.exe
              Source: C:\Users\user\Desktop\mail.txt .exeCode function: 0_2_00506AB8 select,recv,0_2_00506AB8
              Source: mail.txt .exe, 00000000.00000002.2729074743.0000000000501000.00000040.00000001.01000000.00000003.sdmp, java.exe, 00000003.00000002.4465723940.0000000000501000.00000040.00000001.01000000.00000006.sdmpString found in binary or memory: HLOToFrom%s %sSMTPServerSoftware\Microsoft\%s %s Manager\%ssInternetAccountmx.mail.smtp..logzincite"%s"servicesurlmon.dllURLDownloadToCacheFileAhttp://search.lycos.com/default.asp?lpv=1&loc=searchhp&tab=web&query=%s&nbq=%dhttp://www.altavista.com/web/results?q=%s&kgs=0&kls=0&n=%dhttp://search.yahoo.com/search?p=%s&ei=UTF-8&fr=fp-tab-web-t&cop=mss&tab=&num=%dhttp://www.google.com/search?hl=en&ie=UTF-8&oe=UTF-8&q=%s%s+%s-contact+replymailtoU equals www.yahoo.com (Yahoo)
              Source: mail.txt .exe, mail.txt .exe, 00000000.00000002.2729074743.0000000000501000.00000040.00000001.01000000.00000003.sdmp, java.exe, java.exe, 00000003.00000002.4465723940.0000000000501000.00000040.00000001.01000000.00000006.sdmpString found in binary or memory: http://search.lycos.com/default.asp?lpv=1&loc=searchhp&tab=web&query=%s
              Source: mail.txt .exe, 00000000.00000002.2729074743.0000000000501000.00000040.00000001.01000000.00000003.sdmp, java.exe, 00000003.00000002.4465723940.0000000000501000.00000040.00000001.01000000.00000006.sdmpString found in binary or memory: http://search.lycos.com/default.asp?lpv=1&loc=searchhp&tab=web&query=%s&nbq=%dhttp://www.altavista.c
              Source: mail.txt .exe, mail.txt .exe, 00000000.00000002.2729074743.0000000000501000.00000040.00000001.01000000.00000003.sdmp, java.exe, java.exe, 00000003.00000002.4465723940.0000000000501000.00000040.00000001.01000000.00000006.sdmpString found in binary or memory: http://search.yahoo.com/search?p=%s&ei=UTF-8&fr=fp-tab-web-t&cop=mss&tab=
              Source: Amcache.hve.10.drString found in binary or memory: http://upx.sf.net
              Source: mail.txt .exe, mail.txt .exe, 00000000.00000002.2729074743.0000000000501000.00000040.00000001.01000000.00000003.sdmp, java.exe, java.exe, 00000003.00000002.4465723940.0000000000501000.00000040.00000001.01000000.00000006.sdmpString found in binary or memory: http://www.altavista.com/web/results?q=%s&kgs=0&kls=0
              Source: mail.txt .exe, mail.txt .exe, 00000000.00000002.2729074743.0000000000501000.00000040.00000001.01000000.00000003.sdmp, java.exe, java.exe, 00000003.00000002.4465723940.0000000000501000.00000040.00000001.01000000.00000006.sdmpString found in binary or memory: http://www.google.com/search?hl=en&ie=UTF-8&oe=UTF-8&q=%s

              Spam, unwanted Advertisements and Ransom Demands

              barindex
              Source: Yara matchFile source: 0.2.mail.txt .exe.500000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 3.2.java.exe.500000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000003.00000002.4465723940.0000000000501000.00000040.00000001.01000000.00000006.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.2729074743.0000000000501000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: mail.txt .exe PID: 6968, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: java.exe PID: 3664, type: MEMORYSTR

              System Summary

              barindex
              Source: mail.txt .exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              Source: java.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              Source: tmp4F4F.tmp.3.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              Source: C:\Users\user\Desktop\mail.txt .exeFile created: C:\Windows\services.exeJump to behavior
              Source: C:\Users\user\Desktop\mail.txt .exeFile created: C:\Windows\java.exeJump to behavior
              Source: C:\Users\user\Desktop\mail.txt .exeFile created: C:\Windows\java.exeJump to behavior
              Source: C:\Users\user\Desktop\mail.txt .exeFile created: C:\Windows\java.exe\:Zone.Identifier:$DATAJump to behavior
              Source: C:\Users\user\Desktop\mail.txt .exeFile deleted: C:\Windows\java.exeJump to behavior
              Source: C:\Users\user\Desktop\mail.txt .exeCode function: 0_2_005077300_2_00507730
              Source: C:\Users\user\Desktop\mail.txt .exeCode function: 0_2_005011C90_2_005011C9
              Source: C:\Windows\java.exeCode function: 3_2_005077303_2_00507730
              Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\services.exe BF316F51D0C345D61EAEE3940791B64E81F676E3BCA42BAD61073227BEE6653C
              Source: Joe Sandbox ViewDropped File: C:\Windows\services.exe BF316F51D0C345D61EAEE3940791B64E81F676E3BCA42BAD61073227BEE6653C
              Source: C:\Users\user\Desktop\mail.txt .exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6968 -s 1264
              Source: C:\Users\user\Desktop\mail.txt .exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\mail.txt .exeSection loaded: ntmarta.dllJump to behavior
              Source: C:\Users\user\Desktop\mail.txt .exeSection loaded: wininet.dllJump to behavior
              Source: C:\Users\user\Desktop\mail.txt .exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Users\user\Desktop\mail.txt .exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\mail.txt .exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\mail.txt .exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\mail.txt .exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\mail.txt .exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\mail.txt .exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Users\user\Desktop\mail.txt .exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Users\user\Desktop\mail.txt .exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\mail.txt .exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Users\user\Desktop\mail.txt .exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\services.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\services.exeSection loaded: napinsp.dllJump to behavior
              Source: C:\Windows\services.exeSection loaded: pnrpnsp.dllJump to behavior
              Source: C:\Windows\services.exeSection loaded: wshbth.dllJump to behavior
              Source: C:\Windows\services.exeSection loaded: nlaapi.dllJump to behavior
              Source: C:\Windows\services.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\services.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\services.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\services.exeSection loaded: winrnr.dllJump to behavior
              Source: C:\Windows\services.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\services.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\services.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Windows\services.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\services.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\services.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\services.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\services.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\services.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\services.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\services.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\services.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\java.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\java.exeSection loaded: napinsp.dllJump to behavior
              Source: C:\Windows\java.exeSection loaded: pnrpnsp.dllJump to behavior
              Source: C:\Windows\java.exeSection loaded: wshbth.dllJump to behavior
              Source: C:\Windows\java.exeSection loaded: nlaapi.dllJump to behavior
              Source: C:\Windows\java.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\java.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\java.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\java.exeSection loaded: winrnr.dllJump to behavior
              Source: C:\Windows\java.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Windows\java.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\java.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\java.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\java.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\java.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\java.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\java.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\java.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\java.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\java.exeSection loaded: ntmarta.dllJump to behavior
              Source: C:\Windows\java.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\java.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\services.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\services.exeSection loaded: napinsp.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\services.exeSection loaded: pnrpnsp.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\services.exeSection loaded: wshbth.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\services.exeSection loaded: nlaapi.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\services.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\services.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\services.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\services.exeSection loaded: winrnr.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\services.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\services.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\services.exeSection loaded: napinsp.dllJump to behavior
              Source: C:\Windows\services.exeSection loaded: pnrpnsp.dllJump to behavior
              Source: C:\Windows\services.exeSection loaded: wshbth.dllJump to behavior
              Source: C:\Windows\services.exeSection loaded: nlaapi.dllJump to behavior
              Source: C:\Windows\services.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\services.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\services.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\services.exeSection loaded: winrnr.dllJump to behavior
              Source: C:\Windows\services.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\services.exeSection loaded: rasadhlp.dllJump to behavior
              Source: mail.txt .exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
              Source: mail.txt .exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              Source: java.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              Source: tmp4F4F.tmp.3.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              Source: classification engineClassification label: mal100.spre.expl.evad.winEXE@8/13@0/9
              Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6968
              Source: C:\Windows\java.exeMutant created: \Sessions\1\BaseNamedObjects\849224root849224root8849224root849224root88
              Source: C:\Users\user\Desktop\mail.txt .exeFile created: C:\Users\user\AppData\Local\Temp\zincite.logJump to behavior
              Source: C:\Users\user\Desktop\mail.txt .exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: mail.txt .exeReversingLabs: Detection: 73%
              Source: C:\Users\user\Desktop\mail.txt .exeFile read: C:\Users\user\Desktop\mail.txt .exeJump to behavior
              Source: unknownProcess created: C:\Users\user\Desktop\mail.txt .exe C:\Users\user\Desktop\mail.txt .exe
              Source: C:\Users\user\Desktop\mail.txt .exeProcess created: C:\Windows\services.exe C:\Windows\services.exe
              Source: unknownProcess created: C:\Windows\java.exe "C:\Windows\java.exe"
              Source: C:\Windows\java.exeProcess created: C:\Users\user\AppData\Local\Temp\services.exe C:\Users\user\AppData\Local\Temp\services.exe
              Source: unknownProcess created: C:\Windows\services.exe "C:\Windows\services.exe"
              Source: C:\Users\user\Desktop\mail.txt .exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6968 -s 1264
              Source: C:\Users\user\Desktop\mail.txt .exeProcess created: C:\Windows\services.exe C:\Windows\services.exeJump to behavior
              Source: C:\Windows\java.exeProcess created: C:\Users\user\AppData\Local\Temp\services.exe C:\Users\user\AppData\Local\Temp\services.exeJump to behavior
              Source: C:\Users\user\Desktop\mail.txt .exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
              Source: C:\Users\user\Desktop\mail.txt .exeCode function: 0_2_00503620 GetModuleHandleA,LoadLibraryA,GetProcAddress,InternetGetConnectedState,0_2_00503620
              Source: services.exe.0.drStatic PE information: section name: UPX2
              Source: services.exe.3.drStatic PE information: section name: UPX2
              Source: C:\Users\user\Desktop\mail.txt .exeCode function: 0_2_0050A42D push ds; ret 0_2_0050A42E
              Source: C:\Users\user\Desktop\mail.txt .exeCode function: 0_2_0050DEA6 push ds; ret 0_2_0050DEBE
              Source: C:\Users\user\Desktop\mail.txt .exeCode function: 0_2_0050A501 push ecx; retf 0_2_0050A53F
              Source: C:\Users\user\Desktop\mail.txt .exeCode function: 0_2_0050A50F push ecx; retf 0_2_0050A53F
              Source: C:\Users\user\Desktop\mail.txt .exeCode function: 0_2_00509BA2 push edx; retf 0_2_00509BAB
              Source: C:\Windows\services.exeCode function: 1_2_00405A55 push es; iretd 1_2_00405A8E
              Source: C:\Windows\java.exeCode function: 3_2_0050A42D push ds; ret 3_2_0050A42E
              Source: C:\Windows\java.exeCode function: 3_2_0050DEA6 push ds; ret 3_2_0050DEBE
              Source: C:\Windows\java.exeCode function: 3_2_0050A501 push ecx; retf 3_2_0050A53F
              Source: C:\Windows\java.exeCode function: 3_2_0050A50F push ecx; retf 3_2_0050A53F
              Source: C:\Windows\java.exeCode function: 3_2_00509BA2 push edx; retf 3_2_00509BAB
              Source: mail.txt .exeStatic PE information: section name: .text entropy: 6.805048281534057
              Source: java.exe.0.drStatic PE information: section name: .text entropy: 6.805048281534057
              Source: tmp4F4F.tmp.3.drStatic PE information: section name: .text entropy: 6.805048281534057
              Source: initial sampleStatic PE information: section name: UPX0
              Source: initial sampleStatic PE information: section name: UPX1
              Source: initial sampleStatic PE information: section name: UPX0
              Source: initial sampleStatic PE information: section name: UPX1
              Source: initial sampleStatic PE information: section name: UPX0
              Source: initial sampleStatic PE information: section name: UPX1
              Source: initial sampleStatic PE information: section name: UPX0
              Source: initial sampleStatic PE information: section name: UPX1
              Source: initial sampleStatic PE information: section name: UPX0
              Source: initial sampleStatic PE information: section name: UPX1

              Persistence and Installation Behavior

              barindex
              Source: C:\Users\user\Desktop\mail.txt .exeFile created: C:\Windows\services.exeJump to dropped file
              Source: C:\Windows\java.exeFile created: C:\Users\user\AppData\Local\Temp\services.exeJump to dropped file
              Source: C:\Users\user\Desktop\mail.txt .exeExecutable created and started: C:\Windows\services.exeJump to behavior
              Source: unknownExecutable created and started: C:\Windows\java.exe
              Source: C:\Windows\java.exeFile created: tmp4F4F.tmp.3.drJump to dropped file
              Source: C:\Users\user\Desktop\mail.txt .exeFile created: \mail.txt .exe
              Source: C:\Users\user\Desktop\mail.txt .exeFile created: \mail.txt .exe
              Source: C:\Users\user\Desktop\mail.txt .exeFile created: \mail.txt .exeJump to behavior
              Source: C:\Users\user\Desktop\mail.txt .exeFile created: C:\Windows\java.exeJump to dropped file
              Source: C:\Users\user\Desktop\mail.txt .exeFile created: C:\Windows\services.exeJump to dropped file
              Source: C:\Windows\java.exeFile created: C:\Users\user\AppData\Local\Temp\tmp4F4F.tmpJump to dropped file
              Source: C:\Windows\java.exeFile created: C:\Users\user\AppData\Local\Temp\services.exeJump to dropped file
              Source: C:\Users\user\Desktop\mail.txt .exeFile created: C:\Windows\java.exeJump to dropped file
              Source: C:\Users\user\Desktop\mail.txt .exeFile created: C:\Windows\services.exeJump to dropped file
              Source: C:\Users\user\Desktop\mail.txt .exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run JavaVMJump to behavior
              Source: C:\Users\user\Desktop\mail.txt .exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run JavaVMJump to behavior
              Source: C:\Windows\services.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run ServicesJump to behavior
              Source: C:\Windows\services.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run ServicesJump to behavior

              Hooking and other Techniques for Hiding and Protection

              barindex
              Source: Detected 51 consecutive spaces in filenameStatic PE information: mail.txt .exe
              Source: Possible double extension: txt.exeStatic PE information: mail.txt .exe
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: C:\Users\user\Desktop\mail.txt .exeEvasive API call chain: CreateMutex,DecisionNodes,ExitProcessgraph_0-3007
              Source: C:\Users\user\Desktop\mail.txt .exeEvasive API call chain: CreateMutex,DecisionNodes,Sleepgraph_0-3007
              Source: C:\Windows\services.exeWindow / User API: threadDelayed 2878Jump to behavior
              Source: C:\Windows\java.exeWindow / User API: threadDelayed 356Jump to behavior
              Source: C:\Windows\java.exeWindow / User API: threadDelayed 8716Jump to behavior
              Source: C:\Users\user\AppData\Local\Temp\services.exeWindow / User API: threadDelayed 7251Jump to behavior
              Source: C:\Users\user\AppData\Local\Temp\services.exeWindow / User API: threadDelayed 2747Jump to behavior
              Source: C:\Windows\services.exeWindow / User API: threadDelayed 9895Jump to behavior
              Source: C:\Windows\java.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_3-2834
              Source: C:\Windows\services.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_1-1016
              Source: C:\Windows\java.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\tmp4F4F.tmpJump to dropped file
              Source: C:\Users\user\Desktop\mail.txt .exe TID: 6092Thread sleep time: -84000s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\mail.txt .exe TID: 6092Thread sleep count: 34 > 30Jump to behavior
              Source: C:\Users\user\Desktop\mail.txt .exe TID: 6092Thread sleep count: 62 > 30Jump to behavior
              Source: C:\Users\user\Desktop\mail.txt .exe TID: 6092Thread sleep count: 297 > 30Jump to behavior
              Source: C:\Windows\services.exe TID: 7156Thread sleep count: 2878 > 30Jump to behavior
              Source: C:\Windows\java.exe TID: 2468Thread sleep count: 356 > 30Jump to behavior
              Source: C:\Windows\java.exe TID: 2468Thread sleep time: -284800s >= -30000sJump to behavior
              Source: C:\Windows\java.exe TID: 4124Thread sleep count: 42 > 30Jump to behavior
              Source: C:\Windows\java.exe TID: 4124Thread sleep count: 42 > 30Jump to behavior
              Source: C:\Windows\java.exe TID: 4124Thread sleep count: 251 > 30Jump to behavior
              Source: C:\Windows\java.exe TID: 2468Thread sleep count: 8716 > 30Jump to behavior
              Source: C:\Windows\java.exe TID: 2468Thread sleep time: -6972800s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\services.exe TID: 2460Thread sleep count: 7251 > 30Jump to behavior
              Source: C:\Users\user\AppData\Local\Temp\services.exe TID: 2460Thread sleep time: -1812750s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\services.exe TID: 2460Thread sleep count: 2747 > 30Jump to behavior
              Source: C:\Users\user\AppData\Local\Temp\services.exe TID: 2460Thread sleep time: -686750s >= -30000sJump to behavior
              Source: C:\Windows\services.exe TID: 6048Thread sleep count: 9895 > 30Jump to behavior
              Source: C:\Windows\services.exe TID: 6048Thread sleep time: -2473750s >= -30000sJump to behavior
              Source: C:\Windows\services.exe TID: 6048Thread sleep count: 103 > 30Jump to behavior
              Source: C:\Users\user\Desktop\mail.txt .exeLast function: Thread delayed
              Source: C:\Users\user\Desktop\mail.txt .exeCode function: 0_2_00505717 GetSystemTime followed by cmp: cmp word ptr [ebp-10h], 07dch and CTI: jbe 00505758h0_2_00505717
              Source: C:\Windows\java.exeCode function: 3_2_00505717 GetSystemTime followed by cmp: cmp word ptr [ebp-10h], 07dch and CTI: jbe 00505758h3_2_00505717
              Source: C:\Users\user\Desktop\mail.txt .exeCode function: 0_2_005052AD lstrcat,Sleep,lstrcpy,lstrcpy,lstrlen,lstrcat,lstrcat,memset,FindFirstFileA,FindNextFileA,lstrcpy,lstrlen,lstrcat,lstrcat,Sleep,FindClose,0_2_005052AD
              Source: C:\Windows\java.exeCode function: 3_2_005052AD lstrcat,Sleep,lstrcpy,lstrcpy,lstrlen,lstrcat,lstrcat,memset,FindFirstFileA,FindNextFileA,lstrcpy,lstrlen,lstrcat,lstrcat,Sleep,FindClose,3_2_005052AD
              Source: C:\Users\user\Desktop\mail.txt .exeThread delayed: delay time: 84000Jump to behavior
              Source: C:\Users\user\Desktop\mail.txt .exeFile opened: C:\Documents and Settings\user\AppData\Local\Adobe\Acrobat\Jump to behavior
              Source: C:\Users\user\Desktop\mail.txt .exeFile opened: C:\Documents and Settings\user\AppData\Local\Adobe\Acrobat\DC\Jump to behavior
              Source: C:\Users\user\Desktop\mail.txt .exeFile opened: C:\Documents and Settings\user\AppData\Local\Adobe\Jump to behavior
              Source: C:\Users\user\Desktop\mail.txt .exeFile opened: C:\Documents and Settings\user\AppData\Local\Adobe\Acrobat\DC\Cache\Jump to behavior
              Source: C:\Users\user\Desktop\mail.txt .exeFile opened: C:\Documents and Settings\user\AppData\Local\Jump to behavior
              Source: C:\Users\user\Desktop\mail.txt .exeFile opened: C:\Documents and Settings\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Jump to behavior
              Source: Amcache.hve.10.drBinary or memory string: VMware
              Source: Amcache.hve.10.drBinary or memory string: VMware Virtual USB Mouse
              Source: Amcache.hve.10.drBinary or memory string: vmci.syshbin
              Source: Amcache.hve.10.drBinary or memory string: VMware, Inc.
              Source: Amcache.hve.10.drBinary or memory string: VMware20,1hbin@
              Source: Amcache.hve.10.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
              Source: Amcache.hve.10.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
              Source: Amcache.hve.10.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
              Source: mail.txt .exe, 00000000.00000003.2426549427.0000000000821000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMware20,1
              Source: Amcache.hve.10.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
              Source: Amcache.hve.10.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
              Source: Amcache.hve.10.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
              Source: Amcache.hve.10.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
              Source: mail.txt .exe, 00000000.00000002.2729293430.00000000007CE000.00000004.00000020.00020000.00000000.sdmp, java.exe, 00000003.00000002.4466533402.000000000082E000.00000004.00000020.00020000.00000000.sdmp, services.exe, 00000004.00000002.4466269343.0000000000812000.00000004.00000020.00020000.00000000.sdmp, services.exe, 00000005.00000002.4466259388.0000000000800000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
              Source: services.exe, 00000001.00000002.4466417572.0000000000812000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll#
              Source: Amcache.hve.10.drBinary or memory string: vmci.sys
              Source: Amcache.hve.10.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
              Source: Amcache.hve.10.drBinary or memory string: vmci.syshbin`
              Source: Amcache.hve.10.drBinary or memory string: \driver\vmci,\driver\pci
              Source: mail.txt .exe, 00000000.00000003.2426549427.0000000000821000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: i VMware, Inc.
              Source: Amcache.hve.10.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
              Source: Amcache.hve.10.drBinary or memory string: VMware20,1
              Source: Amcache.hve.10.drBinary or memory string: Microsoft Hyper-V Generation Counter
              Source: Amcache.hve.10.drBinary or memory string: NECVMWar VMware SATA CD00
              Source: Amcache.hve.10.drBinary or memory string: VMware Virtual disk SCSI Disk Device
              Source: Amcache.hve.10.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
              Source: Amcache.hve.10.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
              Source: Amcache.hve.10.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
              Source: Amcache.hve.10.drBinary or memory string: VMware PCI VMCI Bus Device
              Source: Amcache.hve.10.drBinary or memory string: VMware VMCI Bus Device
              Source: Amcache.hve.10.drBinary or memory string: VMware Virtual RAM
              Source: Amcache.hve.10.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
              Source: Amcache.hve.10.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
              Source: C:\Users\user\Desktop\mail.txt .exeAPI call chain: ExitProcess graph end nodegraph_0-2984
              Source: C:\Windows\services.exeAPI call chain: ExitProcess graph end nodegraph_1-1005
              Source: C:\Users\user\Desktop\mail.txt .exeProcess queried: DebugPortJump to behavior
              Source: C:\Users\user\Desktop\mail.txt .exeCode function: 0_2_00503620 GetModuleHandleA,LoadLibraryA,GetProcAddress,InternetGetConnectedState,0_2_00503620
              Source: C:\Users\user\Desktop\mail.txt .exeCode function: 0_2_00504E00 GetProcessHeap,RtlAllocateHeap,CreateFileA,ReadFile,ReadFile,FindCloseChangeNotification,GetProcessHeap,RtlFreeHeap,0_2_00504E00
              Source: C:\Users\user\Desktop\mail.txt .exeProcess created: C:\Windows\services.exe C:\Windows\services.exeJump to behavior
              Source: C:\Windows\java.exeProcess created: C:\Users\user\AppData\Local\Temp\services.exe C:\Users\user\AppData\Local\Temp\services.exeJump to behavior
              Source: C:\Users\user\Desktop\mail.txt .exeCode function: 0_2_005032CB lstrlen,GetLocalTime,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeZoneInformation,lstrcat,wsprintfA,0_2_005032CB
              Source: C:\Users\user\Desktop\mail.txt .exeCode function: 0_2_005032CB lstrlen,GetLocalTime,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeZoneInformation,lstrcat,wsprintfA,0_2_005032CB
              Source: Amcache.hve.10.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
              Source: Amcache.hve.10.drBinary or memory string: msmpeng.exe
              Source: Amcache.hve.10.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
              Source: Amcache.hve.10.drBinary or memory string: MsMpEng.exe
              Source: C:\Users\user\Desktop\mail.txt .exeCode function: 0_2_0050311C FindWindowA,FindWindowA,FindWindowA,FindWindowA,RtlExitUserThread,0_2_0050311C
              Source: C:\Windows\java.exeCode function: 3_2_0050311C FindWindowA,FindWindowA,FindWindowA,FindWindowA,RtlExitUserThread,GetModuleHandleA,GetProcAddress,3_2_0050311C
              Source: C:\Windows\services.exeCode function: 1_2_00401F0E GetProcessHeap,RtlAllocateHeap,htons,htons,socket,closesocket,Sleep,htons,socket,bind,listen,CreateThread,select,Sleep,GetProcessHeap,RtlAllocateHeap,accept,closesocket,accept,GetProcessHeap,HeapFree,CreateThread,CloseHandle,1_2_00401F0E
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts11
              Native API
              1
              Registry Run Keys / Startup Folder
              11
              Process Injection
              42
              Masquerading
              OS Credential Dumping12
              System Time Discovery
              Remote Services1
              Email Collection
              1
              Encrypted Channel
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault Accounts2
              Exploitation for Client Execution
              1
              DLL Side-Loading
              1
              Registry Run Keys / Startup Folder
              21
              Virtualization/Sandbox Evasion
              LSASS Memory131
              Security Software Discovery
              Remote Desktop Protocol1
              Archive Collected Data
              1
              Ingress Tool Transfer
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
              DLL Side-Loading
              11
              Process Injection
              Security Account Manager21
              Virtualization/Sandbox Evasion
              SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook221
              Obfuscated Files or Information
              NTDS1
              Application Window Discovery
              Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script21
              Software Packing
              LSA Secrets2
              File and Directory Discovery
              SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
              DLL Side-Loading
              Cached Domain Credentials2
              System Information Discovery
              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
              File Deletion
              DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 signatures2 2 Behavior Graph ID: 1410988 Sample: mail.txt                   ... Startdate: 18/03/2024 Architecture: WINDOWS Score: 100 38 Antivirus detection for dropped file 2->38 40 Antivirus / Scanner detection for submitted sample 2->40 42 Multi AV Scanner detection for submitted file 2->42 44 11 other signatures 2->44 6 java.exe 4 2->6         started        10 mail.txt                                                    .exe 1 5 2->10         started        12 services.exe 2->12         started        process3 file4 22 C:\Users\user\AppData\Local\...\tmp4F4F.tmp, PE32 6->22 dropped 24 C:\Users\user\AppData\Local\...\services.exe, PE32 6->24 dropped 26 C:\Users\user\AppData\Local\...\tmpF606.tmp, Zip 6->26 dropped 46 Antivirus detection for dropped file 6->46 48 Multi AV Scanner detection for dropped file 6->48 50 Machine Learning detection for dropped file 6->50 54 3 other signatures 6->54 14 services.exe 6->14         started        28 C:\Windows\services.exe, PE32 10->28 dropped 30 C:\Windows\java.exe, PE32 10->30 dropped 52 Drops executables to the windows directory (C:\Windows) and starts them 10->52 17 services.exe 1 1 10->17         started        20 WerFault.exe 19 16 10->20         started        signatures5 process6 dnsIp7 56 Machine Learning detection for dropped file 14->56 32 192.168.2.12 unknown unknown 17->32 34 192.168.2.13 unknown unknown 17->34 36 7 other IPs or domains 17->36 58 Antivirus detection for dropped file 17->58 60 Multi AV Scanner detection for dropped file 17->60 62 Connects to many different private IPs (likely to spread or exploit) 17->62 signatures8

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              mail.txt .exe74%ReversingLabsWin32.Trojan.FlyAgent
              mail.txt .exe100%AviraTR/Spy.Banker.Gen
              mail.txt .exe100%Joe Sandbox ML
              SourceDetectionScannerLabelLink
              C:\Users\user\AppData\Local\Temp\services.exe100%AviraBDS/Backdoor.fszhy
              C:\Windows\java.exe100%AviraTR/Spy.Banker.Gen
              C:\Users\user\AppData\Local\Temp\tmp4F4F.tmp100%AviraTR/Spy.Banker.Gen
              C:\Windows\services.exe100%AviraBDS/Backdoor.fszhy
              C:\Users\user\AppData\Local\Temp\services.exe100%Joe Sandbox ML
              C:\Users\user\AppData\Local\Temp\tmpF606.tmp100%Joe Sandbox ML
              C:\Windows\java.exe100%Joe Sandbox ML
              C:\Users\user\AppData\Local\Temp\tmp4F4F.tmp100%Joe Sandbox ML
              C:\Windows\services.exe100%Joe Sandbox ML
              C:\Users\user\AppData\Local\Temp\services.exe100%ReversingLabsWin32.Worm.Mydoom
              C:\Windows\java.exe74%ReversingLabsWin32.Trojan.FlyAgent
              C:\Windows\services.exe100%ReversingLabsWin32.Worm.Mydoom
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              http://www.altavista.com/web/results?q=%s&kgs=0&kls=00%Avira URL Cloudsafe
              No contacted domains info
              NameSourceMaliciousAntivirus DetectionReputation
              http://www.altavista.com/web/results?q=%s&kgs=0&kls=0mail.txt .exe, mail.txt .exe, 00000000.00000002.2729074743.0000000000501000.00000040.00000001.01000000.00000003.sdmp, java.exe, java.exe, 00000003.00000002.4465723940.0000000000501000.00000040.00000001.01000000.00000006.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://upx.sf.netAmcache.hve.10.drfalse
                high
                http://search.lycos.com/default.asp?lpv=1&loc=searchhp&tab=web&query=%smail.txt .exe, mail.txt .exe, 00000000.00000002.2729074743.0000000000501000.00000040.00000001.01000000.00000003.sdmp, java.exe, java.exe, 00000003.00000002.4465723940.0000000000501000.00000040.00000001.01000000.00000006.sdmpfalse
                  high
                  http://www.google.com/search?hl=en&ie=UTF-8&oe=UTF-8&q=%smail.txt .exe, mail.txt .exe, 00000000.00000002.2729074743.0000000000501000.00000040.00000001.01000000.00000003.sdmp, java.exe, java.exe, 00000003.00000002.4465723940.0000000000501000.00000040.00000001.01000000.00000006.sdmpfalse
                    high
                    http://search.yahoo.com/search?p=%s&ei=UTF-8&fr=fp-tab-web-t&cop=mss&tab=mail.txt .exe, mail.txt .exe, 00000000.00000002.2729074743.0000000000501000.00000040.00000001.01000000.00000003.sdmp, java.exe, java.exe, 00000003.00000002.4465723940.0000000000501000.00000040.00000001.01000000.00000006.sdmpfalse
                      high
                      http://search.lycos.com/default.asp?lpv=1&loc=searchhp&tab=web&query=%s&nbq=%dhttp://www.altavista.cmail.txt .exe, 00000000.00000002.2729074743.0000000000501000.00000040.00000001.01000000.00000003.sdmp, java.exe, 00000003.00000002.4465723940.0000000000501000.00000040.00000001.01000000.00000006.sdmpfalse
                        high
                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs
                        IPDomainCountryFlagASNASN NameMalicious
                        IP
                        192.168.2.13
                        172.16.1.166
                        10.0.2.15
                        192.168.2.12
                        172.16.1.4
                        172.16.1.2
                        192.168.2.18
                        192.168.2.9
                        172.16.1.170
                        Joe Sandbox version:40.0.0 Tourmaline
                        Analysis ID:1410988
                        Start date and time:2024-03-18 14:35:58 +01:00
                        Joe Sandbox product:CloudBasic
                        Overall analysis duration:0h 7m 44s
                        Hypervisor based Inspection enabled:false
                        Report type:full
                        Cookbook file name:default.jbs
                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                        Number of analysed new started processes analysed:12
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Sample name:mail.txt .exe
                        Detection:MAL
                        Classification:mal100.spre.expl.evad.winEXE@8/13@0/9
                        EGA Information:
                        • Successful, ratio: 100%
                        HCA Information:
                        • Successful, ratio: 100%
                        • Number of executed functions: 68
                        • Number of non-executed functions: 66
                        Cookbook Comments:
                        • Found application associated with file extension: .exe
                        • Override analysis time to 240000 for current running targets taking high CPU consumption
                        • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
                        • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                        • Excluded IPs from analysis (whitelisted): 52.168.117.173, 17.179.253.242
                        • Excluded domains from analysis (whitelisted): onedsblobprdeus16.eastus.cloudapp.azure.com, apple.com, ocsp.digicert.com, mx-in-rno.apple.com, slscr.update.microsoft.com, login.live.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                        • Report size exceeded maximum capacity and may have missing behavior information.
                        • Report size getting too big, too many NtOpenFile calls found.
                        • Report size getting too big, too many NtQueryValueKey calls found.
                        • VT rate limit hit for: mail.txt .exe
                        TimeTypeDescription
                        14:36:43API Interceptor98x Sleep call for process: mail.txt .exe modified
                        14:36:45AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run JavaVM C:\Windows\java.exe
                        14:36:53AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run Services C:\Windows\services.exe
                        14:37:27API Interceptor2499325x Sleep call for process: java.exe modified
                        14:37:28API Interceptor2206926x Sleep call for process: services.exe modified
                        14:37:56API Interceptor1x Sleep call for process: WerFault.exe modified
                        No context
                        No context
                        No context
                        No context
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        C:\Users\user\AppData\Local\Temp\services.exeinstruction.scr.exeGet hashmaliciousMyDoomBrowse
                          .scr.exeGet hashmaliciousMyDoomBrowse
                            message.com.exeGet hashmaliciousMyDoomBrowse
                              letter.com.exeGet hashmaliciousMyDoomBrowse
                                yBvb5QQho4.exeGet hashmaliciousMyDoomBrowse
                                  fsjRK2SX4t.exeGet hashmaliciousMyDoomBrowse
                                    SecuriteInfo.com.Win32.HLLM.MyDoom.54464.3216.exeGet hashmaliciousMyDoomBrowse
                                      .exeGet hashmaliciousMyDoomBrowse
                                        Cg7HLh2mus.exeGet hashmaliciousMyDoomBrowse
                                          AHnFoINkgu.exeGet hashmaliciousMyDoomBrowse
                                            C:\Windows\services.exeinstruction.scr.exeGet hashmaliciousMyDoomBrowse
                                              .scr.exeGet hashmaliciousMyDoomBrowse
                                                message.com.exeGet hashmaliciousMyDoomBrowse
                                                  letter.com.exeGet hashmaliciousMyDoomBrowse
                                                    yBvb5QQho4.exeGet hashmaliciousMyDoomBrowse
                                                      fsjRK2SX4t.exeGet hashmaliciousMyDoomBrowse
                                                        SecuriteInfo.com.Win32.HLLM.MyDoom.54464.3216.exeGet hashmaliciousMyDoomBrowse
                                                          .exeGet hashmaliciousMyDoomBrowse
                                                            Cg7HLh2mus.exeGet hashmaliciousMyDoomBrowse
                                                              AHnFoINkgu.exeGet hashmaliciousMyDoomBrowse
                                                                Process:C:\Windows\SysWOW64\WerFault.exe
                                                                File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):65536
                                                                Entropy (8bit):0.9070386662593016
                                                                Encrypted:false
                                                                SSDEEP:96:qRFf46JNs6hM1yDfwQXIDcQvc6QcEVcw3cE/n+HbHg/opAnQzOqg7TlOy4aEuFq9:6nJN/0BU/gjd6zuiFhZ24IO8b
                                                                MD5:FE57820F4A67A6B1C62C0A09DB8CDADC
                                                                SHA1:A960E1564CE19B7D1734D375414E066B4067DEB6
                                                                SHA-256:698AC759C7FAB327BE060C7E3D874B3CC49E524409AB3D38F5AEBF4E4977379D
                                                                SHA-512:25F1B668991E2DE827CB9ADDEE34919FD03C70BD5736AD0890285141A666308CDDCB3E39B60CEF00D52DD7CD57C6C989630D33EE378196B3277F6D3747FB9211
                                                                Malicious:false
                                                                Reputation:low
                                                                Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.5.5.2.4.2.6.6.6.5.1.6.3.4.0.7.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.5.5.2.4.2.6.6.7.1.5.6.9.6.5.1.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.8.b.9.1.0.1.0.5.-.d.7.7.0.-.4.5.6.3.-.a.d.1.e.-.a.d.8.1.b.5.2.1.a.1.f.a.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.2.2.8.2.9.e.b.c.-.7.6.4.9.-.4.d.c.8.-.b.a.a.0.-.2.5.9.4.7.c.4.f.8.e.9.d.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.m.a.i.l...t.x.t. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.b.3.8.-.0.0.0.1.-.0.0.1.4.-.2.4.2.c.-.c.5.5.0.3.9.7.9.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.0.5.d.f.2.2.8.a.6.3.7.c.7.e.7.f.e.6.9.5.5.d.a.2.c.0.0.7.9.b.8.c.0.0.0.0.f.f.f.f.!.0.0.0.0.a.f.4.9.d.2.9.3.5.b.7.5.6.2.7.f.
                                                                Process:C:\Windows\SysWOW64\WerFault.exe
                                                                File Type:Mini DuMP crash report, 14 streams, Mon Mar 18 13:37:46 2024, 0x1205a4 type
                                                                Category:dropped
                                                                Size (bytes):88062
                                                                Entropy (8bit):2.056578687053357
                                                                Encrypted:false
                                                                SSDEEP:384:5qJ4KX4dQNBkVj8HTo9nXKC6Rjo+ulX0Gshgf+Td:Ymc4de6jWTaaCWx1GUQa
                                                                MD5:5A5B19A32404D6B67A0099BB719D78E9
                                                                SHA1:88257CE082CE676F74CAD64F691675CA97A30D12
                                                                SHA-256:F6D1F70AA824F00AD7C37CFBE7D697FFAB9902824C81B3334D7725DFA6A04384
                                                                SHA-512:E1810AEADB6A106FF9D52D097EE3F70128E392DC776061C15A1B1F0656D7F74F0BD454C43D626DD791C8E8426DC140DE7953CE1DC829B9704D1399FB6D949683
                                                                Malicious:false
                                                                Reputation:low
                                                                Preview:MDMP..a..... ........C.e....................................$....8..........T.......8...........T...............^)..........,...........................................................................................eJ..............GenuineIntel............T.......8...kC.e.............................0..2...............W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .S.u.m.m.e.r. .T.i.m.e...........................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Windows\SysWOW64\WerFault.exe
                                                                File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):8536
                                                                Entropy (8bit):3.7000663699490346
                                                                Encrypted:false
                                                                SSDEEP:192:R6l7wVeJf9626YEIISUtCKgmfPJjJprR89boysfzYm:R6lXJV626YEnSUtPgmfPJjKoxfJ
                                                                MD5:C336F672678DC23976FF9A2EFF429653
                                                                SHA1:E4B9CFB43E114EC2F7B2E5272270C7CE71A08D3D
                                                                SHA-256:0C0A90619485D610DECE6B94A3676B86743C56DC99D0F0EA984463CB4BB79455
                                                                SHA-512:8ADF9ACEBBE65949CFC55090B0E21A0EDEE85167E8C1C74C0D2472C8640D20BE2C52E3247BC45A3DBD7FD30283C2B127E0A9775060EB9083CC6800606250B188
                                                                Malicious:false
                                                                Reputation:low
                                                                Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.9.6.8.<./.P.i.
                                                                Process:C:\Windows\SysWOW64\WerFault.exe
                                                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):4835
                                                                Entropy (8bit):4.2800978435649695
                                                                Encrypted:false
                                                                SSDEEP:48:cvIwWl8zs3Jg77aI9ykAWpW8VY7Ym8M4Jo0d8FSS+q8VgucVuzLz3mzdd:uIjfZI7J57VDJWMcQb3wdd
                                                                MD5:0E41B37DAD4E9F816340FB8C47455059
                                                                SHA1:91B6922E0D5BE6068EAB0FE64C0C7B74C63F256E
                                                                SHA-256:1AA575563428FDDCCDA389557232A4C50807F96C869808C192E46070AD8D6A1F
                                                                SHA-512:D150DE1242D29447C59129FDF08469FCBDE192B87134CF82990BCFE9AD439EEFAD3A0780CA6A237B22D43992259A2AE1D560D3209A4C81B97A9EAAB69B0851F7
                                                                Malicious:false
                                                                Reputation:low
                                                                Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="240760" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                                Process:C:\Windows\java.exe
                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
                                                                Category:dropped
                                                                Size (bytes):8192
                                                                Entropy (8bit):6.951274251785221
                                                                Encrypted:false
                                                                SSDEEP:192:tZWNqWKIzebvOZnzCj6juhEJS3/Uf/tpfmG62X9f3:tZ6qWTYvczfahX/UHtF6e9f3
                                                                MD5:B0FE74719B1B647E2056641931907F4A
                                                                SHA1:E858C206D2D1542A79936CB00D85DA853BFC95E2
                                                                SHA-256:BF316F51D0C345D61EAEE3940791B64E81F676E3BCA42BAD61073227BEE6653C
                                                                SHA-512:9C82E88264696D0DADEF9C0442AD8D1183E48F0FB355A4FC9BF4FA5DB4E27745039F98B1FD1FEBFF620A5DED6DD493227F00D7D2E74B19757685AA8655F921C2
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: Avira, Detection: 100%
                                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                • Antivirus: ReversingLabs, Detection: 100%
                                                                Joe Sandbox View:
                                                                • Filename: instruction.scr.exe, Detection: malicious, Browse
                                                                • Filename: .scr.exe, Detection: malicious, Browse
                                                                • Filename: message.com.exe, Detection: malicious, Browse
                                                                • Filename: letter.com.exe, Detection: malicious, Browse
                                                                • Filename: yBvb5QQho4.exe, Detection: malicious, Browse
                                                                • Filename: fsjRK2SX4t.exe, Detection: malicious, Browse
                                                                • Filename: SecuriteInfo.com.Win32.HLLM.MyDoom.54464.3216.exe, Detection: malicious, Browse
                                                                • Filename: .exe, Detection: malicious, Browse
                                                                • Filename: Cg7HLh2mus.exe, Detection: malicious, Browse
                                                                • Filename: AHnFoINkgu.exe, Detection: malicious, Browse
                                                                Reputation:moderate, very likely benign file
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......................................................................PE..L........................ .......@..pg...P...p....@..........................................................................p......................................................................................................................UPX0.....@..............................UPX1..... ...P......................@...UPX2.........p......................@..............................................................................................................................................................................................................................................................................................................................................................................................................................................1.24.UPX!....
                                                                Process:C:\Windows\java.exe
                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
                                                                Category:dropped
                                                                Size (bytes):42966
                                                                Entropy (8bit):5.920388487357334
                                                                Encrypted:false
                                                                SSDEEP:768:AEwHupU99d2JE0jNJJ83+8zzqgTdVY9/:AEwVs+0jNDY1qi/q
                                                                MD5:95640F1C78DDCBF8BB59462508624200
                                                                SHA1:D55EB8893FA888EC787DA8E9A7E31ED8842701C4
                                                                SHA-256:F422B1C4A887A35ED65DE77B05BC886529740D1D1860A55D6CD6593C07188CAB
                                                                SHA-512:F563148B1CFDB2EC8F3B7BF386580000FFFD06CCB115898D7150847F0F123E9311122F015071D62B14A449DF56D52FEB3FE8AB5E231391154787AF15FA132F87
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: Avira, Detection: 100%
                                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                Reputation:low
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...............................................................................................PE..L........................b..........$.............P.............................................................................0...................................................................................................................UPX0....................................UPX1.....`.......`..................@....rsrc................d..............@....text................r.............. ..............................................................................................................................................................................................................................................................................................................................................................................1.24.UPX!....
                                                                Process:C:\Windows\java.exe
                                                                File Type:ASCII text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):26
                                                                Entropy (8bit):3.95006375643621
                                                                Encrypted:false
                                                                SSDEEP:3:ggPYV:rPYV
                                                                MD5:187F488E27DB4AF347237FE461A079AD
                                                                SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                Malicious:false
                                                                Reputation:high, very likely benign file
                                                                Preview:[ZoneTransfer]....ZoneId=0
                                                                Process:C:\Windows\java.exe
                                                                File Type:Zip archive data, at least v1.0 to extract, compression method=store
                                                                Category:modified
                                                                Size (bytes):43312
                                                                Entropy (8bit):5.928781182600825
                                                                Encrypted:false
                                                                SSDEEP:768:6EwHupU99d2JE0jNJJ83+8zzqgTdVY9/8:6EwVs+0jNDY1qi/qk
                                                                MD5:54147806DA1F490FE95D19B6F22C3DCD
                                                                SHA1:308082EF41190E3F8B86BB79A2FA9C6B3D34516D
                                                                SHA-256:7FD11ACF8E708515FF23122494B4A93C185AC68916D7D0C783685017D7BA8130
                                                                SHA-512:4235DF32ABDD57938FEEDF44996B665F693441AC3D042D5DB9A87C23DFEEBCDFF4E67C65B609B61A9DC49C61EE7D557AF827E0582570233ECE306471216068C0
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                Preview:PK...........0.[........|...apple.com.htm .exeMZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...............................................................................................PE..L........................b..........$.............P.............................................................................0...................................................................................................................UPX0....................................UPX1.....`.......`..................@....rsrc................d..............@....text................r.............. .................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\Desktop\mail.txt .exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):128
                                                                Entropy (8bit):5.72714157928447
                                                                Encrypted:false
                                                                SSDEEP:3:/0lwNjv9b7JmZNqZrP6qRE+y0GK2vuIt/FIXVQ1:/0CNL9bczqhEasvuIt/aFg
                                                                MD5:22A7E53967B0F029542E990EA3E11197
                                                                SHA1:9E26F6253559198700DD5F323C617112FF6E07C5
                                                                SHA-256:0B49880FC4C2FE67B1277D3565AD7EA7B05597A05C61B388742E9FB3C3FE8700
                                                                SHA-512:CE6F067AD30AF554F3BFCEAEB00E8EE2479E1591188C9E95B381B8CBD958E8AF48F224626132A851C31F1381C4639C0B9F8E5EFD94747C0AA92F57908B2A30CE
                                                                Malicious:false
                                                                Preview:..`....\...P.NN.@;7.@.r...0..(..y...*8..F....W..F...F...F...F...0..j.Wa..Wa..Wa..Wa..W..c.b3.Wa...Pb....8.................p.P
                                                                Process:C:\Windows\SysWOW64\WerFault.exe
                                                                File Type:MS Windows registry file, NT/2000 or above
                                                                Category:dropped
                                                                Size (bytes):1835008
                                                                Entropy (8bit):4.4219129705118165
                                                                Encrypted:false
                                                                SSDEEP:6144:DSvfpi6ceLP/9skLmb0OT/WSPHaJG8nAgeMZMMhA2fX4WABlEnNH0uhiTw:OvloT/W+EZMM6DFyh03w
                                                                MD5:4E49B7D9962411B4E0AD80D0C7C6D1E6
                                                                SHA1:E1DCFF1D608745B7CDC4C46FB968A763B157B681
                                                                SHA-256:E9132810A998EF24E49ED2E0A536FCB928448FD3714BC79C2533B70D0FBD749C
                                                                SHA-512:1954028860C18633D6295EE42E7FE6D35766B16BBCB61F9344E7BA91947A0F777031CADE64254FADEC1F520E01EB9DA1A8972893613A0DE2EE46F27574078CD3
                                                                Malicious:false
                                                                Preview:regf>...>....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm~I7v9y................................................................................................................................................................................................................................................................................................................................................!B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\Desktop\mail.txt .exe
                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
                                                                Category:dropped
                                                                Size (bytes):42966
                                                                Entropy (8bit):5.921070575391315
                                                                Encrypted:false
                                                                SSDEEP:768:AEwHupU99d2JE0jNJJ83+8zzqgTdVY9/:AEwVs+0jNDY1qi/q
                                                                MD5:EDF4FF0BC5DA6DABD5E7B78113D73BD8
                                                                SHA1:AF49D2935B75627F6F748256F10C555D54040F2E
                                                                SHA-256:E16D377C12B63ACB694601B4BDE36D61839054409E7FAE1661FB051892D2ED36
                                                                SHA-512:68D5D0A81964EDA0B156EF4E82D26CA479D32B4A19DFBEC44B4058A6322E8C1F62DFF1EA4F7E61812470790A2029B285C365BF6DA69D31E99788FDD24E17E2F6
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: Avira, Detection: 100%
                                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                • Antivirus: ReversingLabs, Detection: 74%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...............................................................................................PE..L........................b..........$.............P.............................................................................0...................................................................................................................UPX0....................................UPX1.....`.......`..................@....rsrc................d..............@....text................r.............. ..............................................................................................................................................................................................................................................................................................................................................................................1.24.UPX!....
                                                                Process:C:\Users\user\Desktop\mail.txt .exe
                                                                File Type:ASCII text, with CRLF line terminators
                                                                Category:modified
                                                                Size (bytes):26
                                                                Entropy (8bit):3.95006375643621
                                                                Encrypted:false
                                                                SSDEEP:3:ggPYV:rPYV
                                                                MD5:187F488E27DB4AF347237FE461A079AD
                                                                SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                Malicious:false
                                                                Preview:[ZoneTransfer]....ZoneId=0
                                                                Process:C:\Users\user\Desktop\mail.txt .exe
                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
                                                                Category:dropped
                                                                Size (bytes):8192
                                                                Entropy (8bit):6.951274251785221
                                                                Encrypted:false
                                                                SSDEEP:192:tZWNqWKIzebvOZnzCj6juhEJS3/Uf/tpfmG62X9f3:tZ6qWTYvczfahX/UHtF6e9f3
                                                                MD5:B0FE74719B1B647E2056641931907F4A
                                                                SHA1:E858C206D2D1542A79936CB00D85DA853BFC95E2
                                                                SHA-256:BF316F51D0C345D61EAEE3940791B64E81F676E3BCA42BAD61073227BEE6653C
                                                                SHA-512:9C82E88264696D0DADEF9C0442AD8D1183E48F0FB355A4FC9BF4FA5DB4E27745039F98B1FD1FEBFF620A5DED6DD493227F00D7D2E74B19757685AA8655F921C2
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: Avira, Detection: 100%
                                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                • Antivirus: ReversingLabs, Detection: 100%
                                                                Joe Sandbox View:
                                                                • Filename: instruction.scr.exe, Detection: malicious, Browse
                                                                • Filename: .scr.exe, Detection: malicious, Browse
                                                                • Filename: message.com.exe, Detection: malicious, Browse
                                                                • Filename: letter.com.exe, Detection: malicious, Browse
                                                                • Filename: yBvb5QQho4.exe, Detection: malicious, Browse
                                                                • Filename: fsjRK2SX4t.exe, Detection: malicious, Browse
                                                                • Filename: SecuriteInfo.com.Win32.HLLM.MyDoom.54464.3216.exe, Detection: malicious, Browse
                                                                • Filename: .exe, Detection: malicious, Browse
                                                                • Filename: Cg7HLh2mus.exe, Detection: malicious, Browse
                                                                • Filename: AHnFoINkgu.exe, Detection: malicious, Browse
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......................................................................PE..L........................ .......@..pg...P...p....@..........................................................................p......................................................................................................................UPX0.....@..............................UPX1..... ...P......................@...UPX2.........p......................@..............................................................................................................................................................................................................................................................................................................................................................................................................................................1.24.UPX!....
                                                                File type:PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
                                                                Entropy (8bit):5.921070575391315
                                                                TrID:
                                                                • Win32 Executable (generic) a (10002005/4) 99.37%
                                                                • UPX compressed Win32 Executable (30571/9) 0.30%
                                                                • Win32 EXE Yoda's Crypter (26571/9) 0.26%
                                                                • Clipper DOS Executable (2020/12) 0.02%
                                                                • Generic Win/DOS Executable (2004/3) 0.02%
                                                                File name:mail.txt .exe
                                                                File size:42'966 bytes
                                                                MD5:edf4ff0bc5da6dabd5e7b78113d73bd8
                                                                SHA1:af49d2935b75627f6f748256f10c555d54040f2e
                                                                SHA256:e16d377c12b63acb694601b4bde36d61839054409e7fae1661fb051892d2ed36
                                                                SHA512:68d5d0a81964eda0b156ef4e82d26ca479d32b4a19dfbec44b4058a6322e8c1f62dff1ea4f7e61812470790a2029b285c365bf6da69d31e99788fdd24e17e2f6
                                                                SSDEEP:768:AEwHupU99d2JE0jNJJ83+8zzqgTdVY9/:AEwVs+0jNDY1qi/q
                                                                TLSH:D213D0983E4FB942D2850C382A03EEBABD52FD444D09268BB5B47B4BBCB1F96455CC46
                                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...............................................................................................PE..L........................b.........
                                                                Icon Hash:9361c4a092b08082
                                                                Entrypoint:0x510024
                                                                Entrypoint Section:.text
                                                                Digitally signed:false
                                                                Imagebase:0x500000
                                                                Subsystem:windows gui
                                                                Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                                                DLL Characteristics:
                                                                Time Stamp:0x0 [Thu Jan 1 00:00:00 1970 UTC]
                                                                TLS Callbacks:
                                                                CLR (.Net) Version:
                                                                OS Version Major:4
                                                                OS Version Minor:0
                                                                File Version Major:4
                                                                File Version Minor:0
                                                                Subsystem Version Major:4
                                                                Subsystem Version Minor:0
                                                                Import Hash:98cd465c2ab2841f9fd90d5e847563f4
                                                                Instruction
                                                                stc
                                                                jc 00007F64F48D6BD9h
                                                                pop ds
                                                                xor esi, dword ptr [ecx-49h]
                                                                cwde
                                                                leave
                                                                jmp 00007F64F48D6C32h
                                                                jmp 00007F64F48D6BD5h
                                                                cmp dl, byte ptr [ebp+0006E8D2h]
                                                                add byte ptr [eax], al
                                                                dec ecx
                                                                stc
                                                                mov dl, EDh
                                                                pop ecx
                                                                pop ebx
                                                                jc 00007F64F48D6BD9h
                                                                jne 00007F64F48D6B67h
                                                                jnl 00007F64F48D6BB5h
                                                                sbb dword ptr [edx-383C7EDCh], FFFFFFFFh
                                                                NameVirtual AddressVirtual Size Is in Section
                                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_IMPORT0xf5140x130.rsrc
                                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0xf0000x514.rsrc
                                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x101f70x8.text
                                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                UPX00x10000x80000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                UPX10x90000x60000x600095e7e2aea06fcf90374e473c416d1137False0.9812825520833334data7.938048293950375IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                .rsrc0xf0000x10000x80060d328df3a5dff05a8db261a75a0dedaFalse0.27880859375data2.6542421841999686IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                .text0x100000x1ff0x20049d1ec1d6eed7ca336017bbbebab7b7dFalse0.978515625data6.805048281534057IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                RT_ICON0xf0d80x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640EnglishUnited States0.2782258064516129
                                                                RT_ICON0xf3c40x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishUnited States0.4189189189189189
                                                                RT_GROUP_ICON0xf4f00x22dataEnglishUnited States1.0
                                                                DLLImport
                                                                KERNEL32.DLLLoadLibraryA, GetProcAddress, ExitProcess
                                                                ADVAPI32.dllRegCloseKey
                                                                MSVCRT.dllmemset
                                                                USER32.dllwsprintfA
                                                                WS2_32.dllgethostname
                                                                Language of compilation systemCountry where language is spokenMap
                                                                EnglishUnited States
                                                                TimestampSource PortDest PortSource IPDest IP
                                                                Mar 18, 2024 14:36:44.969635010 CET497041034192.168.2.5172.16.1.2
                                                                Mar 18, 2024 14:36:45.984373093 CET497041034192.168.2.5172.16.1.2
                                                                Mar 18, 2024 14:36:47.984302998 CET497041034192.168.2.5172.16.1.2
                                                                Mar 18, 2024 14:36:51.984210014 CET497041034192.168.2.5172.16.1.2
                                                                Mar 18, 2024 14:36:59.985518932 CET497041034192.168.2.5172.16.1.2
                                                                Mar 18, 2024 14:37:05.986304045 CET497131034192.168.2.5172.16.1.4
                                                                Mar 18, 2024 14:37:06.984210968 CET497131034192.168.2.5172.16.1.4
                                                                Mar 18, 2024 14:37:08.984183073 CET497131034192.168.2.5172.16.1.4
                                                                Mar 18, 2024 14:37:12.984208107 CET497131034192.168.2.5172.16.1.4
                                                                Mar 18, 2024 14:37:20.984225035 CET497131034192.168.2.5172.16.1.4
                                                                Mar 18, 2024 14:37:27.000973940 CET497141034192.168.2.5172.16.1.166
                                                                Mar 18, 2024 14:37:27.999804974 CET497141034192.168.2.5172.16.1.166
                                                                Mar 18, 2024 14:37:30.015433073 CET497141034192.168.2.5172.16.1.166
                                                                Mar 18, 2024 14:37:34.015373945 CET497141034192.168.2.5172.16.1.166
                                                                Mar 18, 2024 14:37:42.015577078 CET497141034192.168.2.5172.16.1.166
                                                                Mar 18, 2024 14:38:09.048047066 CET497291034192.168.2.510.0.2.15
                                                                Mar 18, 2024 14:38:10.046597004 CET497291034192.168.2.510.0.2.15
                                                                Mar 18, 2024 14:38:12.202869892 CET497291034192.168.2.510.0.2.15
                                                                Mar 18, 2024 14:38:16.202822924 CET497291034192.168.2.510.0.2.15
                                                                Mar 18, 2024 14:38:24.202841997 CET497291034192.168.2.510.0.2.15
                                                                Mar 18, 2024 14:39:33.891578913 CET497331034192.168.2.5172.16.1.4
                                                                Mar 18, 2024 14:39:34.937231064 CET497331034192.168.2.5172.16.1.4
                                                                Mar 18, 2024 14:39:36.937122107 CET497331034192.168.2.5172.16.1.4
                                                                Mar 18, 2024 14:39:40.937230110 CET497331034192.168.2.5172.16.1.4
                                                                Mar 18, 2024 14:39:49.046524048 CET497331034192.168.2.5172.16.1.4
                                                                Mar 18, 2024 14:40:16.673929930 CET497351034192.168.2.5172.16.1.4
                                                                Mar 18, 2024 14:40:17.749619007 CET497351034192.168.2.5172.16.1.4
                                                                Mar 18, 2024 14:40:19.843365908 CET497351034192.168.2.5172.16.1.4
                                                                Mar 18, 2024 14:40:23.843312979 CET497351034192.168.2.5172.16.1.4
                                                                Mar 18, 2024 14:40:31.937041998 CET497351034192.168.2.5172.16.1.4
                                                                Mar 18, 2024 14:40:37.938071012 CET497361034192.168.2.5172.16.1.170
                                                                Mar 18, 2024 14:40:38.999562025 CET497361034192.168.2.5172.16.1.170
                                                                Mar 18, 2024 14:40:40.999578953 CET497361034192.168.2.5172.16.1.170
                                                                Mar 18, 2024 14:40:45.000022888 CET497361034192.168.2.5172.16.1.170
                                                                Mar 18, 2024 14:40:52.999541998 CET497361034192.168.2.5172.16.1.170

                                                                Click to jump to process

                                                                Click to jump to process

                                                                Click to dive into process behavior distribution

                                                                Click to jump to process

                                                                Target ID:0
                                                                Start time:14:36:43
                                                                Start date:18/03/2024
                                                                Path:C:\Users\user\Desktop\mail.txt .exe
                                                                Wow64 process (32bit):true
                                                                Commandline:C:\Users\user\Desktop\mail.txt .exe
                                                                Imagebase:0x500000
                                                                File size:42'966 bytes
                                                                MD5 hash:EDF4FF0BC5DA6DABD5E7B78113D73BD8
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Yara matches:
                                                                • Rule: JoeSecurity_MyDoom, Description: Yara detected MyDoom, Source: 00000000.00000002.2729074743.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                                Reputation:low
                                                                Has exited:true

                                                                Target ID:1
                                                                Start time:14:36:43
                                                                Start date:18/03/2024
                                                                Path:C:\Windows\services.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:C:\Windows\services.exe
                                                                Imagebase:0x400000
                                                                File size:8'192 bytes
                                                                MD5 hash:B0FE74719B1B647E2056641931907F4A
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Antivirus matches:
                                                                • Detection: 100%, Avira
                                                                • Detection: 100%, Joe Sandbox ML
                                                                • Detection: 100%, ReversingLabs
                                                                Reputation:moderate
                                                                Has exited:false

                                                                Target ID:3
                                                                Start time:14:36:53
                                                                Start date:18/03/2024
                                                                Path:C:\Windows\java.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:"C:\Windows\java.exe"
                                                                Imagebase:0x500000
                                                                File size:42'966 bytes
                                                                MD5 hash:EDF4FF0BC5DA6DABD5E7B78113D73BD8
                                                                Has elevated privileges:false
                                                                Has administrator privileges:false
                                                                Programmed in:C, C++ or other language
                                                                Yara matches:
                                                                • Rule: JoeSecurity_MyDoom, Description: Yara detected MyDoom, Source: 00000003.00000002.4465723940.0000000000501000.00000040.00000001.01000000.00000006.sdmp, Author: Joe Security
                                                                Antivirus matches:
                                                                • Detection: 100%, Avira
                                                                • Detection: 100%, Joe Sandbox ML
                                                                • Detection: 74%, ReversingLabs
                                                                Reputation:low
                                                                Has exited:false

                                                                Target ID:4
                                                                Start time:14:36:53
                                                                Start date:18/03/2024
                                                                Path:C:\Users\user\AppData\Local\Temp\services.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:C:\Users\user\AppData\Local\Temp\services.exe
                                                                Imagebase:0x400000
                                                                File size:8'192 bytes
                                                                MD5 hash:B0FE74719B1B647E2056641931907F4A
                                                                Has elevated privileges:false
                                                                Has administrator privileges:false
                                                                Programmed in:C, C++ or other language
                                                                Antivirus matches:
                                                                • Detection: 100%, Avira
                                                                • Detection: 100%, Joe Sandbox ML
                                                                • Detection: 100%, ReversingLabs
                                                                Reputation:moderate
                                                                Has exited:false

                                                                Target ID:5
                                                                Start time:14:37:01
                                                                Start date:18/03/2024
                                                                Path:C:\Windows\services.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:"C:\Windows\services.exe"
                                                                Imagebase:0x400000
                                                                File size:8'192 bytes
                                                                MD5 hash:B0FE74719B1B647E2056641931907F4A
                                                                Has elevated privileges:false
                                                                Has administrator privileges:false
                                                                Programmed in:C, C++ or other language
                                                                Reputation:moderate
                                                                Has exited:false

                                                                Target ID:10
                                                                Start time:14:37:46
                                                                Start date:18/03/2024
                                                                Path:C:\Windows\SysWOW64\WerFault.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6968 -s 1264
                                                                Imagebase:0xe30000
                                                                File size:483'680 bytes
                                                                MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high
                                                                Has exited:true

                                                                Reset < >

                                                                  Execution Graph

                                                                  Execution Coverage:11.8%
                                                                  Dynamic/Decrypted Code Coverage:0%
                                                                  Signature Coverage:12%
                                                                  Total number of Nodes:651
                                                                  Total number of Limit Nodes:13
                                                                  execution_graph 2970 503280 WSAStartup 2975 5033a8 GetTickCount 2970->2975 2972 5032a0 memset 2976 5031e4 2972->2976 2975->2972 2998 502c90 2976->2998 2979 5031ff 2984 50327c ExitProcess 2979->2984 3009 5075e5 2979->3009 2990 503255 2994 50325a CreateThread 2990->2994 2991 50322c CreateThread 3038 5033b4 2991->3038 3254 50311c FindWindowA 2991->3254 2993 503240 Sleep 2993->2990 2995 50326e 2994->2995 3261 504c1b 2994->3261 3039 50565b GetCurrentThread SetThreadPriority 2995->3039 3000 502caa 2998->3000 2999 502d0f RegOpenKeyExA 2999->3000 3001 502d83 RegCloseKey 2999->3001 3000->2999 3003 502d3a 3000->3003 3002 502d7e 3001->3002 3002->2979 3006 502d8e memset gethostname lstrcat 3002->3006 3003->3002 3004 502d43 RegCreateKeyExA 3003->3004 3004->3003 3005 502d6c RegCloseKey 3004->3005 3005->3003 3007 502e0b lstrcat lstrcat CreateMutexA GetLastError 3006->3007 3008 502ddd 3006->3008 3007->2979 3008->3007 3046 50746b GetModuleFileNameA CreateFileA 3009->3046 3011 507627 GetTempPathA 3014 5075f6 3011->3014 3012 507619 GetWindowsDirectoryA 3012->3014 3013 50766b lstrcat lstrcat lstrcat CreateFileA 3013->3014 3015 5076c8 3013->3015 3014->3011 3014->3012 3014->3013 3014->3014 3016 503209 3014->3016 3057 50737c 3015->3057 3019 502e50 GetModuleFileNameA lstrcpy 3016->3019 3026 502eb6 3019->3026 3020 502ec1 GetWindowsDirectoryA 3020->3026 3021 502ecf GetTempPathA 3021->3026 3022 502ee7 lstrlen 3023 502f01 lstrcat 3022->3023 3024 502f0f lstrcat SetFileAttributesA CreateFileA 3022->3024 3023->3024 3024->3026 3027 502f7e GetFileAttributesA 3024->3027 3025 502f9d 3030 502fb0 RegOpenKeyExA 3025->3030 3026->3020 3026->3021 3026->3022 3026->3025 3026->3027 3028 502f51 CloseHandle DeleteFileA CopyFileA 3026->3028 3029 502f9f lstrcpy 3026->3029 3027->3026 3028->3026 3029->3025 3031 5030c2 lstrlen RegSetValueExA RegCloseKey 3030->3031 3032 5030ad RegOpenKeyExA 3030->3032 3033 5030eb 3031->3033 3032->3031 3032->3033 3034 50315c GetModuleHandleA 3033->3034 3035 5031e2 3034->3035 3036 5031cd GetProcAddress 3034->3036 3035->2990 3035->2991 3036->3035 3037 5031dc 3036->3037 3037->3035 3038->2993 3074 504ff8 RegOpenKeyExA 3039->3074 3043 505674 3091 5055b4 memset GetWindowsDirectoryA lstrcpy 3043->3091 3047 507545 3046->3047 3048 5074b8 3046->3048 3047->3014 3063 5073e8 GetTempPathA lstrlen 3048->3063 3050 5074c4 CreateFileA 3050->3047 3051 5074e6 3050->3051 3066 503697 SetFilePointer ReadFile 3051->3066 3054 50751b ReadFile 3055 507503 WriteFile 3054->3055 3056 507535 FindCloseChangeNotification CloseHandle 3054->3056 3055->3054 3056->3047 3058 507391 3057->3058 3059 5073ac WriteFile 3058->3059 3060 5073cd 3058->3060 3059->3058 3061 5073d1 WriteFile 3060->3061 3062 5073e4 FindCloseChangeNotification wsprintfA memset CreateProcessA 3060->3062 3061->3062 3062->3016 3064 507414 3063->3064 3065 507435 lstrcat lstrcat lstrcpy 3063->3065 3064->3065 3065->3050 3067 5036d4 SetFilePointer 3066->3067 3068 503772 SetFilePointer 3066->3068 3067->3068 3069 5036e7 ReadFile 3067->3069 3068->3054 3069->3068 3070 5036fd 3069->3070 3070->3068 3071 50371e SetFilePointer 3070->3071 3071->3068 3072 50373f ReadFile 3071->3072 3072->3068 3073 503758 3072->3073 3073->3068 3073->3072 3075 5050c8 memset RegQueryValueExA RegCloseKey 3074->3075 3076 505119 3074->3076 3075->3076 3077 50510c 3075->3077 3080 505449 3076->3080 3099 504eea CreateFileA 3077->3099 3081 505503 memset 3080->3081 3082 505521 GetWindowsDirectoryA 3081->3082 3083 505529 GetEnvironmentVariableA 3081->3083 3084 505534 3082->3084 3083->3084 3084->3081 3085 50553c lstrlen 3084->3085 3087 5055af 3084->3087 3088 505585 lstrcat 3084->3088 3089 50556a lstrcat lstrcat 3084->3089 3085->3084 3086 505556 lstrcat 3085->3086 3086->3084 3087->3043 3192 5052ad 3088->3192 3089->3088 3092 5052ad 82 API calls 3091->3092 3093 50560a 3092->3093 3094 50561b GetDriveTypeA 3093->3094 3096 505657 Sleep 3093->3096 3094->3093 3095 50562d Sleep 3094->3095 3097 5052ad 82 API calls 3095->3097 3096->3043 3098 505646 3097->3098 3098->3093 3100 504fee 3099->3100 3101 504f1f 3099->3101 3100->3076 3101->3100 3102 504f28 GetFileSize CreateFileMappingA 3101->3102 3103 504fe9 3102->3103 3104 504f4b 3102->3104 3106 504fdc CloseHandle 3103->3106 3104->3103 3105 504f54 MapViewOfFile 3104->3105 3107 504f67 3105->3107 3112 504f6c 3105->3112 3106->3100 3108 504fd2 CloseHandle 3107->3108 3108->3106 3109 504fcb UnmapViewOfFile 3109->3108 3110 504f7c memset 3110->3112 3112->3109 3112->3110 3113 50463f lstrlen 3112->3113 3114 50465b 3113->3114 3115 50466d 3113->3115 3121 5045cf 3114->3121 3115->3112 3117 504669 3117->3115 3118 50469a lstrlen GetProcessHeap RtlAllocateHeap 3117->3118 3119 50467e lstrcmpiA 3117->3119 3118->3115 3120 5046c5 memset GetTickCount lstrcpy 3118->3120 3119->3115 3119->3117 3120->3115 3131 50402f lstrlen 3121->3131 3123 50461e 3130 5045e1 3123->3130 3173 504449 3123->3173 3126 50462b 3126->3130 3177 50450e 3126->3177 3127 5045f2 lstrlen 3128 5045dc 3127->3128 3128->3123 3128->3127 3128->3130 3156 5042ce 3128->3156 3130->3117 3132 504044 3131->3132 3137 50404c 3131->3137 3132->3128 3133 504055 isspace 3135 504065 isalnum 3133->3135 3133->3137 3134 504090 3136 504092 strchr 3134->3136 3140 5040af 3134->3140 3135->3134 3135->3137 3136->3134 3136->3140 3137->3133 3137->3134 3138 5040fa 3138->3132 3142 50410b lstrlen 3138->3142 3139 5040bb isalnum 3139->3140 3141 5040de tolower 3139->3141 3140->3138 3140->3139 3140->3141 3141->3140 3143 504150 3142->3143 3144 50411a isspace 3143->3144 3149 50416d 3143->3149 3144->3143 3145 50412a strchr 3144->3145 3145->3143 3148 504140 isalnum 3145->3148 3146 5041c2 lstrlen 3155 504209 3146->3155 3147 50417f isalnum 3147->3149 3148->3143 3149->3146 3149->3147 3152 5041ad tolower 3149->3152 3150 5041d3 isspace 3153 5041e5 strchr 3150->3153 3150->3155 3151 504224 lstrlen 3151->3132 3152->3149 3154 5041fa isalnum 3153->3154 3153->3155 3154->3155 3155->3150 3155->3151 3157 5042d7 3156->3157 3158 5042da 3156->3158 3157->3128 3159 50430a lstrlen 3158->3159 3172 504417 3158->3172 3160 504315 3159->3160 3161 504339 lstrlen 3160->3161 3160->3172 3162 504354 3161->3162 3161->3172 3162->3172 3183 504244 3162->3183 3165 504383 3166 50438c lstrlen 3165->3166 3165->3172 3167 50439d 3166->3167 3166->3172 3168 5043a2 lstrlen 3167->3168 3167->3172 3170 5043a7 3168->3170 3169 5043fa lstrlen lstrlen 3171 504425 lstrlen 3169->3171 3169->3172 3170->3169 3170->3172 3171->3172 3172->3128 3174 50445a 3173->3174 3175 50447a tolower 3174->3175 3176 504469 3174->3176 3175->3174 3175->3176 3176->3126 3178 504520 3177->3178 3179 50452a tolower 3178->3179 3182 504546 3178->3182 3179->3178 3179->3182 3180 50457d 3180->3130 3181 504561 lstrcmp 3181->3180 3181->3182 3182->3180 3182->3181 3184 504279 3183->3184 3186 504252 3183->3186 3185 5042b8 3184->3185 3191 504286 3184->3191 3188 5042b3 lstrlen 3185->3188 3189 5042bf lstrcpy 3185->3189 3186->3184 3187 50425d isspace 3186->3187 3187->3186 3188->3165 3188->3172 3189->3188 3190 504299 isspace 3190->3191 3191->3188 3191->3190 3193 5052bf 3192->3193 3194 5052cb 3192->3194 3193->3194 3195 5052d2 Sleep 3193->3195 3196 5052e5 lstrcpy lstrlen 3193->3196 3194->3084 3195->3193 3197 505310 lstrcat 3196->3197 3198 505322 lstrcat memset 3196->3198 3197->3198 3205 50534c 3198->3205 3199 505358 FindFirstFileA 3199->3205 3200 50537b FindNextFileA 3201 505438 FindClose 3200->3201 3200->3205 3201->3194 3202 5053b0 lstrcpy lstrlen 3203 5053e1 lstrcat 3202->3203 3204 5053cf lstrcat 3202->3204 3203->3205 3206 5053fe Sleep 3203->3206 3204->3203 3205->3194 3205->3199 3205->3200 3205->3202 3209 505131 3205->3209 3208 5052ad 68 API calls 3206->3208 3208->3205 3210 505299 3209->3210 3212 505141 3209->3212 3210->3205 3211 505167 3211->3210 3214 505278 Sleep 3211->3214 3215 50528c 3211->3215 3212->3211 3213 50516e lstrcpyn CharLowerA 3212->3213 3213->3211 3214->3211 3216 505291 3215->3216 3217 50529b 3215->3217 3221 504e00 GetProcessHeap RtlAllocateHeap 3216->3221 3217->3210 3219 5052a0 3217->3219 3220 504eea 48 API calls 3219->3220 3220->3210 3222 504e23 3221->3222 3223 504e2b CreateFileA 3221->3223 3222->3210 3224 504ed0 3223->3224 3230 504e50 3223->3230 3225 504ed3 GetProcessHeap RtlFreeHeap 3224->3225 3225->3222 3226 504eb6 ReadFile 3227 504ec2 FindCloseChangeNotification 3226->3227 3226->3230 3227->3225 3230->3224 3230->3226 3230->3227 3231 504c29 3230->3231 3237 504d0c 3230->3237 3236 504c38 3231->3236 3234 504d05 3234->3230 3235 504c8b memcpy 3235->3236 3236->3234 3236->3235 3241 50343e 3236->3241 3245 5034b8 3236->3245 3238 504df8 3237->3238 3239 504d24 3237->3239 3238->3230 3239->3238 3240 50463f 40 API calls 3239->3240 3240->3239 3242 50344b 3241->3242 3243 50347c 3241->3243 3242->3243 3244 503454 tolower tolower 3242->3244 3243->3236 3244->3242 3244->3243 3246 503618 3245->3246 3253 5034d1 3245->3253 3246->3236 3247 5034ed isdigit 3247->3253 3248 50353f memset 3249 503562 WideCharToMultiByte 3248->3249 3248->3253 3249->3253 3250 503582 lstrlen 3251 50359b lstrlen 3250->3251 3252 5035ec lstrlen memcpy 3250->3252 3251->3253 3252->3253 3253->3246 3253->3247 3253->3248 3253->3250 3253->3252 3264 5030f0 3254->3264 3257 5030f0 3 API calls 3258 503142 FindWindowA 3257->3258 3259 5030f0 3 API calls 3258->3259 3260 503152 RtlExitUserThread 3259->3260 3267 504ae2 3261->3267 3265 503119 FindWindowA 3264->3265 3266 5030fc PostMessageA PostMessageA PostMessageA 3264->3266 3265->3257 3266->3265 3270 504af2 3267->3270 3269 504b00 Sleep 3269->3270 3270->3269 3271 504b99 CreateThread 3270->3271 3272 504b61 3270->3272 3275 504bec GetTickCount 3270->3275 3278 503620 GetModuleHandleA 3270->3278 3271->3272 3338 504a37 InterlockedIncrement GetCurrentThread SetThreadPriority 3271->3338 3272->3270 3274 504bba CloseHandle 3272->3274 3283 504a85 3272->3283 3274->3269 3275->3270 3276 504bfd 3275->3276 3276->3269 3288 5047b7 3276->3288 3279 503672 GetProcAddress 3278->3279 3280 503664 LoadLibraryA 3278->3280 3281 503682 3279->3281 3282 503687 InternetGetConnectedState 3279->3282 3280->3279 3280->3281 3281->3270 3282->3270 3284 504a94 3283->3284 3285 504adf 3284->3285 3286 504a9a GetTickCount 3284->3286 3287 504ac1 GetProcessHeap HeapFree 3284->3287 3285->3272 3286->3284 3286->3287 3287->3284 3289 50486e 3288->3289 3290 5047d2 3288->3290 3289->3276 3290->3289 3291 50481c lstrcpyn lstrlen GetProcessHeap RtlAllocateHeap 3290->3291 3291->3289 3292 50484d lstrcpy CreateThread 3291->3292 3292->3289 3293 50477f GetCurrentThread SetThreadPriority 3292->3293 3294 504797 3293->3294 3295 5047ae RtlExitUserThread 3293->3295 3298 504708 memset 3294->3298 3306 507730 memset memset 3298->3306 3301 504741 memset 3330 507940 3301->3330 3302 50477b GetProcessHeap HeapFree 3302->3295 3305 504e00 57 API calls 3305->3302 3309 507763 3306->3309 3307 507771 lstrcpy 3311 5077fc 3307->3311 3309->3307 3310 50779a 3309->3310 3313 5077b0 lstrcat 3310->3313 3314 5077bb 3310->3314 3312 50781f wsprintfA 3311->3312 3315 507835 3312->3315 3313->3314 3316 5077f1 lstrcat 3314->3316 3317 5077cb lstrcat 3314->3317 3318 50784d wsprintfA 3315->3318 3319 50789f 3315->3319 3316->3311 3320 5077db 3317->3320 3329 50785f 3318->3329 3321 5078a7 wsprintfA 3319->3321 3322 5078df 3319->3322 3320->3316 3325 5077e6 lstrcat 3320->3325 3321->3329 3323 5078e7 wsprintfA 3322->3323 3324 50792f 3322->3324 3323->3329 3326 507937 wsprintfA 3324->3326 3325->3316 3328 504735 3326->3328 3327 507920 lstrlen 3327->3326 3328->3301 3328->3302 3329->3327 3329->3328 3331 507952 3330->3331 3332 507955 GetModuleHandleA 3330->3332 3331->3332 3333 507970 GetProcAddress 3332->3333 3334 507965 LoadLibraryA 3332->3334 3335 504763 3333->3335 3336 507985 3333->3336 3334->3333 3334->3335 3335->3302 3335->3305 3336->3335 3337 5079a0 lstrcpy 3336->3337 3337->3335 3339 504a66 3338->3339 3340 504a5c 3338->3340 3342 504a74 InterlockedDecrement 3339->3342 3343 504a7b RtlExitUserThread 3339->3343 3344 5049c5 3340->3344 3342->3343 3345 5049d9 3344->3345 3346 5049ea lstrcpyn 3345->3346 3349 504a28 3345->3349 3354 504971 3346->3354 3348 504a02 3348->3349 3368 506966 3348->3368 3349->3339 3353 504a1f GlobalFree 3353->3349 3414 504874 3354->3414 3356 50497c 3357 504981 3356->3357 3419 503ff8 3356->3419 3357->3348 3360 5049a2 3422 50489d 3360->3422 3361 504994 GetTickCount 3361->3360 3363 50499e 3361->3363 3363->3348 3365 504874 lstrcmpiA 3366 5049af 3365->3366 3366->3363 3430 50400c 3366->3430 3369 504a0f 3368->3369 3370 50697e lstrlen 3368->3370 3369->3349 3395 5071f8 3369->3395 3370->3369 3371 50698e memset 3370->3371 3372 5069af 3371->3372 3441 505a21 3372->3441 3374 5069f2 3444 505a45 3374->3444 3383 506a25 GlobalAlloc 3384 506a75 3383->3384 3385 506a57 3383->3385 3387 506a8a 3384->3387 3388 506a7d DeleteFileA 3384->3388 3515 5067c2 3385->3515 3387->3369 3390 506a8f GlobalFree 3387->3390 3388->3387 3389 506a64 3520 506895 lstrlen wsprintfA lstrlen wsprintfA lstrlen 3389->3520 3390->3369 3393 506a9c 3393->3369 3394 506aa4 DeleteFileA 3393->3394 3394->3369 3396 507253 3395->3396 3397 507208 3395->3397 3396->3353 3610 506b89 3397->3610 3399 50721e 3399->3396 3400 507258 lstrcpy 3399->3400 3401 507271 3400->3401 3404 507280 htons 3401->3404 3410 5072e8 3401->3410 3413 5072aa 3401->3413 3616 506b54 inet_addr 3401->3616 3403 5072fd lstrcpy 3403->3413 3620 506e01 3404->3620 3405 507367 3649 507093 wsprintfA wsprintfA RegOpenKeyExA 3405->3649 3407 5072cd lstrcpy lstrcat 3407->3413 3408 506b54 2 API calls 3408->3413 3410->3353 3411 507328 htons 3412 506e01 16 API calls 3411->3412 3412->3413 3413->3403 3413->3405 3413->3407 3413->3408 3413->3410 3413->3411 3415 50488f 3414->3415 3416 504895 3415->3416 3417 50487d lstrcmpiA 3415->3417 3416->3356 3417->3415 3418 504899 3417->3418 3418->3356 3434 503e35 GetModuleHandleA 3419->3434 3423 5048da GetProcessHeap RtlAllocateHeap 3422->3423 3426 5048af 3422->3426 3424 5048f4 3423->3424 3425 5048f9 memset lstrcpyn GetTickCount 3423->3425 3424->3365 3425->3424 3426->3423 3426->3424 3427 504936 GetTickCount 3426->3427 3428 50400c 2 API calls 3427->3428 3429 504953 lstrcpyn 3428->3429 3429->3424 3431 504014 3430->3431 3432 50402d 3430->3432 3433 504015 GetProcessHeap HeapFree 3431->3433 3432->3363 3433->3432 3433->3433 3435 503e56 GetProcAddress 3434->3435 3436 503e4b LoadLibraryA 3434->3436 3437 503e7a 3435->3437 3438 503e66 3435->3438 3436->3435 3436->3437 3437->3360 3437->3361 3438->3437 3439 503e98 GetProcessHeap RtlAllocateHeap 3438->3439 3439->3437 3440 503eae memset lstrcpyn 3439->3440 3440->3438 3442 505a27 lstrcpy 3441->3442 3442->3374 3445 505a60 3444->3445 3446 505b25 3444->3446 3448 505ab7 lstrcpy lstrcat 3445->3448 3447 505b61 3446->3447 3452 505bba lstrcpy 3446->3452 3449 505b95 lstrcat lstrcpy 3447->3449 3453 505ad1 3448->3453 3450 505bd2 3449->3450 3455 505bf9 strstr 3450->3455 3451 505af5 lstrcat lstrcat lstrcat lstrcpy lstrcat 3451->3450 3454 505a21 lstrcpy 3452->3454 3453->3451 3454->3450 3456 505c13 3455->3456 3457 505c6e 3455->3457 3456->3457 3458 505c26 3456->3458 3461 505d08 lstrcpy 3457->3461 3462 505c81 3457->3462 3459 505c48 lstrcpy lstrcpy lstrcpy 3458->3459 3460 505dc3 3459->3460 3468 505dc7 3460->3468 3461->3462 3463 505d63 lstrcpy wsprintfA 3462->3463 3464 505d99 3463->3464 3465 505db7 3464->3465 3466 505dbc CharUpperA 3464->3466 3467 505dac CharUpperBuffA 3464->3467 3465->3460 3465->3466 3466->3460 3467->3460 3469 505dd0 3468->3469 3470 505e98 lstrcpy 3469->3470 3471 505dde 3469->3471 3470->3471 3472 505ece 3471->3472 3473 505ed3 CharUpperA 3471->3473 3474 505ebd CharUpperBuffA 3471->3474 3472->3473 3475 505ee0 3472->3475 3473->3475 3474->3475 3476 505faf 3475->3476 3477 505fcb 3476->3477 3478 505ff0 GetModuleFileNameA 3477->3478 3479 506014 GetTempPathA 3477->3479 3529 505f2a GetTempPathA GetTempFileNameA CopyFileA 3478->3529 3481 506036 GetTempFileNameA GetModuleFileNameA CopyFileA 3479->3481 3482 50632b 3479->3482 3534 505ee3 CreateFileA 3481->3534 3482->3369 3482->3383 3485 5062d0 CreateFileA 3487 5062f7 3485->3487 3495 50631d 3485->3495 3486 50600e 3486->3485 3491 50625d GetTempPathA GetTempFileNameA 3486->3491 3488 5062fc GetFileSize CloseHandle 3487->3488 3487->3495 3488->3482 3488->3495 3489 5060b8 3492 5060e2 3489->3492 3493 5060ef lstrcpy lstrcat 3489->3493 3490 506339 DeleteFileA 3490->3482 3494 5057e6 27 API calls 3491->3494 3541 5057e6 CreateFileA 3492->3541 3504 50611c 3493->3504 3496 50629f 3494->3496 3495->3482 3495->3490 3497 5062b5 DeleteFileA lstrcpy 3496->3497 3498 5062a6 DeleteFileA 3496->3498 3497->3485 3498->3485 3501 506219 DeleteFileA wsprintfA 3501->3486 3502 50614f lstrcat 3503 50615d 3502->3503 3505 506185 lstrcat 3503->3505 3506 506172 lstrcat 3503->3506 3504->3502 3507 506198 3505->3507 3506->3505 3506->3506 3508 5061d7 lstrcat 3507->3508 3509 5061ac 3507->3509 3512 5061c1 lstrcat 3508->3512 3510 5061c8 lstrcat 3509->3510 3511 5061af 3509->3511 3510->3512 3511->3512 3513 5061b2 lstrcat 3511->3513 3512->3492 3513->3512 3516 5067de 3515->3516 3517 5067ea 8 API calls 3516->3517 3576 5032cb 3517->3576 3519 506869 lstrcat lstrlen wsprintfA lstrcat 3519->3389 3582 506518 3520->3582 3522 5068ea lstrcat 3523 5068fd 3522->3523 3524 506915 lstrlen wsprintfA lstrlen 3523->3524 3586 50666d CreateFileA 3524->3586 3527 506947 3527->3384 3527->3393 3528 50694c lstrlen wsprintfA 3528->3527 3530 505ee3 18 API calls 3529->3530 3531 505f87 3530->3531 3532 505f93 DeleteFileA 3531->3532 3533 505f9a lstrcpy 3531->3533 3532->3533 3533->3486 3535 505f07 3534->3535 3536 505f28 GetTempPathA GetTempFileNameA 3534->3536 3537 503697 6 API calls 3535->3537 3536->3482 3536->3489 3538 505f11 SetFilePointer 3537->3538 3557 50754a 3538->3557 3542 505a19 3541->3542 3543 50581c 3541->3543 3542->3490 3542->3501 3543->3542 3544 505824 CreateFileA 3543->3544 3545 505843 3544->3545 3546 505a14 3544->3546 3545->3546 3548 50584b memset memset memset 3545->3548 3547 505a07 CloseHandle 3546->3547 3547->3542 3565 505717 GetSystemTime 3548->3565 3552 5058b7 8 API calls 3553 50595b ReadFile 3552->3553 3554 50593c 3553->3554 3555 50597c 6 API calls 3553->3555 3554->3555 3556 505941 WriteFile 3554->3556 3555->3547 3556->3553 3558 5073e8 5 API calls 3557->3558 3559 507560 CreateFileA 3558->3559 3560 505f20 CloseHandle 3559->3560 3561 507588 3559->3561 3560->3536 3562 5075cd ReadFile 3561->3562 3563 5075a5 WriteFile 3562->3563 3564 5075d7 CloseHandle 3562->3564 3563->3562 3564->3560 3566 50574a 3565->3566 3567 505772 SetFilePointer 3566->3567 3568 5057b9 ReadFile 3567->3568 3569 5057d2 SetFilePointer 3568->3569 3571 50579c 3568->3571 3569->3552 3571->3568 3571->3569 3572 5056d5 3571->3572 3573 5056de 3572->3573 3575 5056e3 3572->3575 3574 50568c malloc 3573->3574 3574->3575 3575->3571 3577 5032e8 FileTimeToLocalFileTime FileTimeToSystemTime 3576->3577 3578 5032dc GetLocalTime 3576->3578 3579 503303 GetTimeZoneInformation 3577->3579 3578->3579 3580 503319 wsprintfA 3579->3580 3580->3519 3584 506521 3582->3584 3583 50652f 3583->3522 3584->3583 3593 50641f 3584->3593 3587 50669c 3586->3587 3592 5066a4 3586->3592 3587->3527 3587->3528 3588 5066bb ReadFile 3590 50677d 3588->3590 3588->3592 3589 5067ab CloseHandle 3589->3587 3590->3589 3591 506767 memset 3591->3592 3592->3588 3592->3591 3597 50642d 3593->3597 3595 506509 lstrlen 3595->3597 3596 506452 3596->3583 3597->3596 3598 50641f 7 API calls 3597->3598 3599 506346 3597->3599 3598->3597 3600 5063b1 3599->3600 3604 506351 3599->3604 3601 5063b6 3600->3601 3608 5063d3 3600->3608 3602 5063bb 3601->3602 3601->3604 3605 5032cb GetLocalTime FileTimeToLocalFileTime FileTimeToSystemTime GetTimeZoneInformation wsprintfA 3602->3605 3607 506361 3602->3607 3603 506381 lstrcpy 3603->3595 3604->3603 3604->3607 3606 5063c8 3605->3606 3606->3595 3607->3595 3609 506400 wsprintfA 3608->3609 3609->3607 3613 506ba1 3610->3613 3615 506c8e 3610->3615 3611 506c38 lstrlen 3612 506c4e lstrlen 3611->3612 3611->3613 3612->3613 3613->3611 3614 506c6d CharLowerA lstrcmpiA 3613->3614 3613->3615 3614->3613 3614->3615 3615->3399 3617 506b6c gethostbyname 3616->3617 3618 506b63 3616->3618 3619 506b77 3617->3619 3618->3617 3618->3619 3619->3401 3621 506b89 4 API calls 3620->3621 3622 506e25 3621->3622 3623 506b89 4 API calls 3622->3623 3626 506e82 3622->3626 3624 506e4d 3623->3624 3625 506e8a lstrcpy socket 3624->3625 3624->3626 3625->3626 3627 506eb8 connect 3625->3627 3626->3401 3628 50707a closesocket 3627->3628 3629 506ecd 3627->3629 3628->3626 3660 506d65 3629->3660 3633 506d65 5 API calls 3634 506f12 3633->3634 3635 506f39 3634->3635 3636 506d65 5 API calls 3634->3636 3635->3628 3637 506d65 5 API calls 3635->3637 3636->3635 3638 506f6e 3637->3638 3638->3628 3639 506d65 5 API calls 3638->3639 3640 506fa0 3639->3640 3640->3628 3641 506d65 5 API calls 3640->3641 3643 506fc1 3641->3643 3642 507042 send 3644 506d65 5 API calls 3642->3644 3643->3628 3643->3642 3645 507017 send 3643->3645 3646 507028 send 3643->3646 3647 50705b 3644->3647 3645->3646 3646->3628 3646->3643 3647->3628 3648 506d65 5 API calls 3647->3648 3648->3628 3650 507103 3649->3650 3651 5070fb 3649->3651 3652 5071d5 RegEnumKeyA 3650->3652 3656 5071bc RegCloseKey 3650->3656 3657 506b54 2 API calls 3650->3657 3658 50718f htons 3650->3658 3651->3410 3653 5071e2 RegCloseKey 3652->3653 3654 507123 RegOpenKeyExA 3652->3654 3653->3651 3654->3650 3655 507148 memset RegQueryValueExA 3654->3655 3655->3650 3655->3656 3656->3650 3656->3653 3657->3650 3659 506e01 16 API calls 3658->3659 3659->3650 3661 506d78 wvsprintfA lstrlen send 3660->3661 3664 506daa 3660->3664 3661->3664 3663 506dfb 3663->3628 3663->3633 3664->3663 3665 506ab8 3664->3665 3666 506b41 3665->3666 3669 506acf 3665->3669 3666->3664 3667 506b1c recv 3667->3666 3667->3669 3668 506adf select 3668->3666 3668->3667 3669->3666 3669->3667 3669->3668 3678 503ef3 GetModuleHandleA 3679 503f11 LoadLibraryA 3678->3679 3680 503f0c 3678->3680 3681 503f18 3679->3681 3680->3679 3680->3681 3682 503ff1 3681->3682 3683 503f29 GetProcAddress 3681->3683 3683->3682 3684 503f3f GetProcessHeap RtlAllocateHeap 3683->3684 3688 503f63 3684->3688 3685 503fde GetProcessHeap HeapFree 3685->3682 3686 503f80 htons inet_addr 3687 503fa5 gethostbyname 3686->3687 3686->3688 3687->3688 3688->3682 3688->3685 3688->3686 3688->3687 3690 503dff 3688->3690 3692 503e06 3690->3692 3693 503e30 3692->3693 3694 503e22 Sleep 3692->3694 3695 503b7c GetProcessHeap RtlAllocateHeap 3692->3695 3693->3688 3694->3692 3694->3693 3696 503bb3 socket 3695->3696 3697 503bac 3695->3697 3698 503de7 GetProcessHeap HeapFree 3696->3698 3699 503bce 3696->3699 3697->3692 3698->3697 3699->3698 3707 503bd7 3699->3707 3700 503bf5 htons 3715 503819 memset GetTickCount htons 3700->3715 3702 503c1b select 3704 503c4d memset recv 3702->3704 3702->3707 3703 503db8 3705 503dc7 GetProcessHeap HeapFree closesocket 3703->3705 3704->3707 3705->3697 3706 503c7d htons 3706->3703 3706->3707 3707->3700 3707->3702 3707->3703 3707->3705 3707->3706 3708 503c9e htons 3707->3708 3711 503d08 GetProcessHeap RtlAllocateHeap 3707->3711 3714 503d61 GetProcessHeap HeapFree 3707->3714 3718 503a35 3707->3718 3732 503a16 3707->3732 3708->3703 3708->3707 3711->3707 3712 503d23 memset htons 3711->3712 3728 503983 3712->3728 3714->3707 3716 5038d7 htons htons sendto 3715->3716 3717 503881 3715->3717 3716->3707 3717->3716 3719 503a56 3718->3719 3721 503a4f 3718->3721 3736 50392a htons 3719->3736 3721->3707 3722 503aa2 memset 3723 503983 htons 3722->3723 3727 503a66 3723->3727 3724 503ad8 htons htons htons 3724->3721 3725 503b13 GetProcessHeap RtlAllocateHeap 3724->3725 3725->3721 3726 503b31 memset 3725->3726 3726->3727 3727->3721 3727->3722 3727->3724 3729 5039f5 3728->3729 3731 50399b 3728->3731 3729->3707 3730 5039d5 htons 3730->3729 3730->3731 3731->3729 3731->3730 3733 503a1a 3732->3733 3735 503a33 3732->3735 3734 503a1b GetProcessHeap HeapFree 3733->3734 3734->3734 3734->3735 3735->3707 3737 50397d 3736->3737 3738 503948 3736->3738 3737->3727 3738->3737 3739 50396e htons 3738->3739 3739->3737 3739->3738 3670 5011c9 3671 5011e3 3670->3671 3672 502d0f RegOpenKeyExA 3671->3672 3674 502d3a 3671->3674 3672->3671 3673 502d83 RegCloseKey 3672->3673 3675 502d7e 3673->3675 3674->3675 3676 502d43 RegCreateKeyExA 3674->3676 3676->3674 3677 502d6c RegCloseKey 3676->3677 3677->3674

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 6 5052ad-5052bd 7 5052cb-5052cd 6->7 8 5052bf-5052c4 6->8 10 5052ce-5052d1 7->10 8->7 9 5052c6-5052c9 8->9 9->7 11 5052dd-5052e3 9->11 12 5052d2-5052d7 Sleep 11->12 13 5052e5-50530e lstrcpy lstrlen 11->13 12->11 14 505310-50531c lstrcat 13->14 15 505322-505349 lstrcat memset 13->15 14->15 16 50534c-505356 15->16 17 505358-50536b FindFirstFileA 16->17 18 50537b-505386 FindNextFileA 16->18 19 505370-505373 17->19 20 50536d 17->20 21 505438-50543b FindClose 18->21 22 50538c-505393 18->22 23 505441-505444 19->23 24 505379 19->24 20->19 21->23 25 5053b0-5053cd lstrcpy lstrlen 22->25 26 505395-50539c 22->26 23->10 24->22 28 5053e1-5053fc lstrcat 25->28 29 5053cf-5053db lstrcat 25->29 26->16 27 50539e-5053a5 26->27 27->25 30 5053a7-5053ae 27->30 31 50541e-50542b call 505131 28->31 32 5053fe-505412 Sleep call 5052ad 28->32 29->28 30->16 30->25 35 505430-505433 31->35 36 505417-505419 32->36 35->16 36->16
                                                                  APIs
                                                                  • Sleep.KERNEL32(00000800,75918A60,00000184), ref: 005052D7
                                                                  • lstrcpy.KERNEL32(?,?), ref: 005052F4
                                                                  • lstrlen.KERNEL32(?), ref: 00505304
                                                                  • lstrcat.KERNEL32(?,00501190), ref: 0050531C
                                                                  • lstrcat.KERNEL32(?,*.*), ref: 0050532E
                                                                  • memset.MSVCRT ref: 00505341
                                                                  • FindFirstFileA.KERNELBASE(?,00000010), ref: 0050535F
                                                                  • FindNextFileA.KERNELBASE(?,?), ref: 0050537E
                                                                  • lstrcpy.KERNEL32(?,?), ref: 005053BA
                                                                  • lstrlen.KERNEL32(?), ref: 005053C3
                                                                  • lstrcat.KERNEL32(?,00501190), ref: 005053DB
                                                                  • lstrcat.KERNEL32(?,0000002E), ref: 005053EF
                                                                  • Sleep.KERNELBASE(0000004B), ref: 00505400
                                                                  • FindClose.KERNELBASE(?), ref: 0050543B
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2729074743.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000000.00000002.2729050946.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729145703.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729168277.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_500000_mail.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: lstrcat$Find$FileSleeplstrcpylstrlen$CloseFirstNextmemset
                                                                  • String ID: *.*$.$.
                                                                  • API String ID: 56755240-1892373925
                                                                  • Opcode ID: 4a0de44cde8d01dfa769ae8b9abc51166f6d7055e572fb8d163d85066ff3cfd8
                                                                  • Instruction ID: dd7eaa64cc3021d8f9cf9a778dce5b9b88d54ccfb1cc30c989f9fa4e0a5d9972
                                                                  • Opcode Fuzzy Hash: 4a0de44cde8d01dfa769ae8b9abc51166f6d7055e572fb8d163d85066ff3cfd8
                                                                  • Instruction Fuzzy Hash: 3B417B71C40A5DEBDF219BA0DC4DBDEBF7CBB05301F1084A2E645A2090E7749A89DF95
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • RegOpenKeyExA.KERNELBASE(?,Software\Microsoft\Daemon,00000000,00020019,?), ref: 00502D27
                                                                  • RegCreateKeyExA.KERNELBASE(00000002,00000053,00000000,00000000,00000000,00020006,00000000,?,?), ref: 00502D62
                                                                  • RegCloseKey.KERNELBASE(?), ref: 00502D6F
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2729074743.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000000.00000002.2729050946.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729145703.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729168277.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_500000_mail.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CloseCreateOpen
                                                                  • String ID: "%s"$"%s"$"%s"$%P$1&lo$Software\Microsoft\Daemon$UTF-$fp-t$mss&
                                                                  • API String ID: 199004384-1742729895
                                                                  • Opcode ID: 54c313d72eed5809ea717c3aaa2ef99b5af84961543d7f94290a47e14dd327ee
                                                                  • Instruction ID: 5ddebe979ae4482ff55674c5fd03efcc6dad104ab151d763a66a24a0e48becba
                                                                  • Opcode Fuzzy Hash: 54c313d72eed5809ea717c3aaa2ef99b5af84961543d7f94290a47e14dd327ee
                                                                  • Instruction Fuzzy Hash: 3A13CA6284DBD54ECB278B704A6E26D7FA5BB23310B1D49CEC8818B1F3D2589905D36F
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 923 504e00-504e21 GetProcessHeap RtlAllocateHeap 924 504e23-504e26 923->924 925 504e2b-504e4a CreateFileA 923->925 926 504ee7-504ee9 924->926 927 504ed0-504ed2 925->927 928 504e50-504e53 925->928 929 504ed3-504ee6 GetProcessHeap RtlFreeHeap 927->929 928->927 930 504e55-504e71 928->930 929->926 931 504eb6-504ec0 ReadFile 930->931 932 504ec2-504ece FindCloseChangeNotification 931->932 933 504e73-504e75 931->933 932->929 934 504e77-504e79 933->934 935 504e7c-504e9f call 504c29 call 504d0c 933->935 934->935 940 504ea1-504ea8 935->940 941 504eaa-504eb3 935->941 940->932 940->941 941->931
                                                                  APIs
                                                                  • GetProcessHeap.KERNEL32(00000000,00008010,?,?,?,?,0050477B,00000000), ref: 00504E0F
                                                                  • RtlAllocateHeap.NTDLL(00000000), ref: 00504E16
                                                                  • CreateFileA.KERNELBASE({GP,80000000,00000003,00000000,00000003,00000080,00000000,00000200,?,?,?,?,0050477B,00000000), ref: 00504E3F
                                                                  • ReadFile.KERNELBASE(00000000,?,00008000,?,00000000,?,?,?,?,?,0050477B,00000000), ref: 00504EB9
                                                                  • FindCloseChangeNotification.KERNELBASE(?,?,?,?,?,?,?,?,0050477B,00000000), ref: 00504EC5
                                                                  • GetProcessHeap.KERNEL32(00000000,?,?,?,?,?,0050477B,00000000), ref: 00504ED7
                                                                  • RtlFreeHeap.NTDLL(00000000,?,?,?,?,0050477B,00000000), ref: 00504EDE
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2729074743.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000000.00000002.2729050946.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729145703.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729168277.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_500000_mail.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Heap$FileProcess$AllocateChangeCloseCreateFindFreeNotificationRead
                                                                  • String ID: {GP
                                                                  • API String ID: 3486390565-1941362325
                                                                  • Opcode ID: 428cdfe4e4e56a777748bbb5e178a34146adc0e2ef22d4898716c37ae4cd4343
                                                                  • Instruction ID: cde6f649d8a6e970d913e8d6152b8159acc1393c7919c2b618bcbc601deb3034
                                                                  • Opcode Fuzzy Hash: 428cdfe4e4e56a777748bbb5e178a34146adc0e2ef22d4898716c37ae4cd4343
                                                                  • Instruction Fuzzy Hash: 8A216BB5D00208FBDF119FA4DD48AAEBFBDFB04394F204469F642A2190D3304E54AF66
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  APIs
                                                                  • FindWindowA.USER32(rctrl_renwnd32,00000000), ref: 0050312A
                                                                    • Part of subcall function 005030F0: PostMessageA.USER32(?,00000012,00000000,00000000), ref: 00503108
                                                                    • Part of subcall function 005030F0: PostMessageA.USER32(?,00000010,00000000,00000000), ref: 0050310F
                                                                    • Part of subcall function 005030F0: PostMessageA.USER32(?,00000002,00000000,00000000), ref: 00503116
                                                                  • FindWindowA.USER32(ATH_Note,00000000), ref: 0050313A
                                                                  • FindWindowA.USER32(IEFrame,00000000), ref: 0050314A
                                                                  • RtlExitUserThread.NTDLL(00000000), ref: 00503155
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2729074743.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000000.00000002.2729050946.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729145703.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729168277.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_500000_mail.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: FindMessagePostWindow$ExitThreadUser
                                                                  • String ID: ATH_Note$IEFrame$rctrl_renwnd32
                                                                  • API String ID: 2235905160-3881057634
                                                                  • Opcode ID: 3dc4a38075e9342e6b02805258b341f4c805c4931865141f3460f12dc90b924c
                                                                  • Instruction ID: a650038179976161dc88b4fd2029094447a0c5a8afe537662e8923af550cda7c
                                                                  • Opcode Fuzzy Hash: 3dc4a38075e9342e6b02805258b341f4c805c4931865141f3460f12dc90b924c
                                                                  • Instruction Fuzzy Hash: 79D06776AC172579E63C33B96D1FF9E1E1CAB44B61F200406B2459A4C35DE4664085BE
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 988 503620-503662 GetModuleHandleA 989 503672-503680 GetProcAddress 988->989 990 503664-503670 LoadLibraryA 988->990 991 503682-503686 989->991 992 503687-503696 InternetGetConnectedState 989->992 990->989 990->991
                                                                  APIs
                                                                  • GetModuleHandleA.KERNEL32(?), ref: 0050365A
                                                                  • LoadLibraryA.KERNELBASE(wininet.dll), ref: 00503668
                                                                  • GetProcAddress.KERNEL32(00000000,InternetGetConnectedState), ref: 00503678
                                                                  • InternetGetConnectedState.WININET(?,00000000), ref: 0050368D
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2729074743.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000000.00000002.2729050946.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729145703.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729168277.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_500000_mail.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: AddressConnectedHandleInternetLibraryLoadModuleProcState
                                                                  • String ID: InternetGetConnectedState$wininet.dll
                                                                  • API String ID: 1505668628-596207600
                                                                  • Opcode ID: 383ecea641d6cbcfcb23eacf179140b95e1886bb47d9fb192bb945b850ba0d9a
                                                                  • Instruction ID: 2b294e7ad4bcb9401aef01a1c95623af15c32a98deb04781e5990a6f2b8114d4
                                                                  • Opcode Fuzzy Hash: 383ecea641d6cbcfcb23eacf179140b95e1886bb47d9fb192bb945b850ba0d9a
                                                                  • Instruction Fuzzy Hash: 5F011620A083C9E9EF11D7F8D81DBAD7FA91B21748F0485D89185E61C1D7BB8358C776
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  APIs
                                                                  • RegOpenKeyExA.KERNELBASE(80000001,?,00000000,00020019,?,75920F00), ref: 005050BE
                                                                  • memset.MSVCRT ref: 005050D5
                                                                  • RegQueryValueExA.KERNELBASE(?,00000000,00000000,00000000,?,?), ref: 005050F5
                                                                  • RegCloseKey.KERNELBASE(?), ref: 005050FE
                                                                    • Part of subcall function 00504EEA: CreateFileA.KERNEL32(00000020,80000000,00000003,00000000,00000003,00000080,00000000,75920F10,00000000), ref: 00504F0C
                                                                    • Part of subcall function 00504EEA: GetFileSize.KERNEL32(00000000,00000000), ref: 00504F2A
                                                                    • Part of subcall function 00504EEA: CreateFileMappingA.KERNEL32(00000000,00000000,00000002,00000000,00000000,00000000), ref: 00504F3A
                                                                    • Part of subcall function 00504EEA: MapViewOfFile.KERNEL32(00000000,00000004,00000000,00000000,00000000,00000000), ref: 00504F5B
                                                                    • Part of subcall function 00504EEA: CloseHandle.KERNEL32(?), ref: 00504FD5
                                                                    • Part of subcall function 00504EEA: CloseHandle.KERNEL32(?), ref: 00504FDF
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2729074743.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000000.00000002.2729050946.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729145703.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729168277.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_500000_mail.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: File$Close$CreateHandle$MappingOpenQuerySizeValueViewmemset
                                                                  • String ID: $ $4$A$A$B$B$F$M$N$S$W$W$W$\$\$\$\$a$a$a$b$c$e$e$e$f$f$i$i$l$m$o$o$o$r$r$s$t$t$w
                                                                  • API String ID: 1447734293-2356155605
                                                                  • Opcode ID: d70b678158a2ddeabdc93fb81de4d72fe2e86aa731343c368a4f6e47c38d2075
                                                                  • Instruction ID: d5002688ff9bd9582a131d6a7ee4c8a73c9f60058928140604e211d2a98eee7b
                                                                  • Opcode Fuzzy Hash: d70b678158a2ddeabdc93fb81de4d72fe2e86aa731343c368a4f6e47c38d2075
                                                                  • Instruction Fuzzy Hash: 5141F050D082CDDDFB02C6A8D948BDEBFB55B26748F0840D8D5847A282D3FB1658C77A
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  APIs
                                                                  • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 00502E8E
                                                                  • lstrcpy.KERNEL32(.exe,?), ref: 00502EAB
                                                                  • GetWindowsDirectoryA.KERNEL32(?,00000118), ref: 00502EC7
                                                                  • GetTempPathA.KERNEL32(00000118,?), ref: 00502ED5
                                                                  • lstrlen.KERNEL32(?), ref: 00502EEE
                                                                  • lstrcat.KERNEL32(?,00501190), ref: 00502F0D
                                                                  • lstrcat.KERNEL32(?,java.exe), ref: 00502F1A
                                                                  • SetFileAttributesA.KERNELBASE(?,00000020), ref: 00502F25
                                                                  • CreateFileA.KERNELBASE(?,40000000,00000003,00000000,00000002,00000080,00000000), ref: 00502F42
                                                                  • CloseHandle.KERNEL32(00000000), ref: 00502F52
                                                                  • DeleteFileA.KERNELBASE(?), ref: 00502F5F
                                                                  • CopyFileA.KERNEL32(?,?,00000000), ref: 00502F74
                                                                  • GetFileAttributesA.KERNEL32(?), ref: 00502F85
                                                                  • lstrcpy.KERNEL32(?,?), ref: 00502FA9
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2729074743.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000000.00000002.2729050946.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729145703.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729168277.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_500000_mail.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: File$Attributeslstrcatlstrcpy$CloseCopyCreateDeleteDirectoryHandleModuleNamePathTempWindowslstrlen
                                                                  • String ID: .exe$java.exe
                                                                  • API String ID: 3096175462-2602780958
                                                                  • Opcode ID: 473512d9f1244c06d08cbd740965cc33da0b9b43a2f3904d5a041e8f1c7c422d
                                                                  • Instruction ID: dece3f8ae99a5382c4877d1b044eea6b25dfa7d2f7fe03871ebba1afd8658fdb
                                                                  • Opcode Fuzzy Hash: 473512d9f1244c06d08cbd740965cc33da0b9b43a2f3904d5a041e8f1c7c422d
                                                                  • Instruction Fuzzy Hash: 72416A7190429DAFEB10DBA4DC8DBDEBFBCAB18354F104096F585E6090DB749AC8CB21
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  APIs
                                                                    • Part of subcall function 0050746B: GetModuleFileNameA.KERNEL32(00000000,?,00000100,00000000,?), ref: 00507487
                                                                    • Part of subcall function 0050746B: CreateFileA.KERNELBASE(?,80000000,00000003,00000000,00000003,00000080,00000000), ref: 005074AA
                                                                    • Part of subcall function 0050746B: CreateFileA.KERNELBASE(?,C0000000,00000003,00000000,00000002,00000080,00000000), ref: 005074DC
                                                                    • Part of subcall function 0050746B: SetFilePointer.KERNELBASE(?,00000000,00000000,00000000), ref: 005074F5
                                                                    • Part of subcall function 0050746B: ReadFile.KERNELBASE(?,?,00000100,?,00000000), ref: 0050752E
                                                                    • Part of subcall function 0050746B: FindCloseChangeNotification.KERNELBASE(00000000), ref: 0050753E
                                                                    • Part of subcall function 0050746B: CloseHandle.KERNEL32(?), ref: 00507543
                                                                  • GetWindowsDirectoryA.KERNEL32(?,00000100,00000000,?), ref: 0050761F
                                                                    • Part of subcall function 0050737C: WriteFile.KERNELBASE(00000000,?,00000001,?,00000000,00000000,75918A60), ref: 005073BD
                                                                    • Part of subcall function 0050737C: WriteFile.KERNEL32(00000000,?,00000001,?,00000000,00000000,75918A60), ref: 005073E2
                                                                  • GetTempPathA.KERNEL32(00000100,?,00000000,?), ref: 0050762D
                                                                  • lstrcat.KERNEL32(?,services), ref: 00507677
                                                                  • lstrcat.KERNEL32(?,00501830), ref: 00507685
                                                                  • lstrcat.KERNEL32(?,exe), ref: 00507693
                                                                  • CreateFileA.KERNELBASE(?,C0000000,00000003,00000000,00000002,00000080,00000000), ref: 005076AC
                                                                  • FindCloseChangeNotification.KERNELBASE(00000000), ref: 005076D0
                                                                  • wsprintfA.USER32 ref: 005076E9
                                                                  • memset.MSVCRT ref: 005076F8
                                                                  • CreateProcessA.KERNELBASE(00000000,?,00000000,00000000,00000001,00000000,00000000,00000000,?,?), ref: 00507725
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2729074743.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000000.00000002.2729050946.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729145703.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729168277.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_500000_mail.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: File$Create$Closelstrcat$ChangeFindNotificationWrite$DirectoryHandleModuleNamePathPointerProcessReadTempWindowsmemsetwsprintf
                                                                  • String ID: "%s"$\$exe$services
                                                                  • API String ID: 1621132550-3764781487
                                                                  • Opcode ID: 4e5a91acdd77911c355f3c749416d69306de053efc37594798bdc49c714c615a
                                                                  • Instruction ID: 5cab7ea6ea662128e4a800645ff2ec6955619924f35eec1abec093929e757c50
                                                                  • Opcode Fuzzy Hash: 4e5a91acdd77911c355f3c749416d69306de053efc37594798bdc49c714c615a
                                                                  • Instruction Fuzzy Hash: 6D3184B1D04A9CEAEB109BA49C8DFEE7F7CFB48341F1004A1F245E61C1D6705E898A65
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 909 505449-5054fe 910 505503-50551f memset 909->910 911 505521-505527 GetWindowsDirectoryA 910->911 912 505529-50552e GetEnvironmentVariableA 910->912 913 505534-50553a 911->913 912->913 914 5055a2-5055a9 913->914 915 50553c-505554 lstrlen 913->915 914->910 918 5055af-5055b3 914->918 916 505564-505568 915->916 917 505556-505562 lstrcat 915->917 919 505585-50559b lstrcat call 5052ad 916->919 920 50556a-505583 lstrcat * 2 916->920 917->916 922 5055a0-5055a1 919->922 920->919 922->914
                                                                  APIs
                                                                  • memset.MSVCRT ref: 0050550C
                                                                  • GetWindowsDirectoryA.KERNEL32(?,00000184,00000000,75920F10,75920F00), ref: 00505521
                                                                  • GetEnvironmentVariableA.KERNEL32(USERPROFILE,?,00000184,00000000,75920F10,75920F00), ref: 0050552E
                                                                  • lstrlen.KERNEL32(?), ref: 00505543
                                                                  • lstrcat.KERNEL32(?,00501190), ref: 00505562
                                                                  • lstrcat.KERNEL32(?,Local Settings), ref: 00505575
                                                                  • lstrcat.KERNEL32(?,00501190), ref: 00505583
                                                                  • lstrcat.KERNEL32(?,Temporary Internet Files), ref: 00505590
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2729074743.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000000.00000002.2729050946.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729145703.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729168277.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_500000_mail.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: lstrcat$DirectoryEnvironmentVariableWindowslstrlenmemset
                                                                  • String ID: Local Settings$Temporary Internet Files$USERPROFILE
                                                                  • API String ID: 527352983-4053592351
                                                                  • Opcode ID: d89d942958c9cba20cc904a98748bb533d06aa26e497641e0aaf6626ffe246d0
                                                                  • Instruction ID: cacbc361b4096883e695f9cd27b791d52763dfaa7485a7004b5a6053e68340e0
                                                                  • Opcode Fuzzy Hash: d89d942958c9cba20cc904a98748bb533d06aa26e497641e0aaf6626ffe246d0
                                                                  • Instruction Fuzzy Hash: 63410C61C083CCDAEB11D7A8D9087DEBFB95F26348F0840D9D18476282D7BA5758CB76
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 942 502fb0-5030ab RegOpenKeyExA 943 5030c2-5030e5 lstrlen RegSetValueExA RegCloseKey 942->943 944 5030ad-5030c0 RegOpenKeyExA 942->944 945 5030eb-5030ef 943->945 944->943 944->945
                                                                  APIs
                                                                  • RegOpenKeyExA.KERNELBASE(80000002,?,00000000,00020006,?), ref: 005030A7
                                                                  • RegOpenKeyExA.ADVAPI32(80000001,Software\Microsoft\Windows\CurrentVersion\Run,00000000,00020006,?), ref: 005030BC
                                                                  • lstrlen.KERNEL32(00000052), ref: 005030C9
                                                                  • RegSetValueExA.KERNELBASE(?,JavaVM,00000000,00000001,00000052,00000001), ref: 005030DC
                                                                  • RegCloseKey.ADVAPI32(?), ref: 005030E5
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2729074743.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000000.00000002.2729050946.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729145703.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729168277.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_500000_mail.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Open$CloseValuelstrlen
                                                                  • String ID: JavaVM$Software\Microsoft\Windows\CurrentVersion\Run
                                                                  • API String ID: 1812710942-1525231178
                                                                  • Opcode ID: e7c4ab6b2f41031e5725f1ab95989c2709ffec37f0edb752e120a5812798a4be
                                                                  • Instruction ID: cd70c8d2d714d64a17d00ab414c80a8edff05e1f62e6019a642830455d294362
                                                                  • Opcode Fuzzy Hash: e7c4ab6b2f41031e5725f1ab95989c2709ffec37f0edb752e120a5812798a4be
                                                                  • Instruction Fuzzy Hash: 6241BC10D0C2C9EDFB02C2A8D8487DEBFB65B26748F084099D5847A292C2FF1658C77A
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 946 503697-5036ce SetFilePointer ReadFile 947 5036d4-5036e1 SetFilePointer 946->947 948 503776 946->948 947->948 950 5036e7-5036fb ReadFile 947->950 949 503778-50377c 948->949 950->948 951 5036fd-50370f 950->951 951->948 952 503711-503715 951->952 952->948 953 503717-50371c 952->953 953->948 954 50371e-50373d SetFilePointer 953->954 955 503772-503774 954->955 956 50373f-503756 ReadFile 954->956 955->949 956->948 957 503758-503762 956->957 958 503764 957->958 959 503766-503770 957->959 958->959 959->955 959->956
                                                                  APIs
                                                                  • SetFilePointer.KERNELBASE(00000000,0000003C,00000000,00000000,00000100,00000000,75923130), ref: 005036AF
                                                                  • ReadFile.KERNELBASE(00000000,00000000,00000004,?,00000000), ref: 005036C8
                                                                  • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00000000), ref: 005036DC
                                                                  • ReadFile.KERNELBASE(00000000,?,00000016,00000004,00000000), ref: 005036F5
                                                                  • SetFilePointer.KERNELBASE(00000000,00000018,00000000,00000000), ref: 00503732
                                                                  • ReadFile.KERNEL32(00000000,?,00000028,00000500,00000000), ref: 00503750
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2729074743.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000000.00000002.2729050946.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729145703.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729168277.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_500000_mail.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: File$PointerRead
                                                                  • String ID: (
                                                                  • API String ID: 3154509469-3887548279
                                                                  • Opcode ID: 8d052d63ba2457e03fe9d7e8e13cec42e15aac050f382052b2be9159c5306ec8
                                                                  • Instruction ID: f73d0bf622d8b4d7441a19c50e1fac5286902f701a87a8b44225c7f7ee392bb3
                                                                  • Opcode Fuzzy Hash: 8d052d63ba2457e03fe9d7e8e13cec42e15aac050f382052b2be9159c5306ec8
                                                                  • Instruction Fuzzy Hash: 8C3106B6901118FBDF21DF95CE849EEBFBDFF04790F108065E905A2190E6319B81DBA0
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  APIs
                                                                  • GetModuleFileNameA.KERNEL32(00000000,?,00000100,00000000,?), ref: 00507487
                                                                  • CreateFileA.KERNELBASE(?,80000000,00000003,00000000,00000003,00000080,00000000), ref: 005074AA
                                                                    • Part of subcall function 005073E8: GetTempPathA.KERNEL32(00000104,?), ref: 005073FD
                                                                    • Part of subcall function 005073E8: lstrlen.KERNEL32(?), ref: 0050740A
                                                                    • Part of subcall function 005073E8: lstrcat.KERNEL32(?,zincite), ref: 00507448
                                                                    • Part of subcall function 005073E8: lstrcat.KERNEL32(?,.log), ref: 00507456
                                                                    • Part of subcall function 005073E8: lstrcpy.KERNEL32(?,?), ref: 00507462
                                                                  • CreateFileA.KERNELBASE(?,C0000000,00000003,00000000,00000002,00000080,00000000), ref: 005074DC
                                                                    • Part of subcall function 00503697: SetFilePointer.KERNELBASE(00000000,0000003C,00000000,00000000,00000100,00000000,75923130), ref: 005036AF
                                                                    • Part of subcall function 00503697: ReadFile.KERNELBASE(00000000,00000000,00000004,?,00000000), ref: 005036C8
                                                                    • Part of subcall function 00503697: SetFilePointer.KERNELBASE(00000000,00000000,00000000,00000000), ref: 005036DC
                                                                    • Part of subcall function 00503697: ReadFile.KERNELBASE(00000000,?,00000016,00000004,00000000), ref: 005036F5
                                                                    • Part of subcall function 00503697: SetFilePointer.KERNELBASE(00000000,00000018,00000000,00000000), ref: 00503732
                                                                    • Part of subcall function 00503697: ReadFile.KERNEL32(00000000,?,00000028,00000500,00000000), ref: 00503750
                                                                  • SetFilePointer.KERNELBASE(?,00000000,00000000,00000000), ref: 005074F5
                                                                  • WriteFile.KERNELBASE(00000000,?,?,?,00000000), ref: 00507515
                                                                  • ReadFile.KERNELBASE(?,?,00000100,?,00000000), ref: 0050752E
                                                                  • FindCloseChangeNotification.KERNELBASE(00000000), ref: 0050753E
                                                                  • CloseHandle.KERNEL32(?), ref: 00507543
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2729074743.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000000.00000002.2729050946.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729145703.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729168277.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_500000_mail.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: File$PointerRead$CloseCreatelstrcat$ChangeFindHandleModuleNameNotificationPathTempWritelstrcpylstrlen
                                                                  • String ID:
                                                                  • API String ID: 3217969230-0
                                                                  • Opcode ID: 945720a1fce9431e2360ffcd8314ee30a754bd9a45bede0f71f403d5586aa745
                                                                  • Instruction ID: 3ee29f7f2fe5b884bcaff3a16fbbd882d52692b313de89af8fed5149c55411fd
                                                                  • Opcode Fuzzy Hash: 945720a1fce9431e2360ffcd8314ee30a754bd9a45bede0f71f403d5586aa745
                                                                  • Instruction Fuzzy Hash: 1521F875D00128BBDB219BA1DC48FDEBF7CEF15360F104292B654A2090D6706B84DFA4
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 978 5055b4-505605 memset GetWindowsDirectoryA lstrcpy call 5052ad 980 50560a-505612 978->980 981 505613-505619 980->981 982 505648-505655 981->982 983 50561b-50562b GetDriveTypeA 981->983 982->981 985 505657-50565a 982->985 983->982 984 50562d-505647 Sleep call 5052ad 983->984 984->982
                                                                  APIs
                                                                  • memset.MSVCRT ref: 005055CE
                                                                  • GetWindowsDirectoryA.KERNEL32(?,00000104,?,75920F10,75920F00), ref: 005055DE
                                                                  • lstrcpy.KERNEL32(?,00501888), ref: 005055F6
                                                                  • GetDriveTypeA.KERNEL32(00000043,?,75920F10,75920F00), ref: 00505622
                                                                  • Sleep.KERNEL32(00001194,?,75920F10,75920F00), ref: 00505632
                                                                    • Part of subcall function 005052AD: Sleep.KERNEL32(00000800,75918A60,00000184), ref: 005052D7
                                                                    • Part of subcall function 005052AD: lstrcpy.KERNEL32(?,?), ref: 005052F4
                                                                    • Part of subcall function 005052AD: lstrlen.KERNEL32(?), ref: 00505304
                                                                    • Part of subcall function 005052AD: lstrcat.KERNEL32(?,00501190), ref: 0050531C
                                                                    • Part of subcall function 005052AD: lstrcat.KERNEL32(?,*.*), ref: 0050532E
                                                                    • Part of subcall function 005052AD: memset.MSVCRT ref: 00505341
                                                                    • Part of subcall function 005052AD: FindFirstFileA.KERNELBASE(?,00000010), ref: 0050535F
                                                                    • Part of subcall function 005052AD: FindNextFileA.KERNELBASE(?,?), ref: 0050537E
                                                                    • Part of subcall function 005052AD: lstrcpy.KERNEL32(?,?), ref: 005053BA
                                                                    • Part of subcall function 005052AD: lstrlen.KERNEL32(?), ref: 005053C3
                                                                    • Part of subcall function 005052AD: lstrcat.KERNEL32(?,00501190), ref: 005053DB
                                                                    • Part of subcall function 005052AD: lstrcat.KERNEL32(?,0000002E), ref: 005053EF
                                                                    • Part of subcall function 005052AD: Sleep.KERNELBASE(0000004B), ref: 00505400
                                                                    • Part of subcall function 005052AD: FindClose.KERNELBASE(?), ref: 0050543B
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2729074743.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000000.00000002.2729050946.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729145703.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729168277.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_500000_mail.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: lstrcat$FindSleeplstrcpy$Filelstrlenmemset$CloseDirectoryDriveFirstNextTypeWindows
                                                                  • String ID: Z
                                                                  • API String ID: 798667630-1505515367
                                                                  • Opcode ID: c6931e2ca908d11bfe10dd74d10df2d0473876e0ea701a3d5757cf76e3dc8de0
                                                                  • Instruction ID: c2197e004829da8253717f8257516700dd35be32272eb9ca971d862e6122c766
                                                                  • Opcode Fuzzy Hash: c6931e2ca908d11bfe10dd74d10df2d0473876e0ea701a3d5757cf76e3dc8de0
                                                                  • Instruction Fuzzy Hash: B5016DB5D046AA6BDB2093609D89BDE7B6CAB21314F0404D1E389E20C1E6B49AC88F55
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 993 502c90-502d0a 996 502d0f-502d2f RegOpenKeyExA 993->996 997 502d31-502d38 996->997 998 502d83-502d8c RegCloseKey 996->998 997->996 1000 502d3a-502d40 997->1000 999 502d7e-502d82 998->999 1001 502d43-502d6a RegCreateKeyExA 1000->1001 1002 502d75-502d7c 1001->1002 1003 502d6c-502d6f RegCloseKey 1001->1003 1002->999 1002->1001 1003->1002
                                                                  APIs
                                                                  • RegOpenKeyExA.KERNELBASE(?,Software\Microsoft\Daemon,00000000,00020019,?), ref: 00502D27
                                                                  • RegCreateKeyExA.KERNELBASE(00000002,00000053,00000000,00000000,00000000,00020006,00000000,?,?), ref: 00502D62
                                                                  • RegCloseKey.KERNELBASE(?), ref: 00502D6F
                                                                  • RegCloseKey.ADVAPI32(?), ref: 00502D86
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2729074743.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000000.00000002.2729050946.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729145703.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729168277.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_500000_mail.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Close$CreateOpen
                                                                  • String ID: Software\Microsoft\Daemon
                                                                  • API String ID: 1299239824-1912283813
                                                                  • Opcode ID: dca647fb5f665cc76b449c390acf53b1ca5190e4f5961b617e44826d8c6e7f19
                                                                  • Instruction ID: a7eee4beb99658644a23fa6dbb2239ba827f2e479c7b42f201d4ea8a8906cff2
                                                                  • Opcode Fuzzy Hash: dca647fb5f665cc76b449c390acf53b1ca5190e4f5961b617e44826d8c6e7f19
                                                                  • Instruction Fuzzy Hash: 033168519082CDEDEF02C7A8C94C7DEBFB95F22748F084099D584BA182D3BA4B58C776
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1004 505131-50513b 1005 505141-505149 1004->1005 1006 5052ab-5052ac 1004->1006 1007 505167-50516c 1005->1007 1008 50514b-505150 1005->1008 1011 50518c-505198 1007->1011 1009 505152-505157 1008->1009 1010 505163-505165 1008->1010 1012 505159 1009->1012 1013 50515b-505161 1009->1013 1010->1007 1014 50516e-505189 lstrcpyn CharLowerA 1010->1014 1015 5051a4-5051a9 1011->1015 1016 50519a-50519f 1011->1016 1012->1013 1013->1008 1013->1010 1014->1011 1018 5051ab-5051ae 1015->1018 1019 5051bd-5051c2 1015->1019 1017 50525f-505266 1016->1017 1020 505271-505274 1017->1020 1021 505268-50526d 1017->1021 1018->1017 1022 5051b4-5051b7 1018->1022 1023 5051c4-5051c7 1019->1023 1024 5051de-5051e0 1019->1024 1028 505276 1020->1028 1029 5052a9-5052aa 1020->1029 1021->1020 1027 50526f 1021->1027 1022->1017 1022->1019 1030 5051d3-5051d6 1023->1030 1031 5051c9-5051ce 1023->1031 1025 5051e2-5051e5 1024->1025 1026 5051e7-5051e9 1024->1026 1025->1017 1025->1026 1032 5051f5-5051f7 1026->1032 1033 5051eb-5051ee 1026->1033 1027->1020 1034 505283-50528a 1028->1034 1029->1006 1035 5051d8-5051da 1030->1035 1036 50521f-505224 1030->1036 1031->1017 1042 505203-505205 1032->1042 1043 5051f9-5051fc 1032->1043 1040 5051f0-5051f3 1033->1040 1041 505207-50520a 1033->1041 1044 505278-50527d Sleep 1034->1044 1045 50528c-50528f 1034->1045 1035->1036 1037 5051dc 1035->1037 1038 505226-505229 1036->1038 1039 505237-50523e 1036->1039 1048 505230-505235 1037->1048 1038->1039 1049 50522b-50522e 1038->1049 1039->1029 1050 505240-505251 call 5033b4 1039->1050 1040->1017 1040->1032 1041->1036 1053 50520c-50520f 1041->1053 1042->1041 1052 505211-505213 1042->1052 1043->1036 1051 5051fe-505201 1043->1051 1044->1034 1046 505291-505294 call 504e00 1045->1046 1047 50529b-50529e 1045->1047 1058 505299 1046->1058 1047->1029 1055 5052a0-5052a3 call 504eea 1047->1055 1048->1017 1049->1039 1049->1048 1050->1029 1063 505253-50525c 1050->1063 1051->1017 1051->1042 1052->1036 1057 505215-505218 1052->1057 1053->1017 1053->1052 1062 5052a8 1055->1062 1057->1036 1061 50521a-50521d 1057->1061 1058->1062 1061->1017 1061->1036 1062->1029 1063->1017
                                                                  APIs
                                                                  • lstrcpyn.KERNEL32(?,00000070,0000000F,?,?,00505430,?), ref: 00505179
                                                                  • CharLowerA.USER32(?,?,?,00505430,?), ref: 00505183
                                                                  • Sleep.KERNEL32(00000800,?,759183C0,?,?,00505430,?), ref: 0050527D
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2729074743.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000000.00000002.2729050946.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729145703.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729168277.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_500000_mail.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CharLowerSleeplstrcpyn
                                                                  • String ID: 0TP
                                                                  • API String ID: 267381043-1855386918
                                                                  • Opcode ID: 076539342993601403a397f8d3848ee9606f614aa553588212fb02b9d72115e3
                                                                  • Instruction ID: 8274f9cbfd694f8c2d5fe74a321f0c892786a0426ba65b7b33d98da66336cf23
                                                                  • Opcode Fuzzy Hash: 076539342993601403a397f8d3848ee9606f614aa553588212fb02b9d72115e3
                                                                  • Instruction Fuzzy Hash: 2841C168A44E4A4EFF344624C9497BF2F5B7FB2314F98491BD193420D3FA264C8ACE16
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1064 504ae2-504af0 1065 504b06-504b0d call 503620 1064->1065 1068 504af2-504af9 call 505127 1065->1068 1069 504b0f-504b2f call 505127 1065->1069 1076 504b00 Sleep 1068->1076 1074 504b31-504b36 1069->1074 1075 504b7a 1069->1075 1078 504b45-504b4c 1074->1078 1079 504b38-504b3b 1074->1079 1077 504b7c-504b80 1075->1077 1076->1065 1080 504b82-504b84 1077->1080 1081 504bd6-504be3 call 505127 1077->1081 1084 504b52-504b57 1078->1084 1085 504b4e 1078->1085 1082 504b43 1079->1082 1083 504b3d-504b41 1079->1083 1080->1081 1086 504b86-504b8d 1080->1086 1096 504be5-504bea 1081->1096 1097 504bcc-504bd1 1081->1097 1082->1078 1083->1078 1083->1082 1084->1074 1087 504b59-504b5f 1084->1087 1085->1084 1089 504b99-504bb3 CreateThread 1086->1089 1090 504b8f-504b94 1086->1090 1087->1075 1091 504b61-504b6e call 504a85 1087->1091 1093 504bb5-504bb8 1089->1093 1094 504bc8 1089->1094 1090->1076 1091->1077 1101 504b70-504b78 call 505127 1091->1101 1093->1094 1098 504bba-504bc3 CloseHandle 1093->1098 1094->1097 1096->1097 1100 504bec-504bfb GetTickCount 1096->1100 1097->1076 1098->1076 1100->1097 1102 504bfd-504c04 call 5047b7 1100->1102 1101->1077 1102->1076
                                                                  APIs
                                                                    • Part of subcall function 00503620: GetModuleHandleA.KERNEL32(?), ref: 0050365A
                                                                    • Part of subcall function 00503620: LoadLibraryA.KERNELBASE(wininet.dll), ref: 00503668
                                                                    • Part of subcall function 00503620: GetProcAddress.KERNEL32(00000000,InternetGetConnectedState), ref: 00503678
                                                                  • Sleep.KERNELBASE(00000001,?,?,?,?,?,?,00504C20), ref: 00504B00
                                                                  • CreateThread.KERNEL32(00000000,00000000,00504A37,00000000,00000000,?), ref: 00504BAB
                                                                  • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,00504C20), ref: 00504BBB
                                                                  • GetTickCount.KERNEL32 ref: 00504BEC
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2729074743.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000000.00000002.2729050946.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729145703.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729168277.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_500000_mail.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Handle$AddressCloseCountCreateLibraryLoadModuleProcSleepThreadTick
                                                                  • String ID:
                                                                  • API String ID: 50151514-0
                                                                  • Opcode ID: 7bd039e2053160122893935ea775d366336ab228428e61975a78905543a36c9c
                                                                  • Instruction ID: ab1ee794b50bf540a74e33d7e95b3844ad5376a59cf73203d230b0ff36f6ead8
                                                                  • Opcode Fuzzy Hash: 7bd039e2053160122893935ea775d366336ab228428e61975a78905543a36c9c
                                                                  • Instruction Fuzzy Hash: 2331BFF06047829AEB24AF749C9DF7FBED9BB90301F114A19F695C61D1EB60C844CE62
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                    • Part of subcall function 00502C90: RegOpenKeyExA.KERNELBASE(?,Software\Microsoft\Daemon,00000000,00020019,?), ref: 00502D27
                                                                    • Part of subcall function 00502C90: RegCreateKeyExA.KERNELBASE(00000002,00000053,00000000,00000000,00000000,00020006,00000000,?,?), ref: 00502D62
                                                                    • Part of subcall function 00502C90: RegCloseKey.KERNELBASE(?), ref: 00502D6F
                                                                  • CreateThread.KERNELBASE(00000000,00000000,Function_0000311C,00000000,00000000,?), ref: 00503239
                                                                  • Sleep.KERNELBASE ref: 00503253
                                                                  • CreateThread.KERNELBASE(00000000,00000000,Function_00004C1B,00000000,00000000,?), ref: 00503267
                                                                  • Sleep.KERNEL32(000003E8), ref: 00503278
                                                                    • Part of subcall function 00502D8E: memset.MSVCRT ref: 00502DA8
                                                                    • Part of subcall function 00502D8E: gethostname.WS2_32(?,00000100), ref: 00502DB8
                                                                    • Part of subcall function 00502D8E: lstrcat.KERNEL32(?,root), ref: 00502DD0
                                                                    • Part of subcall function 00502D8E: lstrcat.KERNEL32(00000000,00000000), ref: 00502E19
                                                                    • Part of subcall function 00502D8E: lstrcat.KERNEL32(00000000,00000000), ref: 00502E29
                                                                    • Part of subcall function 00502D8E: CreateMutexA.KERNEL32(00000000,00000001,00000000), ref: 00502E36
                                                                    • Part of subcall function 00502D8E: GetLastError.KERNEL32 ref: 00502E3C
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2729074743.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000000.00000002.2729050946.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729145703.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729168277.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_500000_mail.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Create$lstrcat$SleepThread$CloseErrorLastMutexOpengethostnamememset
                                                                  • String ID:
                                                                  • API String ID: 2995464708-0
                                                                  • Opcode ID: 5b84a6266cc0cddde8327f0e5fcd076bdfc815fbfa76804f980ebbea6f6bd2a6
                                                                  • Instruction ID: c3a13703e42c1b4ec363eec73e7dae4186dad5f565332290872ed40493be106c
                                                                  • Opcode Fuzzy Hash: 5b84a6266cc0cddde8327f0e5fcd076bdfc815fbfa76804f980ebbea6f6bd2a6
                                                                  • Instruction Fuzzy Hash: B701B13A14065676D71177729C4FDAF6F6CFFC6B11B10041AFA44920C2DE349A4589B9
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • WSAStartup.WS2_32(00000101,?), ref: 00503295
                                                                    • Part of subcall function 005033A8: GetTickCount.KERNEL32 ref: 005033A8
                                                                  • memset.MSVCRT ref: 005032AE
                                                                    • Part of subcall function 005031E4: CreateThread.KERNELBASE(00000000,00000000,Function_0000311C,00000000,00000000,?), ref: 00503239
                                                                    • Part of subcall function 005031E4: Sleep.KERNELBASE ref: 00503253
                                                                    • Part of subcall function 005031E4: CreateThread.KERNELBASE(00000000,00000000,Function_00004C1B,00000000,00000000,?), ref: 00503267
                                                                    • Part of subcall function 005031E4: Sleep.KERNEL32(000003E8), ref: 00503278
                                                                  • ExitProcess.KERNEL32 ref: 005032C4
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2729074743.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000000.00000002.2729050946.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729145703.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729168277.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_500000_mail.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CreateSleepThread$CountExitProcessStartupTickmemset
                                                                  • String ID:
                                                                  • API String ID: 3857727052-0
                                                                  • Opcode ID: 88d01b5b5f6c5010676a2a66d5ceb351fe4fc908ad08d7981e774765898afe9f
                                                                  • Instruction ID: e6c800b91a5105f6af05a8ed022c94dfcb71a2cb97930a29ec3ddceb2131e2e1
                                                                  • Opcode Fuzzy Hash: 88d01b5b5f6c5010676a2a66d5ceb351fe4fc908ad08d7981e774765898afe9f
                                                                  • Instruction Fuzzy Hash: 93E08C309442086BEB50B7A0CC0EFDD7B2CAB14701F8008A1B284950D2EEA166C88AA6
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • GetCurrentThread.KERNEL32 ref: 0050565D
                                                                  • SetThreadPriority.KERNELBASE(00000000), ref: 00505664
                                                                    • Part of subcall function 00504FF8: RegOpenKeyExA.KERNELBASE(80000001,?,00000000,00020019,?,75920F00), ref: 005050BE
                                                                    • Part of subcall function 00504FF8: memset.MSVCRT ref: 005050D5
                                                                    • Part of subcall function 00504FF8: RegQueryValueExA.KERNELBASE(?,00000000,00000000,00000000,?,?), ref: 005050F5
                                                                    • Part of subcall function 00504FF8: RegCloseKey.KERNELBASE(?), ref: 005050FE
                                                                    • Part of subcall function 00505449: memset.MSVCRT ref: 0050550C
                                                                    • Part of subcall function 00505449: GetWindowsDirectoryA.KERNEL32(?,00000184,00000000,75920F10,75920F00), ref: 00505521
                                                                    • Part of subcall function 00505449: lstrlen.KERNEL32(?), ref: 00505543
                                                                    • Part of subcall function 00505449: lstrcat.KERNEL32(?,00501190), ref: 00505562
                                                                    • Part of subcall function 00505449: lstrcat.KERNEL32(?,Local Settings), ref: 00505575
                                                                    • Part of subcall function 00505449: lstrcat.KERNEL32(?,00501190), ref: 00505583
                                                                    • Part of subcall function 00505449: lstrcat.KERNEL32(?,Temporary Internet Files), ref: 00505590
                                                                    • Part of subcall function 005055B4: memset.MSVCRT ref: 005055CE
                                                                    • Part of subcall function 005055B4: GetWindowsDirectoryA.KERNEL32(?,00000104,?,75920F10,75920F00), ref: 005055DE
                                                                    • Part of subcall function 005055B4: lstrcpy.KERNEL32(?,00501888), ref: 005055F6
                                                                    • Part of subcall function 005055B4: GetDriveTypeA.KERNEL32(00000043,?,75920F10,75920F00), ref: 00505622
                                                                    • Part of subcall function 005055B4: Sleep.KERNEL32(00001194,?,75920F10,75920F00), ref: 00505632
                                                                  • Sleep.KERNEL32(000061A8), ref: 00505684
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2729074743.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000000.00000002.2729050946.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729145703.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729168277.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_500000_mail.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: lstrcat$memset$DirectorySleepThreadWindows$CloseCurrentDriveOpenPriorityQueryTypeValuelstrcpylstrlen
                                                                  • String ID:
                                                                  • API String ID: 1200182354-0
                                                                  • Opcode ID: d3dfe3ca985f4e689f16a7144f6eb9c4b7e5f550bcfda9f1fc34b3dd57ffe1dd
                                                                  • Instruction ID: a00bd4ce691c911287dc50f1ec9ddfcc97e79f3b0b06d643ae5355c187a33e16
                                                                  • Opcode Fuzzy Hash: d3dfe3ca985f4e689f16a7144f6eb9c4b7e5f550bcfda9f1fc34b3dd57ffe1dd
                                                                  • Instruction Fuzzy Hash: 94C0123100098687DF043BF49C1E49E3E21BFA13623384701F263840E3DF2004C86E2B
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • WriteFile.KERNELBASE(00000000,?,00000001,?,00000000,00000000,75918A60), ref: 005073BD
                                                                  • WriteFile.KERNEL32(00000000,?,00000001,?,00000000,00000000,75918A60), ref: 005073E2
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2729074743.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000000.00000002.2729050946.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729145703.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729168277.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_500000_mail.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: FileWrite
                                                                  • String ID:
                                                                  • API String ID: 3934441357-0
                                                                  • Opcode ID: 3c2d70d6b2ebeca3607b6924ad4f9547b586735f7dfb2575c4133ed41483a66d
                                                                  • Instruction ID: 22b37714542d64fe014a8661f32d504f0c3aa166d1667109d1551e00d35c67e0
                                                                  • Opcode Fuzzy Hash: 3c2d70d6b2ebeca3607b6924ad4f9547b586735f7dfb2575c4133ed41483a66d
                                                                  • Instruction Fuzzy Hash: DAF0C8B2D0025DBEEB00DB65CD49BEF7BACFB48300F1044B5AA15E3182E230AE449B90
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  Strings
                                                                  • contact+, xrefs: 005077B3
                                                                  • http://www.altavista.com/web/results?q=%s&kgs=0&kls=0, xrefs: 005078E7
                                                                  • %s+%s, xrefs: 00507825
                                                                  • &num=%d, xrefs: 00507895
                                                                  • reply, xrefs: 00507793
                                                                  • &nbq=%d, xrefs: 0050791B
                                                                  • http://search.lycos.com/default.asp?lpv=1&loc=searchhp&tab=web&query=%s, xrefs: 0050792F
                                                                  • mail, xrefs: 005077F4
                                                                  • &n=%d, xrefs: 005078D8
                                                                  • http://www.google.com/search?hl=en&ie=UTF-8&oe=UTF-8&q=%s, xrefs: 0050784D
                                                                  • w, xrefs: 005077E9
                                                                  • http://search.yahoo.com/search?p=%s&ei=UTF-8&fr=fp-tab-web-t&cop=mss&tab=, xrefs: 005078A7
                                                                  • mailto, xrefs: 00507771
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2729074743.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000000.00000002.2729050946.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729145703.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729168277.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_500000_mail.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: wsprintf$lstrcat$memset$lstrcpylstrlen
                                                                  • String ID: %s+%s$&n=%d$&nbq=%d$&num=%d$contact+$http://search.lycos.com/default.asp?lpv=1&loc=searchhp&tab=web&query=%s$http://search.yahoo.com/search?p=%s&ei=UTF-8&fr=fp-tab-web-t&cop=mss&tab=$http://www.altavista.com/web/results?q=%s&kgs=0&kls=0$http://www.google.com/search?hl=en&ie=UTF-8&oe=UTF-8&q=%s$mail$mailto$reply$w
                                                                  • API String ID: 3204893122-2625203255
                                                                  • Opcode ID: 635e0927980e0d4f1e152389c1cd3419be9ed90e47190587e3b17e1ee343d797
                                                                  • Instruction ID: ded823d3f8bc32eef99a2724958b2501f44dba1139f3c98e25ba8aed4e19c952
                                                                  • Opcode Fuzzy Hash: 635e0927980e0d4f1e152389c1cd3419be9ed90e47190587e3b17e1ee343d797
                                                                  • Instruction Fuzzy Hash: D551E430F4450C7AEF08A6669D8EEEE3E5FBBDCB10F18C827F105610D6DDB0AA158525
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • GetLocalTime.KERNEL32(?), ref: 005032E0
                                                                  • FileTimeToLocalFileTime.KERNEL32(00000000,?), ref: 005032EF
                                                                  • FileTimeToSystemTime.KERNEL32(?,?), ref: 005032FD
                                                                  • GetTimeZoneInformation.KERNEL32(?), ref: 0050330B
                                                                  • wsprintfA.USER32 ref: 00503399
                                                                  Strings
                                                                  • %s, %u %s %u %.2u:%.2u:%.2u %c%.2u%.2u, xrefs: 00503391
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2729074743.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000000.00000002.2729050946.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729145703.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729168277.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_500000_mail.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Time$File$Local$InformationSystemZonewsprintf
                                                                  • String ID: %s, %u %s %u %.2u:%.2u:%.2u %c%.2u%.2u
                                                                  • API String ID: 4026320513-1580571061
                                                                  • Opcode ID: 3a7b98e65f6c78f5d9b51af2aadc7aef16cb77ea1e4a24cd175063a99b3a5637
                                                                  • Instruction ID: a724780acf2ae77f2b438354054414b458c2743b998ef78bcc664df01f72aa73
                                                                  • Opcode Fuzzy Hash: 3a7b98e65f6c78f5d9b51af2aadc7aef16cb77ea1e4a24cd175063a99b3a5637
                                                                  • Instruction Fuzzy Hash: 7921287290024CAADF24DF99DC59AFE3BBDBF08705F10441AF956C2090E778CA88DB65
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • select.WS2_32(00000001,?,00000000,00000000,00000200), ref: 00506B12
                                                                  • recv.WS2_32(00000000,?,00000001,00000000), ref: 00506B21
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2729074743.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000000.00000002.2729050946.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729145703.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729168277.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_500000_mail.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: recvselect
                                                                  • String ID:
                                                                  • API String ID: 741273618-0
                                                                  • Opcode ID: c7b9de3faed6e7e385b1f76ede6720dd13d837e2c864222dfe83f2688b9843cd
                                                                  • Instruction ID: 03514d87830b8e2bd1425e58e666e4343d3a5ee024025f41421e549905ad165e
                                                                  • Opcode Fuzzy Hash: c7b9de3faed6e7e385b1f76ede6720dd13d837e2c864222dfe83f2688b9843cd
                                                                  • Instruction Fuzzy Hash: 7511B271A00208ABDB15CF59CC86BEEBBB8FF81700F104059A915E62C0DB30DA91CB24
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • GetSystemTime.KERNEL32(0000002E,0000002E,?,00000000,0000001E), ref: 00505721
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2729074743.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000000.00000002.2729050946.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729145703.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729168277.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_500000_mail.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: SystemTime
                                                                  • String ID:
                                                                  • API String ID: 2656138-0
                                                                  • Opcode ID: c9c0e3fb25f61834500a3681515ade6d4997d58bd528bc0d92d3ea59b26e053d
                                                                  • Instruction ID: 19201fb6aed2fae6b5a5d3050ea43a42579a100c3c4deb84fc8169bf925c8c27
                                                                  • Opcode Fuzzy Hash: c9c0e3fb25f61834500a3681515ade6d4997d58bd528bc0d92d3ea59b26e053d
                                                                  • Instruction Fuzzy Hash: 50F0BD78D10629EBDB00DBA8C4984AEB7B4FF44744B405A55D421E7390E3B0E645CB95
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • GetModuleFileNameA.KERNEL32(00000000,?,00000104,?,00000000), ref: 00506002
                                                                  • GetTempPathA.KERNEL32(00000104,?,?,00000000), ref: 00506023
                                                                  • GetTempFileNameA.KERNEL32(00000000,tmp,00000000,?), ref: 0050604C
                                                                  • GetModuleFileNameA.KERNEL32(00000000,00000000,00000104), ref: 0050605B
                                                                  • CopyFileA.KERNEL32(00000000,?,00000000), ref: 00506070
                                                                    • Part of subcall function 00505EE3: CreateFileA.KERNEL32(00000003,C0000000,00000003,00000000,00000003,00000080,00000000,?,00506082,?), ref: 00505EFA
                                                                    • Part of subcall function 00505EE3: SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 00505F14
                                                                    • Part of subcall function 00505EE3: CloseHandle.KERNEL32(00000000), ref: 00505F22
                                                                  • GetTempPathA.KERNEL32(00000104,00000000), ref: 00506094
                                                                  • GetTempFileNameA.KERNEL32(00000000,tmp,00000000,?), ref: 005060A9
                                                                  • lstrcpy.KERNEL32(?,?), ref: 005060FD
                                                                  • lstrcat.KERNEL32(?,00501830), ref: 00506115
                                                                  • lstrcat.KERNEL32(?,doc), ref: 00506156
                                                                  • lstrcat.KERNEL32(?,00501870), ref: 0050617E
                                                                  • lstrcat.KERNEL32(?,00501830), ref: 00506191
                                                                  • lstrcat.KERNEL32(?,00502734), ref: 005061B8
                                                                  • lstrcat.KERNEL32(?,0050272C), ref: 005061CE
                                                                  • lstrcat.KERNEL32(?,00502724), ref: 005061DD
                                                                  • lstrcat.KERNEL32(?,00502720), ref: 005061EB
                                                                  • DeleteFileA.KERNEL32(?), ref: 00506219
                                                                  • wsprintfA.USER32 ref: 00506232
                                                                  • GetTempPathA.KERNEL32(00000104,?), ref: 00506265
                                                                  • GetTempFileNameA.KERNEL32(?,tmp,00000000,00000000), ref: 0050627F
                                                                  • DeleteFileA.KERNEL32(00000000), ref: 005062AD
                                                                  • DeleteFileA.KERNEL32(?), ref: 005062B6
                                                                  • lstrcpy.KERNEL32(?,00000000), ref: 005062C4
                                                                  • CreateFileA.KERNEL32(?,80000000,00000003,00000000,00000003,00000080,00000000), ref: 005062EA
                                                                  • GetFileSize.KERNEL32(00000000,00000000), ref: 00506304
                                                                  • CloseHandle.KERNEL32( jP), ref: 0050630F
                                                                  • DeleteFileA.KERNEL32(?), ref: 00506339
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2729074743.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000000.00000002.2729050946.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729145703.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729168277.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_500000_mail.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: File$lstrcat$Temp$Name$Delete$Path$CloseCreateHandleModulelstrcpy$CopyPointerSizewsprintf
                                                                  • String ID: jP$%s.zip$com$doc$htm$html$tmp$txt
                                                                  • API String ID: 3181343175-3074387375
                                                                  • Opcode ID: a5d0772700f06ebca4c143b7e350f5dc79510eb46c2f0f3208337496e6dbf733
                                                                  • Instruction ID: 215d56b1a9a915398b7b7de64b2b15009c2de42112ae2f90419e4ee996d24c39
                                                                  • Opcode Fuzzy Hash: a5d0772700f06ebca4c143b7e350f5dc79510eb46c2f0f3208337496e6dbf733
                                                                  • Instruction Fuzzy Hash: 54A1B4B1940659AEDB209760CC8DFEF7FADFB51300F04085AF296D20C1D6B49A98DB66
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • CreateFileA.KERNEL32(?,80000000,00000003,00000000,00000003,00000080,00000000,75918A60,?,00000104), ref: 0050580E
                                                                  • CreateFileA.KERNEL32(?,40000000,00000003,00000000,00000002,00000080,00000000), ref: 00505833
                                                                  • memset.MSVCRT ref: 00505852
                                                                  • memset.MSVCRT ref: 0050585E
                                                                  • memset.MSVCRT ref: 0050586A
                                                                    • Part of subcall function 00505717: GetSystemTime.KERNEL32(0000002E,0000002E,?,00000000,0000001E), ref: 00505721
                                                                    • Part of subcall function 00505772: SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,75923130), ref: 00505786
                                                                    • Part of subcall function 00505772: ReadFile.KERNEL32(00000000,?,00000400,0000001E,00000000), ref: 005057CC
                                                                    • Part of subcall function 00505772: SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 005057D8
                                                                  • GetFileSize.KERNEL32(?,00000000), ref: 005058CA
                                                                  • GetFileSize.KERNEL32(?,00000000), ref: 005058D6
                                                                  • lstrlen.KERNEL32(00506207), ref: 005058E7
                                                                  • WriteFile.KERNEL32(00000000,04034B50,0000001E,?,00000000), ref: 0050590E
                                                                  • lstrlen.KERNEL32(00506207,?,00000000), ref: 00505918
                                                                  • WriteFile.KERNEL32(?,00506207,00000000), ref: 00505921
                                                                  • lstrlen.KERNEL32(00506207), ref: 00505926
                                                                  • SetFilePointer.KERNEL32(?,00000000,00000000,00000000), ref: 00505934
                                                                  • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 00505953
                                                                  • ReadFile.KERNEL32(?,?,00000400,?,00000000), ref: 00505972
                                                                  • WriteFile.KERNEL32(?,?,0000002E,?,00000000), ref: 005059A8
                                                                  • lstrlen.KERNEL32(00506207,?,00000000), ref: 005059B2
                                                                  • WriteFile.KERNEL32(?,00506207,00000000), ref: 005059BB
                                                                  • lstrlen.KERNEL32(00506207), ref: 005059C0
                                                                  • WriteFile.KERNEL32(?,06054B50,00000016,?,00000000), ref: 005059FC
                                                                  • CloseHandle.KERNEL32(?), ref: 00505A01
                                                                  • CloseHandle.KERNEL32(?), ref: 00505A0A
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2729074743.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000000.00000002.2729050946.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729145703.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729168277.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_500000_mail.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: File$Write$lstrlen$Pointermemset$CloseCreateHandleReadSize$SystemTime
                                                                  • String ID:
                                                                  • API String ID: 2136260124-3916222277
                                                                  • Opcode ID: d3892d766c3aa4be7e112a987401fd98666d2ac7ac1380c23e6cc41f9b4c72c6
                                                                  • Instruction ID: 773f872c4516b25f3d46c8f58171cf100fa68b818a43c43766e7d6fd81e4158a
                                                                  • Opcode Fuzzy Hash: d3892d766c3aa4be7e112a987401fd98666d2ac7ac1380c23e6cc41f9b4c72c6
                                                                  • Instruction Fuzzy Hash: F0710275D1125CAADF21DFA4DD88ADFBBB8FF08350F10011AF514A6260E7319A44DBA9
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • lstrcpy.KERNEL32(?,"Postmaster"), ref: 00505AB8
                                                                  • lstrcat.KERNEL32(?,00502644), ref: 00505ACA
                                                                  • lstrcat.KERNEL32(?,postmaster), ref: 00505AF6
                                                                  • lstrcat.KERNEL32(?,00501868), ref: 00505AFE
                                                                  • lstrcat.KERNEL32(?,?), ref: 00505B05
                                                                  • lstrcpy.KERNEL32(?,?), ref: 00505B12
                                                                  • lstrcat.KERNEL32(?,0050261C), ref: 00505B1E
                                                                  • lstrcat.KERNEL32(?,yahoo.com), ref: 00505BA4
                                                                  • lstrcpy.KERNEL32(?,yahoo.com), ref: 00505BB2
                                                                  • lstrcpy.KERNEL32(?,0000000A), ref: 00505BBF
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2729074743.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000000.00000002.2729050946.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729145703.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729168277.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_500000_mail.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: lstrcat$lstrcpy
                                                                  • String ID: "Automatic Email Delivery Software"$"Bounced mail"$"MAILER-DAEMON"$"Mail Administrator"$"Mail Delivery Subsystem"$"Post Office"$"Postmaster"$"Returned mail"$"The Post Office"$MAILER-DAEMON$noreply$postmaster$yahoo.com
                                                                  • API String ID: 2482611188-423193620
                                                                  • Opcode ID: 7d073a5acc986f1f03e9c764ca59b1a8bfb834ff45090a4b13ef80b0dc7bb979
                                                                  • Instruction ID: a9b0a225ccebaa74ed32a98531ce4ef3425950baae9838941721c6dfd1e2a18b
                                                                  • Opcode Fuzzy Hash: 7d073a5acc986f1f03e9c764ca59b1a8bfb834ff45090a4b13ef80b0dc7bb979
                                                                  • Instruction Fuzzy Hash: D8417771340B11A7E71097259CCEBBF7E9CFB91B01F144016F982960C2FEE59845AEB6
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                    • Part of subcall function 00506B89: lstrlen.KERNEL32(00000000,00000000,00000000), ref: 00506C46
                                                                    • Part of subcall function 00506B89: lstrlen.KERNEL32(00000000), ref: 00506C55
                                                                    • Part of subcall function 00506B89: CharLowerA.USER32(00000000), ref: 00506C74
                                                                    • Part of subcall function 00506B89: lstrcmpiA.KERNEL32(00000000,?), ref: 00506C84
                                                                  • lstrcpy.KERNEL32(?,?), ref: 00506E94
                                                                  • socket.WS2_32(00000002,00000001,00000006), ref: 00506EA0
                                                                  • connect.WS2_32(00000000,00000002,00000010), ref: 00506EBF
                                                                  • send.WS2_32(00000000,00501830,00000001,00000000), ref: 00507023
                                                                  • send.WS2_32(00000000,005071AD,00000002,00000000), ref: 00507034
                                                                  • send.WS2_32(00000000,.,00000005,00000000), ref: 0050704E
                                                                  • closesocket.WS2_32(00000000), ref: 00507086
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2729074743.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000000.00000002.2729050946.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729145703.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729168277.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_500000_mail.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: send$lstrlen$CharLowerclosesocketconnectlstrcmpilstrcpysocket
                                                                  • String ID: .$%sO %s$DATA$E%s %s$From$HEL$HLO$IL F$MA%sROM:<%s>$PT T$QUIT$RC%sO:<%s>
                                                                  • API String ID: 461202756-3815809343
                                                                  • Opcode ID: 137dcdbcc398edce13df37ae931c225a0fe07400167ff2055b513371b32ddfb0
                                                                  • Instruction ID: 33585215259ea1a97b37e4a6d099c67cd5c3f73b094bdd9841701b712144618c
                                                                  • Opcode Fuzzy Hash: 137dcdbcc398edce13df37ae931c225a0fe07400167ff2055b513371b32ddfb0
                                                                  • Instruction Fuzzy Hash: 31611936F0421D6FDB309BA4CC5DBEE7FACBB58710F204562F644E22C1D6B09A948B50
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • lstrlen.KERNEL32(00000000,?,?,?,005045DC,?,75920440,?,?,00504669), ref: 00504039
                                                                  • isspace.MSVCRT ref: 0050405A
                                                                  • isalnum.MSVCRT ref: 0050406A
                                                                  • lstrlen.KERNEL32(?,005045DC,?,75920440,?,?,00504669), ref: 00504110
                                                                  • lstrlen.KERNEL32(?), ref: 005041CD
                                                                  • lstrlen.KERNEL32(?), ref: 0050422A
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2729074743.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000000.00000002.2729050946.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729145703.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729168277.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_500000_mail.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: lstrlen$isalnumisspace
                                                                  • String ID: _-!.$_-!.@
                                                                  • API String ID: 942633883-1107819772
                                                                  • Opcode ID: 13f1972239871b3c44236b19c0e3c7acdde54ddd6e475e0e74b5625e8a80bea5
                                                                  • Instruction ID: 46a4e0ed4f2d23864a61de77937e1c011c01544acd97643bc178da60782ba0d3
                                                                  • Opcode Fuzzy Hash: 13f1972239871b3c44236b19c0e3c7acdde54ddd6e475e0e74b5625e8a80bea5
                                                                  • Instruction Fuzzy Hash: FA61F6F5908B925EEB255BB06C5833F7F98BF62312F28045EEBC1C90C2E668C481CE15
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • wsprintfA.USER32 ref: 00506807
                                                                  • wsprintfA.USER32 ref: 00506816
                                                                  • lstrlen.KERNEL32(?,To: %s,?), ref: 0050682D
                                                                  • wsprintfA.USER32 ref: 00506832
                                                                  • lstrlen.KERNEL32(?,Subject: %s,?), ref: 00506844
                                                                  • wsprintfA.USER32 ref: 00506849
                                                                  • lstrcat.KERNEL32(?,Date: ), ref: 0050685A
                                                                  • lstrlen.KERNEL32(?), ref: 0050685D
                                                                    • Part of subcall function 005032CB: GetLocalTime.KERNEL32(?), ref: 005032E0
                                                                    • Part of subcall function 005032CB: GetTimeZoneInformation.KERNEL32(?), ref: 0050330B
                                                                    • Part of subcall function 005032CB: wsprintfA.USER32 ref: 00503399
                                                                  • lstrcat.KERNEL32(?,MIME-Version: 1.0), ref: 00506871
                                                                  • lstrlen.KERNEL32(?,Content-Type: multipart/mixed;boundary="%s",?), ref: 0050687D
                                                                  • wsprintfA.USER32 ref: 00506882
                                                                  • lstrcat.KERNEL32(?,X-Priority: 3X-MSMail-Priority: NormalX-Mailer: Microsoft Outlook Express 6.00.2600.0000X-MIMEOLE: Produced By Microsoft MimeOLE V6.00.2600.0000), ref: 0050688D
                                                                  Strings
                                                                  • MIME-Version: 1.0, xrefs: 0050686B
                                                                  • X-Priority: 3X-MSMail-Priority: NormalX-Mailer: Microsoft Outlook Express 6.00.2600.0000X-MIMEOLE: Produced By Microsoft MimeOLE V6.00.2600.0000, xrefs: 00506887
                                                                  • To: %s, xrefs: 00506827
                                                                  • Date: , xrefs: 00506854
                                                                  • Subject: %s, xrefs: 0050683E
                                                                  • Content-Type: multipart/mixed;boundary="%s", xrefs: 00506877
                                                                  • NextPart, xrefs: 005067F6
                                                                  • ----=_%s_%.3u_%.4u_%.8X.%.8X, xrefs: 005067FB
                                                                  • From: %s, xrefs: 00506810
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2729074743.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000000.00000002.2729050946.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729145703.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729168277.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_500000_mail.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: wsprintf$lstrlen$lstrcat$Time$InformationLocalZone
                                                                  • String ID: MIME-Version: 1.0$----=_%s_%.3u_%.4u_%.8X.%.8X$Content-Type: multipart/mixed;boundary="%s"$Date: $From: %s$NextPart$Subject: %s$To: %s$X-Priority: 3X-MSMail-Priority: NormalX-Mailer: Microsoft Outlook Express 6.00.2600.0000X-MIMEOLE: Produced By Microsoft MimeOLE V6.00.2600.0000
                                                                  • API String ID: 1752939335-3336112092
                                                                  • Opcode ID: 4b9b89b98c63909c37f3a55d16aa84089577f12d36d32ece7d67388f72588239
                                                                  • Instruction ID: 516944fcafe1d406c4de45a34c5fbbf3ebfe04e920b5b8b11edbf61359fe2e0a
                                                                  • Opcode Fuzzy Hash: 4b9b89b98c63909c37f3a55d16aa84089577f12d36d32ece7d67388f72588239
                                                                  • Instruction Fuzzy Hash: E111BF767817153AD2047721AC8FFAFBE4CFF81B20F040425F908A21C2DAA9B61995BD
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • GetProcessHeap.KERNEL32(00000000,00001000,00000000), ref: 00503B9D
                                                                  • RtlAllocateHeap.NTDLL(00000000), ref: 00503BA0
                                                                  • socket.WS2_32(00000002,00000002,00000011), ref: 00503BBA
                                                                  • htons.WS2_32(00000000), ref: 00503BF5
                                                                  • select.WS2_32 ref: 00503C3F
                                                                  • memset.MSVCRT ref: 00503C51
                                                                  • recv.WS2_32(?,00000000,00001000,00000000), ref: 00503C61
                                                                  • htons.WS2_32(?), ref: 00503C88
                                                                  • htons.WS2_32(?), ref: 00503CA3
                                                                  • GetProcessHeap.KERNEL32(00000000,00000108), ref: 00503D10
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2729074743.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000000.00000002.2729050946.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729145703.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729168277.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_500000_mail.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Heaphtons$Process$Allocatememsetrecvselectsocket
                                                                  • String ID:
                                                                  • API String ID: 1083883850-0
                                                                  • Opcode ID: 2774ab65e68e478f934b67ed2fed43b34ffd1c969f5f9ebea79d8cc2d8644057
                                                                  • Instruction ID: 407117dfceaa818f317e20e129298f2efd80ccf421d121f9015e9229cc58b6dd
                                                                  • Opcode Fuzzy Hash: 2774ab65e68e478f934b67ed2fed43b34ffd1c969f5f9ebea79d8cc2d8644057
                                                                  • Instruction Fuzzy Hash: 8F61D2769047069FD720AF64DC48B6FBFECFF94784F100809F98997290D7709A489BA2
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • wsprintfA.USER32 ref: 005070BC
                                                                  • wsprintfA.USER32 ref: 005070D4
                                                                  • RegOpenKeyExA.ADVAPI32(80000001,?,00000000,00020019,?), ref: 005070F1
                                                                  • RegEnumKeyA.ADVAPI32(?,00000000,?,00000100), ref: 005071D8
                                                                  • RegCloseKey.ADVAPI32(?), ref: 005071E5
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2729074743.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000000.00000002.2729050946.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729145703.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729168277.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_500000_mail.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: wsprintf$CloseEnumOpen
                                                                  • String ID: %s %s$Account$Internet$SMTP$Server$Software\Microsoft\%s %s Manager\%ss
                                                                  • API String ID: 1693054222-1692917665
                                                                  • Opcode ID: d5346e02a52f48e42c981e2d26ebe83a68710e29bf017808395a5baaf78aa8eb
                                                                  • Instruction ID: 919e163466d9f41961a9d57fd17da3ca6bbeb631558065ae4de98a1fa7a4ba0d
                                                                  • Opcode Fuzzy Hash: d5346e02a52f48e42c981e2d26ebe83a68710e29bf017808395a5baaf78aa8eb
                                                                  • Instruction Fuzzy Hash: 7641F671E0021DABDB21DBA1DD49EEFBBBCFF88741F0000A5A905E2090E774AA44DB61
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • lstrlen.KERNEL32(?,This is a multi-part message in MIME format.,?,?,00000000,?,?,00506A70,?), ref: 005068B1
                                                                  • wsprintfA.USER32 ref: 005068BC
                                                                  • lstrlen.KERNEL32(?,--%sContent-Type: text/plain;charset=us-asciiContent-Transfer-Encoding: 7bit,?,?,?,00506A70,?), ref: 005068D2
                                                                  • wsprintfA.USER32 ref: 005068D7
                                                                  • lstrlen.KERNEL32(?,?,?,?,?,?), ref: 005068DD
                                                                  • lstrcat.KERNEL32(?,), ref: 005068F2
                                                                  • lstrlen.KERNEL32(?,--%sContent-Type: application/octet-stream;name="%s"Content-Transfer-Encoding: base64Content-Disposition: %s;filename="%s",?,?,attachment,?,?,?,?,?,?), ref: 00506929
                                                                  • wsprintfA.USER32 ref: 0050692E
                                                                  • lstrlen.KERNEL32(?,?), ref: 00506937
                                                                  • lstrlen.KERNEL32(?,--%s--,?), ref: 00506955
                                                                  • wsprintfA.USER32 ref: 0050695A
                                                                  Strings
                                                                  • inline, xrefs: 00506910, 0050691E
                                                                  • , xrefs: 005068EC
                                                                  • --%s--, xrefs: 0050694F
                                                                  • --%sContent-Type: text/plain;charset=us-asciiContent-Transfer-Encoding: 7bit, xrefs: 005068C9
                                                                  • This is a multi-part message in MIME format., xrefs: 005068AB
                                                                  • attachment, xrefs: 00506906
                                                                  • --%sContent-Type: application/octet-stream;name="%s"Content-Transfer-Encoding: base64Content-Disposition: %s;filename="%s", xrefs: 00506923
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2729074743.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000000.00000002.2729050946.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729145703.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729168277.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_500000_mail.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: lstrlen$wsprintf$lstrcat
                                                                  • String ID: $--%s--$--%sContent-Type: application/octet-stream;name="%s"Content-Transfer-Encoding: base64Content-Disposition: %s;filename="%s"$--%sContent-Type: text/plain;charset=us-asciiContent-Transfer-Encoding: 7bit$This is a multi-part message in MIME format.$attachment$inline
                                                                  • API String ID: 3012818462-48772991
                                                                  • Opcode ID: cae06789496e9d4e026e2ffa55617fbe67ac389098ddb8fb236da88765f6ea02
                                                                  • Instruction ID: 3fdca0e5f0ffa1fa4bef71aa3ca571d11d6ceae177e96fc01e7fdd5b86b94422
                                                                  • Opcode Fuzzy Hash: cae06789496e9d4e026e2ffa55617fbe67ac389098ddb8fb236da88765f6ea02
                                                                  • Instruction Fuzzy Hash: 2B11E472A402047BDB04A769DC8EDBF3FADEFC1720F180426F904D61C1DA39D95066B5
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2729074743.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000000.00000002.2729050946.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729145703.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729168277.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_500000_mail.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: lstrcpy$CharUpper$Buffstrstrwsprintf
                                                                  • String ID: %s.%s$.com$com
                                                                  • API String ID: 1204462619-569357965
                                                                  • Opcode ID: aff7aef32e20002ebd41d7685b69dc327a5e07d15891742e9745e351183a1eb9
                                                                  • Instruction ID: 2a81d91e2002685be900b6559790254c352ea299669c914cf5c60e1db04ad5da
                                                                  • Opcode Fuzzy Hash: aff7aef32e20002ebd41d7685b69dc327a5e07d15891742e9745e351183a1eb9
                                                                  • Instruction Fuzzy Hash: FF414BB7340B425AE7046326AC8DBBF3A9AFBD0711F11041AF781C20C1EE758A469E35
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • GetModuleHandleA.KERNEL32(iphlpapi.dll), ref: 00503F02
                                                                  • LoadLibraryA.KERNEL32(iphlpapi.dll), ref: 00503F12
                                                                  • GetProcAddress.KERNEL32(00000000,GetNetworkParams), ref: 00503F2F
                                                                  • GetProcessHeap.KERNEL32(00000000,00004000), ref: 00503F4D
                                                                  • RtlAllocateHeap.NTDLL(00000000), ref: 00503F50
                                                                  • htons.WS2_32(00000035), ref: 00503F88
                                                                  • inet_addr.WS2_32(?), ref: 00503F93
                                                                  • gethostbyname.WS2_32(?), ref: 00503FA6
                                                                  • GetProcessHeap.KERNEL32(00000000,?), ref: 00503FE3
                                                                  • HeapFree.KERNEL32(00000000), ref: 00503FE6
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2729074743.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000000.00000002.2729050946.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729145703.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729168277.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_500000_mail.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Heap$Process$AddressAllocateFreeHandleLibraryLoadModuleProcgethostbynamehtonsinet_addr
                                                                  • String ID: GetNetworkParams$iphlpapi.dll
                                                                  • API String ID: 2899438970-2099955842
                                                                  • Opcode ID: e30f29e266a04806bc51eef7561a6e33902f13042b838279bdac54ccba920e99
                                                                  • Instruction ID: acfe8a1e42ac83ed393b8fa399d380572ad7b045617876d8cdea66422d8a7479
                                                                  • Opcode Fuzzy Hash: e30f29e266a04806bc51eef7561a6e33902f13042b838279bdac54ccba920e99
                                                                  • Instruction Fuzzy Hash: C5319F35E00A07AFDF109BB89C49AAE7FBCBF14361B140115F914E32D0DB38DA459BA5
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                    • Part of subcall function 00506B89: lstrlen.KERNEL32(00000000,00000000,00000000), ref: 00506C46
                                                                    • Part of subcall function 00506B89: lstrlen.KERNEL32(00000000), ref: 00506C55
                                                                    • Part of subcall function 00506B89: CharLowerA.USER32(00000000), ref: 00506C74
                                                                    • Part of subcall function 00506B89: lstrcmpiA.KERNEL32(00000000,?), ref: 00506C84
                                                                  • lstrcpy.KERNEL32(?,?), ref: 0050726A
                                                                  • htons.WS2_32(00000019), ref: 00507288
                                                                  • lstrcpy.KERNEL32(00000000,mx.), ref: 005072D4
                                                                  • lstrcat.KERNEL32(00000000,?), ref: 005072E4
                                                                  • lstrcpy.KERNEL32(?,?), ref: 0050730B
                                                                  • htons.WS2_32(00000019), ref: 00507330
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2729074743.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000000.00000002.2729050946.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729145703.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729168277.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_500000_mail.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: lstrcpy$htonslstrlen$CharLowerlstrcatlstrcmpi
                                                                  • String ID: mail.$mx.$smtp.
                                                                  • API String ID: 3218502294-1213875280
                                                                  • Opcode ID: 804a74257488d78c00b214698439b83876a0d802025c44b510a4b9a1897df326
                                                                  • Instruction ID: 61d13515a21d5bbe502a9dd85473b184d0e7fa3ad14d9318c08b4ea8da931990
                                                                  • Opcode Fuzzy Hash: 804a74257488d78c00b214698439b83876a0d802025c44b510a4b9a1897df326
                                                                  • Instruction Fuzzy Hash: 7B417076E0821E9BDF25DBA0DD49BEE7BB8BF48300F100496F905E61C1DB70AA449B61
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • GetModuleHandleA.KERNEL32(dnsapi.dll,?,?,?,?,00504001,?,0050498D,?,?,?,00504A02,?), ref: 00503E3F
                                                                  • LoadLibraryA.KERNEL32(dnsapi.dll,?,?,?,00504001,?,0050498D,?,?,?,00504A02,?), ref: 00503E4C
                                                                  • GetProcAddress.KERNEL32(00000000,DnsQuery_A), ref: 00503E5C
                                                                  • GetProcessHeap.KERNEL32(00000000,00000108,?,?,?,?,?,00504001,?,0050498D,?,?,?,00504A02,?), ref: 00503E9B
                                                                  • RtlAllocateHeap.NTDLL(00000000,?,?), ref: 00503EA2
                                                                  • memset.MSVCRT ref: 00503EB2
                                                                  • lstrcpyn.KERNEL32(00000008,0027D9E8,000000FF,?), ref: 00503ECD
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2729074743.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000000.00000002.2729050946.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729145703.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729168277.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_500000_mail.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Heap$AddressAllocateHandleLibraryLoadModuleProcProcesslstrcpynmemset
                                                                  • String ID: DnsQuery_A$dnsapi.dll
                                                                  • API String ID: 979329682-3847274415
                                                                  • Opcode ID: dca0aab8c91f9d596bb827dcb1b0edf6cee5f3e290248c7e98bdbcda5f02536a
                                                                  • Instruction ID: 40075319653eeb29a435cd9483c3460f96daf6c4fdfe13ee8d6bb4df6979a84e
                                                                  • Opcode Fuzzy Hash: dca0aab8c91f9d596bb827dcb1b0edf6cee5f3e290248c7e98bdbcda5f02536a
                                                                  • Instruction Fuzzy Hash: 09210276504B0AABC7209F52DC08A3FBFACFF54780F104A29F145D2180DBB1E98897A5
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • CreateFileA.KERNEL32(?,80000000,00000003,00000000,00000003,00000000,00000000,?), ref: 0050668E
                                                                  • ReadFile.KERNEL32(?,?,00000400,?,00000000,?,75920440,75A78400), ref: 005066CF
                                                                  • memset.MSVCRT ref: 0050676E
                                                                  • CloseHandle.KERNEL32(?,?,75920440,75A78400), ref: 005067B5
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2729074743.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000000.00000002.2729050946.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729145703.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729168277.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_500000_mail.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: File$CloseCreateHandleReadmemset
                                                                  • String ID: =$AiP$AiP$L
                                                                  • API String ID: 1934991721-3068730819
                                                                  • Opcode ID: 4b4b3571be216019aa3e8e3fed23bcde9ca09769882202b2b4a052264b8fe6bc
                                                                  • Instruction ID: 75c36a7ddd45a5937c5c7dc736fdda1d92c830406bf875cefc640d4579443e51
                                                                  • Opcode Fuzzy Hash: 4b4b3571be216019aa3e8e3fed23bcde9ca09769882202b2b4a052264b8fe6bc
                                                                  • Instruction Fuzzy Hash: 24418034900299EBDF11CF98C884AEEBFB9FF46304F1045A5E991A7182D3709A51CBA1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • memset.MSVCRT ref: 00502DA8
                                                                  • gethostname.WS2_32(?,00000100), ref: 00502DB8
                                                                  • lstrcat.KERNEL32(?,root), ref: 00502DD0
                                                                  • lstrcat.KERNEL32(00000000,00000000), ref: 00502E19
                                                                  • lstrcat.KERNEL32(00000000,00000000), ref: 00502E29
                                                                  • CreateMutexA.KERNEL32(00000000,00000001,00000000), ref: 00502E36
                                                                  • GetLastError.KERNEL32 ref: 00502E3C
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2729074743.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000000.00000002.2729050946.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729145703.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729168277.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_500000_mail.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: lstrcat$CreateErrorLastMutexgethostnamememset
                                                                  • String ID: root
                                                                  • API String ID: 3016363891-385153371
                                                                  • Opcode ID: 8a72bc0ed65294613998b6506ccfb39ae7e57c9a2bb16a50c2e50e91b418762a
                                                                  • Instruction ID: f5e5deb4a2873d9f3c4a82aa4f30ac048af43ff210c46692099915afef873f95
                                                                  • Opcode Fuzzy Hash: 8a72bc0ed65294613998b6506ccfb39ae7e57c9a2bb16a50c2e50e91b418762a
                                                                  • Instruction Fuzzy Hash: 1511E67794025C6BDB229B74EC49FEE3B6CBB69300F0401D6E585E20C1D6B49ACB8B65
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2729074743.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000000.00000002.2729050946.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729145703.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729168277.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_500000_mail.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: lstrcat$PathTemplstrcpylstrlen
                                                                  • String ID: .log$\$zincite
                                                                  • API String ID: 1195028341-2520228640
                                                                  • Opcode ID: 9b8db98ae055c8dff7040cdb26ef09709199bca6636e77b7a4b7fff887e6c2cb
                                                                  • Instruction ID: b4afade12c0fc9fcd69d2ee1c841bfa627f913ce1fee5f64901a70284f785ff6
                                                                  • Opcode Fuzzy Hash: 9b8db98ae055c8dff7040cdb26ef09709199bca6636e77b7a4b7fff887e6c2cb
                                                                  • Instruction Fuzzy Hash: B70186B180455D9BDF109F74DD9DFDE7FBCAB24300F5000A1A6C4D2091D6B0AAC88F51
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • CreateFileA.KERNEL32(00000020,80000000,00000003,00000000,00000003,00000080,00000000,75920F10,00000000), ref: 00504F0C
                                                                  • GetFileSize.KERNEL32(00000000,00000000), ref: 00504F2A
                                                                  • CreateFileMappingA.KERNEL32(00000000,00000000,00000002,00000000,00000000,00000000), ref: 00504F3A
                                                                  • MapViewOfFile.KERNEL32(00000000,00000004,00000000,00000000,00000000,00000000), ref: 00504F5B
                                                                  • memset.MSVCRT ref: 00504F89
                                                                  • UnmapViewOfFile.KERNEL32(00000000), ref: 00504FCC
                                                                  • CloseHandle.KERNEL32(?), ref: 00504FD5
                                                                  • CloseHandle.KERNEL32(?), ref: 00504FDF
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2729074743.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000000.00000002.2729050946.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729145703.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729168277.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_500000_mail.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: File$CloseCreateHandleView$MappingSizeUnmapmemset
                                                                  • String ID:
                                                                  • API String ID: 3315828190-0
                                                                  • Opcode ID: ea459288a82a99d4b24cf1e29823d3646dec14334e4c9beca5f678ee1d7cd67b
                                                                  • Instruction ID: 0ab0f1c3a718459e2b74eb1b04299cdf3ef3ce68078fedbeea16834dce009e45
                                                                  • Opcode Fuzzy Hash: ea459288a82a99d4b24cf1e29823d3646dec14334e4c9beca5f678ee1d7cd67b
                                                                  • Instruction Fuzzy Hash: 1D31D5F190438AAFDB206F649C88EAE7FACFB04359F100529FB92D22D1D7209C45CB61
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • lstrlen.KERNEL32(00000000,?), ref: 00504652
                                                                  • lstrcmpiA.KERNEL32(0000000A,?), ref: 00504689
                                                                  • lstrlen.KERNEL32(?), ref: 005046A1
                                                                  • GetProcessHeap.KERNEL32(?,-0000000F), ref: 005046AA
                                                                  • RtlAllocateHeap.NTDLL(00000000), ref: 005046B1
                                                                  • memset.MSVCRT ref: 005046C9
                                                                  • GetTickCount.KERNEL32 ref: 005046D5
                                                                  • lstrcpy.KERNEL32(0000000A,?), ref: 005046EE
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2729074743.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000000.00000002.2729050946.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729145703.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729168277.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_500000_mail.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Heaplstrlen$AllocateCountProcessTicklstrcmpilstrcpymemset
                                                                  • String ID:
                                                                  • API String ID: 518059893-0
                                                                  • Opcode ID: 1daf1c05f38e62147fa237e0655a6596e761156900e08a1e520a1545e835069c
                                                                  • Instruction ID: 707180101a398f47e83f4d7edf7de099827023ee405d7e436c1cd2a4ce101803
                                                                  • Opcode Fuzzy Hash: 1daf1c05f38e62147fa237e0655a6596e761156900e08a1e520a1545e835069c
                                                                  • Instruction Fuzzy Hash: E2212676800655ABC7219F64DC08BDF7BE8FB19350F004865EA86D3290E770E9489FA1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • isdigit.MSVCRT ref: 005034F2
                                                                  • memset.MSVCRT ref: 00503548
                                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000014,00000000,00000000,?,?,00000000), ref: 00503572
                                                                  • lstrlen.KERNEL32(00000000,?,?,00000000), ref: 0050358E
                                                                  • lstrlen.KERNEL32(?,?,?,00000000), ref: 005035A9
                                                                  • lstrlen.KERNEL32(00000000,?,?,00000000), ref: 005035F0
                                                                  • memcpy.MSVCRT ref: 00503602
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2729074743.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000000.00000002.2729050946.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729145703.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729168277.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_500000_mail.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: lstrlen$ByteCharMultiWideisdigitmemcpymemset
                                                                  • String ID:
                                                                  • API String ID: 3478709927-0
                                                                  • Opcode ID: 20185cf25f03a19cac97d795cc106f02322d58cc053b962646699da87d9d3388
                                                                  • Instruction ID: 23a442e20ae22f83cb2f45545b469242e3b658874f908f9248848cc5510e9995
                                                                  • Opcode Fuzzy Hash: 20185cf25f03a19cac97d795cc106f02322d58cc053b962646699da87d9d3388
                                                                  • Instruction Fuzzy Hash: BE41B471804299AFDB25CFA4C988AEE7FACAF19344F14019DD882A7191D6719F49CB60
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2729074743.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000000.00000002.2729050946.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729145703.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729168277.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_500000_mail.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 4b01e0d636c3c5e7f2603455e11ec21e70862c83b27c4529908b2baa5dc44e6a
                                                                  • Instruction ID: 1af87907bf89bedeb0649b551357384cbbe48afd0fdc4005cd780a5b5450faca
                                                                  • Opcode Fuzzy Hash: 4b01e0d636c3c5e7f2603455e11ec21e70862c83b27c4529908b2baa5dc44e6a
                                                                  • Instruction Fuzzy Hash: 7841B039A00219ABCB00DFA5CC84AEEBBF8FF48715F104456E959E7291E3749A41CB64
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • GetProcessHeap.KERNEL32(00000000,00000090,00000000,?,?,005049A9,?,00000000,?,?,00504A02,?), ref: 005048E1
                                                                  • RtlAllocateHeap.NTDLL(00000000,?,005049A9), ref: 005048E8
                                                                  • memset.MSVCRT ref: 005048FC
                                                                  • lstrcpyn.KERNEL32(00000010,?,0000007F,?), ref: 00504915
                                                                  • GetTickCount.KERNEL32 ref: 0050491B
                                                                  • GetTickCount.KERNEL32 ref: 00504942
                                                                  • lstrcpyn.KERNEL32(00000010,?,0000007F,?,005049A9,?,00000000,?,?,00504A02,?), ref: 0050495B
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2729074743.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000000.00000002.2729050946.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729145703.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729168277.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_500000_mail.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CountHeapTicklstrcpyn$AllocateProcessmemset
                                                                  • String ID:
                                                                  • API String ID: 2696074827-0
                                                                  • Opcode ID: 1c86731311e4b75f3192dccd85ac791b4297224c5a05b58980cdcf0866b5c10e
                                                                  • Instruction ID: 703d1ba90af1539a1c1e71d69a92d341ab7fc86eaf6e4218c2875852d7dfb891
                                                                  • Opcode Fuzzy Hash: 1c86731311e4b75f3192dccd85ac791b4297224c5a05b58980cdcf0866b5c10e
                                                                  • Instruction Fuzzy Hash: A0214AB2900B919FD730DF64D98896FBBE4FF54700B108D2DE69AD3691D334A8489F51
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                    • Part of subcall function 005073E8: GetTempPathA.KERNEL32(00000104,?), ref: 005073FD
                                                                    • Part of subcall function 005073E8: lstrlen.KERNEL32(?), ref: 0050740A
                                                                    • Part of subcall function 005073E8: lstrcat.KERNEL32(?,zincite), ref: 00507448
                                                                    • Part of subcall function 005073E8: lstrcat.KERNEL32(?,.log), ref: 00507456
                                                                    • Part of subcall function 005073E8: lstrcpy.KERNEL32(?,?), ref: 00507462
                                                                  • CreateFileA.KERNEL32(?,80000000,00000003,00000000,00000003,00000080,00000000,00000104), ref: 0050757A
                                                                  • WriteFile.KERNEL32( _P,?,00000000,00000000,00000000), ref: 005075B7
                                                                  • ReadFile.KERNEL32(00000000,?,00000100,00000000,00000000,00000000,00000000), ref: 005075D0
                                                                  • CloseHandle.KERNEL32(?), ref: 005075DA
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2729074743.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000000.00000002.2729050946.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729145703.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729168277.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_500000_mail.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: File$lstrcat$CloseCreateHandlePathReadTempWritelstrcpylstrlen
                                                                  • String ID: _P$ _P
                                                                  • API String ID: 285733917-3595566573
                                                                  • Opcode ID: a1883ad2f206a693e9717ab779b99790b24625ca6c7e82073e9dc987f6aa6288
                                                                  • Instruction ID: 95e29d51a280f3ee1416f365a270c88ebcaea3d62707c39128d041610a3427a9
                                                                  • Opcode Fuzzy Hash: a1883ad2f206a693e9717ab779b99790b24625ca6c7e82073e9dc987f6aa6288
                                                                  • Instruction Fuzzy Hash: 3211FAB690410CFFEB11DB94DC88EEEBB7CEB58354F1001A6B681A2090DA706F84DB60
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • GetModuleHandleA.KERNEL32(urlmon.dll,?,00000200), ref: 0050795B
                                                                  • LoadLibraryA.KERNEL32(urlmon.dll,?,00000200), ref: 00507966
                                                                  • GetProcAddress.KERNEL32(00000000,URLDownloadToCacheFileA), ref: 00507976
                                                                  • lstrcpy.KERNEL32(?,?), ref: 005079A8
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2729074743.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000000.00000002.2729050946.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729145703.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729168277.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_500000_mail.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: AddressHandleLibraryLoadModuleProclstrcpy
                                                                  • String ID: URLDownloadToCacheFileA$urlmon.dll
                                                                  • API String ID: 1765825236-446873360
                                                                  • Opcode ID: 8d756ae2cdbdadfac3edac27fec9d7869389870997cdf4f7ecb942f188448ba0
                                                                  • Instruction ID: 185a24763c0bcb0fc453a4a8a7a4dc2d3681b975c5b2d20548b30850ca32465b
                                                                  • Opcode Fuzzy Hash: 8d756ae2cdbdadfac3edac27fec9d7869389870997cdf4f7ecb942f188448ba0
                                                                  • Instruction Fuzzy Hash: A0F0C872A0861977E7115B748C59FEF7F6CAF59B40F000424FA45D10C0EBB0E54986A5
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • GetTempPathA.KERNEL32(00000104,?,00000000,?), ref: 00505F41
                                                                  • GetTempFileNameA.KERNEL32(?,tmp,00000000,?), ref: 00505F5C
                                                                  • CopyFileA.KERNEL32(005065B9,?,00000000), ref: 00505F75
                                                                    • Part of subcall function 00505EE3: CreateFileA.KERNEL32(00000003,C0000000,00000003,00000000,00000003,00000080,00000000,?,00506082,?), ref: 00505EFA
                                                                    • Part of subcall function 00505EE3: SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 00505F14
                                                                    • Part of subcall function 00505EE3: CloseHandle.KERNEL32(00000000), ref: 00505F22
                                                                  • DeleteFileA.KERNEL32(005065B9), ref: 00505F94
                                                                  • lstrcpy.KERNEL32(005065B9,?), ref: 00505FA2
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2729074743.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000000.00000002.2729050946.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729145703.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729168277.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_500000_mail.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: File$Temp$CloseCopyCreateDeleteHandleNamePathPointerlstrcpy
                                                                  • String ID: tmp
                                                                  • API String ID: 2319981759-753892680
                                                                  • Opcode ID: edf9a31c2175ba5224d3b1140d48908c277679a7e7ee6f9f0873a1c53c273d39
                                                                  • Instruction ID: b6d547f1361db50440f4c558ef177c196600c1e2c9737aacd924c07538a66ded
                                                                  • Opcode Fuzzy Hash: edf9a31c2175ba5224d3b1140d48908c277679a7e7ee6f9f0873a1c53c273d39
                                                                  • Instruction Fuzzy Hash: B101A2B690065AAFDB109B60DC8DFDE7BBCAB54700F000095F6C5E2091E6B466C9CF62
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • lstrlen.KERNEL32(?,?,?,?,005045EB,75920440,?,?,00504669), ref: 00504311
                                                                  • lstrlen.KERNEL32(?,?,005045EB,75920440,?,?,00504669), ref: 0050433A
                                                                  • lstrlen.KERNEL32(0050B178,?,005045EB,75920440,?,?,00504669), ref: 00504373
                                                                  • lstrlen.KERNEL32(0050B280,?,005045EB,75920440,?,?,00504669), ref: 0050438D
                                                                  • lstrlen.KERNEL32(0050B280,?,005045EB,75920440,?,?,00504669), ref: 005043A3
                                                                  • lstrlen.KERNEL32(0050B178,?,005045EB,75920440,?,?,00504669), ref: 005043FB
                                                                  • lstrlen.KERNEL32(0050B178,?,005045EB,75920440,?,?,00504669), ref: 00504410
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2729074743.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000000.00000002.2729050946.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729145703.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729168277.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_500000_mail.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: lstrlen
                                                                  • String ID:
                                                                  • API String ID: 1659193697-0
                                                                  • Opcode ID: 7234369e607e997fc05737b92fa64be9d20d6ac8b389998761447fe385796dbe
                                                                  • Instruction ID: 2d6b92822a5ce253097b69b3c07574bdd26a63d487101100c5e09b38dca8b49d
                                                                  • Opcode Fuzzy Hash: 7234369e607e997fc05737b92fa64be9d20d6ac8b389998761447fe385796dbe
                                                                  • Instruction Fuzzy Hash: CB419FF0A4564ACBFB214F34AEF836E3EE4B759705F90152ADB41C72A1E7248889DF01
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2729074743.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000000.00000002.2729050946.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729145703.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729168277.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_500000_mail.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: DeleteFileGlobal$AllocFreelstrlenmemset
                                                                  • String ID:
                                                                  • API String ID: 986129705-0
                                                                  • Opcode ID: c0b672306122552f2995b5b1776029508f415337df1c08127a0dd511841b9662
                                                                  • Instruction ID: 64ff1dbb5a700912d54094296ca3f5a4976b8a1cb91408c58090539e8bb41b0b
                                                                  • Opcode Fuzzy Hash: c0b672306122552f2995b5b1776029508f415337df1c08127a0dd511841b9662
                                                                  • Instruction Fuzzy Hash: 6631AA72D04259DBDB10EB61DC89ADD7BB9FF85700F1044EAE109E6181D734AE948FA0
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2729074743.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000000.00000002.2729050946.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729145703.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729168277.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_500000_mail.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: htons$CountTickmemsetsendto
                                                                  • String ID:
                                                                  • API String ID: 2621409306-0
                                                                  • Opcode ID: b3b5947bce572049420d80081d79d006cc1fcd4d3d740dc27c7c1cedb21463b1
                                                                  • Instruction ID: db08ba042e804f953b88991fca2d77eeadd2c4749c7c0b9e33eca97f00638003
                                                                  • Opcode Fuzzy Hash: b3b5947bce572049420d80081d79d006cc1fcd4d3d740dc27c7c1cedb21463b1
                                                                  • Instruction Fuzzy Hash: 1E312121A0025A5BDB258FB48C04BEE7BE8FF14304F1440B8EA09A7291E3B05E86CB59
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • lstrcpyn.KERNEL32(?,-00000009,0000007F,00000000), ref: 00504824
                                                                  • lstrlen.KERNEL32(?), ref: 0050482E
                                                                  • GetProcessHeap.KERNEL32(00000000,-0000000A), ref: 0050483A
                                                                  • RtlAllocateHeap.NTDLL(00000000), ref: 00504841
                                                                  • lstrcpy.KERNEL32(00000000,?), ref: 00504852
                                                                  • CreateThread.KERNEL32(00000000,00000000,0050477F,00000000,00000000,?), ref: 00504868
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2729074743.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000000.00000002.2729050946.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729145703.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729168277.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_500000_mail.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Heap$AllocateCreateProcessThreadlstrcpylstrcpynlstrlen
                                                                  • String ID:
                                                                  • API String ID: 3371211169-0
                                                                  • Opcode ID: b0110b9564446553085c75ac71a692edf586f148188e76fdc507fc1a0d64157a
                                                                  • Instruction ID: 07f746d2b3960384b515d2a8365d25916a05af25f1ccb339341a6fe92818cc76
                                                                  • Opcode Fuzzy Hash: b0110b9564446553085c75ac71a692edf586f148188e76fdc507fc1a0d64157a
                                                                  • Instruction Fuzzy Hash: AA11E2B5E00AA59BEB208BB59D5DBBE3BACFF50700F148811FB46D70D0EB20C8058B65
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • InterlockedIncrement.KERNEL32(0050B390), ref: 00504A3F
                                                                  • GetCurrentThread.KERNEL32 ref: 00504A47
                                                                  • SetThreadPriority.KERNEL32(00000000), ref: 00504A4E
                                                                  • InterlockedDecrement.KERNEL32(0050B390), ref: 00504A75
                                                                  • RtlExitUserThread.NTDLL(00000000), ref: 00504A7D
                                                                    • Part of subcall function 005049C5: lstrcpyn.KERNEL32(?,?,0000007F), ref: 005049F3
                                                                    • Part of subcall function 005049C5: GlobalFree.KERNEL32(00000000), ref: 00504A22
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2729074743.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000000.00000002.2729050946.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729145703.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729168277.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_500000_mail.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Thread$Interlocked$CurrentDecrementExitFreeGlobalIncrementPriorityUserlstrcpyn
                                                                  • String ID:
                                                                  • API String ID: 3760226487-0
                                                                  • Opcode ID: 4cbbf26141544510d966b90899a4a27ebab7c4cfef4a543942c3c1baaca5dbd7
                                                                  • Instruction ID: 59da798909faaf52fbb5bb2341fb00456894eff524a9a69de734a8fe505154a2
                                                                  • Opcode Fuzzy Hash: 4cbbf26141544510d966b90899a4a27ebab7c4cfef4a543942c3c1baaca5dbd7
                                                                  • Instruction Fuzzy Hash: 79E0E532504690DBD3105BA5AC1CB9F7FE8BB95721F05C519F19AC21D187701088AA7B
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • GetCurrentThread.KERNEL32 ref: 00504782
                                                                  • SetThreadPriority.KERNEL32(00000000), ref: 00504789
                                                                  • RtlExitUserThread.NTDLL(00000000), ref: 005047B0
                                                                    • Part of subcall function 00504708: memset.MSVCRT ref: 00504721
                                                                    • Part of subcall function 00504708: memset.MSVCRT ref: 0050474B
                                                                  • GetProcessHeap.KERNEL32(00000000,?), ref: 005047A1
                                                                  • HeapFree.KERNEL32(00000000), ref: 005047A8
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2729074743.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000000.00000002.2729050946.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729145703.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729168277.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_500000_mail.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Thread$Heapmemset$CurrentExitFreePriorityProcessUser
                                                                  • String ID:
                                                                  • API String ID: 2017824994-0
                                                                  • Opcode ID: 836c254a06e8348137cac086d59406f412e6514e815de78c3af08e5fd35cbc47
                                                                  • Instruction ID: 134dd03ee56ed5e35b093408589009be06d3af64b950e7fdb32cbac4dc487e3d
                                                                  • Opcode Fuzzy Hash: 836c254a06e8348137cac086d59406f412e6514e815de78c3af08e5fd35cbc47
                                                                  • Instruction Fuzzy Hash: 66E0EC72545A60ABD6102BA1AD1DB8E3FA8EF15762F054101F69A960E08B6054849ABB
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2729074743.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000000.00000002.2729050946.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729145703.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729168277.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_500000_mail.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: isspace$lstrcpy
                                                                  • String ID: EP
                                                                  • API String ID: 3591682678-39091752
                                                                  • Opcode ID: 97e05d28098dfa30c11553f396c773aa8e9dcaeee145c2bf642825238118a22f
                                                                  • Instruction ID: d322a60b3cd344418dea32cdce2ecae7b80887596fe3726befac56383c2b426d
                                                                  • Opcode Fuzzy Hash: 97e05d28098dfa30c11553f396c773aa8e9dcaeee145c2bf642825238118a22f
                                                                  • Instruction Fuzzy Hash: 2011E7E96087D39EEB224EB4444477E7FD87F56311F0805A9F7D0861D6C3A48885CBA1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • GetModuleHandleA.KERNEL32(kernel32.dll), ref: 005031C3
                                                                  • GetProcAddress.KERNEL32(00000000,RegisterServiceProcess), ref: 005031D2
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2729074743.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000000.00000002.2729050946.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729145703.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729168277.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_500000_mail.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: AddressHandleModuleProc
                                                                  • String ID: RegisterServiceProcess$kernel32.dll
                                                                  • API String ID: 1646373207-4020013434
                                                                  • Opcode ID: 88f355962e72c872d7e8e3649b1a006756f8412f5a34d5979d28c820e35911b0
                                                                  • Instruction ID: a02a020f7e88b2a2deb55d5915b0d8113451b0eb92c2fbf378a69a289d5184d3
                                                                  • Opcode Fuzzy Hash: 88f355962e72c872d7e8e3649b1a006756f8412f5a34d5979d28c820e35911b0
                                                                  • Instruction Fuzzy Hash: A711BF10D0C6C999FB0297B8891979EBEA61F22749F0840C894846A2D2C6FF5718D3B6
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • lstrlen.KERNEL32(00000000,00000000,00000000), ref: 00506C46
                                                                  • lstrlen.KERNEL32(00000000), ref: 00506C55
                                                                  • CharLowerA.USER32(00000000), ref: 00506C74
                                                                  • lstrcmpiA.KERNEL32(00000000,?), ref: 00506C84
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.2729074743.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000000.00000002.2729050946.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729074743.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729145703.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.2729168277.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_500000_mail.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: lstrlen$CharLowerlstrcmpi
                                                                  • String ID:
                                                                  • API String ID: 1011886143-0
                                                                  • Opcode ID: 1614e062b7db843fd35929ba8e3fbe92fee8bfd64a38d3db1eeeb3163424b487
                                                                  • Instruction ID: a780f0e17b679421bcea0a2979c9bb813d318467be715c50e32b2a5f4f05fe6d
                                                                  • Opcode Fuzzy Hash: 1614e062b7db843fd35929ba8e3fbe92fee8bfd64a38d3db1eeeb3163424b487
                                                                  • Instruction Fuzzy Hash: F351D476A481994AFF364B2C84187FC7FD6FB26340F9814AAC8C1861D6D2648CF3C75A
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Execution Graph

                                                                  Execution Coverage:33.4%
                                                                  Dynamic/Decrypted Code Coverage:0%
                                                                  Signature Coverage:9.9%
                                                                  Total number of Nodes:232
                                                                  Total number of Limit Nodes:6
                                                                  execution_graph 795 402110 WSAStartup 798 401f0e GetProcessHeap RtlAllocateHeap 795->798 799 401f37 798->799 800 401f2e 798->800 829 4022e0 GetProcessHeap RtlAllocateHeap 799->829 811 401fb8 socket bind 812 401f94 closesocket Sleep htons 811->812 813 401fd5 listen 811->813 812->811 863 402b3b GetTickCount 813->863 817 402b3b GetTickCount 818 40200a 817->818 818->817 819 402043 select 818->819 821 401d22 6 API calls 818->821 824 401c50 36 API calls 818->824 869 402714 818->869 822 402085 GetProcessHeap RtlAllocateHeap 819->822 823 40207c Sleep 819->823 821->818 825 4020b2 accept 822->825 826 40209b accept closesocket 822->826 823->818 824->818 827 4020f0 CreateThread CloseHandle 825->827 828 4020dc GetProcessHeap HeapFree 825->828 826->818 827->818 828->818 830 4022fa 829->830 831 401f44 829->831 873 402180 830->873 831->800 833 402746 831->833 881 4028c8 833->881 835 40275b gethostname 836 402771 835->836 837 4027af lstrlen 836->837 838 4027df 836->838 837->836 839 4027ec GetProcessHeap RtlAllocateHeap 838->839 840 401f58 839->840 841 40280e GetTempPathA 839->841 846 40272d 840->846 842 402846 lstrlen 841->842 845 402825 841->845 843 4028b5 lstrcpy 842->843 844 40286b 842->844 843->840 844->843 845->842 847 401f64 846->847 848 402735 846->848 850 401d22 GetModuleFileNameA RegOpenKeyExA 847->850 848->847 882 402667 CreateFileA 848->882 851 401e52 lstrlen RegSetValueExA RegCloseKey 850->851 852 401e3d RegOpenKeyExA 850->852 853 401e81 851->853 852->851 852->853 854 401c50 GetTempPathA lstrlen 853->854 855 401c7c 854->855 856 401c9d lstrcat lstrcat 854->856 855->856 857 402667 19 API calls 856->857 858 401ccf CreateFileA 857->858 859 401cf7 858->859 860 401d1f htons 858->860 919 402528 859->919 860->811 864 401fe8 CreateThread 863->864 865 401e86 GetModuleHandleA 864->865 951 401c36 864->951 866 401ef7 GetProcAddress 865->866 867 401f0c 865->867 866->867 868 401f06 866->868 867->818 868->867 870 40272a 869->870 871 40271c 869->871 870->818 871->870 942 402409 CreateFileA 871->942 874 402184 873->874 875 402187 873->875 874->831 876 4021de GetProcessHeap RtlAllocateHeap 875->876 878 402197 875->878 879 4021bd 876->879 878->879 880 4021a1 GetProcessHeap RtlReAllocateHeap 878->880 879->831 880->879 881->835 883 402691 882->883 884 402696 882->884 883->847 891 402c20 SetFilePointer ReadFile 884->891 887 4026c7 ReadFile 888 402706 FindCloseChangeNotification 887->888 890 4026b1 887->890 888->883 890->887 890->888 900 40238e 890->900 892 402c5d SetFilePointer 891->892 893 40269c SetFilePointer 891->893 892->893 894 402c70 ReadFile 892->894 893->890 894->893 895 402c86 894->895 895->893 896 402ca7 SetFilePointer 895->896 897 402cc8 ReadFile 896->897 898 402cfb 896->898 897->893 899 402ce1 897->899 898->893 899->897 899->898 901 40239e 900->901 901->901 902 4023aa htonl 901->902 903 4023c0 htonl 902->903 903->903 906 4023d1 903->906 904 4023d5 904->890 905 4023dd htonl 905->906 906->904 906->905 908 402241 906->908 915 402159 908->915 910 402286 910->906 911 40224d 911->910 912 402180 4 API calls 911->912 913 402275 912->913 913->910 914 402b3b GetTickCount 913->914 914->910 916 402168 915->916 917 402160 Sleep 916->917 918 40216e 916->918 917->916 918->911 930 4024ab gethostname gethostbyname 919->930 922 401d15 FindCloseChangeNotification 922->860 923 40255d GetProcessHeap RtlAllocateHeap 923->922 924 402580 923->924 925 402159 Sleep 924->925 927 402591 925->927 926 402650 GetProcessHeap HeapFree 926->922 927->926 935 402311 927->935 929 402632 WriteFile 929->926 929->927 931 402526 930->931 932 4024d9 930->932 931->922 931->923 932->931 933 402311 3 API calls 932->933 934 402510 WriteFile 933->934 934->931 936 402326 935->936 937 402355 936->937 941 402343 htonl 936->941 938 40235d htonl 937->938 938->938 939 40236f htonl 938->939 940 40237d 939->940 940->929 940->940 941->936 943 402433 942->943 944 402438 942->944 943->870 945 402159 Sleep 944->945 947 402442 945->947 946 402498 FindCloseChangeNotification 946->943 947->946 948 402311 3 API calls 947->948 949 40247a WriteFile 948->949 949->947 950 402497 949->950 950->946 952 401c47 RtlExitUserThread 951->952 953 401c3d 951->953 956 401af2 953->956 958 401b00 956->958 959 402159 Sleep 958->959 964 401b09 Sleep 958->964 965 402bdc GetModuleHandleA 958->965 970 401947 gethostname gethostbyname 958->970 972 4019a3 958->972 991 401a97 958->991 959->958 964->958 966 402bf9 GetProcAddress 965->966 967 402bee LoadLibraryA 965->967 968 402c09 966->968 969 402c0e InternetGetConnectedState 966->969 967->966 967->968 968->958 969->968 971 401973 970->971 971->958 973 401947 2 API calls 972->973 974 4019b3 973->974 975 4019c0 htons socket connect 974->975 976 4019b8 974->976 977 401a88 closesocket 975->977 978 4019fd 975->978 976->958 977->976 979 402159 Sleep 978->979 980 401a08 979->980 981 401a31 980->981 982 401a19 980->982 984 402241 6 API calls 981->984 983 402b3b GetTickCount 982->983 985 401a1e 983->985 984->985 986 401a43 send 985->986 987 401a56 recv 986->987 988 401a75 987->988 989 401a86 987->989 988->987 988->989 990 40238e 9 API calls 988->990 989->977 990->988 992 401aa5 991->992 996 401ae6 991->996 993 4019a3 17 API calls 992->993 994 401abd 993->994 994->996 997 402298 994->997 996->958 998 402159 Sleep 997->998 999 4022a3 998->999 999->996 1000 406770 1001 406788 1000->1001 1002 406882 LoadLibraryA 1001->1002 1003 4068c7 1001->1003 1004 4068ab GetProcAddress 1001->1004 1002->1001 1004->1001 1005 4068c1 ExitProcess 1004->1005 1006 401910 1007 401919 1006->1007 1008 40193e RtlExitUserThread 1006->1008 1013 4017e4 1007->1013 1010 40191f 1011 401927 closesocket 1010->1011 1012 40192e GetProcessHeap HeapFree 1010->1012 1011->1012 1012->1008 1014 402159 Sleep 1013->1014 1016 4017fa 1014->1016 1015 401811 1018 40181e recv 1015->1018 1016->1015 1017 402b3b GetTickCount 1016->1017 1017->1015 1019 401839 1018->1019 1032 40188c 1018->1032 1020 401902 1019->1020 1021 401848 1019->1021 1055 4015ee GetProcessHeap RtlAllocateHeap 1020->1055 1023 4018fa 1021->1023 1024 40184f 1021->1024 1035 4012c6 1023->1035 1026 401852 1024->1026 1027 40188e 1024->1027 1029 401859 recv 1026->1029 1031 40238e 9 API calls 1026->1031 1026->1032 1028 402159 Sleep 1027->1028 1030 401894 1028->1030 1029->1026 1029->1032 1030->1032 1033 402311 3 API calls 1030->1033 1031->1026 1032->1010 1034 4018d5 send 1033->1034 1034->1030 1034->1032 1036 4012f8 recv 1035->1036 1037 4015db 1036->1037 1038 40131d 1036->1038 1037->1032 1038->1036 1039 401323 GetTempPathA lstrlen 1038->1039 1040 401366 GetTickCount GetTickCount lstrlen wsprintfA CreateFileA 1039->1040 1041 401346 1039->1041 1040->1037 1045 4013cb 1040->1045 1041->1040 1042 401419 recv 1043 401432 closesocket 1042->1043 1042->1045 1048 40146a 1043->1048 1044 401403 WriteFile 1044->1042 1045->1042 1045->1044 1045->1045 1046 4015e3 CloseHandle 1047 4015ce DeleteFileA 1046->1047 1047->1037 1048->1046 1049 4014ba SetFilePointer htonl 1048->1049 1050 4014d9 1049->1050 1052 40152a 1049->1052 1051 4014ea ReadFile 1050->1051 1050->1052 1051->1046 1051->1050 1052->1046 1053 401555 CloseHandle wsprintfA CreateProcessA 1052->1053 1053->1047 1054 4015b9 WaitForSingleObject CloseHandle CloseHandle 1053->1054 1054->1047 1056 401619 1055->1056 1061 4017dd 1055->1061 1057 402159 Sleep 1056->1057 1058 40162c 1057->1058 1062 402b9a htonl 1058->1062 1066 4016c2 1058->1066 1059 4017bf GetProcessHeap HeapFree 1060 402241 6 API calls 1059->1060 1060->1061 1061->1032 1062->1058 1063 40175d 1063->1059 1065 402311 3 API calls 1063->1065 1064 402b9a htonl 1064->1066 1067 40179c send 1065->1067 1066->1063 1066->1064 1067->1063 1068 4017bc 1067->1068 1068->1059

                                                                  Callgraph

                                                                  • Executed
                                                                  • Not Executed
                                                                  • Opacity -> Relevance
                                                                  • Disassembly available
                                                                  callgraph 0 Function_00402241 17 Function_00402159 0->17 45 Function_00402180 0->45 71 Function_0040221C 0->71 93 Function_00402B3B 0->93 1 Function_004057C5 2 Function_00402746 5 Function_004028C8 2->5 11 Function_00402AD0 2->11 79 Function_00402A28 2->79 3 Function_004012C6 3->5 3->11 40 Function_00402EFA 3->40 3->79 4 Function_00401947 6 Function_004054C8 7 Function_00405C49 8 Function_004010CA 9 Function_0040634E 10 Function_00401C50 27 Function_00402667 10->27 28 Function_00402B68 10->28 78 Function_00402528 10->78 11->79 12 Function_00405A55 13 Function_004064D5 14 Function_00405FD7 15 Function_00405BD8 16 Function_00405959 18 Function_00405C5A 19 Function_004066DB 20 Function_00402BDC 21 Function_0040545E 22 Function_0040595E 23 Function_004022E0 23->45 24 Function_00405C63 25 Function_004066E3 26 Function_004017E4 26->3 26->17 32 Function_004015EE 26->32 39 Function_00402177 26->39 59 Function_0040238E 26->59 64 Function_00402311 26->64 26->71 26->93 27->59 72 Function_00402C20 27->72 29 Function_004056E9 30 Function_0040566A 31 Function_00405B6B 32->0 32->17 32->39 48 Function_00402B84 32->48 32->64 70 Function_00402B9A 32->70 90 Function_00402134 32->90 33 Function_00405AEF 34 Function_00406770 35 Function_004028F0 36 Function_00406571 37 Function_00405C72 38 Function_00401AF2 38->4 38->17 38->20 38->28 38->39 67 Function_00401A97 38->67 76 Function_004019A3 38->76 44 Function_00402E80 40->44 41 Function_004054FC 42 Function_00405CFF 43 Function_00405500 50 Function_00402D06 44->50 57 Function_00402D8C 44->57 45->90 46 Function_00405702 47 Function_00406304 48->28 49 Function_00406506 51 Function_00401E86 52 Function_00405787 53 Function_00405908 54 Function_00405F09 55 Function_00402409 55->17 55->64 56 Function_00405D89 77 Function_00402D26 57->77 58 Function_00401F0E 58->2 58->10 58->23 58->51 65 Function_00402714 58->65 74 Function_00401D22 58->74 84 Function_0040272D 58->84 91 Function_00401C36 58->91 58->93 59->0 60 Function_0040658E 61 Function_00405A8F 62 Function_00402110 62->58 63 Function_00401910 63->26 64->28 64->48 65->55 66 Function_00406316 67->48 68 Function_00402298 67->68 67->76 68->17 68->71 69 Function_00406019 73 Function_00401120 75 Function_004055A2 76->0 76->4 76->17 76->39 76->59 76->71 76->93 78->17 78->64 82 Function_004024AB 78->82 78->90 79->35 80 Function_00406428 81 Function_0040552B 82->64 83 Function_004059AC 84->27 85 Function_00405C2E 86 Function_00405DAE 87 Function_00406130 88 Function_00405C32 89 Function_00401233 91->38 92 Function_004060B7 94 Function_004059BC 95 Function_0040123F

                                                                  Control-flow Graph

                                                                  APIs
                                                                  • GetProcessHeap.KERNEL32(00000000,0000001C), ref: 00401F19
                                                                  • RtlAllocateHeap.NTDLL(00000000), ref: 00401F20
                                                                    • Part of subcall function 00402746: gethostname.WS2_32(?,00000100), ref: 00402769
                                                                    • Part of subcall function 00402746: lstrlen.KERNEL32(00000000), ref: 004027B2
                                                                    • Part of subcall function 00402746: GetProcessHeap.KERNEL32(00000000,00000200), ref: 004027F5
                                                                    • Part of subcall function 00402746: RtlAllocateHeap.NTDLL(00000000), ref: 004027FC
                                                                    • Part of subcall function 00402746: GetTempPathA.KERNEL32(00000100,00000000), ref: 00402819
                                                                    • Part of subcall function 00401D22: GetModuleFileNameA.KERNELBASE(00000000,?,00000100), ref: 00401E17
                                                                    • Part of subcall function 00401D22: RegOpenKeyExA.KERNELBASE(80000002,Software\Microsoft\Windows\CurrentVersion\Run,00000000,00020006,?), ref: 00401E37
                                                                    • Part of subcall function 00401D22: RegOpenKeyExA.ADVAPI32(80000001,Software\Microsoft\Windows\CurrentVersion\Run,00000000,00020006,?), ref: 00401E4C
                                                                    • Part of subcall function 00401D22: lstrlen.KERNEL32(?), ref: 00401E59
                                                                    • Part of subcall function 00401C50: GetTempPathA.KERNEL32(00000104,?), ref: 00401C65
                                                                    • Part of subcall function 00401C50: lstrlen.KERNEL32(?), ref: 00401C72
                                                                    • Part of subcall function 00401C50: lstrcat.KERNEL32(?,zincite), ref: 00401CB0
                                                                    • Part of subcall function 00401C50: lstrcat.KERNEL32(?,.log), ref: 00401CBE
                                                                    • Part of subcall function 00401C50: CreateFileA.KERNELBASE(?,C0000000,00000003,00000000,00000002,00000080,00000000), ref: 00401CEA
                                                                    • Part of subcall function 00401C50: FindCloseChangeNotification.KERNELBASE(00000000), ref: 00401D19
                                                                  • htons.WS2_32(0000040A), ref: 00401F8A
                                                                  • closesocket.WS2_32(?), ref: 00401F97
                                                                  • Sleep.KERNEL32(000000FA), ref: 00401FA2
                                                                  • htons.WS2_32(0000040A), ref: 00401FB6
                                                                  • socket.WS2_32(00000002,00000001,00000006), ref: 00401FC2
                                                                  • bind.WS2_32(00000000,00000004,00000010), ref: 00401FCB
                                                                  • listen.WS2_32(?,7FFFFFFF), ref: 00401FDD
                                                                  • CreateThread.KERNELBASE(00000000,00000000,Function_00001C36,00000000,00000000,?), ref: 00401FFF
                                                                  • select.WS2_32(?,?), ref: 00402072
                                                                  • Sleep.KERNELBASE(00000001), ref: 0040207D
                                                                  • GetProcessHeap.KERNEL32(00000000,0000001C), ref: 00402088
                                                                  • RtlAllocateHeap.NTDLL(00000000), ref: 0040208F
                                                                  • accept.WS2_32(?,00000000,00000000), ref: 004020A0
                                                                  • closesocket.WS2_32(00000000), ref: 004020A7
                                                                  • accept.WS2_32(?,00000008,00000018), ref: 004020CE
                                                                  • GetProcessHeap.KERNEL32(00000000,00000000), ref: 004020DE
                                                                  • HeapFree.KERNEL32(00000000), ref: 004020E5
                                                                  • CreateThread.KERNEL32(00000000,00000000,Function_00001910,00000000,00000000,00000000), ref: 004020FE
                                                                  • CloseHandle.KERNEL32(00000000), ref: 00402105
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.4465780997.0000000000401000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.4465725305.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.4465780997.0000000000405000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.4465896116.0000000000406000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.4465979660.0000000000407000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_services.jbxd
                                                                  Similarity
                                                                  • API ID: Heap$Process$AllocateCreatelstrlen$CloseFileOpenPathSleepTempThreadacceptclosesockethtonslstrcat$ChangeFindFreeHandleModuleNameNotificationbindgethostnamelistenselectsocket
                                                                  • String ID: zincite
                                                                  • API String ID: 3879026950-3297986242
                                                                  • Opcode ID: fe2f1d9fdd21c84416cc25d48b1996b681bad49b490d28944656e069e58d6bc5
                                                                  • Instruction ID: 63643564f20939399de5e248beed26de427b9082207dbc7f249a8e94aa20677d
                                                                  • Opcode Fuzzy Hash: fe2f1d9fdd21c84416cc25d48b1996b681bad49b490d28944656e069e58d6bc5
                                                                  • Instruction Fuzzy Hash: E551BD70504304AFE320AF61DE49B1BBBF8FF44784F10453AF686E61F1DB78A8408A69
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  APIs
                                                                  • GetTempPathA.KERNEL32(00000104,?), ref: 00401C65
                                                                  • lstrlen.KERNEL32(?), ref: 00401C72
                                                                  • lstrcat.KERNEL32(?,zincite), ref: 00401CB0
                                                                  • lstrcat.KERNEL32(?,.log), ref: 00401CBE
                                                                  • CreateFileA.KERNELBASE(?,C0000000,00000003,00000000,00000002,00000080,00000000), ref: 00401CEA
                                                                  • FindCloseChangeNotification.KERNELBASE(00000000), ref: 00401D19
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.4465780997.0000000000401000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.4465725305.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.4465780997.0000000000405000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.4465896116.0000000000406000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.4465979660.0000000000407000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_services.jbxd
                                                                  Similarity
                                                                  • API ID: lstrcat$ChangeCloseCreateFileFindNotificationPathTemplstrlen
                                                                  • String ID: .log$\$zincite
                                                                  • API String ID: 2721264048-2520228640
                                                                  • Opcode ID: 862124e1eb0eee65f550ee3459eb0c6eb416149437c4fea1a35bd8d2657bf9b4
                                                                  • Instruction ID: d308b9f2279752326791d57484c75deaf2d3a492223dede54109555acb1d5f82
                                                                  • Opcode Fuzzy Hash: 862124e1eb0eee65f550ee3459eb0c6eb416149437c4fea1a35bd8d2657bf9b4
                                                                  • Instruction Fuzzy Hash: 2411C8B59402586BEB206B64DD4EFFA37AC9B04710F1000B3F784F61E1D6F89AC88B58
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 56 402746-40276f call 4028c8 gethostname 59 402771-40277c 56->59 60 402787-402789 59->60 61 40277e-402785 59->61 62 4027a6-4027a8 60->62 63 40278b-4027a4 60->63 61->59 61->60 64 4027a9-4027ad 62->64 63->62 65 4027c8-4027dd call 402a28 64->65 66 4027af-4027c5 lstrlen call 402a28 64->66 65->64 71 4027df-402808 call 402ad0 GetProcessHeap RtlAllocateHeap 65->71 66->65 74 4028c3-4028c7 71->74 75 40280e-402823 GetTempPathA 71->75 76 402825-40282a 75->76 77 402846-402869 lstrlen 75->77 76->76 78 40282c-40282e 76->78 79 4028b5-4028c1 lstrcpy 77->79 80 40286b 77->80 78->77 81 402830-402838 78->81 79->74 82 40286e-402877 80->82 81->77 83 40283a-40283d 81->83 84 402889-4028a1 82->84 85 402879-402887 82->85 83->77 86 40283f-402842 83->86 87 4028a3-4028b3 84->87 85->87 86->77 87->79 87->82
                                                                  APIs
                                                                  • gethostname.WS2_32(?,00000100), ref: 00402769
                                                                  • lstrlen.KERNEL32(00000000), ref: 004027B2
                                                                  • GetProcessHeap.KERNEL32(00000000,00000200), ref: 004027F5
                                                                  • RtlAllocateHeap.NTDLL(00000000), ref: 004027FC
                                                                  • GetTempPathA.KERNEL32(00000100,00000000), ref: 00402819
                                                                  • lstrlen.KERNEL32(00000000), ref: 00402856
                                                                  • lstrcpy.KERNEL32(00000000,.log), ref: 004028BB
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.4465780997.0000000000401000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.4465725305.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.4465780997.0000000000405000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.4465896116.0000000000406000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.4465979660.0000000000407000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_services.jbxd
                                                                  Similarity
                                                                  • API ID: Heaplstrlen$AllocatePathProcessTempgethostnamelstrcpy
                                                                  • String ID: .log
                                                                  • API String ID: 3142192315-299349702
                                                                  • Opcode ID: 4a549d7456097e64e3e163d2aeb9219a779bb868f440c68a974d96d48cf1f2d2
                                                                  • Instruction ID: 465d614720e4f98c554e9bbc52a771583fa62571e225c13d7661abedabf026f6
                                                                  • Opcode Fuzzy Hash: 4a549d7456097e64e3e163d2aeb9219a779bb868f440c68a974d96d48cf1f2d2
                                                                  • Instruction Fuzzy Hash: 5B41CD73A00204ABDB159BB8DE0CBFF3BE9BB49300F18407BE541E72C1D5B989458B54
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  APIs
                                                                  • GetModuleFileNameA.KERNELBASE(00000000,?,00000100), ref: 00401E17
                                                                  • RegOpenKeyExA.KERNELBASE(80000002,Software\Microsoft\Windows\CurrentVersion\Run,00000000,00020006,?), ref: 00401E37
                                                                  • RegOpenKeyExA.ADVAPI32(80000001,Software\Microsoft\Windows\CurrentVersion\Run,00000000,00020006,?), ref: 00401E4C
                                                                  • lstrlen.KERNEL32(?), ref: 00401E59
                                                                  • RegSetValueExA.KERNELBASE(?,Services,00000000,00000001,?,00000001), ref: 00401E72
                                                                  • RegCloseKey.ADVAPI32(?), ref: 00401E7B
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.4465780997.0000000000401000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.4465725305.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.4465780997.0000000000405000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.4465896116.0000000000406000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.4465979660.0000000000407000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_services.jbxd
                                                                  Similarity
                                                                  • API ID: Open$CloseFileModuleNameValuelstrlen
                                                                  • String ID: Services$Software\Microsoft\Windows\CurrentVersion\Run
                                                                  • API String ID: 3264941416-1243856414
                                                                  • Opcode ID: c0ff7b9709e14f39830c692d285c4254b3bd2cef27112853d439ce5e8ff935ad
                                                                  • Instruction ID: bab74bb5fb5e80abe69f2363fff059b18a7d2aa8d11ef8515edd262db9c0df91
                                                                  • Opcode Fuzzy Hash: c0ff7b9709e14f39830c692d285c4254b3bd2cef27112853d439ce5e8ff935ad
                                                                  • Instruction Fuzzy Hash: 0A51BE10D0C2C9EDFB02C6A8D9487EEBFB55B26749F084099D5847A292C2FF1658C776
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 92 402c20-402c57 SetFilePointer ReadFile 93 402c5d-402c6a SetFilePointer 92->93 94 402cff 92->94 93->94 96 402c70-402c84 ReadFile 93->96 95 402d01-402d05 94->95 96->94 97 402c86-402c98 96->97 97->94 98 402c9a-402c9e 97->98 98->94 99 402ca0-402ca5 98->99 99->94 100 402ca7-402cc6 SetFilePointer 99->100 101 402cc8-402cdf ReadFile 100->101 102 402cfb-402cfd 100->102 101->94 103 402ce1-402ceb 101->103 102->95 104 402ced 103->104 105 402cef-402cf9 103->105 104->105 105->101 105->102
                                                                  APIs
                                                                  • SetFilePointer.KERNELBASE(00000000,0000003C,00000000,00000000,?,00000000,00000000), ref: 00402C38
                                                                  • ReadFile.KERNELBASE(00000000,00000000,00000004,?,00000000,?,00000000,00000000), ref: 00402C51
                                                                  • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 00402C65
                                                                  • ReadFile.KERNELBASE(00000000,?,00000016,00000004,00000000,?,00000000,00000000), ref: 00402C7E
                                                                  • SetFilePointer.KERNEL32(00000000,00000018,00000000,00000000,?,00000000,00000000), ref: 00402CBB
                                                                  • ReadFile.KERNEL32(00000000,?,00000028,00000500,00000000,?,00000000,00000000), ref: 00402CD9
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.4465780997.0000000000401000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.4465725305.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.4465780997.0000000000405000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.4465896116.0000000000406000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.4465979660.0000000000407000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_services.jbxd
                                                                  Similarity
                                                                  • API ID: File$PointerRead
                                                                  • String ID: (
                                                                  • API String ID: 3154509469-3887548279
                                                                  • Opcode ID: 6867e366b6f43ad089afff83f7b127a1952e869132ce6ddbdd4ebe026399a56d
                                                                  • Instruction ID: 0a2bc8566371eb4e5b481824b359c4a7693ed211b1de43140c1e77ab5c19bb7d
                                                                  • Opcode Fuzzy Hash: 6867e366b6f43ad089afff83f7b127a1952e869132ce6ddbdd4ebe026399a56d
                                                                  • Instruction Fuzzy Hash: 42313676901118BADF21DF94CE449EFBBB9FF04390F10406AE905B2290D6749A81EBA8
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 106 402bdc-402bec GetModuleHandleA 107 402bf9-402c07 GetProcAddress 106->107 108 402bee-402bf7 LoadLibraryA 106->108 109 402c09-402c0c 107->109 110 402c0e-402c1b InternetGetConnectedState 107->110 108->107 108->109 111 402c1d-402c1f 109->111 110->111
                                                                  APIs
                                                                  • GetModuleHandleA.KERNEL32(wininet.dll,?,?,00401B05,?,?,?,?,?,00401C46,00000000), ref: 00402BE4
                                                                  • LoadLibraryA.KERNELBASE(wininet.dll,?,?,00401B05,?,?,?,?,?,00401C46,00000000), ref: 00402BEF
                                                                  • GetProcAddress.KERNEL32(00000000,InternetGetConnectedState), ref: 00402BFF
                                                                  • InternetGetConnectedState.WININET(00000000,00000000,?,?,00401B05,?,?,?,?,?,00401C46,00000000), ref: 00402C15
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.4465780997.0000000000401000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.4465725305.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.4465780997.0000000000405000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.4465896116.0000000000406000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.4465979660.0000000000407000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_services.jbxd
                                                                  Similarity
                                                                  • API ID: AddressConnectedHandleInternetLibraryLoadModuleProcState
                                                                  • String ID: InternetGetConnectedState$wininet.dll
                                                                  • API String ID: 1505668628-596207600
                                                                  • Opcode ID: a37456e34d594103b89777690462d1489ba709ca72bb1b5dfb4240220dcd0849
                                                                  • Instruction ID: 9a479a25d9d6a13632a63e79a708e40800bebfc4b8359a5714031e7911cbad49
                                                                  • Opcode Fuzzy Hash: a37456e34d594103b89777690462d1489ba709ca72bb1b5dfb4240220dcd0849
                                                                  • Instruction Fuzzy Hash: 40E04F75655212ABF7201B719F4EF6B225C5B05B41F10497BF103F51E1EBBCD44055AC
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 112 4019a3-4019b6 call 401947 115 4019c0-4019f7 htons socket connect 112->115 116 4019b8-4019bb 112->116 118 401a88-401a93 closesocket 115->118 119 4019fd-401a17 call 402159 call 40221c 115->119 117 401a94-401a96 116->117 118->117 124 401a31-401a40 call 402177 call 402241 119->124 125 401a19-401a2f call 402b3b call 402177 119->125 134 401a43-401a55 send 124->134 125->134 135 401a56-401a73 recv 134->135 136 401a75-401a84 call 40238e 135->136 137 401a86 135->137 136->135 136->137 137->118
                                                                  APIs
                                                                    • Part of subcall function 00401947: gethostname.WS2_32(?,00000100), ref: 0040195C
                                                                    • Part of subcall function 00401947: gethostbyname.WS2_32(?), ref: 00401969
                                                                  • htons.WS2_32(0000040A), ref: 004019D0
                                                                  • socket.WS2_32(00000002,00000001,00000006), ref: 004019DF
                                                                  • connect.WS2_32(00000000,?,00000010), ref: 004019EF
                                                                  • send.WS2_32(00000000,00401164,00000001,00000000), ref: 00401A4F
                                                                  • recv.WS2_32(00000000,?,00000020,00000000), ref: 00401A6A
                                                                  • closesocket.WS2_32(00000000), ref: 00401A8B
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.4465780997.0000000000401000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.4465725305.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.4465780997.0000000000405000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.4465896116.0000000000406000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.4465979660.0000000000407000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_services.jbxd
                                                                  Similarity
                                                                  • API ID: closesocketconnectgethostbynamegethostnamehtonsrecvsendsocket
                                                                  • String ID:
                                                                  • API String ID: 1510073661-0
                                                                  • Opcode ID: 2a21ca618489f6ec19938a17c44a3dae582688b32802aec640c23780eae26ec9
                                                                  • Instruction ID: 0b23af087cc8eec7cc1e21334d5c71020c57f0b57cd055084c320c5618d28d3d
                                                                  • Opcode Fuzzy Hash: 2a21ca618489f6ec19938a17c44a3dae582688b32802aec640c23780eae26ec9
                                                                  • Instruction Fuzzy Hash: F121C375600205FBEB10AFA1DE0AF9E7BB9EF04344F20003AFA85B61F1D7B549418B49
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 140 402667-40268f CreateFileA 141 402691-402694 140->141 142 402696-4026b0 call 402c20 SetFilePointer 140->142 143 402710-402713 141->143 146 4026b1-4026b6 142->146 147 4026c7-4026ea ReadFile 146->147 148 4026b8-4026bb 146->148 151 402706-40270f FindCloseChangeNotification 147->151 152 4026ec-4026fc call 40238e 147->152 149 4026c2-4026c5 148->149 150 4026bd-4026c0 148->150 149->147 149->151 150->149 150->151 151->143 155 402701-402704 152->155 156 4026fe 152->156 155->146 156->155
                                                                  APIs
                                                                  • CreateFileA.KERNELBASE(?,80000000,00000003,00000000,00000003,00000080,00000000,75918A60), ref: 00402684
                                                                  • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,00401CCF,?,?), ref: 004026A4
                                                                  • ReadFile.KERNELBASE(00000000,?,00000020,?,00000000,?,?,?,?,?,?,?,?,?,00401CCF,?), ref: 004026E0
                                                                  • FindCloseChangeNotification.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,00401CCF,?,?), ref: 00402707
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.4465780997.0000000000401000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.4465725305.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.4465780997.0000000000405000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.4465896116.0000000000406000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.4465979660.0000000000407000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_services.jbxd
                                                                  Similarity
                                                                  • API ID: File$ChangeCloseCreateFindNotificationPointerRead
                                                                  • String ID:
                                                                  • API String ID: 2405668454-3916222277
                                                                  • Opcode ID: a846899278c3e595d7c3445bfc842bfb2744db7b400f7519058065fdcd010807
                                                                  • Instruction ID: 65b246ce000513070fce25458afbecf7756c4f1386a5a2a80221073d1864df85
                                                                  • Opcode Fuzzy Hash: a846899278c3e595d7c3445bfc842bfb2744db7b400f7519058065fdcd010807
                                                                  • Instruction Fuzzy Hash: 65118771900114FAEB209BA5DE88ADFBB7CEF05360F204537F915F61D1C7B49A448A69
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 157 402528-40253b call 4024ab 160 402544-40254d 157->160 161 40253d 157->161 162 402552-402557 160->162 163 40254f 160->163 161->160 164 402664-402666 162->164 165 40255d-402578 GetProcessHeap RtlAllocateHeap 162->165 163->162 166 402580-402597 call 402134 call 402159 165->166 167 40257a-40257b 165->167 173 402599-4025a4 166->173 174 4025fa-402602 166->174 168 402662-402663 167->168 168->164 173->174 175 4025a6 173->175 176 402650-402660 GetProcessHeap HeapFree 174->176 177 402604-40260e 174->177 179 4025a9-4025b3 175->179 176->168 178 402611-402617 177->178 180 402629-40264e call 402311 WriteFile 178->180 181 402619-402627 178->181 182 4025c3-4025c8 179->182 183 4025b5-4025b8 179->183 180->176 180->177 181->178 181->180 187 4025d7-4025da 182->187 188 4025ca-4025d5 182->188 185 4025ba-4025bd 183->185 186 4025bf-4025c1 183->186 185->183 185->186 186->182 190 4025dd-4025e5 186->190 187->190 188->187 188->190 190->179 191 4025e7-4025ec 190->191 191->174 192 4025ee-4025f8 191->192 192->173 192->174
                                                                  APIs
                                                                    • Part of subcall function 004024AB: gethostname.WS2_32(?,00000100), ref: 004024C0
                                                                    • Part of subcall function 004024AB: gethostbyname.WS2_32(?), ref: 004024CD
                                                                    • Part of subcall function 004024AB: WriteFile.KERNELBASE(6%@,?,00000020,00000000,00000000), ref: 00402520
                                                                  • GetProcessHeap.KERNEL32(00000000,00000000,00000000,?,?,?,?,?,?,00401D15), ref: 00402567
                                                                  • RtlAllocateHeap.NTDLL(00000000), ref: 0040256E
                                                                  • WriteFile.KERNELBASE(00000000,?,00000020,?,00000000,?,?,?,?,?,?,00401D15), ref: 00402642
                                                                  • GetProcessHeap.KERNEL32(00000000,00000000,?,?,?,?,?,?,00401D15), ref: 00402653
                                                                  • HeapFree.KERNEL32(00000000,?,?,?,?,?,?,00401D15), ref: 0040265A
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.4465780997.0000000000401000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.4465725305.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.4465780997.0000000000405000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.4465896116.0000000000406000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.4465979660.0000000000407000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_services.jbxd
                                                                  Similarity
                                                                  • API ID: Heap$FileProcessWrite$AllocateFreegethostbynamegethostname
                                                                  • String ID:
                                                                  • API String ID: 1381504460-0
                                                                  • Opcode ID: cb84bfe19f4f92fb60ffda4fede0af42123b7535614bf0299b989d0789685bc5
                                                                  • Instruction ID: e93690f6efb094d726be1ca240a6e8d252680ed4df48be1e4ed5d20c378adae6
                                                                  • Opcode Fuzzy Hash: cb84bfe19f4f92fb60ffda4fede0af42123b7535614bf0299b989d0789685bc5
                                                                  • Instruction Fuzzy Hash: BE419F71A00259EFCB14DF64CA98A9E77B5FB44304F20457AE915BB2C1CBB4EE50CB98
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 193 4024ab-4024d7 gethostname gethostbyname 194 402526-402527 193->194 195 4024d9-4024e7 193->195 196 4024ea-4024f2 195->196 197 402503-402505 196->197 198 4024f4-402501 196->198 197->194 199 402507-402520 call 402311 WriteFile 197->199 198->196 198->197 199->194
                                                                  APIs
                                                                  • gethostname.WS2_32(?,00000100), ref: 004024C0
                                                                  • gethostbyname.WS2_32(?), ref: 004024CD
                                                                  • WriteFile.KERNELBASE(6%@,?,00000020,00000000,00000000), ref: 00402520
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.4465780997.0000000000401000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.4465725305.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.4465780997.0000000000405000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.4465896116.0000000000406000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.4465979660.0000000000407000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_services.jbxd
                                                                  Similarity
                                                                  • API ID: FileWritegethostbynamegethostname
                                                                  • String ID: 6%@
                                                                  • API String ID: 318559467-1099485511
                                                                  • Opcode ID: f034063b5387ddc9d0de5fa9bbd9bc3ce1eafbdd233045a66a0e29a2c198d38c
                                                                  • Instruction ID: 54dfa080bba5bf9ad2062c22b38b8dcdf997bae28b9b2d9a825c475ac44d6093
                                                                  • Opcode Fuzzy Hash: f034063b5387ddc9d0de5fa9bbd9bc3ce1eafbdd233045a66a0e29a2c198d38c
                                                                  • Instruction Fuzzy Hash: 9F014071A00209ABDF14DF65DE59ADEB7BCEB48300F10407AE945F72D0E774EA448B58
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 202 402409-402431 CreateFileA 203 402433-402436 202->203 204 402438-402445 call 402159 202->204 205 4024a8-4024aa 203->205 208 402447 204->208 209 402498-4024a7 FindCloseChangeNotification 204->209 210 402448-402455 208->210 209->205 211 402457-40245c 210->211 212 402471-402495 call 402311 WriteFile 211->212 213 40245e-40246f 211->213 212->210 216 402497 212->216 213->211 213->212 216->209
                                                                  APIs
                                                                  • CreateFileA.KERNELBASE(?,40000000,00000003,00000000,00000002,00000080,00000000), ref: 00402425
                                                                  • WriteFile.KERNELBASE(?,?,00000020,?,00000000), ref: 0040248A
                                                                  • FindCloseChangeNotification.KERNELBASE(?), ref: 0040249F
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.4465780997.0000000000401000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.4465725305.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.4465780997.0000000000405000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.4465896116.0000000000406000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.4465979660.0000000000407000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_services.jbxd
                                                                  Similarity
                                                                  • API ID: File$ChangeCloseCreateFindNotificationWrite
                                                                  • String ID:
                                                                  • API String ID: 3805958096-0
                                                                  • Opcode ID: 02cce61bae3da03cfbe432f57d36e2110cdf58b40a94688df2534fc4476fb847
                                                                  • Instruction ID: 869e521865e1404736e4a209302c2f71d5a307e29bced8060bbcdd2507a7e97b
                                                                  • Opcode Fuzzy Hash: 02cce61bae3da03cfbe432f57d36e2110cdf58b40a94688df2534fc4476fb847
                                                                  • Instruction Fuzzy Hash: 5B11D672500208BFDB109F94DD84F9EB7B8EF44325F20853AF545F61D0D774A9858B64
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 217 401947-401971 gethostname gethostbyname 218 401973-401978 217->218 219 40197a-40197d 217->219 218->219 220 40197e-401982 218->220 221 401983-401987 220->221 222 401999 221->222 223 401989-40198e 221->223 224 40199b-40199d 222->224 225 401990-401997 223->225 226 40199e-4019a1 223->226 225->221 225->222 226->224
                                                                  APIs
                                                                  • gethostname.WS2_32(?,00000100), ref: 0040195C
                                                                  • gethostbyname.WS2_32(?), ref: 00401969
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.4465780997.0000000000401000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.4465725305.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.4465780997.0000000000405000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.4465896116.0000000000406000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.4465979660.0000000000407000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_services.jbxd
                                                                  Similarity
                                                                  • API ID: gethostbynamegethostname
                                                                  • String ID:
                                                                  • API String ID: 3961807697-0
                                                                  • Opcode ID: 7f7489a05263d50e9f5280867374dca372806a9a6e7122dc19f1c9b7e6bb3912
                                                                  • Instruction ID: d087f8dd0fb0701926f1ae1460b74465c54af62c64bb0150b0245bb175ba3ed1
                                                                  • Opcode Fuzzy Hash: 7f7489a05263d50e9f5280867374dca372806a9a6e7122dc19f1c9b7e6bb3912
                                                                  • Instruction Fuzzy Hash: DCF054717101045BEF10DA799C14BFB73ECEB44344F1854B6A986F72B0E678ED41C694
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 227 402110-402126 WSAStartup call 401f0e 229 40212b-402131 227->229
                                                                  APIs
                                                                  • WSAStartup.WS2_32(00000101), ref: 00402120
                                                                    • Part of subcall function 00401F0E: GetProcessHeap.KERNEL32(00000000,0000001C), ref: 00401F19
                                                                    • Part of subcall function 00401F0E: RtlAllocateHeap.NTDLL(00000000), ref: 00401F20
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.4465780997.0000000000401000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.4465725305.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.4465780997.0000000000405000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.4465896116.0000000000406000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.4465979660.0000000000407000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_services.jbxd
                                                                  Similarity
                                                                  • API ID: Heap$AllocateProcessStartup
                                                                  • String ID:
                                                                  • API String ID: 758850586-0
                                                                  • Opcode ID: e59473464d790235308ec1e16d264448846f175b2295cd92bdf9d6610ea48e59
                                                                  • Instruction ID: 394aaf448670e1c9671958fd0a23c61cfec1bbe2cdcd19ae9f34d9542a64428f
                                                                  • Opcode Fuzzy Hash: e59473464d790235308ec1e16d264448846f175b2295cd92bdf9d6610ea48e59
                                                                  • Instruction Fuzzy Hash: 4BC02B725000402FE301B300DC02FB6312C7704300F0004353581400E2E3F940184163
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 230 401af2-401afc 231 401b00-401b07 call 402bdc 230->231 234 401b13-401b26 call 402159 231->234 235 401b09-401b0e 231->235 239 401b67-401b71 call 402177 234->239 240 401b28-401b2a 234->240 237 401c24-401c2a Sleep 235->237 237->231 249 401b83-401b8b 239->249 250 401b73-401b7c call 4019a3 239->250 241 401b4c-401b54 call 401947 240->241 242 401b2c-401b37 240->242 248 401b59-401b5c 241->248 242->241 244 401b39-401b4a call 402b68 242->244 244->241 255 401b60-401b65 244->255 248->255 256 401b5e 248->256 252 401b97-401b9d 249->252 253 401b8d-401b92 249->253 257 401b81-401b82 250->257 258 401ba3-401ba6 252->258 259 401b9f-401ba1 252->259 253->237 255->239 255->240 256->255 257->249 261 401ba8-401baa 258->261 262 401bac-401baf 258->262 260 401bb3 259->260 264 401bb4-401bbf 260->264 261->260 263 401bb1 262->263 262->264 263->260 265 401bc1-401bc4 264->265 266 401bcf-401bd3 264->266 269 401bc6-401bc8 265->269 270 401bc9-401bcb 265->270 267 401bd5-401bd6 call 401a97 266->267 268 401bfa-401bfd 266->268 275 401bdb-401bde 267->275 272 401c06-401c0f 268->272 273 401bff-401c04 268->273 269->270 270->266 274 401bcd 270->274 276 401c11-401c16 272->276 277 401c18-401c1d 272->277 273->237 274->266 278 401be0-401bf2 call 402b68 275->278 279 401bf5-401bf8 275->279 276->237 280 401c2f-401c34 277->280 281 401c1f 277->281 278->279 284 401bf4 278->284 279->267 279->268 280->237 281->237 284->279
                                                                  APIs
                                                                    • Part of subcall function 00402BDC: GetModuleHandleA.KERNEL32(wininet.dll,?,?,00401B05,?,?,?,?,?,00401C46,00000000), ref: 00402BE4
                                                                    • Part of subcall function 00402BDC: LoadLibraryA.KERNELBASE(wininet.dll,?,?,00401B05,?,?,?,?,?,00401C46,00000000), ref: 00402BEF
                                                                    • Part of subcall function 00402BDC: GetProcAddress.KERNEL32(00000000,InternetGetConnectedState), ref: 00402BFF
                                                                  • Sleep.KERNEL32(0000EA60,?,?,?,?,?,00401C46,00000000), ref: 00401C24
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.4465780997.0000000000401000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.4465725305.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.4465780997.0000000000405000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.4465896116.0000000000406000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.4465979660.0000000000407000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_services.jbxd
                                                                  Similarity
                                                                  • API ID: AddressHandleLibraryLoadModuleProcSleep
                                                                  • String ID:
                                                                  • API String ID: 598054177-0
                                                                  • Opcode ID: cc4ed5cdb316f89ee48a959f0db2784bda8b517e773fa2b5245cd414c5d5d6a3
                                                                  • Instruction ID: 556554e90d697c25865dfeac8bb208c10a23844f2c0764a878470f5d7dc47180
                                                                  • Opcode Fuzzy Hash: cc4ed5cdb316f89ee48a959f0db2784bda8b517e773fa2b5245cd414c5d5d6a3
                                                                  • Instruction Fuzzy Hash: 683113356442159BE224AA15C981E39B3F5EB01B18F21013FF251BB2F2EB7CEC41868E
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • recv.WS2_32(?,?,00000080,00000000), ref: 0040130C
                                                                  • GetTempPathA.KERNEL32(00000100,?,?,?), ref: 0040132F
                                                                  • lstrlen.KERNEL32(?,?,?), ref: 0040133C
                                                                  • GetTickCount.KERNEL32 ref: 00401372
                                                                  • GetTickCount.KERNEL32 ref: 0040137A
                                                                  • lstrlen.KERNEL32(?,%.8x.%c%c%c,?,?,?), ref: 0040138F
                                                                  • wsprintfA.USER32 ref: 0040139D
                                                                  • CreateFileA.KERNEL32(?,C0000000,00000003,00000000,00000002,00000080,00000000), ref: 004013B9
                                                                  • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 00401413
                                                                  • recv.WS2_32(?,?,00000200,00000000), ref: 00401425
                                                                  • closesocket.WS2_32(?), ref: 00401435
                                                                  • SetFilePointer.KERNEL32(?,00000000,00000000,00000000), ref: 004014C1
                                                                  • htonl.WS2_32(?), ref: 004014CA
                                                                  • ReadFile.KERNEL32(?,?,00000000,?,00000000), ref: 004014FA
                                                                  • CloseHandle.KERNEL32(?), ref: 0040155E
                                                                  • wsprintfA.USER32 ref: 00401573
                                                                  • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000001,00000000,00000000,00000000,?,?), ref: 004015AF
                                                                  • WaitForSingleObject.KERNEL32(?,000000FF), ref: 004015BE
                                                                  • CloseHandle.KERNEL32(?), ref: 004015C7
                                                                  • CloseHandle.KERNEL32(?), ref: 004015CC
                                                                  • DeleteFileA.KERNEL32(?), ref: 004015D5
                                                                  • CloseHandle.KERNEL32(?), ref: 004015E6
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.4465780997.0000000000401000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.4465725305.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.4465780997.0000000000405000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.4465896116.0000000000406000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.4465979660.0000000000407000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_services.jbxd
                                                                  Similarity
                                                                  • API ID: File$CloseHandle$CountCreateTicklstrlenrecvwsprintf$DeleteObjectPathPointerProcessReadSingleTempWaitWriteclosesockethtonl
                                                                  • String ID: "%s"$%.8x.%c%c%c
                                                                  • API String ID: 2752258614-574288969
                                                                  • Opcode ID: d87f23115844a503b3769bbd931cddded3c6aecd11922378917989d44afb3391
                                                                  • Instruction ID: 87b5d8eef72c4e099ef873e594ac55454593937c6fbe0acc7a325c837c011b3a
                                                                  • Opcode Fuzzy Hash: d87f23115844a503b3769bbd931cddded3c6aecd11922378917989d44afb3391
                                                                  • Instruction Fuzzy Hash: 1BA17AB290124CABEB119FA4DD88EDE7BADFB04300F104576FA09E31A1DB34D9858F64
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • GetProcessHeap.KERNEL32(00000000,00000200), ref: 004015FF
                                                                  • RtlAllocateHeap.NTDLL(00000000), ref: 00401606
                                                                  • send.WS2_32(00000000,?,00000020,00000000), ref: 004017AB
                                                                  • GetProcessHeap.KERNEL32(00000000,?), ref: 004017C4
                                                                  • HeapFree.KERNEL32(00000000), ref: 004017CB
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.4465780997.0000000000401000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.4465725305.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.4465780997.0000000000405000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.4465896116.0000000000406000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.4465979660.0000000000407000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_services.jbxd
                                                                  Similarity
                                                                  • API ID: Heap$Process$AllocateFreesend
                                                                  • String ID:
                                                                  • API String ID: 4105135367-0
                                                                  • Opcode ID: 3d1d185d2aa9f56e36d5c05daaa268825108e9a00c95c9ce06bd95516940abd8
                                                                  • Instruction ID: 52fb6d836b38e9ee9535e48970a26cdb363203125a638cc4e1af546f8777f0e4
                                                                  • Opcode Fuzzy Hash: 3d1d185d2aa9f56e36d5c05daaa268825108e9a00c95c9ce06bd95516940abd8
                                                                  • Instruction Fuzzy Hash: 6D616F35A00105AFDB10DFA5C984AADB7B5EF44328F24847AE915BB2E1C779ED41CB48
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • GetModuleHandleA.KERNEL32(kernel32.dll), ref: 00401EED
                                                                  • GetProcAddress.KERNEL32(00000000,RegisterServiceProcess), ref: 00401EFC
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.4465780997.0000000000401000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.4465725305.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.4465780997.0000000000405000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.4465896116.0000000000406000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.4465979660.0000000000407000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_services.jbxd
                                                                  Similarity
                                                                  • API ID: AddressHandleModuleProc
                                                                  • String ID: RegisterServiceProcess$kernel32.dll
                                                                  • API String ID: 1646373207-4020013434
                                                                  • Opcode ID: 88965b28d84923e145c86964e19b387d6cdeb36cc163beab82d193450ada039d
                                                                  • Instruction ID: fe3fddd0a83443da577e5a50337f346177ffc8e2680221d965c1de18958cb581
                                                                  • Opcode Fuzzy Hash: 88965b28d84923e145c86964e19b387d6cdeb36cc163beab82d193450ada039d
                                                                  • Instruction Fuzzy Hash: F611BF10D0C2C9D9FB0297E8895979FBEA51F22749F0840D895847A2D2C7FF5718C3B6
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • GetProcessHeap.KERNEL32(00000000,?,?,004026F8,76A85350,00402275,004026F8,00000007,004023FA,00000000,004026FC), ref: 004021AA
                                                                  • RtlReAllocateHeap.NTDLL(00000000), ref: 004021B1
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.4465780997.0000000000401000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.4465725305.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.4465780997.0000000000405000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.4465896116.0000000000406000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.4465979660.0000000000407000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_services.jbxd
                                                                  Similarity
                                                                  • API ID: Heap$AllocateProcess
                                                                  • String ID:
                                                                  • API String ID: 1357844191-0
                                                                  • Opcode ID: 26a0c9002352f9922aa997980867025a6c0a5e0e25f200c771313e238489ce55
                                                                  • Instruction ID: b91e93daa79bc00c502a8745a29ed674d322f15872cdf6577bcb50ea8502c1c8
                                                                  • Opcode Fuzzy Hash: 26a0c9002352f9922aa997980867025a6c0a5e0e25f200c771313e238489ce55
                                                                  • Instruction Fuzzy Hash: 6D113A7130170157DB184AA98E8C63BB29AAFC4341714443EE657EF7D0EFB4C8428714
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • RtlExitUserThread.NTDLL(00000000), ref: 00401940
                                                                    • Part of subcall function 004017E4: recv.WS2_32(?,?,00000001,00000000), ref: 0040182A
                                                                    • Part of subcall function 004017E4: recv.WS2_32(?,?,00000020,00000000), ref: 0040186D
                                                                  • closesocket.WS2_32(?), ref: 00401928
                                                                  • GetProcessHeap.KERNEL32(00000000,?), ref: 00401931
                                                                  • HeapFree.KERNEL32(00000000), ref: 00401938
                                                                  Memory Dump Source
                                                                  • Source File: 00000001.00000002.4465780997.0000000000401000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                  • Associated: 00000001.00000002.4465725305.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.4465780997.0000000000405000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.4465896116.0000000000406000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                  • Associated: 00000001.00000002.4465979660.0000000000407000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_1_2_400000_services.jbxd
                                                                  Similarity
                                                                  • API ID: Heaprecv$ExitFreeProcessThreadUserclosesocket
                                                                  • String ID:
                                                                  • API String ID: 2166171475-0
                                                                  • Opcode ID: f08946cb0ca92a7e7864d3179d4bb38cfe4129f2fea6f70c9f97e31e457419b4
                                                                  • Instruction ID: a39a1a5debe07bde33d46ee6b6cdb91c709c7e08ef56850422b225088ed05449
                                                                  • Opcode Fuzzy Hash: f08946cb0ca92a7e7864d3179d4bb38cfe4129f2fea6f70c9f97e31e457419b4
                                                                  • Instruction Fuzzy Hash: 19E08C36601260E7C6102BA09E0CB8B3BA8AF08762F040026F585F65B0CB348440C7A8
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Execution Graph

                                                                  Execution Coverage:29%
                                                                  Dynamic/Decrypted Code Coverage:0%
                                                                  Signature Coverage:0%
                                                                  Total number of Nodes:650
                                                                  Total number of Limit Nodes:24
                                                                  execution_graph 2137 503280 WSAStartup 2142 5033a8 GetTickCount 2137->2142 2139 5032a0 memset 2143 5031e4 2139->2143 2142->2139 2145 5031f2 2143->2145 2144 5031ff 2149 50327c ExitProcess 2144->2149 2167 5075e5 2144->2167 2145->2144 2164 502d8e memset gethostname lstrcat 2145->2164 2156 503255 2160 50325a CreateThread 2156->2160 2157 50322c CreateThread 2203 5033b4 2157->2203 2415 50311c FindWindowA 2157->2415 2159 503240 Sleep 2159->2156 2161 50326e 2160->2161 2412 504c1b 2160->2412 2196 50565b GetCurrentThread SetThreadPriority 2161->2196 2165 502e0b lstrcat lstrcat CreateMutexA GetLastError 2164->2165 2166 502ddd 2164->2166 2165->2144 2166->2165 2204 50746b GetModuleFileNameA CreateFileA 2167->2204 2169 5075f6 2170 507627 GetTempPathA 2169->2170 2171 507619 GetWindowsDirectoryA 2169->2171 2172 50766b lstrcat lstrcat lstrcat CreateFileA 2169->2172 2174 503209 2169->2174 2170->2169 2171->2169 2172->2169 2173 5076c8 2172->2173 2215 50737c 2173->2215 2177 502e50 GetModuleFileNameA lstrcpy 2174->2177 2184 502eb6 2177->2184 2178 502ec1 GetWindowsDirectoryA 2178->2184 2179 502ecf GetTempPathA 2179->2184 2180 502ee7 lstrlen 2181 502f01 lstrcat 2180->2181 2182 502f0f lstrcat SetFileAttributesA CreateFileA 2180->2182 2181->2182 2182->2184 2185 502f7e GetFileAttributesA 2182->2185 2183 502f9d 2188 502fb0 RegOpenKeyExA 2183->2188 2184->2178 2184->2179 2184->2180 2184->2183 2184->2185 2186 502f51 CloseHandle DeleteFileA CopyFileA 2184->2186 2187 502f9f lstrcpy 2184->2187 2185->2184 2186->2184 2187->2183 2189 5030c2 lstrlen RegSetValueExA RegCloseKey 2188->2189 2190 5030ad RegOpenKeyExA 2188->2190 2191 5030eb 2189->2191 2190->2189 2190->2191 2192 50315c GetModuleHandleA 2191->2192 2193 5031e2 2192->2193 2194 5031cd GetProcAddress 2192->2194 2193->2156 2193->2157 2194->2193 2195 5031dc 2194->2195 2195->2193 2232 504ff8 RegOpenKeyExA 2196->2232 2200 505674 2249 5055b4 memset GetWindowsDirectoryA lstrcpy 2200->2249 2203->2159 2205 507545 2204->2205 2206 5074b8 2204->2206 2205->2169 2221 5073e8 GetTempPathA lstrlen 2206->2221 2208 5074c4 CreateFileA 2208->2205 2209 5074e6 2208->2209 2224 503697 SetFilePointer ReadFile 2209->2224 2212 50751b ReadFile 2213 507503 WriteFile 2212->2213 2214 507535 FindCloseChangeNotification CloseHandle 2212->2214 2213->2212 2214->2205 2216 507391 2215->2216 2217 5073ac WriteFile 2216->2217 2218 5073cd 2216->2218 2217->2216 2219 5073d1 WriteFile 2218->2219 2220 5073e4 FindCloseChangeNotification wsprintfA memset CreateProcessA 2218->2220 2219->2220 2220->2174 2222 507414 2221->2222 2223 507435 lstrcat lstrcat lstrcpy 2221->2223 2222->2223 2223->2208 2225 5036d4 SetFilePointer 2224->2225 2226 503772 SetFilePointer 2224->2226 2225->2226 2227 5036e7 ReadFile 2225->2227 2226->2212 2227->2226 2228 5036fd 2227->2228 2228->2226 2229 50371e SetFilePointer 2228->2229 2229->2226 2230 50373f ReadFile 2229->2230 2230->2226 2231 503758 2230->2231 2231->2226 2231->2230 2233 5050c8 memset RegQueryValueExA RegCloseKey 2232->2233 2234 505119 2232->2234 2233->2234 2235 50510c 2233->2235 2238 505449 2234->2238 2257 504eea CreateFileA 2235->2257 2239 505503 memset 2238->2239 2240 505521 GetWindowsDirectoryA 2239->2240 2241 505529 GetEnvironmentVariableA 2239->2241 2244 505534 2240->2244 2241->2244 2242 50553c lstrlen 2242->2244 2245 505556 lstrcat 2242->2245 2243 5055af 2243->2200 2244->2239 2244->2242 2244->2243 2246 505585 lstrcat 2244->2246 2247 50556a lstrcat lstrcat 2244->2247 2245->2244 2350 5052ad 2246->2350 2247->2246 2250 5052ad 82 API calls 2249->2250 2251 50560a 2250->2251 2252 50561b GetDriveTypeA 2251->2252 2254 505657 Sleep 2251->2254 2252->2251 2253 50562d Sleep 2252->2253 2255 5052ad 82 API calls 2253->2255 2254->2200 2256 505646 2255->2256 2256->2251 2258 504fee 2257->2258 2259 504f1f 2257->2259 2258->2234 2259->2258 2260 504f28 GetFileSize CreateFileMappingA 2259->2260 2261 504fe9 2260->2261 2262 504f4b 2260->2262 2264 504fdc CloseHandle 2261->2264 2262->2261 2263 504f54 MapViewOfFile 2262->2263 2265 504f67 2263->2265 2270 504f6c 2263->2270 2264->2258 2266 504fd2 CloseHandle 2265->2266 2266->2264 2267 504fcb UnmapViewOfFile 2267->2266 2268 504f7c memset 2268->2270 2270->2267 2270->2268 2271 50463f lstrlen 2270->2271 2272 50465b 2271->2272 2273 50466d 2271->2273 2279 5045cf 2272->2279 2273->2270 2275 504669 2275->2273 2276 50469a lstrlen GetProcessHeap RtlAllocateHeap 2275->2276 2277 50467e lstrcmpiA 2275->2277 2276->2273 2278 5046c5 memset GetTickCount lstrcpy 2276->2278 2277->2273 2277->2275 2278->2273 2289 50402f lstrlen 2279->2289 2281 50461e 2288 5045e1 2281->2288 2331 504449 2281->2331 2284 5045dc 2284->2281 2286 5045f2 lstrlen 2284->2286 2284->2288 2314 5042ce 2284->2314 2285 50462b 2285->2288 2335 50450e 2285->2335 2286->2284 2288->2275 2290 504044 2289->2290 2295 50404c 2289->2295 2290->2284 2291 504055 isspace 2293 504065 isalnum 2291->2293 2291->2295 2292 504090 2294 504092 strchr 2292->2294 2299 5040af 2292->2299 2293->2292 2293->2295 2294->2292 2294->2299 2295->2291 2295->2292 2296 5040fa 2296->2290 2298 50410b lstrlen 2296->2298 2297 5040bb isalnum 2297->2299 2300 5040de tolower 2297->2300 2301 504150 2298->2301 2299->2296 2299->2297 2299->2300 2300->2299 2302 50411a isspace 2301->2302 2303 50416d 2301->2303 2302->2301 2304 50412a strchr 2302->2304 2305 5041c2 lstrlen 2303->2305 2306 50417f isalnum 2303->2306 2310 5041ad tolower 2303->2310 2304->2301 2307 504140 isalnum 2304->2307 2313 504209 2305->2313 2306->2303 2307->2301 2308 5041d3 isspace 2311 5041e5 strchr 2308->2311 2308->2313 2309 504224 lstrlen 2309->2290 2310->2303 2312 5041fa isalnum 2311->2312 2311->2313 2312->2313 2313->2308 2313->2309 2315 5042d7 2314->2315 2316 5042da 2314->2316 2315->2284 2317 50430a lstrlen 2316->2317 2330 504417 2316->2330 2318 504315 2317->2318 2319 504339 lstrlen 2318->2319 2318->2330 2320 504354 2319->2320 2319->2330 2320->2330 2341 504244 2320->2341 2323 504383 2324 50438c lstrlen 2323->2324 2323->2330 2325 50439d 2324->2325 2324->2330 2326 5043a2 lstrlen 2325->2326 2325->2330 2328 5043a7 2326->2328 2327 5043fa lstrlen lstrlen 2329 504425 lstrlen 2327->2329 2327->2330 2328->2327 2328->2330 2329->2330 2330->2284 2332 50445a 2331->2332 2333 50447a tolower 2332->2333 2334 504469 2332->2334 2333->2332 2333->2334 2334->2285 2336 504520 2335->2336 2337 50452a tolower 2336->2337 2340 504546 2336->2340 2337->2336 2337->2340 2338 504561 lstrcmp 2339 50457d 2338->2339 2338->2340 2339->2288 2340->2338 2340->2339 2342 504279 2341->2342 2344 504252 2341->2344 2343 5042b8 2342->2343 2349 504286 2342->2349 2346 5042b3 lstrlen 2343->2346 2347 5042bf lstrcpy 2343->2347 2344->2342 2345 50425d isspace 2344->2345 2345->2344 2346->2323 2346->2330 2347->2346 2348 504299 isspace 2348->2349 2349->2346 2349->2348 2351 5052bf 2350->2351 2359 5052cb 2350->2359 2352 5052d2 Sleep 2351->2352 2353 5052e5 lstrcpy lstrlen 2351->2353 2351->2359 2352->2351 2354 505310 lstrcat 2353->2354 2355 505322 lstrcat memset 2353->2355 2354->2355 2363 50534c 2355->2363 2356 505358 FindFirstFileA 2356->2363 2357 50537b FindNextFileA 2358 505438 FindClose 2357->2358 2357->2363 2358->2359 2359->2244 2360 5053b0 lstrcpy lstrlen 2361 5053e1 lstrcat 2360->2361 2362 5053cf lstrcat 2360->2362 2361->2363 2364 5053fe Sleep 2361->2364 2362->2361 2363->2356 2363->2357 2363->2359 2363->2360 2367 505131 2363->2367 2365 5052ad 68 API calls 2364->2365 2365->2363 2368 505299 2367->2368 2370 505141 2367->2370 2368->2363 2369 50516e lstrcpyn CharLowerA 2371 505167 2369->2371 2370->2369 2370->2371 2371->2368 2372 505278 Sleep 2371->2372 2373 50528c 2371->2373 2372->2371 2374 505291 2373->2374 2375 50529b 2373->2375 2379 504e00 GetProcessHeap RtlAllocateHeap 2374->2379 2375->2368 2376 5052a0 2375->2376 2378 504eea 48 API calls 2376->2378 2378->2368 2380 504e23 2379->2380 2381 504e2b CreateFileA 2379->2381 2380->2368 2382 504ed0 2381->2382 2388 504e50 2381->2388 2383 504ed3 GetProcessHeap RtlFreeHeap 2382->2383 2383->2380 2384 504eb6 ReadFile 2385 504ec2 FindCloseChangeNotification 2384->2385 2384->2388 2385->2383 2388->2382 2388->2384 2388->2385 2389 504c29 2388->2389 2395 504d0c 2388->2395 2394 504c38 2389->2394 2392 504d05 2392->2388 2393 504c8b memcpy 2393->2394 2394->2392 2394->2393 2399 50343e 2394->2399 2403 5034b8 2394->2403 2396 504df8 2395->2396 2397 504d24 2395->2397 2396->2388 2397->2396 2398 50463f 40 API calls 2397->2398 2398->2397 2400 50347c 2399->2400 2402 50344b 2399->2402 2400->2394 2401 503454 tolower tolower 2401->2400 2401->2402 2402->2400 2402->2401 2404 503618 2403->2404 2411 5034d1 2403->2411 2404->2394 2405 5034ed isdigit 2405->2411 2406 50353f memset 2407 503562 WideCharToMultiByte 2406->2407 2406->2411 2407->2411 2408 503582 lstrlen 2409 50359b lstrlen 2408->2409 2410 5035ec lstrlen memcpy 2408->2410 2409->2411 2410->2411 2411->2404 2411->2405 2411->2406 2411->2408 2411->2410 2425 504ae2 2412->2425 2836 5030f0 2415->2836 2418 5030f0 3 API calls 2419 503142 FindWindowA 2418->2419 2420 5030f0 3 API calls 2419->2420 2421 503152 RtlExitUserThread 2420->2421 2422 50315c GetModuleHandleA 2421->2422 2423 5031dc 2422->2423 2424 5031cd GetProcAddress 2422->2424 2424->2423 2428 504af2 2425->2428 2427 504b00 Sleep 2427->2428 2428->2427 2429 504b99 CreateThread 2428->2429 2431 504bba CloseHandle 2428->2431 2432 504bec GetTickCount 2428->2432 2433 504b61 2428->2433 2436 503620 GetModuleHandleA 2428->2436 2429->2428 2496 504a37 InterlockedIncrement GetCurrentThread SetThreadPriority 2429->2496 2431->2427 2432->2428 2434 504bfd 2432->2434 2433->2428 2441 504a85 2433->2441 2434->2427 2446 5047b7 2434->2446 2437 503672 GetProcAddress 2436->2437 2438 503664 LoadLibraryA 2436->2438 2439 503682 2437->2439 2440 503687 InternetGetConnectedState 2437->2440 2438->2437 2438->2439 2439->2428 2440->2428 2443 504a94 2441->2443 2442 504adf 2442->2433 2443->2442 2444 504a9a GetTickCount 2443->2444 2445 504ac1 GetProcessHeap HeapFree 2443->2445 2444->2443 2444->2445 2445->2443 2447 50486e 2446->2447 2448 5047d2 2446->2448 2447->2434 2448->2447 2449 50481c lstrcpyn lstrlen GetProcessHeap RtlAllocateHeap 2448->2449 2449->2447 2450 50484d lstrcpy CreateThread 2449->2450 2450->2447 2451 50477f GetCurrentThread SetThreadPriority 2450->2451 2452 504797 2451->2452 2453 5047ae RtlExitUserThread 2451->2453 2456 504708 memset 2452->2456 2464 507730 memset memset 2456->2464 2459 504741 memset 2488 507940 2459->2488 2460 50477b GetProcessHeap HeapFree 2460->2453 2463 504e00 57 API calls 2463->2460 2467 507763 2464->2467 2465 507771 lstrcpy 2469 5077fc 2465->2469 2467->2465 2468 50779a 2467->2468 2471 5077b0 lstrcat 2468->2471 2472 5077bb 2468->2472 2470 50781f wsprintfA 2469->2470 2473 507835 2470->2473 2471->2472 2476 5077f1 lstrcat 2472->2476 2477 5077cb lstrcat 2472->2477 2474 50784d wsprintfA 2473->2474 2475 50789f 2473->2475 2487 50785f 2474->2487 2478 5078a7 wsprintfA 2475->2478 2479 5078df 2475->2479 2476->2469 2480 5077db 2477->2480 2478->2487 2481 5078e7 wsprintfA 2479->2481 2482 50792f 2479->2482 2480->2476 2483 5077e6 lstrcat 2480->2483 2481->2487 2484 507937 wsprintfA 2482->2484 2483->2476 2486 504735 2484->2486 2485 507920 lstrlen 2485->2484 2486->2459 2486->2460 2487->2485 2487->2486 2489 507952 2488->2489 2490 507955 GetModuleHandleA 2488->2490 2489->2490 2491 507970 GetProcAddress 2490->2491 2492 507965 LoadLibraryA 2490->2492 2493 504763 2491->2493 2494 507985 2491->2494 2492->2491 2492->2493 2493->2460 2493->2463 2494->2493 2495 5079a0 lstrcpy 2494->2495 2495->2493 2497 504a66 2496->2497 2498 504a5c 2496->2498 2500 504a74 InterlockedDecrement 2497->2500 2501 504a7b RtlExitUserThread 2497->2501 2502 5049c5 2498->2502 2500->2501 2503 5049d9 2502->2503 2504 5049ea lstrcpyn 2503->2504 2509 504a28 2503->2509 2512 504971 2504->2512 2506 504a02 2506->2509 2527 506966 2506->2527 2509->2497 2511 504a1f GlobalFree 2511->2509 2574 504874 2512->2574 2514 504981 2514->2506 2515 50497c 2515->2514 2579 503ff8 2515->2579 2518 5049a2 2582 50489d 2518->2582 2519 504994 GetTickCount 2519->2518 2520 50499e 2519->2520 2520->2506 2523 504874 lstrcmpiA 2524 5049af 2523->2524 2525 5049bc 2524->2525 2590 50400c 2524->2590 2525->2520 2528 504a0f 2527->2528 2529 50697e lstrlen 2527->2529 2528->2509 2554 5071f8 2528->2554 2529->2528 2530 50698e memset 2529->2530 2531 5069af 2530->2531 2602 505a21 2531->2602 2533 5069f2 2605 505a45 2533->2605 2542 506a25 GlobalAlloc 2543 506a75 2542->2543 2544 506a57 2542->2544 2546 506a8a 2543->2546 2547 506a7d DeleteFileA 2543->2547 2679 5067c2 2544->2679 2546->2528 2549 506a8f GlobalFree 2546->2549 2547->2546 2548 506a64 2684 506895 lstrlen wsprintfA lstrlen wsprintfA lstrlen 2548->2684 2549->2528 2552 506a9c 2552->2528 2553 506aa4 DeleteFileA 2552->2553 2553->2528 2555 507253 2554->2555 2556 507208 2554->2556 2555->2511 2775 506b89 2556->2775 2558 50721e 2558->2555 2559 507258 lstrcpy 2558->2559 2564 507271 2559->2564 2560 5072aa 2562 5072fd lstrcpy 2560->2562 2565 5072cd lstrcpy lstrcat 2560->2565 2566 507367 2560->2566 2569 506b54 2 API calls 2560->2569 2571 5072e8 2560->2571 2572 507328 htons 2560->2572 2562->2560 2563 507280 htons 2785 506e01 2563->2785 2564->2560 2564->2563 2564->2571 2781 506b54 inet_addr 2564->2781 2565->2560 2815 507093 wsprintfA wsprintfA RegOpenKeyExA 2566->2815 2569->2560 2571->2511 2573 506e01 16 API calls 2572->2573 2573->2560 2575 50488f 2574->2575 2576 504895 2575->2576 2577 50487d lstrcmpiA 2575->2577 2576->2515 2577->2575 2578 504899 2577->2578 2578->2515 2594 503e35 GetModuleHandleA 2579->2594 2583 5048da GetProcessHeap RtlAllocateHeap 2582->2583 2584 5048af 2582->2584 2585 5048f4 2583->2585 2586 5048f9 memset lstrcpyn GetTickCount 2583->2586 2584->2583 2584->2585 2587 504936 GetTickCount 2584->2587 2585->2523 2586->2585 2588 50400c 2 API calls 2587->2588 2589 504953 lstrcpyn 2588->2589 2589->2585 2591 504014 2590->2591 2592 50402d 2590->2592 2593 504015 GetProcessHeap HeapFree 2591->2593 2592->2525 2593->2592 2593->2593 2595 503e56 GetProcAddress 2594->2595 2596 503e4b LoadLibraryA 2594->2596 2597 503e7a 2595->2597 2598 503e66 DnsQuery_A 2595->2598 2596->2595 2596->2597 2597->2518 2597->2519 2598->2597 2599 503e7e 2598->2599 2599->2597 2600 503e98 GetProcessHeap RtlAllocateHeap 2599->2600 2600->2597 2601 503eae memset lstrcpyn 2600->2601 2601->2599 2603 505a27 lstrcpy 2602->2603 2603->2533 2606 505a60 2605->2606 2607 505b25 2605->2607 2609 505ab7 lstrcpy lstrcat 2606->2609 2608 505b61 2607->2608 2613 505bba lstrcpy 2607->2613 2610 505b95 lstrcat lstrcpy 2608->2610 2614 505ad1 2609->2614 2611 505bd2 2610->2611 2616 505bf9 strstr 2611->2616 2612 505af5 lstrcat lstrcat lstrcat lstrcpy lstrcat 2612->2611 2615 505a21 lstrcpy 2613->2615 2614->2612 2615->2611 2617 505c13 2616->2617 2619 505c6e 2616->2619 2617->2619 2620 505c26 2617->2620 2618 505c81 2624 505d63 lstrcpy wsprintfA 2618->2624 2619->2618 2623 505d08 lstrcpy 2619->2623 2621 505c48 lstrcpy lstrcpy lstrcpy 2620->2621 2622 505dc3 2621->2622 2629 505dc7 2622->2629 2623->2618 2625 505d99 2624->2625 2626 505db7 2625->2626 2627 505dbc CharUpperA 2625->2627 2628 505dac CharUpperBuffA 2625->2628 2626->2622 2626->2627 2627->2622 2628->2622 2630 505dd0 2629->2630 2631 505e98 lstrcpy 2630->2631 2632 505dde 2630->2632 2631->2632 2633 505ece 2632->2633 2634 505ed3 CharUpperA 2632->2634 2635 505ebd CharUpperBuffA 2632->2635 2633->2634 2636 505ee0 2633->2636 2634->2636 2635->2636 2637 505faf 2636->2637 2638 505fcb 2637->2638 2639 505ff0 GetModuleFileNameA 2638->2639 2640 506014 GetTempPathA 2638->2640 2716 505f2a GetTempPathA GetTempFileNameA CopyFileA 2639->2716 2642 506036 GetTempFileNameA GetModuleFileNameA CopyFileA 2640->2642 2643 50633f 2640->2643 2693 505ee3 CreateFileA 2642->2693 2643->2528 2643->2542 2644 50600e 2646 50623d 2644->2646 2648 5062d0 CreateFileA 2646->2648 2653 50625d GetTempPathA GetTempFileNameA 2646->2653 2649 5062f7 2648->2649 2650 50632f 2648->2650 2649->2650 2651 5062fc GetFileSize CloseHandle 2649->2651 2650->2643 2655 50631d 2650->2655 2654 50632b 2651->2654 2651->2655 2652 506339 DeleteFileA 2652->2643 2659 5057e6 27 API calls 2653->2659 2654->2643 2655->2643 2655->2652 2656 5060b8 2657 5060e2 2656->2657 2658 5060ef lstrcpy lstrcat 2656->2658 2700 5057e6 CreateFileA 2657->2700 2668 50611c 2658->2668 2660 50629f 2659->2660 2661 5062b5 DeleteFileA lstrcpy 2660->2661 2662 5062a6 DeleteFileA 2660->2662 2661->2648 2662->2648 2665 50614f lstrcat 2667 50615d 2665->2667 2666 506219 DeleteFileA wsprintfA 2666->2646 2669 506185 lstrcat 2667->2669 2671 506172 lstrcat 2667->2671 2668->2665 2670 506198 2669->2670 2672 5061d7 lstrcat 2670->2672 2673 5061ac 2670->2673 2671->2669 2671->2671 2676 5061c1 lstrcat 2672->2676 2674 5061c8 lstrcat 2673->2674 2675 5061af 2673->2675 2674->2676 2675->2676 2677 5061b2 lstrcat 2675->2677 2676->2657 2677->2676 2680 5067de 2679->2680 2681 5067ea 8 API calls 2680->2681 2740 5032cb 2681->2740 2683 506869 lstrcat lstrlen wsprintfA lstrcat 2683->2548 2746 506518 2684->2746 2686 5068ea lstrcat 2687 5068fd 2686->2687 2688 506915 lstrlen wsprintfA lstrlen 2687->2688 2750 50666d CreateFileA 2688->2750 2691 506947 2691->2543 2691->2552 2692 50694c lstrlen wsprintfA 2692->2691 2694 505f07 2693->2694 2695 505f28 GetTempPathA GetTempFileNameA 2693->2695 2696 503697 6 API calls 2694->2696 2695->2643 2695->2656 2697 505f11 SetFilePointer 2696->2697 2721 50754a 2697->2721 2701 505a19 2700->2701 2702 50581c 2700->2702 2701->2652 2701->2666 2702->2701 2703 505824 CreateFileA 2702->2703 2704 505843 2703->2704 2705 505a14 2703->2705 2704->2705 2706 50584b memset memset memset 2704->2706 2707 505a07 CloseHandle 2705->2707 2729 505717 GetSystemTime 2706->2729 2707->2701 2711 5058b7 8 API calls 2712 50595b ReadFile 2711->2712 2713 50593c 2712->2713 2714 50597c 6 API calls 2712->2714 2713->2714 2715 505941 WriteFile 2713->2715 2714->2707 2715->2712 2717 505ee3 18 API calls 2716->2717 2718 505f87 2717->2718 2719 505f93 DeleteFileA 2718->2719 2720 505f9a lstrcpy 2718->2720 2719->2720 2720->2644 2722 5073e8 5 API calls 2721->2722 2723 507560 CreateFileA 2722->2723 2724 505f20 CloseHandle 2723->2724 2725 507588 2723->2725 2724->2695 2726 5075cd ReadFile 2725->2726 2727 5075a5 WriteFile 2726->2727 2728 5075d7 CloseHandle 2726->2728 2727->2726 2728->2724 2730 50574a 2729->2730 2731 505772 SetFilePointer 2730->2731 2732 5057b9 ReadFile 2731->2732 2733 5057d2 SetFilePointer 2732->2733 2734 50579c 2732->2734 2733->2711 2734->2732 2734->2733 2736 5056d5 2734->2736 2737 5056de 2736->2737 2739 5056e3 2736->2739 2738 50568c malloc 2737->2738 2738->2739 2739->2734 2741 5032e8 FileTimeToLocalFileTime FileTimeToSystemTime 2740->2741 2742 5032dc GetLocalTime 2740->2742 2743 503303 GetTimeZoneInformation 2741->2743 2742->2743 2744 503319 wsprintfA 2743->2744 2744->2683 2748 506521 2746->2748 2747 50652f 2747->2686 2748->2747 2758 50641f 2748->2758 2751 50669c 2750->2751 2757 5066a4 2750->2757 2751->2691 2751->2692 2752 5066bb ReadFile 2754 50677d 2752->2754 2752->2757 2753 5067ab CloseHandle 2753->2751 2754->2753 2755 50679a 2754->2755 2755->2753 2756 506767 memset 2756->2757 2757->2752 2757->2756 2762 50642d 2758->2762 2760 506509 lstrlen 2760->2762 2761 506452 2761->2747 2762->2761 2763 50641f 7 API calls 2762->2763 2764 506346 2762->2764 2763->2762 2765 5063b1 2764->2765 2768 506351 2764->2768 2766 5063b6 2765->2766 2773 5063d3 2765->2773 2767 5063bb 2766->2767 2766->2768 2770 5032cb GetLocalTime FileTimeToLocalFileTime FileTimeToSystemTime GetTimeZoneInformation wsprintfA 2767->2770 2772 506361 2767->2772 2769 506381 lstrcpy 2768->2769 2768->2772 2769->2760 2771 5063c8 2770->2771 2771->2760 2772->2760 2774 506400 wsprintfA 2773->2774 2774->2772 2779 506ba1 2775->2779 2780 506c8e 2775->2780 2776 506c38 lstrlen 2777 506c4e lstrlen 2776->2777 2776->2779 2777->2779 2778 506c6d CharLowerA lstrcmpiA 2778->2779 2778->2780 2779->2776 2779->2778 2779->2780 2780->2558 2782 506b63 2781->2782 2783 506b6c gethostbyname 2781->2783 2782->2783 2784 506b77 2782->2784 2783->2784 2784->2564 2786 506b89 4 API calls 2785->2786 2787 506e25 2786->2787 2788 506b89 4 API calls 2787->2788 2791 506e82 2787->2791 2789 506e4d 2788->2789 2790 506e8a lstrcpy socket 2789->2790 2789->2791 2790->2791 2792 506eb8 connect 2790->2792 2791->2564 2793 507080 2792->2793 2794 506ecd 2792->2794 2795 507083 closesocket 2793->2795 2826 506d65 2794->2826 2795->2791 2798 506d65 5 API calls 2799 506f12 2798->2799 2800 506f39 2799->2800 2801 506d65 5 API calls 2799->2801 2800->2793 2802 506d65 5 API calls 2800->2802 2801->2800 2803 506f6e 2802->2803 2803->2793 2804 506d65 5 API calls 2803->2804 2805 506fa0 2804->2805 2805->2793 2806 506d65 5 API calls 2805->2806 2808 506fc1 2806->2808 2807 507042 send 2809 506d65 5 API calls 2807->2809 2808->2793 2808->2807 2810 507017 send 2808->2810 2811 507028 send 2808->2811 2812 50705b 2809->2812 2810->2811 2811->2793 2811->2808 2812->2793 2813 506d65 5 API calls 2812->2813 2814 50707a 2813->2814 2814->2795 2816 507103 2815->2816 2817 5070fb 2815->2817 2818 5071d5 RegEnumKeyA 2816->2818 2822 5071bc RegCloseKey 2816->2822 2823 506b54 2 API calls 2816->2823 2824 50718f htons 2816->2824 2817->2571 2819 5071e2 RegCloseKey 2818->2819 2820 507123 RegOpenKeyExA 2818->2820 2819->2817 2820->2816 2821 507148 memset RegQueryValueExA 2820->2821 2821->2816 2821->2822 2822->2816 2822->2819 2823->2816 2825 506e01 16 API calls 2824->2825 2825->2816 2827 506d78 wvsprintfA lstrlen send 2826->2827 2830 506daa 2826->2830 2827->2830 2829 506dfb 2829->2793 2829->2798 2830->2829 2831 506ab8 2830->2831 2832 506b41 2831->2832 2835 506acf 2831->2835 2832->2830 2833 506b1c recv 2833->2832 2833->2835 2834 506adf select 2834->2832 2834->2833 2835->2832 2835->2833 2835->2834 2837 503119 FindWindowA 2836->2837 2838 5030fc PostMessageA PostMessageA PostMessageA 2836->2838 2837->2418 2838->2837 2839 503ef3 GetModuleHandleA 2840 503f11 LoadLibraryA 2839->2840 2841 503f0c 2839->2841 2842 503f18 2840->2842 2841->2840 2841->2842 2843 503ff1 2842->2843 2844 503f29 GetProcAddress 2842->2844 2844->2843 2845 503f3f GetProcessHeap RtlAllocateHeap 2844->2845 2849 503f63 2845->2849 2846 503fde GetProcessHeap HeapFree 2846->2843 2847 503f80 htons inet_addr 2848 503fa5 gethostbyname 2847->2848 2847->2849 2848->2849 2849->2843 2849->2846 2849->2847 2849->2848 2851 503dff 2849->2851 2852 503e06 2851->2852 2854 503e30 2852->2854 2855 503e22 Sleep 2852->2855 2856 503b7c GetProcessHeap RtlAllocateHeap 2852->2856 2854->2849 2855->2852 2855->2854 2857 503bb3 socket 2856->2857 2858 503bac 2856->2858 2859 503de7 GetProcessHeap HeapFree 2857->2859 2860 503bce 2857->2860 2858->2852 2859->2858 2860->2859 2875 503bd7 2860->2875 2861 503bf5 htons 2876 503819 memset GetTickCount htons 2861->2876 2863 503c1b select 2864 503c4d memset recv 2863->2864 2863->2875 2864->2875 2865 503db8 2866 503dc7 GetProcessHeap HeapFree closesocket 2865->2866 2866->2858 2867 503c7d htons 2867->2865 2867->2875 2868 503c9e htons 2868->2865 2868->2875 2871 503d08 GetProcessHeap RtlAllocateHeap 2872 503d23 memset htons 2871->2872 2871->2875 2889 503983 2872->2889 2874 503d61 GetProcessHeap HeapFree 2874->2875 2875->2861 2875->2863 2875->2865 2875->2866 2875->2867 2875->2868 2875->2871 2875->2874 2879 503a35 2875->2879 2893 503a16 2875->2893 2877 5038d7 htons htons sendto 2876->2877 2878 503881 2876->2878 2877->2875 2878->2877 2880 503a56 2879->2880 2882 503a4f 2879->2882 2897 50392a htons 2880->2897 2882->2875 2883 503aa2 memset 2884 503983 htons 2883->2884 2888 503a66 2884->2888 2885 503ad8 htons htons htons 2885->2882 2886 503b13 GetProcessHeap RtlAllocateHeap 2885->2886 2886->2882 2887 503b31 memset 2886->2887 2887->2888 2888->2882 2888->2883 2888->2885 2890 5039f5 2889->2890 2892 50399b 2889->2892 2890->2875 2891 5039d5 htons 2891->2890 2891->2892 2892->2890 2892->2891 2894 503a1a 2893->2894 2896 503a33 2893->2896 2895 503a1b GetProcessHeap HeapFree 2894->2895 2895->2895 2895->2896 2896->2875 2898 50397d 2897->2898 2899 503948 2897->2899 2898->2888 2899->2898 2900 50396e htons 2899->2900 2900->2898 2900->2899 2901 502d8a memset gethostname lstrcat 2902 502e0b lstrcat lstrcat CreateMutexA GetLastError 2901->2902 2903 502ddd 2901->2903 2903->2902

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 158 5052ad-5052bd 159 5052cb-5052cd 158->159 160 5052bf-5052c4 158->160 161 5052ce-5052d1 159->161 160->159 162 5052c6-5052c9 160->162 162->159 163 5052dd-5052e3 162->163 164 5052d2-5052d7 Sleep 163->164 165 5052e5-50530e lstrcpy lstrlen 163->165 164->163 166 505310-50531c lstrcat 165->166 167 505322-505349 lstrcat memset 165->167 166->167 168 50534c-505356 167->168 169 505358-50536b FindFirstFileA 168->169 170 50537b-505386 FindNextFileA 168->170 171 505370-505373 169->171 172 50536d 169->172 173 505438-50543b FindClose 170->173 174 50538c-505393 170->174 175 505441-505444 171->175 176 505379 171->176 172->171 173->175 177 5053b0-5053cd lstrcpy lstrlen 174->177 178 505395-50539c 174->178 175->161 176->174 179 5053e1-5053fc lstrcat 177->179 180 5053cf-5053db lstrcat 177->180 178->168 181 50539e-5053a5 178->181 182 50541e-50542b call 505131 179->182 183 5053fe-505412 Sleep call 5052ad 179->183 180->179 181->177 184 5053a7-5053ae 181->184 188 505430-505433 182->188 187 505417-505419 183->187 184->168 184->177 187->168 188->168
                                                                  APIs
                                                                  • Sleep.KERNEL32(00000800,75918A60,00000184), ref: 005052D7
                                                                  • lstrcpy.KERNEL32(?,?), ref: 005052F4
                                                                  • lstrlen.KERNEL32(?), ref: 00505304
                                                                  • lstrcat.KERNEL32(?,00501190), ref: 0050531C
                                                                  • lstrcat.KERNEL32(?,*.*), ref: 0050532E
                                                                  • memset.MSVCRT ref: 00505341
                                                                  • FindFirstFileA.KERNELBASE(?,00000010), ref: 0050535F
                                                                  • FindNextFileA.KERNELBASE(?,?), ref: 0050537E
                                                                  • lstrcpy.KERNEL32(?,?), ref: 005053BA
                                                                  • lstrlen.KERNEL32(?), ref: 005053C3
                                                                  • lstrcat.KERNEL32(?,00501190), ref: 005053DB
                                                                  • lstrcat.KERNEL32(?,0000002E), ref: 005053EF
                                                                  • Sleep.KERNELBASE(0000004B), ref: 00505400
                                                                  • FindClose.KERNELBASE(?), ref: 0050543B
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.4465723940.0000000000501000.00000040.00000001.01000000.00000006.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000003.00000002.4465669604.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.0000000000509000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.000000000050D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465923043.000000000050F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465975687.0000000000510000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_500000_java.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: lstrcat$Find$FileSleeplstrcpylstrlen$CloseFirstNextmemset
                                                                  • String ID: *.*$.$.
                                                                  • API String ID: 56755240-1892373925
                                                                  • Opcode ID: 34cc2739efd55a8dec5c8707a28d88c0ae17d04aa17f36ad44157fb3d89b558b
                                                                  • Instruction ID: dd7eaa64cc3021d8f9cf9a778dce5b9b88d54ccfb1cc30c989f9fa4e0a5d9972
                                                                  • Opcode Fuzzy Hash: 34cc2739efd55a8dec5c8707a28d88c0ae17d04aa17f36ad44157fb3d89b558b
                                                                  • Instruction Fuzzy Hash: 3B417B71C40A5DEBDF219BA0DC4DBDEBF7CBB05301F1084A2E645A2090E7749A89DF95
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  APIs
                                                                  • RegOpenKeyExA.KERNELBASE(80000001,?,00000000,00020019,?,75920F00), ref: 005050BE
                                                                  • memset.MSVCRT ref: 005050D5
                                                                  • RegQueryValueExA.KERNELBASE(?,00000000,00000000,00000000,?,?), ref: 005050F5
                                                                  • RegCloseKey.KERNELBASE(?), ref: 005050FE
                                                                    • Part of subcall function 00504EEA: CreateFileA.KERNEL32(00000020,80000000,00000003,00000000,00000003,00000080,00000000,75920F10,00000000), ref: 00504F0C
                                                                    • Part of subcall function 00504EEA: GetFileSize.KERNEL32(00000000,00000000), ref: 00504F2A
                                                                    • Part of subcall function 00504EEA: CreateFileMappingA.KERNEL32(00000000,00000000,00000002,00000000,00000000,00000000), ref: 00504F3A
                                                                    • Part of subcall function 00504EEA: MapViewOfFile.KERNEL32(00000000,00000004,00000000,00000000,00000000,00000000), ref: 00504F5B
                                                                    • Part of subcall function 00504EEA: CloseHandle.KERNEL32(?), ref: 00504FD5
                                                                    • Part of subcall function 00504EEA: CloseHandle.KERNEL32(?), ref: 00504FDF
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.4465723940.0000000000501000.00000040.00000001.01000000.00000006.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000003.00000002.4465669604.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.0000000000509000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.000000000050D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465923043.000000000050F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465975687.0000000000510000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_500000_java.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: File$Close$CreateHandle$MappingOpenQuerySizeValueViewmemset
                                                                  • String ID: $ $4$A$A$B$B$F$M$N$S$W$W$W$\$\$\$\$a$a$a$b$c$e$e$e$f$f$i$i$l$m$o$o$o$r$r$s$t$t$w
                                                                  • API String ID: 1447734293-2356155605
                                                                  • Opcode ID: 677459de2a13ac9aaaeb7965c8c2d1de803a57408f06097325033d5e59273e1f
                                                                  • Instruction ID: d5002688ff9bd9582a131d6a7ee4c8a73c9f60058928140604e211d2a98eee7b
                                                                  • Opcode Fuzzy Hash: 677459de2a13ac9aaaeb7965c8c2d1de803a57408f06097325033d5e59273e1f
                                                                  • Instruction Fuzzy Hash: 5141F050D082CDDDFB02C6A8D948BDEBFB55B26748F0840D8D5847A282D3FB1658C77A
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 6 505faf-505fd7 call 5033b4 9 505fe0-505fee 6->9 10 505fd9 6->10 11 505ff0-50600f GetModuleFileNameA call 505f2a 9->11 12 506014-506030 GetTempPathA 9->12 10->9 19 50623d-506244 11->19 14 506036-5060b2 GetTempFileNameA GetModuleFileNameA CopyFileA call 505ee3 GetTempPathA GetTempFileNameA 12->14 15 50633f-506341 12->15 14->15 23 5060b8-5060d0 call 5033b4 14->23 16 506342-506345 15->16 21 5062d0-5062f5 CreateFileA 19->21 22 50624a-50625b call 5033b4 19->22 25 5062f7-5062fa 21->25 26 50632f-506336 21->26 22->21 33 50625d-5062a4 GetTempPathA GetTempFileNameA call 5057e6 22->33 36 5060d2 23->36 37 5060d9-5060e0 23->37 25->26 29 5062fc-50631b GetFileSize CloseHandle 25->29 26->15 31 506338 26->31 34 50632b-50632d 29->34 35 50631d-506324 29->35 32 506339 DeleteFileA 31->32 32->15 46 5062b5-5062ca DeleteFileA lstrcpy 33->46 47 5062a6-5062b3 DeleteFileA 33->47 34->16 35->15 41 506326-506329 35->41 36->37 38 5060e2-5060ea 37->38 39 5060ef-506127 lstrcpy lstrcat call 5033b4 37->39 42 5061fb-506213 call 5057e6 38->42 49 506129 39->49 50 50614a 39->50 41->32 42->32 55 506219-50623b DeleteFileA wsprintfA 42->55 46->21 47->21 52 506143-506148 49->52 53 50612b-50612e 49->53 54 50614f-50616d lstrcat call 5033b4 50->54 52->54 56 506130-506133 53->56 57 50613c-506141 53->57 61 506185-5061aa lstrcat call 5033b4 54->61 62 50616f 54->62 55->19 56->52 59 506135-50613a 56->59 57->54 59->54 66 5061d7-5061df lstrcat 61->66 67 5061ac-5061ad 61->67 64 506172-506183 lstrcat 62->64 64->61 64->64 70 5061e4 66->70 68 5061c8-5061d5 lstrcat 67->68 69 5061af-5061b0 67->69 68->70 71 5061c1-5061c6 69->71 72 5061b2-5061bf lstrcat 69->72 73 5061ea-5061fa lstrcat 70->73 71->73 72->70 73->42
                                                                  APIs
                                                                  • GetModuleFileNameA.KERNEL32(00000000,?,00000104,00504A0F,00000000), ref: 00506002
                                                                  • GetTempPathA.KERNEL32(00000104,?,00504A0F,00000000), ref: 00506023
                                                                  • GetTempFileNameA.KERNELBASE(00000000,tmp,00000000,?), ref: 0050604C
                                                                  • GetModuleFileNameA.KERNEL32(00000000,00000000,00000104), ref: 0050605B
                                                                  • CopyFileA.KERNEL32(00000000,?,00000000), ref: 00506070
                                                                    • Part of subcall function 00505EE3: CreateFileA.KERNELBASE(00000003,C0000000,00000003,00000000,00000003,00000080,00000000,?,00506082,?), ref: 00505EFA
                                                                    • Part of subcall function 00505EE3: SetFilePointer.KERNELBASE(00000000,00000000,00000000,00000000), ref: 00505F14
                                                                    • Part of subcall function 00505EE3: CloseHandle.KERNEL32(00000000), ref: 00505F22
                                                                  • GetTempPathA.KERNEL32(00000104,00000000), ref: 00506094
                                                                  • GetTempFileNameA.KERNELBASE(00000000,tmp,00000000,?), ref: 005060A9
                                                                  • lstrcpy.KERNEL32(?,?), ref: 005060FD
                                                                  • lstrcat.KERNEL32(?,00501830), ref: 00506115
                                                                  • lstrcat.KERNEL32(?,doc), ref: 00506156
                                                                  • lstrcat.KERNEL32(?,00501870), ref: 0050617E
                                                                  • lstrcat.KERNEL32(?,00501830), ref: 00506191
                                                                  • lstrcat.KERNEL32(?,00502734), ref: 005061B8
                                                                  • lstrcat.KERNEL32(?,0050272C), ref: 005061CE
                                                                  • lstrcat.KERNEL32(?,00502724), ref: 005061DD
                                                                  • lstrcat.KERNEL32(?,00502720), ref: 005061EB
                                                                  • DeleteFileA.KERNELBASE(?), ref: 00506219
                                                                  • wsprintfA.USER32 ref: 00506232
                                                                  • GetTempPathA.KERNEL32(00000104,?), ref: 00506265
                                                                  • GetTempFileNameA.KERNEL32(?,tmp,00000000,00000000), ref: 0050627F
                                                                  • DeleteFileA.KERNEL32(00000000), ref: 005062AD
                                                                  • DeleteFileA.KERNEL32(?), ref: 005062B6
                                                                  • lstrcpy.KERNEL32(?,00000000), ref: 005062C4
                                                                  • CreateFileA.KERNELBASE(?,80000000,00000003,00000000,00000003,00000080,00000000), ref: 005062EA
                                                                  • GetFileSize.KERNEL32(00000000,00000000), ref: 00506304
                                                                  • CloseHandle.KERNEL32( jP), ref: 0050630F
                                                                  • DeleteFileA.KERNEL32(?), ref: 00506339
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.4465723940.0000000000501000.00000040.00000001.01000000.00000006.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000003.00000002.4465669604.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.0000000000509000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.000000000050D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465923043.000000000050F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465975687.0000000000510000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_500000_java.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: File$lstrcat$Temp$Name$Delete$Path$CloseCreateHandleModulelstrcpy$CopyPointerSizewsprintf
                                                                  • String ID: jP$%s.zip$com$doc$htm$html$tmp$txt
                                                                  • API String ID: 3181343175-3074387375
                                                                  • Opcode ID: 094a3e60c7db3f626dd2b72ad45e081d1d3724dcec7c9d95af63d3e43eb12e98
                                                                  • Instruction ID: 215d56b1a9a915398b7b7de64b2b15009c2de42112ae2f90419e4ee996d24c39
                                                                  • Opcode Fuzzy Hash: 094a3e60c7db3f626dd2b72ad45e081d1d3724dcec7c9d95af63d3e43eb12e98
                                                                  • Instruction Fuzzy Hash: 54A1B4B1940659AEDB209760CC8DFEF7FADFB51300F04085AF296D20C1D6B49A98DB66
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  APIs
                                                                  • CreateFileA.KERNELBASE(?,80000000,00000003,00000000,00000003,00000080,00000000,75918A60,?,00000104), ref: 0050580E
                                                                  • CreateFileA.KERNELBASE(?,40000000,00000003,00000000,00000002,00000080,00000000), ref: 00505833
                                                                  • memset.MSVCRT ref: 00505852
                                                                  • memset.MSVCRT ref: 0050585E
                                                                  • memset.MSVCRT ref: 0050586A
                                                                    • Part of subcall function 00505717: GetSystemTime.KERNEL32(0000002E,0000002E,?,00000000,0000001E), ref: 00505721
                                                                    • Part of subcall function 00505772: SetFilePointer.KERNELBASE(00000000,00000000,00000000,00000000,00000000,00000000,75923130), ref: 00505786
                                                                    • Part of subcall function 00505772: ReadFile.KERNELBASE(00000000,?,00000400,0000001E,00000000), ref: 005057CC
                                                                    • Part of subcall function 00505772: SetFilePointer.KERNELBASE(00000000,00000000,00000000,00000000), ref: 005057D8
                                                                  • GetFileSize.KERNEL32(?,00000000), ref: 005058CA
                                                                  • GetFileSize.KERNEL32(?,00000000), ref: 005058D6
                                                                  • lstrlen.KERNEL32(00506207), ref: 005058E7
                                                                  • WriteFile.KERNELBASE(00000000,04034B50,0000001E,?,00000000), ref: 0050590E
                                                                  • lstrlen.KERNEL32(00506207,?,00000000), ref: 00505918
                                                                  • WriteFile.KERNELBASE(?,00506207,00000000), ref: 00505921
                                                                  • lstrlen.KERNEL32(00506207), ref: 00505926
                                                                  • SetFilePointer.KERNELBASE(?,00000000,00000000,00000000), ref: 00505934
                                                                  • WriteFile.KERNELBASE(?,?,?,?,00000000), ref: 00505953
                                                                  • ReadFile.KERNELBASE(?,?,00000400,?,00000000), ref: 00505972
                                                                  • WriteFile.KERNELBASE(?,?,0000002E,?,00000000), ref: 005059A8
                                                                  • lstrlen.KERNEL32(00506207,?,00000000), ref: 005059B2
                                                                  • WriteFile.KERNELBASE(?,00506207,00000000), ref: 005059BB
                                                                  • lstrlen.KERNEL32(00506207), ref: 005059C0
                                                                  • WriteFile.KERNELBASE(?,06054B50,00000016,?,00000000), ref: 005059FC
                                                                  • CloseHandle.KERNEL32(?), ref: 00505A01
                                                                  • CloseHandle.KERNEL32(?), ref: 00505A0A
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.4465723940.0000000000501000.00000040.00000001.01000000.00000006.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000003.00000002.4465669604.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.0000000000509000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.000000000050D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465923043.000000000050F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465975687.0000000000510000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_500000_java.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: File$Write$lstrlen$Pointermemset$CloseCreateHandleReadSize$SystemTime
                                                                  • String ID:
                                                                  • API String ID: 2136260124-3916222277
                                                                  • Opcode ID: 481d2e45d31b4b1407c013f5c1c3bd1dc6fb6bd0b0a7f5ed78220b9d1ce30f4e
                                                                  • Instruction ID: 773f872c4516b25f3d46c8f58171cf100fa68b818a43c43766e7d6fd81e4158a
                                                                  • Opcode Fuzzy Hash: 481d2e45d31b4b1407c013f5c1c3bd1dc6fb6bd0b0a7f5ed78220b9d1ce30f4e
                                                                  • Instruction Fuzzy Hash: F0710275D1125CAADF21DFA4DD88ADFBBB8FF08350F10011AF514A6260E7319A44DBA9
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 91 506e01-506e2a call 506b89 94 506e82-506e85 91->94 95 506e2c-506e52 call 506d35 call 506b89 91->95 96 507090-507092 94->96 95->94 101 506e54-506e6f call 506d35 95->101 101->94 104 506e71-506e74 101->104 105 506e76-506e7b 104->105 106 506e7d-506e80 104->106 105->104 105->106 106->94 107 506e8a-506eae lstrcpy socket 106->107 108 506eb0-506eb3 107->108 109 506eb8-506ec7 connect 107->109 110 50708f 108->110 111 507080-507082 109->111 112 506ecd-506ee3 call 506d65 109->112 110->96 113 507083-50708e closesocket 111->113 112->111 116 506ee9-506eee 112->116 113->110 116->111 117 506ef4-506f17 call 506d65 116->117 120 506f20-506f3e call 506d65 117->120 121 506f19-506f1e 117->121 120->111 126 506f44-506f49 120->126 121->120 122 506f4f-506f73 call 506d65 121->122 122->111 128 506f79-506f80 122->128 126->111 126->122 128->111 129 506f86-506fa5 call 506d65 128->129 129->111 132 506fab-506fad 129->132 132->111 133 506fb3-506fc5 call 506d65 132->133 133->111 136 506fcb-506fd0 133->136 136->111 137 506fd6-506fdf 136->137 138 506fe2-506fe6 137->138 139 506ff5-506ffa 138->139 140 506fe8-506feb 139->140 141 506ffc-507001 139->141 142 507008-50700c 140->142 143 506fed-506ff0 140->143 141->142 144 507003-507006 141->144 142->141 143->141 145 506ff2-506ff3 143->145 144->142 146 50700e-507010 144->146 145->139 147 507042-50705f send call 506d65 146->147 148 507012-507015 146->148 147->111 154 507061-507066 147->154 150 507017-507025 send 148->150 151 507028-507038 send 148->151 150->151 151->111 152 50703a-507040 151->152 152->138 154->111 155 507068-50707e call 506d65 154->155 155->113
                                                                  APIs
                                                                    • Part of subcall function 00506B89: lstrlen.KERNEL32(00000000,00000000,00000000), ref: 00506C46
                                                                    • Part of subcall function 00506B89: lstrlen.KERNEL32(00000000), ref: 00506C55
                                                                    • Part of subcall function 00506B89: CharLowerA.USER32(00000000), ref: 00506C74
                                                                    • Part of subcall function 00506B89: lstrcmpiA.KERNEL32(00000000,?), ref: 00506C84
                                                                  • lstrcpy.KERNEL32(?,?), ref: 00506E94
                                                                  • socket.WS2_32(00000002,00000001,00000006), ref: 00506EA0
                                                                  • connect.WS2_32(00000000,00000002,00000010), ref: 00506EBF
                                                                  • send.WS2_32(00000000,00501830,00000001,00000000), ref: 00507023
                                                                  • send.WS2_32(00000000,005071AD,00000002,00000000), ref: 00507034
                                                                  • send.WS2_32(00000000,.,00000005,00000000), ref: 0050704E
                                                                  • closesocket.WS2_32(00000000), ref: 00507086
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.4465723940.0000000000501000.00000040.00000001.01000000.00000006.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000003.00000002.4465669604.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.0000000000509000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.000000000050D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465923043.000000000050F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465975687.0000000000510000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_500000_java.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: send$lstrlen$CharLowerclosesocketconnectlstrcmpilstrcpysocket
                                                                  • String ID: .$%sO %s$DATA$E%s %s$From$HEL$HLO$IL F$MA%sROM:<%s>$PT T$QUIT$RC%sO:<%s>
                                                                  • API String ID: 461202756-3815809343
                                                                  • Opcode ID: 137dcdbcc398edce13df37ae931c225a0fe07400167ff2055b513371b32ddfb0
                                                                  • Instruction ID: 33585215259ea1a97b37e4a6d099c67cd5c3f73b094bdd9841701b712144618c
                                                                  • Opcode Fuzzy Hash: 137dcdbcc398edce13df37ae931c225a0fe07400167ff2055b513371b32ddfb0
                                                                  • Instruction Fuzzy Hash: 31611936F0421D6FDB309BA4CC5DBEE7FACBB58710F204562F644E22C1D6B09A948B50
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 189 502e50-502eb3 GetModuleFileNameA lstrcpy 190 502eb6-502ebf 189->190 191 502ec1-502ecd GetWindowsDirectoryA 190->191 192 502ecf-502ed5 GetTempPathA 190->192 193 502edb-502ee1 191->193 192->193 194 502f90-502f97 193->194 195 502ee7-502eff lstrlen 193->195 194->190 198 502f9d 194->198 196 502f01-502f0d lstrcat 195->196 197 502f0f-502f4a lstrcat SetFileAttributesA CreateFileA 195->197 196->197 199 502f4c-502f4f 197->199 200 502f7e-502f8b GetFileAttributesA 197->200 201 502fab-502faf 198->201 199->200 202 502f51-502f7c CloseHandle DeleteFileA CopyFileA 199->202 203 502f8e 200->203 202->203 203->194 204 502f9f-502fa9 lstrcpy 203->204 204->201
                                                                  APIs
                                                                  • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 00502E8E
                                                                  • lstrcpy.KERNEL32(.exe,?), ref: 00502EAB
                                                                  • GetWindowsDirectoryA.KERNEL32(?,00000118), ref: 00502EC7
                                                                  • GetTempPathA.KERNEL32(00000118,?), ref: 00502ED5
                                                                  • lstrlen.KERNEL32(?), ref: 00502EEE
                                                                  • lstrcat.KERNEL32(?,00501190), ref: 00502F0D
                                                                  • lstrcat.KERNEL32(?,java.exe), ref: 00502F1A
                                                                  • SetFileAttributesA.KERNELBASE(?,00000020), ref: 00502F25
                                                                  • CreateFileA.KERNELBASE(?,40000000,00000003,00000000,00000002,00000080,00000000), ref: 00502F42
                                                                  • CloseHandle.KERNEL32(00000000), ref: 00502F52
                                                                  • DeleteFileA.KERNEL32(?), ref: 00502F5F
                                                                  • CopyFileA.KERNEL32(?,?,00000000), ref: 00502F74
                                                                  • GetFileAttributesA.KERNELBASE(?), ref: 00502F85
                                                                  • lstrcpy.KERNEL32(?,?), ref: 00502FA9
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.4465723940.0000000000501000.00000040.00000001.01000000.00000006.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000003.00000002.4465669604.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.0000000000509000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.000000000050D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465923043.000000000050F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465975687.0000000000510000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_500000_java.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: File$Attributeslstrcatlstrcpy$CloseCopyCreateDeleteDirectoryHandleModuleNamePathTempWindowslstrlen
                                                                  • String ID: .exe$java.exe
                                                                  • API String ID: 3096175462-2602780958
                                                                  • Opcode ID: 473512d9f1244c06d08cbd740965cc33da0b9b43a2f3904d5a041e8f1c7c422d
                                                                  • Instruction ID: dece3f8ae99a5382c4877d1b044eea6b25dfa7d2f7fe03871ebba1afd8658fdb
                                                                  • Opcode Fuzzy Hash: 473512d9f1244c06d08cbd740965cc33da0b9b43a2f3904d5a041e8f1c7c422d
                                                                  • Instruction Fuzzy Hash: 72416A7190429DAFEB10DBA4DC8DBDEBFBCAB18354F104096F585E6090DB749AC8CB21
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  APIs
                                                                  • lstrlen.KERNEL32(?,This is a multi-part message in MIME format.,00504A0F,?,00000000,?,?,00506A70,?), ref: 005068B1
                                                                  • wsprintfA.USER32 ref: 005068BC
                                                                  • lstrlen.KERNEL32(?,--%sContent-Type: text/plain;charset=us-asciiContent-Transfer-Encoding: 7bit,?,?,?,00506A70,?), ref: 005068D2
                                                                  • wsprintfA.USER32 ref: 005068D7
                                                                  • lstrlen.KERNEL32(?,?,?,?,?,?), ref: 005068DD
                                                                  • lstrcat.KERNEL32(?,), ref: 005068F2
                                                                  • lstrlen.KERNEL32(?,--%sContent-Type: application/octet-stream;name="%s"Content-Transfer-Encoding: base64Content-Disposition: %s;filename="%s",?,?,attachment,?,?,?,?,?,?), ref: 00506929
                                                                  • wsprintfA.USER32 ref: 0050692E
                                                                  • lstrlen.KERNEL32(?,?), ref: 00506937
                                                                  • lstrlen.KERNEL32(?,--%s--,?), ref: 00506955
                                                                  • wsprintfA.USER32 ref: 0050695A
                                                                  Strings
                                                                  • --%sContent-Type: text/plain;charset=us-asciiContent-Transfer-Encoding: 7bit, xrefs: 005068C9
                                                                  • This is a multi-part message in MIME format., xrefs: 005068AB
                                                                  • --%sContent-Type: application/octet-stream;name="%s"Content-Transfer-Encoding: base64Content-Disposition: %s;filename="%s", xrefs: 00506923
                                                                  • inline, xrefs: 00506910, 0050691E
                                                                  • attachment, xrefs: 00506906
                                                                  • , xrefs: 005068EC
                                                                  • --%s--, xrefs: 0050694F
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.4465723940.0000000000501000.00000040.00000001.01000000.00000006.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000003.00000002.4465669604.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.0000000000509000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.000000000050D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465923043.000000000050F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465975687.0000000000510000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_500000_java.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: lstrlen$wsprintf$lstrcat
                                                                  • String ID: $--%s--$--%sContent-Type: application/octet-stream;name="%s"Content-Transfer-Encoding: base64Content-Disposition: %s;filename="%s"$--%sContent-Type: text/plain;charset=us-asciiContent-Transfer-Encoding: 7bit$This is a multi-part message in MIME format.$attachment$inline
                                                                  • API String ID: 3012818462-48772991
                                                                  • Opcode ID: d8a5b4ba0c87a80df2ab2dbe0b27be4406f16275184a865202cdbe473250b1af
                                                                  • Instruction ID: 3fdca0e5f0ffa1fa4bef71aa3ca571d11d6ceae177e96fc01e7fdd5b86b94422
                                                                  • Opcode Fuzzy Hash: d8a5b4ba0c87a80df2ab2dbe0b27be4406f16275184a865202cdbe473250b1af
                                                                  • Instruction Fuzzy Hash: 2B11E472A402047BDB04A769DC8EDBF3FADEFC1720F180426F904D61C1DA39D95066B5
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 217 5075e5-5075fe call 50746b 220 507601-507617 217->220 221 507627-50762d GetTempPathA 220->221 222 507619-507625 GetWindowsDirectoryA 220->222 223 507633-50763b 221->223 222->223 224 50766b-5076b7 lstrcat * 3 CreateFileA 223->224 225 50763d-507645 223->225 227 5076c8-507725 call 50737c FindCloseChangeNotification wsprintfA memset CreateProcessA 224->227 228 5076b9-5076c0 224->228 225->225 226 507647-507649 225->226 226->224 229 50764b-507655 226->229 233 50772b-50772f 227->233 228->220 230 5076c6 228->230 229->224 232 507657-50765a 229->232 230->233 232->224 235 50765c-507664 232->235 235->224
                                                                  APIs
                                                                    • Part of subcall function 0050746B: GetModuleFileNameA.KERNEL32(00000000,?,00000100,00000000,?), ref: 00507487
                                                                    • Part of subcall function 0050746B: CreateFileA.KERNELBASE(?,80000000,00000003,00000000,00000003,00000080,00000000), ref: 005074AA
                                                                    • Part of subcall function 0050746B: CreateFileA.KERNELBASE(?,C0000000,00000003,00000000,00000002,00000080,00000000), ref: 005074DC
                                                                    • Part of subcall function 0050746B: SetFilePointer.KERNELBASE(?,00000000,00000000,00000000), ref: 005074F5
                                                                    • Part of subcall function 0050746B: ReadFile.KERNELBASE(?,?,00000100,?,00000000), ref: 0050752E
                                                                    • Part of subcall function 0050746B: FindCloseChangeNotification.KERNELBASE(00000000), ref: 0050753E
                                                                    • Part of subcall function 0050746B: CloseHandle.KERNEL32(?), ref: 00507543
                                                                  • GetWindowsDirectoryA.KERNEL32(?,00000100,00000000,?), ref: 0050761F
                                                                    • Part of subcall function 0050737C: WriteFile.KERNELBASE(00000000,?,00000001,?,00000000,00000000,75918A60), ref: 005073BD
                                                                    • Part of subcall function 0050737C: WriteFile.KERNEL32(00000000,?,00000001,?,00000000,00000000,75918A60), ref: 005073E2
                                                                  • GetTempPathA.KERNEL32(00000100,?,00000000,?), ref: 0050762D
                                                                  • lstrcat.KERNEL32(?,services), ref: 00507677
                                                                  • lstrcat.KERNEL32(?,00501830), ref: 00507685
                                                                  • lstrcat.KERNEL32(?,exe), ref: 00507693
                                                                  • CreateFileA.KERNELBASE(?,C0000000,00000003,00000000,00000002,00000080,00000000), ref: 005076AC
                                                                  • FindCloseChangeNotification.KERNELBASE(00000000), ref: 005076D0
                                                                  • wsprintfA.USER32 ref: 005076E9
                                                                  • memset.MSVCRT ref: 005076F8
                                                                  • CreateProcessA.KERNELBASE(00000000,?,00000000,00000000,00000001,00000000,00000000,00000000,?,?), ref: 00507725
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.4465723940.0000000000501000.00000040.00000001.01000000.00000006.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000003.00000002.4465669604.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.0000000000509000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.000000000050D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465923043.000000000050F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465975687.0000000000510000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_500000_java.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: File$Create$Closelstrcat$ChangeFindNotificationWrite$DirectoryHandleModuleNamePathPointerProcessReadTempWindowsmemsetwsprintf
                                                                  • String ID: "%s"$\$exe$services
                                                                  • API String ID: 1621132550-3764781487
                                                                  • Opcode ID: 5c317b5b59bea286267556cb9c01fb929164c3676ee251d47bdff0a625850d3a
                                                                  • Instruction ID: 5cab7ea6ea662128e4a800645ff2ec6955619924f35eec1abec093929e757c50
                                                                  • Opcode Fuzzy Hash: 5c317b5b59bea286267556cb9c01fb929164c3676ee251d47bdff0a625850d3a
                                                                  • Instruction Fuzzy Hash: 6D3184B1D04A9CEAEB109BA49C8DFEE7F7CFB48341F1004A1F245E61C1D6705E898A65
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 236 505449-5054fe 237 505503-50551f memset 236->237 238 505521-505527 GetWindowsDirectoryA 237->238 239 505529-50552e GetEnvironmentVariableA 237->239 240 505534-50553a 238->240 239->240 241 5055a2-5055a9 240->241 242 50553c-505554 lstrlen 240->242 241->237 243 5055af-5055b3 241->243 244 505564-505568 242->244 245 505556-505562 lstrcat 242->245 246 505585-50559b lstrcat call 5052ad 244->246 247 50556a-505583 lstrcat * 2 244->247 245->244 249 5055a0-5055a1 246->249 247->246 249->241
                                                                  APIs
                                                                  • memset.MSVCRT ref: 0050550C
                                                                  • GetWindowsDirectoryA.KERNEL32(?,00000184,00000000,75920F10,75920F00), ref: 00505521
                                                                  • GetEnvironmentVariableA.KERNEL32(USERPROFILE,?,00000184,00000000,75920F10,75920F00), ref: 0050552E
                                                                  • lstrlen.KERNEL32(?), ref: 00505543
                                                                  • lstrcat.KERNEL32(?,00501190), ref: 00505562
                                                                  • lstrcat.KERNEL32(?,Local Settings), ref: 00505575
                                                                  • lstrcat.KERNEL32(?,00501190), ref: 00505583
                                                                  • lstrcat.KERNEL32(?,Temporary Internet Files), ref: 00505590
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.4465723940.0000000000501000.00000040.00000001.01000000.00000006.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000003.00000002.4465669604.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.0000000000509000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.000000000050D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465923043.000000000050F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465975687.0000000000510000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_500000_java.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: lstrcat$DirectoryEnvironmentVariableWindowslstrlenmemset
                                                                  • String ID: Local Settings$Temporary Internet Files$USERPROFILE
                                                                  • API String ID: 527352983-4053592351
                                                                  • Opcode ID: d3d72fad8d95c92e9146461b2fa435eca7b58b323d94a8347745e93cc0012726
                                                                  • Instruction ID: cacbc361b4096883e695f9cd27b791d52763dfaa7485a7004b5a6053e68340e0
                                                                  • Opcode Fuzzy Hash: d3d72fad8d95c92e9146461b2fa435eca7b58b323d94a8347745e93cc0012726
                                                                  • Instruction Fuzzy Hash: 63410C61C083CCDAEB11D7A8D9087DEBFB95F26348F0840D9D18476282D7BA5758CB76
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 250 503e35-503e49 GetModuleHandleA 251 503e56-503e64 GetProcAddress 250->251 252 503e4b-503e54 LoadLibraryA 250->252 253 503e7a-503e7c 251->253 254 503e66-503e78 DnsQuery_A 251->254 252->251 252->253 256 503eee-503ef2 253->256 254->253 255 503e7e-503e89 254->255 257 503ee9-503eed 255->257 258 503e8b-503e8c 255->258 257->256 259 503e91-503e96 258->259 260 503ee2-503ee6 259->260 261 503e98-503eac GetProcessHeap RtlAllocateHeap 259->261 260->259 262 503ee8 260->262 261->262 263 503eae-503ed5 memset lstrcpyn 261->263 262->257 264 503ed7-503edb 263->264 265 503edd 263->265 266 503ee0 264->266 265->266 266->260
                                                                  APIs
                                                                  • GetModuleHandleA.KERNEL32(dnsapi.dll,00504A02,?,00504A02,00504A02,00504001,?,0050498D,00504A02,?,?,00504A02,?), ref: 00503E3F
                                                                  • LoadLibraryA.KERNEL32(dnsapi.dll,?,00504A02,00504A02,00504001,?,0050498D,00504A02,?,?,00504A02,?), ref: 00503E4C
                                                                  • GetProcAddress.KERNEL32(00000000,DnsQuery_A), ref: 00503E5C
                                                                  • DnsQuery_A.DNSAPI(00504A02,0000000F,00000000,00000000,?,00000000,?,00504A02,00504A02,00504001,?,0050498D,00504A02,?,?,00504A02), ref: 00503E74
                                                                  • GetProcessHeap.KERNEL32(00000000,00000108,?,?,?,00504A02,00504A02,00504001,?,0050498D,00504A02,?,?,00504A02,?), ref: 00503E9B
                                                                  • RtlAllocateHeap.NTDLL(00000000,?,?), ref: 00503EA2
                                                                  • memset.MSVCRT ref: 00503EB2
                                                                  • lstrcpyn.KERNEL32(00000008,?,000000FF,?,00504A02,?), ref: 00503ECD
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.4465723940.0000000000501000.00000040.00000001.01000000.00000006.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000003.00000002.4465669604.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.0000000000509000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.000000000050D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465923043.000000000050F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465975687.0000000000510000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_500000_java.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Heap$AddressAllocateHandleLibraryLoadModuleProcProcessQuery_lstrcpynmemset
                                                                  • String ID: DnsQuery_A$dnsapi.dll
                                                                  • API String ID: 2609538583-3847274415
                                                                  • Opcode ID: d2971f3d149bab432924e85564ded9411b60e21a70f7c7355013299d56644311
                                                                  • Instruction ID: 40075319653eeb29a435cd9483c3460f96daf6c4fdfe13ee8d6bb4df6979a84e
                                                                  • Opcode Fuzzy Hash: d2971f3d149bab432924e85564ded9411b60e21a70f7c7355013299d56644311
                                                                  • Instruction Fuzzy Hash: 09210276504B0AABC7209F52DC08A3FBFACFF54780F104A29F145D2180DBB1E98897A5
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 267 5071f8-507206 268 507253-507257 267->268 269 507208-507223 call 506b89 267->269 269->268 272 507225-507240 call 506d35 269->272 272->268 275 507242-507245 272->275 276 507247-50724c 275->276 277 50724e-507251 275->277 276->275 276->277 277->268 278 507258-50726f lstrcpy 277->278 279 5072a6-5072a8 278->279 280 507271-50727e call 506b54 279->280 281 5072aa-5072ad 279->281 290 507280-507299 htons call 506e01 280->290 291 5072a4 280->291 282 5072b3-5072b9 281->282 284 5072bb-5072bc 282->284 285 5072fd-50730b lstrcpy 282->285 287 5072f6-5072fb 284->287 288 5072be-5072bf 284->288 289 50730d-507314 285->289 294 5072cd-5072e6 lstrcpy lstrcat 287->294 292 5072c1-5072c2 288->292 293 5072ef-5072f4 288->293 295 507316-507326 call 506b54 289->295 296 50736e-507376 call 507093 289->296 302 50729e-5072a2 290->302 291->279 298 507367 292->298 299 5072c8 292->299 293->294 294->289 307 507328-50734a htons call 506e01 295->307 308 50735f-507362 295->308 306 507377-50737b 296->306 298->296 299->294 302->291 305 5072e8-5072ea 302->305 305->306 307->305 311 50734c-50735d call 5033b4 307->311 308->282 311->296 311->308
                                                                  APIs
                                                                    • Part of subcall function 00506B89: lstrlen.KERNEL32(00000000,00000000,00000000), ref: 00506C46
                                                                    • Part of subcall function 00506B89: lstrlen.KERNEL32(00000000), ref: 00506C55
                                                                    • Part of subcall function 00506B89: CharLowerA.USER32(00000000), ref: 00506C74
                                                                    • Part of subcall function 00506B89: lstrcmpiA.KERNEL32(00000000,?), ref: 00506C84
                                                                  • lstrcpy.KERNEL32(?,?), ref: 0050726A
                                                                  • htons.WS2_32(00000019), ref: 00507288
                                                                  • lstrcpy.KERNEL32(00000000,mx.), ref: 005072D4
                                                                  • lstrcat.KERNEL32(00000000,?), ref: 005072E4
                                                                  • lstrcpy.KERNEL32(?,?), ref: 0050730B
                                                                  • htons.WS2_32(00000019), ref: 00507330
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.4465723940.0000000000501000.00000040.00000001.01000000.00000006.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000003.00000002.4465669604.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.0000000000509000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.000000000050D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465923043.000000000050F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465975687.0000000000510000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_500000_java.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: lstrcpy$htonslstrlen$CharLowerlstrcatlstrcmpi
                                                                  • String ID: mail.$mx.$smtp.
                                                                  • API String ID: 3218502294-1213875280
                                                                  • Opcode ID: bec314be6d6f3dd3130de3883a57f7864911e9e3467cbc4de992e4fb4bfe4188
                                                                  • Instruction ID: 61d13515a21d5bbe502a9dd85473b184d0e7fa3ad14d9318c08b4ea8da931990
                                                                  • Opcode Fuzzy Hash: bec314be6d6f3dd3130de3883a57f7864911e9e3467cbc4de992e4fb4bfe4188
                                                                  • Instruction Fuzzy Hash: 7B417076E0821E9BDF25DBA0DD49BEE7BB8BF48300F100496F905E61C1DB70AA449B61
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 314 50666d-50669a CreateFileA 315 5066a4-5066b0 314->315 316 50669c-50669f 314->316 318 5066b3-5066b9 315->318 317 5067bf-5067c1 316->317 319 5066e1-5066f6 318->319 320 5066bb-5066d8 ReadFile 318->320 319->318 321 5066f8-506703 call 506609 319->321 322 50677d-50677f 320->322 323 5066de 320->323 330 506705-50670e 321->330 324 506781-50678f call 506609 322->324 325 5067ab-5067be CloseHandle 322->325 323->319 331 506791 324->331 332 506795-506798 324->332 325->317 333 506740-506752 330->333 334 506710-506723 call 5033b4 330->334 331->332 335 50679a 332->335 336 50679e-5067aa 332->336 338 506761-506765 333->338 339 506754-506760 333->339 342 506725-50672c 334->342 343 50672e-506731 334->343 335->336 336->325 338->330 341 506767-506778 memset 338->341 339->338 341->318 344 50673f 342->344 343->333 345 506733-50673b 343->345 344->333 345->344
                                                                  APIs
                                                                  • CreateFileA.KERNELBASE(?,80000000,00000003,00000000,00000003,00000000,00000000,?), ref: 0050668E
                                                                  • ReadFile.KERNELBASE(?,?,00000400,?,00000000,?,75920440,75A78400), ref: 005066CF
                                                                  • memset.MSVCRT ref: 0050676E
                                                                  • CloseHandle.KERNEL32(?,?,75920440,75A78400), ref: 005067B5
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.4465723940.0000000000501000.00000040.00000001.01000000.00000006.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000003.00000002.4465669604.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.0000000000509000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.000000000050D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465923043.000000000050F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465975687.0000000000510000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_500000_java.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: File$CloseCreateHandleReadmemset
                                                                  • String ID: =$AiP$AiP$L
                                                                  • API String ID: 1934991721-3068730819
                                                                  • Opcode ID: d3fd9ca8599230727a5ff21a4c33e8c9938b9a13f51fbc19e9badfacaad136ea
                                                                  • Instruction ID: 75c36a7ddd45a5937c5c7dc736fdda1d92c830406bf875cefc640d4579443e51
                                                                  • Opcode Fuzzy Hash: d3fd9ca8599230727a5ff21a4c33e8c9938b9a13f51fbc19e9badfacaad136ea
                                                                  • Instruction Fuzzy Hash: 24418034900299EBDF11CF98C884AEEBFB9FF46304F1045A5E991A7182D3709A51CBA1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 346 504e00-504e21 GetProcessHeap RtlAllocateHeap 347 504e23-504e26 346->347 348 504e2b-504e4a CreateFileA 346->348 349 504ee7-504ee9 347->349 350 504ed0-504ed2 348->350 351 504e50-504e53 348->351 352 504ed3-504ee6 GetProcessHeap RtlFreeHeap 350->352 351->350 353 504e55-504e71 351->353 352->349 354 504eb6-504ec0 ReadFile 353->354 355 504ec2-504ece FindCloseChangeNotification 354->355 356 504e73-504e75 354->356 355->352 357 504e77-504e79 356->357 358 504e7c-504e9f call 504c29 call 504d0c 356->358 357->358 363 504ea1-504ea8 358->363 364 504eaa-504eb3 358->364 363->355 363->364 364->354
                                                                  APIs
                                                                  • GetProcessHeap.KERNEL32(00000000,00008010,?,?,?,?,0050477B,00000000), ref: 00504E0F
                                                                  • RtlAllocateHeap.NTDLL(00000000), ref: 00504E16
                                                                  • CreateFileA.KERNELBASE({GP,80000000,00000003,00000000,00000003,00000080,00000000,00000200,?,?,?,?,0050477B,00000000), ref: 00504E3F
                                                                  • ReadFile.KERNELBASE(00000000,?,00008000,?,00000000,?,?,?,?,?,0050477B,00000000), ref: 00504EB9
                                                                  • FindCloseChangeNotification.KERNELBASE(?,?,?,?,?,?,?,?,0050477B,00000000), ref: 00504EC5
                                                                  • GetProcessHeap.KERNEL32(00000000,?,?,?,?,?,0050477B,00000000), ref: 00504ED7
                                                                  • RtlFreeHeap.NTDLL(00000000,?,?,?,?,0050477B,00000000), ref: 00504EDE
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.4465723940.0000000000501000.00000040.00000001.01000000.00000006.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000003.00000002.4465669604.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.0000000000509000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.000000000050D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465923043.000000000050F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465975687.0000000000510000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_500000_java.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Heap$FileProcess$AllocateChangeCloseCreateFindFreeNotificationRead
                                                                  • String ID: {GP
                                                                  • API String ID: 3486390565-1941362325
                                                                  • Opcode ID: 428cdfe4e4e56a777748bbb5e178a34146adc0e2ef22d4898716c37ae4cd4343
                                                                  • Instruction ID: cde6f649d8a6e970d913e8d6152b8159acc1393c7919c2b618bcbc601deb3034
                                                                  • Opcode Fuzzy Hash: 428cdfe4e4e56a777748bbb5e178a34146adc0e2ef22d4898716c37ae4cd4343
                                                                  • Instruction Fuzzy Hash: 8A216BB5D00208FBDF119FA4DD48AAEBFBDFB04394F204469F642A2190D3304E54AF66
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 365 502d8a-502ddb memset gethostname lstrcat 366 502e0b-502e4f lstrcat * 2 CreateMutexA GetLastError 365->366 367 502ddd 365->367 368 502dde-502dec 367->368 369 502dee-502df0 368->369 370 502dff-502e08 368->370 369->370 371 502df2-502dfd 369->371 370->368 372 502e0a 370->372 371->370 372->366
                                                                  APIs
                                                                  • memset.MSVCRT ref: 00502DA8
                                                                  • gethostname.WS2_32(?,00000100), ref: 00502DB8
                                                                  • lstrcat.KERNEL32(?,root), ref: 00502DD0
                                                                  • lstrcat.KERNEL32(00000000,00000000), ref: 00502E19
                                                                  • lstrcat.KERNEL32(00000000,00000000), ref: 00502E29
                                                                  • CreateMutexA.KERNELBASE(00000000,00000001,00000000), ref: 00502E36
                                                                  • GetLastError.KERNEL32 ref: 00502E3C
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.4465723940.0000000000501000.00000040.00000001.01000000.00000006.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000003.00000002.4465669604.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.0000000000509000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.000000000050D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465923043.000000000050F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465975687.0000000000510000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_500000_java.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: lstrcat$CreateErrorLastMutexgethostnamememset
                                                                  • String ID: root
                                                                  • API String ID: 3016363891-385153371
                                                                  • Opcode ID: 8b525dd58b779d996fb6a8d86ac4fd597cf676b2815009214a9b3c48bfcca267
                                                                  • Instruction ID: f0f7e16a089310aca742f5238602011a20bf225b974dc6b71ad344aa0a64dbe1
                                                                  • Opcode Fuzzy Hash: 8b525dd58b779d996fb6a8d86ac4fd597cf676b2815009214a9b3c48bfcca267
                                                                  • Instruction Fuzzy Hash: 7D11067294025C6BDB229774EC49FEA3B6CBB69310F0401D6E585E20C1D6B49ACB8B61
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 373 502d8e-502ddb memset gethostname lstrcat 374 502e0b-502e4f lstrcat * 2 CreateMutexA GetLastError 373->374 375 502ddd 373->375 376 502dde-502dec 375->376 377 502dee-502df0 376->377 378 502dff-502e08 376->378 377->378 379 502df2-502dfd 377->379 378->376 380 502e0a 378->380 379->378 380->374
                                                                  APIs
                                                                  • memset.MSVCRT ref: 00502DA8
                                                                  • gethostname.WS2_32(?,00000100), ref: 00502DB8
                                                                  • lstrcat.KERNEL32(?,root), ref: 00502DD0
                                                                  • lstrcat.KERNEL32(00000000,00000000), ref: 00502E19
                                                                  • lstrcat.KERNEL32(00000000,00000000), ref: 00502E29
                                                                  • CreateMutexA.KERNELBASE(00000000,00000001,00000000), ref: 00502E36
                                                                  • GetLastError.KERNEL32 ref: 00502E3C
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.4465723940.0000000000501000.00000040.00000001.01000000.00000006.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000003.00000002.4465669604.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.0000000000509000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.000000000050D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465923043.000000000050F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465975687.0000000000510000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_500000_java.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: lstrcat$CreateErrorLastMutexgethostnamememset
                                                                  • String ID: root
                                                                  • API String ID: 3016363891-385153371
                                                                  • Opcode ID: cf7a759d958d5d5df551feae167fd14b3451636c600fc75c24892226733576e4
                                                                  • Instruction ID: f5e5deb4a2873d9f3c4a82aa4f30ac048af43ff210c46692099915afef873f95
                                                                  • Opcode Fuzzy Hash: cf7a759d958d5d5df551feae167fd14b3451636c600fc75c24892226733576e4
                                                                  • Instruction Fuzzy Hash: 1511E67794025C6BDB229B74EC49FEE3B6CBB69300F0401D6E585E20C1D6B49ACB8B65
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • RegOpenKeyExA.KERNELBASE(80000002,?,00000000,00020006,?), ref: 005030A7
                                                                  • RegOpenKeyExA.ADVAPI32(80000001,Software\Microsoft\Windows\CurrentVersion\Run,00000000,00020006,?), ref: 005030BC
                                                                  • lstrlen.KERNEL32(00000052), ref: 005030C9
                                                                  • RegSetValueExA.KERNELBASE(?,JavaVM,00000000,00000001,00000052,00000001), ref: 005030DC
                                                                  • RegCloseKey.KERNELBASE(?), ref: 005030E5
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.4465723940.0000000000501000.00000040.00000001.01000000.00000006.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000003.00000002.4465669604.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.0000000000509000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.000000000050D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465923043.000000000050F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465975687.0000000000510000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_500000_java.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Open$CloseValuelstrlen
                                                                  • String ID: JavaVM$Software\Microsoft\Windows\CurrentVersion\Run
                                                                  • API String ID: 1812710942-1525231178
                                                                  • Opcode ID: e7c4ab6b2f41031e5725f1ab95989c2709ffec37f0edb752e120a5812798a4be
                                                                  • Instruction ID: cd70c8d2d714d64a17d00ab414c80a8edff05e1f62e6019a642830455d294362
                                                                  • Opcode Fuzzy Hash: e7c4ab6b2f41031e5725f1ab95989c2709ffec37f0edb752e120a5812798a4be
                                                                  • Instruction Fuzzy Hash: 6241BC10D0C2C9EDFB02C2A8D8487DEBFB65B26748F084099D5847A292C2FF1658C77A
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • SetFilePointer.KERNELBASE(00000000,0000003C,00000000,00000000,00000000,00000000,00000104), ref: 005036AF
                                                                  • ReadFile.KERNELBASE(00000000,00000000,00000004,00000000,00000000), ref: 005036C8
                                                                  • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00000000), ref: 005036DC
                                                                  • ReadFile.KERNELBASE(00000000,?,00000016,00000004,00000000), ref: 005036F5
                                                                  • SetFilePointer.KERNELBASE(00000000,00000018,00000000,00000000), ref: 00503732
                                                                  • ReadFile.KERNEL32(00000000,?,00000028,00000500,00000000), ref: 00503750
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.4465723940.0000000000501000.00000040.00000001.01000000.00000006.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000003.00000002.4465669604.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.0000000000509000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.000000000050D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465923043.000000000050F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465975687.0000000000510000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_500000_java.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: File$PointerRead
                                                                  • String ID: (
                                                                  • API String ID: 3154509469-3887548279
                                                                  • Opcode ID: 8d052d63ba2457e03fe9d7e8e13cec42e15aac050f382052b2be9159c5306ec8
                                                                  • Instruction ID: f73d0bf622d8b4d7441a19c50e1fac5286902f701a87a8b44225c7f7ee392bb3
                                                                  • Opcode Fuzzy Hash: 8d052d63ba2457e03fe9d7e8e13cec42e15aac050f382052b2be9159c5306ec8
                                                                  • Instruction Fuzzy Hash: 8C3106B6901118FBDF21DF95CE849EEBFBDFF04790F108065E905A2190E6319B81DBA0
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • GetModuleFileNameA.KERNEL32(00000000,?,00000100,00000000,?), ref: 00507487
                                                                  • CreateFileA.KERNELBASE(?,80000000,00000003,00000000,00000003,00000080,00000000), ref: 005074AA
                                                                    • Part of subcall function 005073E8: GetTempPathA.KERNEL32(00000104,?), ref: 005073FD
                                                                    • Part of subcall function 005073E8: lstrlen.KERNEL32(?), ref: 0050740A
                                                                    • Part of subcall function 005073E8: lstrcat.KERNEL32(?,zincite), ref: 00507448
                                                                    • Part of subcall function 005073E8: lstrcat.KERNEL32(?,.log), ref: 00507456
                                                                    • Part of subcall function 005073E8: lstrcpy.KERNEL32(?,?), ref: 00507462
                                                                  • CreateFileA.KERNELBASE(?,C0000000,00000003,00000000,00000002,00000080,00000000), ref: 005074DC
                                                                    • Part of subcall function 00503697: SetFilePointer.KERNELBASE(00000000,0000003C,00000000,00000000,00000000,00000000,00000104), ref: 005036AF
                                                                    • Part of subcall function 00503697: ReadFile.KERNELBASE(00000000,00000000,00000004,00000000,00000000), ref: 005036C8
                                                                    • Part of subcall function 00503697: SetFilePointer.KERNELBASE(00000000,00000000,00000000,00000000), ref: 005036DC
                                                                    • Part of subcall function 00503697: ReadFile.KERNELBASE(00000000,?,00000016,00000004,00000000), ref: 005036F5
                                                                    • Part of subcall function 00503697: SetFilePointer.KERNELBASE(00000000,00000018,00000000,00000000), ref: 00503732
                                                                    • Part of subcall function 00503697: ReadFile.KERNEL32(00000000,?,00000028,00000500,00000000), ref: 00503750
                                                                  • SetFilePointer.KERNELBASE(?,00000000,00000000,00000000), ref: 005074F5
                                                                  • WriteFile.KERNELBASE(00000000,?,?,?,00000000), ref: 00507515
                                                                  • ReadFile.KERNELBASE(?,?,00000100,?,00000000), ref: 0050752E
                                                                  • FindCloseChangeNotification.KERNELBASE(00000000), ref: 0050753E
                                                                  • CloseHandle.KERNEL32(?), ref: 00507543
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.4465723940.0000000000501000.00000040.00000001.01000000.00000006.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000003.00000002.4465669604.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.0000000000509000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.000000000050D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465923043.000000000050F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465975687.0000000000510000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_500000_java.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: File$PointerRead$CloseCreatelstrcat$ChangeFindHandleModuleNameNotificationPathTempWritelstrcpylstrlen
                                                                  • String ID:
                                                                  • API String ID: 3217969230-0
                                                                  • Opcode ID: ce32c246a33f20e58d6278d0f612e51c5e19eb005e251be8a3b6b2944cde01c9
                                                                  • Instruction ID: 3ee29f7f2fe5b884bcaff3a16fbbd882d52692b313de89af8fed5149c55411fd
                                                                  • Opcode Fuzzy Hash: ce32c246a33f20e58d6278d0f612e51c5e19eb005e251be8a3b6b2944cde01c9
                                                                  • Instruction Fuzzy Hash: 1521F875D00128BBDB219BA1DC48FDEBF7CEF15360F104292B654A2090D6706B84DFA4
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • GetLocalTime.KERNELBASE(?), ref: 005032E0
                                                                  • FileTimeToLocalFileTime.KERNEL32(00000000,?), ref: 005032EF
                                                                  • FileTimeToSystemTime.KERNEL32(?,?), ref: 005032FD
                                                                  • GetTimeZoneInformation.KERNELBASE(?), ref: 0050330B
                                                                  • wsprintfA.USER32 ref: 00503399
                                                                  Strings
                                                                  • %s, %u %s %u %.2u:%.2u:%.2u %c%.2u%.2u, xrefs: 00503391
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.4465723940.0000000000501000.00000040.00000001.01000000.00000006.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000003.00000002.4465669604.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.0000000000509000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.000000000050D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465923043.000000000050F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465975687.0000000000510000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_500000_java.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Time$File$Local$InformationSystemZonewsprintf
                                                                  • String ID: %s, %u %s %u %.2u:%.2u:%.2u %c%.2u%.2u
                                                                  • API String ID: 4026320513-1580571061
                                                                  • Opcode ID: 3a7b98e65f6c78f5d9b51af2aadc7aef16cb77ea1e4a24cd175063a99b3a5637
                                                                  • Instruction ID: a724780acf2ae77f2b438354054414b458c2743b998ef78bcc664df01f72aa73
                                                                  • Opcode Fuzzy Hash: 3a7b98e65f6c78f5d9b51af2aadc7aef16cb77ea1e4a24cd175063a99b3a5637
                                                                  • Instruction Fuzzy Hash: 7921287290024CAADF24DF99DC59AFE3BBDBF08705F10441AF956C2090E778CA88DB65
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                    • Part of subcall function 005073E8: GetTempPathA.KERNEL32(00000104,?), ref: 005073FD
                                                                    • Part of subcall function 005073E8: lstrlen.KERNEL32(?), ref: 0050740A
                                                                    • Part of subcall function 005073E8: lstrcat.KERNEL32(?,zincite), ref: 00507448
                                                                    • Part of subcall function 005073E8: lstrcat.KERNEL32(?,.log), ref: 00507456
                                                                    • Part of subcall function 005073E8: lstrcpy.KERNEL32(?,?), ref: 00507462
                                                                  • CreateFileA.KERNELBASE(?,80000000,00000003,00000000,00000003,00000080,00000000,00000104), ref: 0050757A
                                                                  • WriteFile.KERNELBASE( _P,?,00000000,00000000,00000000), ref: 005075B7
                                                                  • ReadFile.KERNELBASE(00000000,?,00000100,00000000,00000000,00000000,00000000), ref: 005075D0
                                                                  • CloseHandle.KERNEL32(?), ref: 005075DA
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.4465723940.0000000000501000.00000040.00000001.01000000.00000006.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000003.00000002.4465669604.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.0000000000509000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.000000000050D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465923043.000000000050F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465975687.0000000000510000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_500000_java.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: File$lstrcat$CloseCreateHandlePathReadTempWritelstrcpylstrlen
                                                                  • String ID: _P$ _P
                                                                  • API String ID: 285733917-3595566573
                                                                  • Opcode ID: f913fd42e879a096b32d6719d4cc10f2557aa5c1de87ce01b876391c2f5311ba
                                                                  • Instruction ID: 95e29d51a280f3ee1416f365a270c88ebcaea3d62707c39128d041610a3427a9
                                                                  • Opcode Fuzzy Hash: f913fd42e879a096b32d6719d4cc10f2557aa5c1de87ce01b876391c2f5311ba
                                                                  • Instruction Fuzzy Hash: 3211FAB690410CFFEB11DB94DC88EEEBB7CEB58354F1001A6B681A2090DA706F84DB60
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • memset.MSVCRT ref: 005055CE
                                                                  • GetWindowsDirectoryA.KERNEL32(?,00000104,?,75920F10,75920F00), ref: 005055DE
                                                                  • lstrcpy.KERNEL32(?,00501888), ref: 005055F6
                                                                  • GetDriveTypeA.KERNEL32(00000043,?,75920F10,75920F00), ref: 00505622
                                                                  • Sleep.KERNEL32(00001194,?,75920F10,75920F00), ref: 00505632
                                                                    • Part of subcall function 005052AD: Sleep.KERNEL32(00000800,75918A60,00000184), ref: 005052D7
                                                                    • Part of subcall function 005052AD: lstrcpy.KERNEL32(?,?), ref: 005052F4
                                                                    • Part of subcall function 005052AD: lstrlen.KERNEL32(?), ref: 00505304
                                                                    • Part of subcall function 005052AD: lstrcat.KERNEL32(?,00501190), ref: 0050531C
                                                                    • Part of subcall function 005052AD: lstrcat.KERNEL32(?,*.*), ref: 0050532E
                                                                    • Part of subcall function 005052AD: memset.MSVCRT ref: 00505341
                                                                    • Part of subcall function 005052AD: FindFirstFileA.KERNELBASE(?,00000010), ref: 0050535F
                                                                    • Part of subcall function 005052AD: FindNextFileA.KERNELBASE(?,?), ref: 0050537E
                                                                    • Part of subcall function 005052AD: lstrcpy.KERNEL32(?,?), ref: 005053BA
                                                                    • Part of subcall function 005052AD: lstrlen.KERNEL32(?), ref: 005053C3
                                                                    • Part of subcall function 005052AD: lstrcat.KERNEL32(?,00501190), ref: 005053DB
                                                                    • Part of subcall function 005052AD: lstrcat.KERNEL32(?,0000002E), ref: 005053EF
                                                                    • Part of subcall function 005052AD: Sleep.KERNELBASE(0000004B), ref: 00505400
                                                                    • Part of subcall function 005052AD: FindClose.KERNELBASE(?), ref: 0050543B
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.4465723940.0000000000501000.00000040.00000001.01000000.00000006.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000003.00000002.4465669604.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.0000000000509000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.000000000050D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465923043.000000000050F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465975687.0000000000510000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_500000_java.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: lstrcat$FindSleeplstrcpy$Filelstrlenmemset$CloseDirectoryDriveFirstNextTypeWindows
                                                                  • String ID: Z
                                                                  • API String ID: 798667630-1505515367
                                                                  • Opcode ID: 9ee661453eb1d2122f14e4296619a70f61453c8a90dd75b8a2c9885480629b10
                                                                  • Instruction ID: c2197e004829da8253717f8257516700dd35be32272eb9ca971d862e6122c766
                                                                  • Opcode Fuzzy Hash: 9ee661453eb1d2122f14e4296619a70f61453c8a90dd75b8a2c9885480629b10
                                                                  • Instruction Fuzzy Hash: B5016DB5D046AA6BDB2093609D89BDE7B6CAB21314F0404D1E389E20C1E6B49AC88F55
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • GetModuleHandleA.KERNEL32(?), ref: 0050365A
                                                                  • LoadLibraryA.KERNELBASE(wininet.dll), ref: 00503668
                                                                  • GetProcAddress.KERNEL32(00000000,InternetGetConnectedState), ref: 00503678
                                                                  • InternetGetConnectedState.WININET(?,00000000), ref: 0050368D
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.4465723940.0000000000501000.00000040.00000001.01000000.00000006.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000003.00000002.4465669604.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.0000000000509000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.000000000050D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465923043.000000000050F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465975687.0000000000510000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_500000_java.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: AddressConnectedHandleInternetLibraryLoadModuleProcState
                                                                  • String ID: InternetGetConnectedState$wininet.dll
                                                                  • API String ID: 1505668628-596207600
                                                                  • Opcode ID: 383ecea641d6cbcfcb23eacf179140b95e1886bb47d9fb192bb945b850ba0d9a
                                                                  • Instruction ID: 2b294e7ad4bcb9401aef01a1c95623af15c32a98deb04781e5990a6f2b8114d4
                                                                  • Opcode Fuzzy Hash: 383ecea641d6cbcfcb23eacf179140b95e1886bb47d9fb192bb945b850ba0d9a
                                                                  • Instruction Fuzzy Hash: 5F011620A083C9E9EF11D7F8D81DBAD7FA91B21748F0485D89185E61C1D7BB8358C776
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • lstrlen.KERNEL32(00504A0F,?), ref: 0050697F
                                                                  • memset.MSVCRT ref: 0050699C
                                                                  • GlobalAlloc.KERNELBASE(00000040,?,00000000), ref: 00506A4A
                                                                  • DeleteFileA.KERNEL32(?), ref: 00506A84
                                                                  • GlobalFree.KERNEL32(?), ref: 00506A92
                                                                  • DeleteFileA.KERNELBASE(?), ref: 00506AAB
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.4465723940.0000000000501000.00000040.00000001.01000000.00000006.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000003.00000002.4465669604.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.0000000000509000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.000000000050D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465923043.000000000050F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465975687.0000000000510000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_500000_java.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: DeleteFileGlobal$AllocFreelstrlenmemset
                                                                  • String ID:
                                                                  • API String ID: 986129705-0
                                                                  • Opcode ID: 6dd78a900dba814e068311bea715ff8960b663710d4381be50eb23fc4b887274
                                                                  • Instruction ID: 64ff1dbb5a700912d54094296ca3f5a4976b8a1cb91408c58090539e8bb41b0b
                                                                  • Opcode Fuzzy Hash: 6dd78a900dba814e068311bea715ff8960b663710d4381be50eb23fc4b887274
                                                                  • Instruction Fuzzy Hash: 6631AA72D04259DBDB10EB61DC89ADD7BB9FF85700F1044EAE109E6181D734AE948FA0
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • InterlockedIncrement.KERNEL32(0050B390), ref: 00504A3F
                                                                  • GetCurrentThread.KERNEL32 ref: 00504A47
                                                                  • SetThreadPriority.KERNELBASE(00000000), ref: 00504A4E
                                                                  • InterlockedDecrement.KERNEL32(0050B390), ref: 00504A75
                                                                  • RtlExitUserThread.NTDLL(00000000), ref: 00504A7D
                                                                    • Part of subcall function 005049C5: lstrcpyn.KERNEL32(?,?,0000007F,?,0050B390), ref: 005049F3
                                                                    • Part of subcall function 005049C5: GlobalFree.KERNEL32(00000000), ref: 00504A22
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.4465723940.0000000000501000.00000040.00000001.01000000.00000006.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000003.00000002.4465669604.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.0000000000509000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.000000000050D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465923043.000000000050F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465975687.0000000000510000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_500000_java.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Thread$Interlocked$CurrentDecrementExitFreeGlobalIncrementPriorityUserlstrcpyn
                                                                  • String ID:
                                                                  • API String ID: 3760226487-0
                                                                  • Opcode ID: 4cbbf26141544510d966b90899a4a27ebab7c4cfef4a543942c3c1baaca5dbd7
                                                                  • Instruction ID: 59da798909faaf52fbb5bb2341fb00456894eff524a9a69de734a8fe505154a2
                                                                  • Opcode Fuzzy Hash: 4cbbf26141544510d966b90899a4a27ebab7c4cfef4a543942c3c1baaca5dbd7
                                                                  • Instruction Fuzzy Hash: 79E0E532504690DBD3105BA5AC1CB9F7FE8BB95721F05C519F19AC21D187701088AA7B
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • lstrcpyn.KERNEL32(?,00000070,0000000F,?,?,00505430,?), ref: 00505179
                                                                  • CharLowerA.USER32(?,?,?,00505430,?), ref: 00505183
                                                                  • Sleep.KERNEL32(00000800,?,759183C0,?,?,00505430,?), ref: 0050527D
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.4465723940.0000000000501000.00000040.00000001.01000000.00000006.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000003.00000002.4465669604.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.0000000000509000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.000000000050D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465923043.000000000050F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465975687.0000000000510000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_500000_java.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CharLowerSleeplstrcpyn
                                                                  • String ID: 0TP
                                                                  • API String ID: 267381043-1855386918
                                                                  • Opcode ID: 58247fd17fb87f74bb58f54966b4e5650545c160f13571a61582d6b25f85bdbb
                                                                  • Instruction ID: 8274f9cbfd694f8c2d5fe74a321f0c892786a0426ba65b7b33d98da66336cf23
                                                                  • Opcode Fuzzy Hash: 58247fd17fb87f74bb58f54966b4e5650545c160f13571a61582d6b25f85bdbb
                                                                  • Instruction Fuzzy Hash: 2841C168A44E4A4EFF344624C9497BF2F5B7FB2314F98491BD193420D3FA264C8ACE16
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                    • Part of subcall function 00503620: GetModuleHandleA.KERNEL32(?), ref: 0050365A
                                                                    • Part of subcall function 00503620: LoadLibraryA.KERNELBASE(wininet.dll), ref: 00503668
                                                                    • Part of subcall function 00503620: GetProcAddress.KERNEL32(00000000,InternetGetConnectedState), ref: 00503678
                                                                  • Sleep.KERNELBASE(00000001,?,?,?,?,?,?,00504C20), ref: 00504B00
                                                                  • CreateThread.KERNELBASE(00000000,00000000,Function_00004A37,00000000,00000000,?), ref: 00504BAB
                                                                  • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,00504C20), ref: 00504BBB
                                                                  • GetTickCount.KERNEL32 ref: 00504BEC
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.4465723940.0000000000501000.00000040.00000001.01000000.00000006.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000003.00000002.4465669604.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.0000000000509000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.000000000050D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465923043.000000000050F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465975687.0000000000510000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_500000_java.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Handle$AddressCloseCountCreateLibraryLoadModuleProcSleepThreadTick
                                                                  • String ID:
                                                                  • API String ID: 50151514-0
                                                                  • Opcode ID: 7bd039e2053160122893935ea775d366336ab228428e61975a78905543a36c9c
                                                                  • Instruction ID: ab1ee794b50bf540a74e33d7e95b3844ad5376a59cf73203d230b0ff36f6ead8
                                                                  • Opcode Fuzzy Hash: 7bd039e2053160122893935ea775d366336ab228428e61975a78905543a36c9c
                                                                  • Instruction Fuzzy Hash: 2331BFF06047829AEB24AF749C9DF7FBED9BB90301F114A19F695C61D1EB60C844CE62
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • CreateThread.KERNEL32(00000000,00000000,0050311C,00000000,00000000,?), ref: 00503239
                                                                  • Sleep.KERNEL32 ref: 00503253
                                                                  • CreateThread.KERNELBASE(00000000,00000000,Function_00004C1B,00000000,00000000,?), ref: 00503267
                                                                  • Sleep.KERNEL32(000003E8), ref: 00503278
                                                                    • Part of subcall function 00502D8E: memset.MSVCRT ref: 00502DA8
                                                                    • Part of subcall function 00502D8E: gethostname.WS2_32(?,00000100), ref: 00502DB8
                                                                    • Part of subcall function 00502D8E: lstrcat.KERNEL32(?,root), ref: 00502DD0
                                                                    • Part of subcall function 00502D8E: lstrcat.KERNEL32(00000000,00000000), ref: 00502E19
                                                                    • Part of subcall function 00502D8E: lstrcat.KERNEL32(00000000,00000000), ref: 00502E29
                                                                    • Part of subcall function 00502D8E: CreateMutexA.KERNELBASE(00000000,00000001,00000000), ref: 00502E36
                                                                    • Part of subcall function 00502D8E: GetLastError.KERNEL32 ref: 00502E3C
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.4465723940.0000000000501000.00000040.00000001.01000000.00000006.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000003.00000002.4465669604.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.0000000000509000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.000000000050D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465923043.000000000050F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465975687.0000000000510000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_500000_java.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Createlstrcat$SleepThread$ErrorLastMutexgethostnamememset
                                                                  • String ID:
                                                                  • API String ID: 1090214876-0
                                                                  • Opcode ID: 56b857bb58b019830c55899e3dc40cd59a11f718e304888cd94b7654b28f1510
                                                                  • Instruction ID: c3a13703e42c1b4ec363eec73e7dae4186dad5f565332290872ed40493be106c
                                                                  • Opcode Fuzzy Hash: 56b857bb58b019830c55899e3dc40cd59a11f718e304888cd94b7654b28f1510
                                                                  • Instruction Fuzzy Hash: B701B13A14065676D71177729C4FDAF6F6CFFC6B11B10041AFA44920C2DE349A4589B9
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00000000,00000000,00000000,75923130), ref: 00505786
                                                                  • ReadFile.KERNELBASE(00000000,?,00000400,0000001E,00000000), ref: 005057CC
                                                                  • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00000000), ref: 005057D8
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.4465723940.0000000000501000.00000040.00000001.01000000.00000006.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000003.00000002.4465669604.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.0000000000509000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.000000000050D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465923043.000000000050F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465975687.0000000000510000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_500000_java.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: File$Pointer$Read
                                                                  • String ID:
                                                                  • API String ID: 2010065189-0
                                                                  • Opcode ID: bb546912d54678a9d0532169b250e9a907e6a5e32c21b8bb19504821abbee549
                                                                  • Instruction ID: 2023e3fc1b6d4fef64246fcfcc3d40c5cb703b471bd574507167deff65189e91
                                                                  • Opcode Fuzzy Hash: bb546912d54678a9d0532169b250e9a907e6a5e32c21b8bb19504821abbee549
                                                                  • Instruction Fuzzy Hash: AC015A75801528FBCB219B91CD48CDF7FBCFF043A0F1000A6FA08A2150E6305A85EFA4
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • CreateFileA.KERNELBASE(00000003,C0000000,00000003,00000000,00000003,00000080,00000000,?,00506082,?), ref: 00505EFA
                                                                    • Part of subcall function 00503697: SetFilePointer.KERNELBASE(00000000,0000003C,00000000,00000000,00000000,00000000,00000104), ref: 005036AF
                                                                    • Part of subcall function 00503697: ReadFile.KERNELBASE(00000000,00000000,00000004,00000000,00000000), ref: 005036C8
                                                                    • Part of subcall function 00503697: SetFilePointer.KERNELBASE(00000000,00000000,00000000,00000000), ref: 005036DC
                                                                    • Part of subcall function 00503697: ReadFile.KERNELBASE(00000000,?,00000016,00000004,00000000), ref: 005036F5
                                                                    • Part of subcall function 00503697: SetFilePointer.KERNELBASE(00000000,00000018,00000000,00000000), ref: 00503732
                                                                    • Part of subcall function 00503697: ReadFile.KERNEL32(00000000,?,00000028,00000500,00000000), ref: 00503750
                                                                  • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00000000), ref: 00505F14
                                                                    • Part of subcall function 0050754A: CreateFileA.KERNELBASE(?,80000000,00000003,00000000,00000003,00000080,00000000,00000104), ref: 0050757A
                                                                    • Part of subcall function 0050754A: ReadFile.KERNELBASE(00000000,?,00000100,00000000,00000000,00000000,00000000), ref: 005075D0
                                                                    • Part of subcall function 0050754A: CloseHandle.KERNEL32(?), ref: 005075DA
                                                                  • CloseHandle.KERNEL32(00000000), ref: 00505F22
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.4465723940.0000000000501000.00000040.00000001.01000000.00000006.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000003.00000002.4465669604.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.0000000000509000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.000000000050D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465923043.000000000050F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465975687.0000000000510000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_500000_java.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: File$PointerRead$CloseCreateHandle
                                                                  • String ID:
                                                                  • API String ID: 683849867-0
                                                                  • Opcode ID: b99fe2f45e5bde572de9b7e7ed92353d3095358bd454211046ec1452de006103
                                                                  • Instruction ID: 775e82f229dd3032f6fe67c201e338f7e7adaa5fd3f05fa10755dd2907732c0f
                                                                  • Opcode Fuzzy Hash: b99fe2f45e5bde572de9b7e7ed92353d3095358bd454211046ec1452de006103
                                                                  • Instruction Fuzzy Hash: ACE08631181B60BBF1312320BC1FFDE2A5CBF05721F200200F690790E05B942B46459E
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • WSAStartup.WS2_32(00000101,?), ref: 00503295
                                                                    • Part of subcall function 005033A8: GetTickCount.KERNEL32 ref: 005033A8
                                                                  • memset.MSVCRT ref: 005032AE
                                                                    • Part of subcall function 005031E4: CreateThread.KERNEL32(00000000,00000000,0050311C,00000000,00000000,?), ref: 00503239
                                                                    • Part of subcall function 005031E4: Sleep.KERNEL32 ref: 00503253
                                                                    • Part of subcall function 005031E4: CreateThread.KERNELBASE(00000000,00000000,Function_00004C1B,00000000,00000000,?), ref: 00503267
                                                                    • Part of subcall function 005031E4: Sleep.KERNEL32(000003E8), ref: 00503278
                                                                  • ExitProcess.KERNEL32 ref: 005032C4
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.4465723940.0000000000501000.00000040.00000001.01000000.00000006.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000003.00000002.4465669604.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.0000000000509000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.000000000050D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465923043.000000000050F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465975687.0000000000510000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_500000_java.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CreateSleepThread$CountExitProcessStartupTickmemset
                                                                  • String ID:
                                                                  • API String ID: 3857727052-0
                                                                  • Opcode ID: d350899a09f95ef6e7ab3bbd56bc2704d28786e2137af9dc1514bced35b22768
                                                                  • Instruction ID: e6c800b91a5105f6af05a8ed022c94dfcb71a2cb97930a29ec3ddceb2131e2e1
                                                                  • Opcode Fuzzy Hash: d350899a09f95ef6e7ab3bbd56bc2704d28786e2137af9dc1514bced35b22768
                                                                  • Instruction Fuzzy Hash: 93E08C309442086BEB50B7A0CC0EFDD7B2CAB14701F8008A1B284950D2EEA166C88AA6
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • GetCurrentThread.KERNEL32 ref: 0050565D
                                                                  • SetThreadPriority.KERNELBASE(00000000), ref: 00505664
                                                                    • Part of subcall function 00504FF8: RegOpenKeyExA.KERNELBASE(80000001,?,00000000,00020019,?,75920F00), ref: 005050BE
                                                                    • Part of subcall function 00504FF8: memset.MSVCRT ref: 005050D5
                                                                    • Part of subcall function 00504FF8: RegQueryValueExA.KERNELBASE(?,00000000,00000000,00000000,?,?), ref: 005050F5
                                                                    • Part of subcall function 00504FF8: RegCloseKey.KERNELBASE(?), ref: 005050FE
                                                                    • Part of subcall function 00505449: memset.MSVCRT ref: 0050550C
                                                                    • Part of subcall function 00505449: GetWindowsDirectoryA.KERNEL32(?,00000184,00000000,75920F10,75920F00), ref: 00505521
                                                                    • Part of subcall function 00505449: lstrlen.KERNEL32(?), ref: 00505543
                                                                    • Part of subcall function 00505449: lstrcat.KERNEL32(?,00501190), ref: 00505562
                                                                    • Part of subcall function 00505449: lstrcat.KERNEL32(?,Local Settings), ref: 00505575
                                                                    • Part of subcall function 00505449: lstrcat.KERNEL32(?,00501190), ref: 00505583
                                                                    • Part of subcall function 00505449: lstrcat.KERNEL32(?,Temporary Internet Files), ref: 00505590
                                                                    • Part of subcall function 005055B4: memset.MSVCRT ref: 005055CE
                                                                    • Part of subcall function 005055B4: GetWindowsDirectoryA.KERNEL32(?,00000104,?,75920F10,75920F00), ref: 005055DE
                                                                    • Part of subcall function 005055B4: lstrcpy.KERNEL32(?,00501888), ref: 005055F6
                                                                    • Part of subcall function 005055B4: GetDriveTypeA.KERNEL32(00000043,?,75920F10,75920F00), ref: 00505622
                                                                    • Part of subcall function 005055B4: Sleep.KERNEL32(00001194,?,75920F10,75920F00), ref: 00505632
                                                                  • Sleep.KERNEL32(000061A8), ref: 00505684
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.4465723940.0000000000501000.00000040.00000001.01000000.00000006.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000003.00000002.4465669604.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.0000000000509000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.000000000050D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465923043.000000000050F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465975687.0000000000510000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_500000_java.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: lstrcat$memset$DirectorySleepThreadWindows$CloseCurrentDriveOpenPriorityQueryTypeValuelstrcpylstrlen
                                                                  • String ID:
                                                                  • API String ID: 1200182354-0
                                                                  • Opcode ID: d3dfe3ca985f4e689f16a7144f6eb9c4b7e5f550bcfda9f1fc34b3dd57ffe1dd
                                                                  • Instruction ID: a00bd4ce691c911287dc50f1ec9ddfcc97e79f3b0b06d643ae5355c187a33e16
                                                                  • Opcode Fuzzy Hash: d3dfe3ca985f4e689f16a7144f6eb9c4b7e5f550bcfda9f1fc34b3dd57ffe1dd
                                                                  • Instruction Fuzzy Hash: 94C0123100098687DF043BF49C1E49E3E21BFA13623384701F263840E3DF2004C86E2B
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • WriteFile.KERNELBASE(00000000,?,00000001,?,00000000,00000000,75918A60), ref: 005073BD
                                                                  • WriteFile.KERNEL32(00000000,?,00000001,?,00000000,00000000,75918A60), ref: 005073E2
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.4465723940.0000000000501000.00000040.00000001.01000000.00000006.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000003.00000002.4465669604.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.0000000000509000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.000000000050D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465923043.000000000050F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465975687.0000000000510000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_500000_java.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: FileWrite
                                                                  • String ID:
                                                                  • API String ID: 3934441357-0
                                                                  • Opcode ID: 3c2d70d6b2ebeca3607b6924ad4f9547b586735f7dfb2575c4133ed41483a66d
                                                                  • Instruction ID: 22b37714542d64fe014a8661f32d504f0c3aa166d1667109d1551e00d35c67e0
                                                                  • Opcode Fuzzy Hash: 3c2d70d6b2ebeca3607b6924ad4f9547b586735f7dfb2575c4133ed41483a66d
                                                                  • Instruction Fuzzy Hash: DAF0C8B2D0025DBEEB00DB65CD49BEF7BACFB48300F1044B5AA15E3182E230AE449B90
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.4465723940.0000000000501000.00000040.00000001.01000000.00000006.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000003.00000002.4465669604.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.0000000000509000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.000000000050D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465923043.000000000050F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465975687.0000000000510000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_500000_java.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: gethostbynameinet_addr
                                                                  • String ID:
                                                                  • API String ID: 1594361348-0
                                                                  • Opcode ID: d80e6b9ccf96af150c4b4bc22e55b89b49174f73060853a5bde8afa2a2c8e0c9
                                                                  • Instruction ID: 501b0e01b687e7f67490080a527e39b23ae378a902b17d1d7521d5b9a2636822
                                                                  • Opcode Fuzzy Hash: d80e6b9ccf96af150c4b4bc22e55b89b49174f73060853a5bde8afa2a2c8e0c9
                                                                  • Instruction Fuzzy Hash: F5E04F72A015304FC775576CA84866E7F64AF06B707060390EDA0E72F0D3208C61D6C1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • lstrcpyn.KERNEL32(?,?,0000007F,?,0050B390), ref: 005049F3
                                                                  • GlobalFree.KERNEL32(00000000), ref: 00504A22
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.4465723940.0000000000501000.00000040.00000001.01000000.00000006.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000003.00000002.4465669604.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.0000000000509000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.000000000050D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465923043.000000000050F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465975687.0000000000510000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_500000_java.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: FreeGloballstrcpyn
                                                                  • String ID:
                                                                  • API String ID: 1459762280-0
                                                                  • Opcode ID: 7d035dee32a55ad060078f1a2d67e29d411d44635d7f6be3b5683acde2b4a0e8
                                                                  • Instruction ID: 93f080cd151b0566b5450e3832289e04369c3a844037cb3805327191c1a613e0
                                                                  • Opcode Fuzzy Hash: 7d035dee32a55ad060078f1a2d67e29d411d44635d7f6be3b5683acde2b4a0e8
                                                                  • Instruction Fuzzy Hash: 81012BB2A04A091FDB30966CE816BBF7FE9FF81760F24442AF749D35C0EA3498014B44
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  Strings
                                                                  • http://search.lycos.com/default.asp?lpv=1&loc=searchhp&tab=web&query=%s, xrefs: 0050792F
                                                                  • mail, xrefs: 005077F4
                                                                  • http://www.altavista.com/web/results?q=%s&kgs=0&kls=0, xrefs: 005078E7
                                                                  • http://search.yahoo.com/search?p=%s&ei=UTF-8&fr=fp-tab-web-t&cop=mss&tab=, xrefs: 005078A7
                                                                  • contact+, xrefs: 005077B3
                                                                  • reply, xrefs: 00507793
                                                                  • &nbq=%d, xrefs: 0050791B
                                                                  • &n=%d, xrefs: 005078D8
                                                                  • &num=%d, xrefs: 00507895
                                                                  • http://www.google.com/search?hl=en&ie=UTF-8&oe=UTF-8&q=%s, xrefs: 0050784D
                                                                  • %s+%s, xrefs: 00507825
                                                                  • mailto, xrefs: 00507771
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.4465723940.0000000000501000.00000040.00000001.01000000.00000006.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000003.00000002.4465669604.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.0000000000509000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.000000000050D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465923043.000000000050F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465975687.0000000000510000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_500000_java.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: wsprintf$lstrcat$memset$lstrcpylstrlen
                                                                  • String ID: %s+%s$&n=%d$&nbq=%d$&num=%d$contact+$http://search.lycos.com/default.asp?lpv=1&loc=searchhp&tab=web&query=%s$http://search.yahoo.com/search?p=%s&ei=UTF-8&fr=fp-tab-web-t&cop=mss&tab=$http://www.altavista.com/web/results?q=%s&kgs=0&kls=0$http://www.google.com/search?hl=en&ie=UTF-8&oe=UTF-8&q=%s$mail$mailto$reply
                                                                  • API String ID: 3204893122-1703501390
                                                                  • Opcode ID: bcab0227e277082ccd510bc8d607ea9e91170f1f256f590e2014eab68a4d74d1
                                                                  • Instruction ID: ded823d3f8bc32eef99a2724958b2501f44dba1139f3c98e25ba8aed4e19c952
                                                                  • Opcode Fuzzy Hash: bcab0227e277082ccd510bc8d607ea9e91170f1f256f590e2014eab68a4d74d1
                                                                  • Instruction Fuzzy Hash: D551E430F4450C7AEF08A6669D8EEEE3E5FBBDCB10F18C827F105610D6DDB0AA158525
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • FindWindowA.USER32(rctrl_renwnd32,00000000), ref: 0050312A
                                                                    • Part of subcall function 005030F0: PostMessageA.USER32(?,00000012,00000000,00000000), ref: 00503108
                                                                    • Part of subcall function 005030F0: PostMessageA.USER32(?,00000010,00000000,00000000), ref: 0050310F
                                                                    • Part of subcall function 005030F0: PostMessageA.USER32(?,00000002,00000000,00000000), ref: 00503116
                                                                  • FindWindowA.USER32(ATH_Note,00000000), ref: 0050313A
                                                                  • FindWindowA.USER32(IEFrame,00000000), ref: 0050314A
                                                                  • RtlExitUserThread.NTDLL(00000000), ref: 00503155
                                                                  • GetModuleHandleA.KERNEL32(kernel32.dll), ref: 005031C3
                                                                  • GetProcAddress.KERNEL32(00000000,RegisterServiceProcess), ref: 005031D2
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.4465723940.0000000000501000.00000040.00000001.01000000.00000006.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000003.00000002.4465669604.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.0000000000509000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.000000000050D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465923043.000000000050F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465975687.0000000000510000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_500000_java.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: FindMessagePostWindow$AddressExitHandleModuleProcThreadUser
                                                                  • String ID: ATH_Note$IEFrame$RegisterServiceProcess$kernel32.dll$rctrl_renwnd32
                                                                  • API String ID: 104824008-672394068
                                                                  • Opcode ID: 0e403a32e1aee024a8ab39fe307f344bc474e0f0a24a2a0af902c9252800bb10
                                                                  • Instruction ID: ca8937058ee0a95befedaf0986bb5ec46897f89f1bd3759e6bbb064e7f8aa431
                                                                  • Opcode Fuzzy Hash: 0e403a32e1aee024a8ab39fe307f344bc474e0f0a24a2a0af902c9252800bb10
                                                                  • Instruction Fuzzy Hash: C7211210D4C7C9A9FB1197F88C1E79EAEA95F22749F1440C8A1846A1C3CAFB5718C3B7
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • lstrcpy.KERNEL32(?,"Postmaster"), ref: 00505AB8
                                                                  • lstrcat.KERNEL32(?,00502644), ref: 00505ACA
                                                                  • lstrcat.KERNEL32(?,postmaster), ref: 00505AF6
                                                                  • lstrcat.KERNEL32(?,00501868), ref: 00505AFE
                                                                  • lstrcat.KERNEL32(?,?), ref: 00505B05
                                                                  • lstrcpy.KERNEL32(?,?), ref: 00505B12
                                                                  • lstrcat.KERNEL32(?,0050261C), ref: 00505B1E
                                                                  • lstrcat.KERNEL32(?,yahoo.com), ref: 00505BA4
                                                                  • lstrcpy.KERNEL32(?,yahoo.com), ref: 00505BB2
                                                                  • lstrcpy.KERNEL32(?,008538C2), ref: 00505BBF
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.4465723940.0000000000501000.00000040.00000001.01000000.00000006.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000003.00000002.4465669604.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.0000000000509000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.000000000050D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465923043.000000000050F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465975687.0000000000510000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_500000_java.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: lstrcat$lstrcpy
                                                                  • String ID: "Automatic Email Delivery Software"$"Bounced mail"$"MAILER-DAEMON"$"Mail Administrator"$"Mail Delivery Subsystem"$"Post Office"$"Postmaster"$"Returned mail"$"The Post Office"$MAILER-DAEMON$noreply$postmaster$yahoo.com
                                                                  • API String ID: 2482611188-423193620
                                                                  • Opcode ID: f2ae21f6f0fc755f6ab651e23e7815c34ac089526878af3048900abbff2b26bb
                                                                  • Instruction ID: a9b0a225ccebaa74ed32a98531ce4ef3425950baae9838941721c6dfd1e2a18b
                                                                  • Opcode Fuzzy Hash: f2ae21f6f0fc755f6ab651e23e7815c34ac089526878af3048900abbff2b26bb
                                                                  • Instruction Fuzzy Hash: D8417771340B11A7E71097259CCEBBF7E9CFB91B01F144016F982960C2FEE59845AEB6
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • lstrlen.KERNEL32(00000000,?,?,?,005045DC,?,75920440,?,?,00504669), ref: 00504039
                                                                  • isspace.MSVCRT ref: 0050405A
                                                                  • isalnum.MSVCRT ref: 0050406A
                                                                  • lstrlen.KERNEL32(?,005045DC,?,75920440,?,?,00504669), ref: 00504110
                                                                  • lstrlen.KERNEL32(?), ref: 005041CD
                                                                  • lstrlen.KERNEL32(?), ref: 0050422A
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.4465723940.0000000000501000.00000040.00000001.01000000.00000006.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000003.00000002.4465669604.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.0000000000509000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.000000000050D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465923043.000000000050F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465975687.0000000000510000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_500000_java.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: lstrlen$isalnumisspace
                                                                  • String ID: _-!.$_-!.@
                                                                  • API String ID: 942633883-1107819772
                                                                  • Opcode ID: 13f1972239871b3c44236b19c0e3c7acdde54ddd6e475e0e74b5625e8a80bea5
                                                                  • Instruction ID: 46a4e0ed4f2d23864a61de77937e1c011c01544acd97643bc178da60782ba0d3
                                                                  • Opcode Fuzzy Hash: 13f1972239871b3c44236b19c0e3c7acdde54ddd6e475e0e74b5625e8a80bea5
                                                                  • Instruction Fuzzy Hash: FA61F6F5908B925EEB255BB06C5833F7F98BF62312F28045EEBC1C90C2E668C481CE15
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • wsprintfA.USER32 ref: 00506807
                                                                  • wsprintfA.USER32 ref: 00506816
                                                                  • lstrlen.KERNEL32(?,To: %s,?), ref: 0050682D
                                                                  • wsprintfA.USER32 ref: 00506832
                                                                  • lstrlen.KERNEL32(?,Subject: %s,?), ref: 00506844
                                                                  • wsprintfA.USER32 ref: 00506849
                                                                  • lstrcat.KERNEL32(?,Date: ), ref: 0050685A
                                                                  • lstrlen.KERNEL32(?), ref: 0050685D
                                                                    • Part of subcall function 005032CB: GetLocalTime.KERNELBASE(?), ref: 005032E0
                                                                    • Part of subcall function 005032CB: GetTimeZoneInformation.KERNELBASE(?), ref: 0050330B
                                                                    • Part of subcall function 005032CB: wsprintfA.USER32 ref: 00503399
                                                                  • lstrcat.KERNEL32(?,MIME-Version: 1.0), ref: 00506871
                                                                  • lstrlen.KERNEL32(?,Content-Type: multipart/mixed;boundary="%s",?), ref: 0050687D
                                                                  • wsprintfA.USER32 ref: 00506882
                                                                  • lstrcat.KERNEL32(?,X-Priority: 3X-MSMail-Priority: NormalX-Mailer: Microsoft Outlook Express 6.00.2600.0000X-MIMEOLE: Produced By Microsoft MimeOLE V6.00.2600.0000), ref: 0050688D
                                                                  Strings
                                                                  • MIME-Version: 1.0, xrefs: 0050686B
                                                                  • Subject: %s, xrefs: 0050683E
                                                                  • Date: , xrefs: 00506854
                                                                  • NextPart, xrefs: 005067F6
                                                                  • From: %s, xrefs: 00506810
                                                                  • ----=_%s_%.3u_%.4u_%.8X.%.8X, xrefs: 005067FB
                                                                  • To: %s, xrefs: 00506827
                                                                  • Content-Type: multipart/mixed;boundary="%s", xrefs: 00506877
                                                                  • X-Priority: 3X-MSMail-Priority: NormalX-Mailer: Microsoft Outlook Express 6.00.2600.0000X-MIMEOLE: Produced By Microsoft MimeOLE V6.00.2600.0000, xrefs: 00506887
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.4465723940.0000000000501000.00000040.00000001.01000000.00000006.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000003.00000002.4465669604.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.0000000000509000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.000000000050D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465923043.000000000050F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465975687.0000000000510000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_500000_java.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: wsprintf$lstrlen$lstrcat$Time$InformationLocalZone
                                                                  • String ID: MIME-Version: 1.0$----=_%s_%.3u_%.4u_%.8X.%.8X$Content-Type: multipart/mixed;boundary="%s"$Date: $From: %s$NextPart$Subject: %s$To: %s$X-Priority: 3X-MSMail-Priority: NormalX-Mailer: Microsoft Outlook Express 6.00.2600.0000X-MIMEOLE: Produced By Microsoft MimeOLE V6.00.2600.0000
                                                                  • API String ID: 1752939335-3336112092
                                                                  • Opcode ID: 65c65f0f7d9700eea59a9b15cfe4f069311947272235b1f9c059394cb26afcae
                                                                  • Instruction ID: 516944fcafe1d406c4de45a34c5fbbf3ebfe04e920b5b8b11edbf61359fe2e0a
                                                                  • Opcode Fuzzy Hash: 65c65f0f7d9700eea59a9b15cfe4f069311947272235b1f9c059394cb26afcae
                                                                  • Instruction Fuzzy Hash: E111BF767817153AD2047721AC8FFAFBE4CFF81B20F040425F908A21C2DAA9B61995BD
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • GetProcessHeap.KERNEL32(00000000,00001000,00000000), ref: 00503B9D
                                                                  • RtlAllocateHeap.NTDLL(00000000), ref: 00503BA0
                                                                  • socket.WS2_32(00000002,00000002,00000011), ref: 00503BBA
                                                                  • htons.WS2_32(00000000), ref: 00503BF5
                                                                  • select.WS2_32 ref: 00503C3F
                                                                  • memset.MSVCRT ref: 00503C51
                                                                  • recv.WS2_32(?,00000000,00001000,00000000), ref: 00503C61
                                                                  • htons.WS2_32(?), ref: 00503C88
                                                                  • htons.WS2_32(?), ref: 00503CA3
                                                                  • GetProcessHeap.KERNEL32(00000000,00000108), ref: 00503D10
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.4465723940.0000000000501000.00000040.00000001.01000000.00000006.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000003.00000002.4465669604.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.0000000000509000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.000000000050D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465923043.000000000050F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465975687.0000000000510000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_500000_java.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Heaphtons$Process$Allocatememsetrecvselectsocket
                                                                  • String ID:
                                                                  • API String ID: 1083883850-0
                                                                  • Opcode ID: c9f7bc26b78ece624b09ac70a74073d8748b4f15b1362e67323826f7ad7e9130
                                                                  • Instruction ID: 407117dfceaa818f317e20e129298f2efd80ccf421d121f9015e9229cc58b6dd
                                                                  • Opcode Fuzzy Hash: c9f7bc26b78ece624b09ac70a74073d8748b4f15b1362e67323826f7ad7e9130
                                                                  • Instruction Fuzzy Hash: 8F61D2769047069FD720AF64DC48B6FBFECFF94784F100809F98997290D7709A489BA2
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • wsprintfA.USER32 ref: 005070BC
                                                                  • wsprintfA.USER32 ref: 005070D4
                                                                  • RegOpenKeyExA.ADVAPI32(80000001,?,00000000,00020019,?), ref: 005070F1
                                                                  • RegEnumKeyA.ADVAPI32(?,00000000,?,00000100), ref: 005071D8
                                                                  • RegCloseKey.ADVAPI32(?), ref: 005071E5
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.4465723940.0000000000501000.00000040.00000001.01000000.00000006.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000003.00000002.4465669604.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.0000000000509000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.000000000050D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465923043.000000000050F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465975687.0000000000510000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_500000_java.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: wsprintf$CloseEnumOpen
                                                                  • String ID: %s %s$Account$Internet$SMTP$Server$Software\Microsoft\%s %s Manager\%ss
                                                                  • API String ID: 1693054222-1692917665
                                                                  • Opcode ID: a100bb0b5d2db9c482a7de813b13c352d9e9d523f33d783107d2be0624946bfd
                                                                  • Instruction ID: 919e163466d9f41961a9d57fd17da3ca6bbeb631558065ae4de98a1fa7a4ba0d
                                                                  • Opcode Fuzzy Hash: a100bb0b5d2db9c482a7de813b13c352d9e9d523f33d783107d2be0624946bfd
                                                                  • Instruction Fuzzy Hash: 7641F671E0021DABDB21DBA1DD49EEFBBBCFF88741F0000A5A905E2090E774AA44DB61
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.4465723940.0000000000501000.00000040.00000001.01000000.00000006.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000003.00000002.4465669604.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.0000000000509000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.000000000050D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465923043.000000000050F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465975687.0000000000510000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_500000_java.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: lstrcpy$CharUpper$Buffstrstrwsprintf
                                                                  • String ID: %s.%s$.com$com
                                                                  • API String ID: 1204462619-569357965
                                                                  • Opcode ID: 0bd2fc9e38ccdf57edabb65dabad38c9a347dc46d3a870250db8cbaf424e98cf
                                                                  • Instruction ID: 2a81d91e2002685be900b6559790254c352ea299669c914cf5c60e1db04ad5da
                                                                  • Opcode Fuzzy Hash: 0bd2fc9e38ccdf57edabb65dabad38c9a347dc46d3a870250db8cbaf424e98cf
                                                                  • Instruction Fuzzy Hash: FF414BB7340B425AE7046326AC8DBBF3A9AFBD0711F11041AF781C20C1EE758A469E35
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • GetModuleHandleA.KERNEL32(iphlpapi.dll), ref: 00503F02
                                                                  • LoadLibraryA.KERNEL32(iphlpapi.dll), ref: 00503F12
                                                                  • GetProcAddress.KERNEL32(00000000,GetNetworkParams), ref: 00503F2F
                                                                  • GetProcessHeap.KERNEL32(00000000,00004000), ref: 00503F4D
                                                                  • RtlAllocateHeap.NTDLL(00000000), ref: 00503F50
                                                                  • htons.WS2_32(00000035), ref: 00503F88
                                                                  • inet_addr.WS2_32(?), ref: 00503F93
                                                                  • gethostbyname.WS2_32(?), ref: 00503FA6
                                                                  • GetProcessHeap.KERNEL32(00000000,?), ref: 00503FE3
                                                                  • HeapFree.KERNEL32(00000000), ref: 00503FE6
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.4465723940.0000000000501000.00000040.00000001.01000000.00000006.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000003.00000002.4465669604.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.0000000000509000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.000000000050D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465923043.000000000050F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465975687.0000000000510000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_500000_java.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Heap$Process$AddressAllocateFreeHandleLibraryLoadModuleProcgethostbynamehtonsinet_addr
                                                                  • String ID: GetNetworkParams$iphlpapi.dll
                                                                  • API String ID: 2899438970-2099955842
                                                                  • Opcode ID: e30f29e266a04806bc51eef7561a6e33902f13042b838279bdac54ccba920e99
                                                                  • Instruction ID: acfe8a1e42ac83ed393b8fa399d380572ad7b045617876d8cdea66422d8a7479
                                                                  • Opcode Fuzzy Hash: e30f29e266a04806bc51eef7561a6e33902f13042b838279bdac54ccba920e99
                                                                  • Instruction Fuzzy Hash: C5319F35E00A07AFDF109BB89C49AAE7FBCBF14361B140115F914E32D0DB38DA459BA5
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • lstrlen.KERNEL32(?,?,?,?,005045EB,75920440,?,?,00504669), ref: 00504311
                                                                  • lstrlen.KERNEL32(?,?,005045EB,75920440,?,?,00504669), ref: 0050433A
                                                                  • lstrlen.KERNEL32(cpxlate,?,005045EB,75920440,?,?,00504669), ref: 00504373
                                                                  • lstrlen.KERNEL32(microsoft.com,?,005045EB,75920440,?,?,00504669), ref: 0050438D
                                                                  • lstrlen.KERNEL32(microsoft.com,?,005045EB,75920440,?,?,00504669), ref: 005043A3
                                                                  • lstrlen.KERNEL32(cpxlate,?,005045EB,75920440,?,?,00504669), ref: 005043FB
                                                                  • lstrlen.KERNEL32(cpxlate,?,005045EB,75920440,?,?,00504669), ref: 00504410
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.4465723940.0000000000501000.00000040.00000001.01000000.00000006.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000003.00000002.4465669604.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.0000000000509000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.000000000050D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465923043.000000000050F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465975687.0000000000510000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_500000_java.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: lstrlen
                                                                  • String ID: cpxlate$microsoft.com
                                                                  • API String ID: 1659193697-1417270902
                                                                  • Opcode ID: 7234369e607e997fc05737b92fa64be9d20d6ac8b389998761447fe385796dbe
                                                                  • Instruction ID: 2d6b92822a5ce253097b69b3c07574bdd26a63d487101100c5e09b38dca8b49d
                                                                  • Opcode Fuzzy Hash: 7234369e607e997fc05737b92fa64be9d20d6ac8b389998761447fe385796dbe
                                                                  • Instruction Fuzzy Hash: CB419FF0A4564ACBFB214F34AEF836E3EE4B759705F90152ADB41C72A1E7248889DF01
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.4465723940.0000000000501000.00000040.00000001.01000000.00000006.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000003.00000002.4465669604.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.0000000000509000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.000000000050D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465923043.000000000050F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465975687.0000000000510000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_500000_java.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: lstrcat$PathTemplstrcpylstrlen
                                                                  • String ID: .log$\$zincite
                                                                  • API String ID: 1195028341-2520228640
                                                                  • Opcode ID: 9b8db98ae055c8dff7040cdb26ef09709199bca6636e77b7a4b7fff887e6c2cb
                                                                  • Instruction ID: b4afade12c0fc9fcd69d2ee1c841bfa627f913ce1fee5f64901a70284f785ff6
                                                                  • Opcode Fuzzy Hash: 9b8db98ae055c8dff7040cdb26ef09709199bca6636e77b7a4b7fff887e6c2cb
                                                                  • Instruction Fuzzy Hash: B70186B180455D9BDF109F74DD9DFDE7FBCAB24300F5000A1A6C4D2091D6B0AAC88F51
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • CreateFileA.KERNEL32(00000020,80000000,00000003,00000000,00000003,00000080,00000000,75920F10,00000000), ref: 00504F0C
                                                                  • GetFileSize.KERNEL32(00000000,00000000), ref: 00504F2A
                                                                  • CreateFileMappingA.KERNEL32(00000000,00000000,00000002,00000000,00000000,00000000), ref: 00504F3A
                                                                  • MapViewOfFile.KERNEL32(00000000,00000004,00000000,00000000,00000000,00000000), ref: 00504F5B
                                                                  • memset.MSVCRT ref: 00504F89
                                                                  • UnmapViewOfFile.KERNEL32(00000000), ref: 00504FCC
                                                                  • CloseHandle.KERNEL32(?), ref: 00504FD5
                                                                  • CloseHandle.KERNEL32(?), ref: 00504FDF
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.4465723940.0000000000501000.00000040.00000001.01000000.00000006.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000003.00000002.4465669604.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.0000000000509000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.000000000050D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465923043.000000000050F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465975687.0000000000510000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_500000_java.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: File$CloseCreateHandleView$MappingSizeUnmapmemset
                                                                  • String ID:
                                                                  • API String ID: 3315828190-0
                                                                  • Opcode ID: af9d264d035b30454285412ee2e0fbb538361efd641962c35410f79fff99e6b2
                                                                  • Instruction ID: 0ab0f1c3a718459e2b74eb1b04299cdf3ef3ce68078fedbeea16834dce009e45
                                                                  • Opcode Fuzzy Hash: af9d264d035b30454285412ee2e0fbb538361efd641962c35410f79fff99e6b2
                                                                  • Instruction Fuzzy Hash: 1D31D5F190438AAFDB206F649C88EAE7FACFB04359F100529FB92D22D1D7209C45CB61
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • lstrlen.KERNEL32(00000000,?), ref: 00504652
                                                                  • lstrcmpiA.KERNEL32(008538C2,?), ref: 00504689
                                                                  • lstrlen.KERNEL32(?), ref: 005046A1
                                                                  • GetProcessHeap.KERNEL32(?,-0000000F), ref: 005046AA
                                                                  • RtlAllocateHeap.NTDLL(00000000), ref: 005046B1
                                                                  • memset.MSVCRT ref: 005046C9
                                                                  • GetTickCount.KERNEL32 ref: 005046D5
                                                                  • lstrcpy.KERNEL32(0000000A,?), ref: 005046EE
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.4465723940.0000000000501000.00000040.00000001.01000000.00000006.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000003.00000002.4465669604.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.0000000000509000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.000000000050D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465923043.000000000050F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465975687.0000000000510000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_500000_java.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Heaplstrlen$AllocateCountProcessTicklstrcmpilstrcpymemset
                                                                  • String ID:
                                                                  • API String ID: 518059893-0
                                                                  • Opcode ID: 9efe57d214a3b300e581acbdec6397eaff9b66c6c968e2989330a7faa671002f
                                                                  • Instruction ID: 707180101a398f47e83f4d7edf7de099827023ee405d7e436c1cd2a4ce101803
                                                                  • Opcode Fuzzy Hash: 9efe57d214a3b300e581acbdec6397eaff9b66c6c968e2989330a7faa671002f
                                                                  • Instruction Fuzzy Hash: E2212676800655ABC7219F64DC08BDF7BE8FB19350F004865EA86D3290E770E9489FA1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • isdigit.MSVCRT ref: 005034F2
                                                                  • memset.MSVCRT ref: 00503548
                                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000014,00000000,00000000,?,?,00000000), ref: 00503572
                                                                  • lstrlen.KERNEL32(00000000,?,?,00000000), ref: 0050358E
                                                                  • lstrlen.KERNEL32(?,?,?,00000000), ref: 005035A9
                                                                  • lstrlen.KERNEL32(00000000,?,?,00000000), ref: 005035F0
                                                                  • memcpy.MSVCRT ref: 00503602
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.4465723940.0000000000501000.00000040.00000001.01000000.00000006.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000003.00000002.4465669604.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.0000000000509000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.000000000050D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465923043.000000000050F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465975687.0000000000510000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_500000_java.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: lstrlen$ByteCharMultiWideisdigitmemcpymemset
                                                                  • String ID:
                                                                  • API String ID: 3478709927-0
                                                                  • Opcode ID: a2ce9885984fa3000aded219a2996b6cc6e5ec1c0a8ebb19bb3fbddf8be59116
                                                                  • Instruction ID: 23a442e20ae22f83cb2f45545b469242e3b658874f908f9248848cc5510e9995
                                                                  • Opcode Fuzzy Hash: a2ce9885984fa3000aded219a2996b6cc6e5ec1c0a8ebb19bb3fbddf8be59116
                                                                  • Instruction Fuzzy Hash: BE41B471804299AFDB25CFA4C988AEE7FACAF19344F14019DD882A7191D6719F49CB60
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.4465723940.0000000000501000.00000040.00000001.01000000.00000006.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000003.00000002.4465669604.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.0000000000509000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.000000000050D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465923043.000000000050F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465975687.0000000000510000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_500000_java.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: c63324c0295fa89b6ebd5856617ed0b4d67f95c478c8ab9655f69d5cbd800aba
                                                                  • Instruction ID: 1af87907bf89bedeb0649b551357384cbbe48afd0fdc4005cd780a5b5450faca
                                                                  • Opcode Fuzzy Hash: c63324c0295fa89b6ebd5856617ed0b4d67f95c478c8ab9655f69d5cbd800aba
                                                                  • Instruction Fuzzy Hash: 7841B039A00219ABCB00DFA5CC84AEEBBF8FF48715F104456E959E7291E3749A41CB64
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • GetProcessHeap.KERNEL32(00000000,00000090,00000000,00504A02,?,005049A9,00504A02,00000000,?,?,00504A02,?), ref: 005048E1
                                                                  • RtlAllocateHeap.NTDLL(00000000,?,005049A9), ref: 005048E8
                                                                  • memset.MSVCRT ref: 005048FC
                                                                  • lstrcpyn.KERNEL32(00000010,?,0000007F,?,00504A02,?), ref: 00504915
                                                                  • GetTickCount.KERNEL32 ref: 0050491B
                                                                  • GetTickCount.KERNEL32 ref: 00504942
                                                                  • lstrcpyn.KERNEL32(00000010,00000000,0000007F,?,005049A9,00504A02,00000000,?,?,00504A02,?), ref: 0050495B
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.4465723940.0000000000501000.00000040.00000001.01000000.00000006.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000003.00000002.4465669604.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.0000000000509000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.000000000050D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465923043.000000000050F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465975687.0000000000510000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_500000_java.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CountHeapTicklstrcpyn$AllocateProcessmemset
                                                                  • String ID:
                                                                  • API String ID: 2696074827-0
                                                                  • Opcode ID: 402b7b3b154f41ef7f311cd206536f8d1fec18a9e784e76e33cb7e60e1247590
                                                                  • Instruction ID: 703d1ba90af1539a1c1e71d69a92d341ab7fc86eaf6e4218c2875852d7dfb891
                                                                  • Opcode Fuzzy Hash: 402b7b3b154f41ef7f311cd206536f8d1fec18a9e784e76e33cb7e60e1247590
                                                                  • Instruction Fuzzy Hash: A0214AB2900B919FD730DF64D98896FBBE4FF54700B108D2DE69AD3691D334A8489F51
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.4465723940.0000000000501000.00000040.00000001.01000000.00000006.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000003.00000002.4465669604.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.0000000000509000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.000000000050D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465923043.000000000050F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465975687.0000000000510000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_500000_java.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: isspace$lstrcpy
                                                                  • String ID: cpxlate$microsoft.com$EP
                                                                  • API String ID: 3591682678-1338335977
                                                                  • Opcode ID: 97e05d28098dfa30c11553f396c773aa8e9dcaeee145c2bf642825238118a22f
                                                                  • Instruction ID: d322a60b3cd344418dea32cdce2ecae7b80887596fe3726befac56383c2b426d
                                                                  • Opcode Fuzzy Hash: 97e05d28098dfa30c11553f396c773aa8e9dcaeee145c2bf642825238118a22f
                                                                  • Instruction Fuzzy Hash: 2011E7E96087D39EEB224EB4444477E7FD87F56311F0805A9F7D0861D6C3A48885CBA1
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • GetModuleHandleA.KERNEL32(urlmon.dll,?,00000200), ref: 0050795B
                                                                  • LoadLibraryA.KERNEL32(urlmon.dll,?,00000200), ref: 00507966
                                                                  • GetProcAddress.KERNEL32(00000000,URLDownloadToCacheFileA), ref: 00507976
                                                                  • lstrcpy.KERNEL32(?,?), ref: 005079A8
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.4465723940.0000000000501000.00000040.00000001.01000000.00000006.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000003.00000002.4465669604.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.0000000000509000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.000000000050D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465923043.000000000050F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465975687.0000000000510000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_500000_java.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: AddressHandleLibraryLoadModuleProclstrcpy
                                                                  • String ID: URLDownloadToCacheFileA$urlmon.dll
                                                                  • API String ID: 1765825236-446873360
                                                                  • Opcode ID: 8d756ae2cdbdadfac3edac27fec9d7869389870997cdf4f7ecb942f188448ba0
                                                                  • Instruction ID: 185a24763c0bcb0fc453a4a8a7a4dc2d3681b975c5b2d20548b30850ca32465b
                                                                  • Opcode Fuzzy Hash: 8d756ae2cdbdadfac3edac27fec9d7869389870997cdf4f7ecb942f188448ba0
                                                                  • Instruction Fuzzy Hash: A0F0C872A0861977E7115B748C59FEF7F6CAF59B40F000424FA45D10C0EBB0E54986A5
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • GetTempPathA.KERNEL32(00000104,?,00000000,?), ref: 00505F41
                                                                  • GetTempFileNameA.KERNEL32(?,tmp,00000000,?), ref: 00505F5C
                                                                  • CopyFileA.KERNEL32(005065B9,?,00000000), ref: 00505F75
                                                                    • Part of subcall function 00505EE3: CreateFileA.KERNELBASE(00000003,C0000000,00000003,00000000,00000003,00000080,00000000,?,00506082,?), ref: 00505EFA
                                                                    • Part of subcall function 00505EE3: SetFilePointer.KERNELBASE(00000000,00000000,00000000,00000000), ref: 00505F14
                                                                    • Part of subcall function 00505EE3: CloseHandle.KERNEL32(00000000), ref: 00505F22
                                                                  • DeleteFileA.KERNEL32(005065B9), ref: 00505F94
                                                                  • lstrcpy.KERNEL32(005065B9,?), ref: 00505FA2
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.4465723940.0000000000501000.00000040.00000001.01000000.00000006.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000003.00000002.4465669604.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.0000000000509000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.000000000050D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465923043.000000000050F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465975687.0000000000510000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_500000_java.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: File$Temp$CloseCopyCreateDeleteHandleNamePathPointerlstrcpy
                                                                  • String ID: tmp
                                                                  • API String ID: 2319981759-753892680
                                                                  • Opcode ID: edf9a31c2175ba5224d3b1140d48908c277679a7e7ee6f9f0873a1c53c273d39
                                                                  • Instruction ID: b6d547f1361db50440f4c558ef177c196600c1e2c9737aacd924c07538a66ded
                                                                  • Opcode Fuzzy Hash: edf9a31c2175ba5224d3b1140d48908c277679a7e7ee6f9f0873a1c53c273d39
                                                                  • Instruction Fuzzy Hash: B101A2B690065AAFDB109B60DC8DFDE7BBCAB54700F000095F6C5E2091E6B466C9CF62
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.4465723940.0000000000501000.00000040.00000001.01000000.00000006.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000003.00000002.4465669604.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.0000000000509000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.000000000050D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465923043.000000000050F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465975687.0000000000510000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_500000_java.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: htons$CountTickmemsetsendto
                                                                  • String ID:
                                                                  • API String ID: 2621409306-0
                                                                  • Opcode ID: e09023cd58fd96e722efa017393dccad0732a0c6f729856dbb0536fb1071b873
                                                                  • Instruction ID: db08ba042e804f953b88991fca2d77eeadd2c4749c7c0b9e33eca97f00638003
                                                                  • Opcode Fuzzy Hash: e09023cd58fd96e722efa017393dccad0732a0c6f729856dbb0536fb1071b873
                                                                  • Instruction Fuzzy Hash: 1E312121A0025A5BDB258FB48C04BEE7BE8FF14304F1440B8EA09A7291E3B05E86CB59
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • lstrcpyn.KERNEL32(?,008538AF,0000007F,00000000), ref: 00504824
                                                                  • lstrlen.KERNEL32(?), ref: 0050482E
                                                                  • GetProcessHeap.KERNEL32(00000000,-0000000A), ref: 0050483A
                                                                  • RtlAllocateHeap.NTDLL(00000000), ref: 00504841
                                                                  • lstrcpy.KERNEL32(00000000,?), ref: 00504852
                                                                  • CreateThread.KERNEL32(00000000,00000000,0050477F,00000000,00000000,?), ref: 00504868
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.4465723940.0000000000501000.00000040.00000001.01000000.00000006.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000003.00000002.4465669604.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.0000000000509000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.000000000050D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465923043.000000000050F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465975687.0000000000510000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_500000_java.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Heap$AllocateCreateProcessThreadlstrcpylstrcpynlstrlen
                                                                  • String ID:
                                                                  • API String ID: 3371211169-0
                                                                  • Opcode ID: 9415a5e40e1ec01e5b2a933be3d9349c4a5e167bbc259252a0e3da0ad32e4735
                                                                  • Instruction ID: 07f746d2b3960384b515d2a8365d25916a05af25f1ccb339341a6fe92818cc76
                                                                  • Opcode Fuzzy Hash: 9415a5e40e1ec01e5b2a933be3d9349c4a5e167bbc259252a0e3da0ad32e4735
                                                                  • Instruction Fuzzy Hash: AA11E2B5E00AA59BEB208BB59D5DBBE3BACFF50700F148811FB46D70D0EB20C8058B65
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • GetCurrentThread.KERNEL32 ref: 00504782
                                                                  • SetThreadPriority.KERNEL32(00000000), ref: 00504789
                                                                  • RtlExitUserThread.NTDLL(00000000), ref: 005047B0
                                                                    • Part of subcall function 00504708: memset.MSVCRT ref: 00504721
                                                                    • Part of subcall function 00504708: memset.MSVCRT ref: 0050474B
                                                                  • GetProcessHeap.KERNEL32(00000000,?), ref: 005047A1
                                                                  • HeapFree.KERNEL32(00000000), ref: 005047A8
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.4465723940.0000000000501000.00000040.00000001.01000000.00000006.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000003.00000002.4465669604.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.0000000000509000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.000000000050D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465923043.000000000050F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465975687.0000000000510000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_500000_java.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Thread$Heapmemset$CurrentExitFreePriorityProcessUser
                                                                  • String ID:
                                                                  • API String ID: 2017824994-0
                                                                  • Opcode ID: 836c254a06e8348137cac086d59406f412e6514e815de78c3af08e5fd35cbc47
                                                                  • Instruction ID: 134dd03ee56ed5e35b093408589009be06d3af64b950e7fdb32cbac4dc487e3d
                                                                  • Opcode Fuzzy Hash: 836c254a06e8348137cac086d59406f412e6514e815de78c3af08e5fd35cbc47
                                                                  • Instruction Fuzzy Hash: 66E0EC72545A60ABD6102BA1AD1DB8E3FA8EF15762F054101F69A960E08B6054849ABB
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • GetModuleHandleA.KERNEL32(kernel32.dll), ref: 005031C3
                                                                  • GetProcAddress.KERNEL32(00000000,RegisterServiceProcess), ref: 005031D2
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.4465723940.0000000000501000.00000040.00000001.01000000.00000006.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000003.00000002.4465669604.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.0000000000509000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.000000000050D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465923043.000000000050F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465975687.0000000000510000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_500000_java.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: AddressHandleModuleProc
                                                                  • String ID: RegisterServiceProcess$kernel32.dll
                                                                  • API String ID: 1646373207-4020013434
                                                                  • Opcode ID: 88f355962e72c872d7e8e3649b1a006756f8412f5a34d5979d28c820e35911b0
                                                                  • Instruction ID: a02a020f7e88b2a2deb55d5915b0d8113451b0eb92c2fbf378a69a289d5184d3
                                                                  • Opcode Fuzzy Hash: 88f355962e72c872d7e8e3649b1a006756f8412f5a34d5979d28c820e35911b0
                                                                  • Instruction Fuzzy Hash: A711BF10D0C6C999FB0297B8891979EBEA61F22749F0840C894846A2D2C6FF5718D3B6
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%

                                                                  APIs
                                                                  • lstrlen.KERNEL32(00000000,00000000,00000000), ref: 00506C46
                                                                  • lstrlen.KERNEL32(00000000), ref: 00506C55
                                                                  • CharLowerA.USER32(00000000), ref: 00506C74
                                                                  • lstrcmpiA.KERNEL32(00000000,?), ref: 00506C84
                                                                  Memory Dump Source
                                                                  • Source File: 00000003.00000002.4465723940.0000000000501000.00000040.00000001.01000000.00000006.sdmp, Offset: 00500000, based on PE: true
                                                                  • Associated: 00000003.00000002.4465669604.0000000000500000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.0000000000509000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465723940.000000000050D000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465923043.000000000050F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                  • Associated: 00000003.00000002.4465975687.0000000000510000.00000040.00000001.01000000.00000006.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_3_2_500000_java.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: lstrlen$CharLowerlstrcmpi
                                                                  • String ID:
                                                                  • API String ID: 1011886143-0
                                                                  • Opcode ID: 1614e062b7db843fd35929ba8e3fbe92fee8bfd64a38d3db1eeeb3163424b487
                                                                  • Instruction ID: a780f0e17b679421bcea0a2979c9bb813d318467be715c50e32b2a5f4f05fe6d
                                                                  • Opcode Fuzzy Hash: 1614e062b7db843fd35929ba8e3fbe92fee8bfd64a38d3db1eeeb3163424b487
                                                                  • Instruction Fuzzy Hash: F351D476A481994AFF364B2C84187FC7FD6FB26340F9814AAC8C1861D6D2648CF3C75A
                                                                  Uniqueness

                                                                  Uniqueness Score: -1.00%