Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
.com.exe

Overview

General Information

Sample name: .com.exe
renamed because original name is a hash value
Original sample name:instruction.htm .com.exe
Analysis ID:1410989
MD5:b1f6a4cc592f3c9f7d4b69c02ac74d11
SHA1:db2db17c1d3e2c4f3a45aad9215cc77ed455ffcc
SHA256:3db846a796caa001666df8f7cae709fff02f984711b0e70e0e79c457d631b4e5
Tags:exe
Infos:

Detection

MyDoom
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected MyDoom
Connects to many different private IPs (likely to spread or exploit)
Drops PE files with benign system names
Drops executables to the windows directory (C:\Windows) and starts them
Exploit detected, runtime environment dropped PE file
Exploit detected, runtime environment starts unknown processes
Found evasive API chain (may stop execution after checking mutex)
Machine Learning detection for dropped file
Machine Learning detection for sample
Opens the same file many times (likely Sandbox evasion)
PE file has a writeable .text section
Sigma detected: Files With System Process Name In Unsuspected Locations
Sigma detected: System File Execution Location Anomaly
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to dynamically determine API calls
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to search for IE or Outlook window (often done to steal information)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Deletes files inside the Windows folder
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found decision node followed by non-executed suspicious APIs
Found dropped PE file which has not been started or loaded
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
PE file contains sections with non-standard names
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Wow6432Node CurrentVersion Autorun Keys Modification
Tries to load missing DLLs
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Uses the system / local time for branch decision (may execute only at specific dates)

Classification

  • System is w10x64
  • .com.exe (PID: 3416 cmdline: C:\Users\user\Desktop\ .com.exe MD5: B1F6A4CC592F3C9F7D4B69C02AC74D11)
    • services.exe (PID: 2680 cmdline: C:\Windows\services.exe MD5: B0FE74719B1B647E2056641931907F4A)
    • WerFault.exe (PID: 5272 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 3416 -s 1188 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • java.exe (PID: 3384 cmdline: "C:\Windows\java.exe" MD5: B1F6A4CC592F3C9F7D4B69C02AC74D11)
    • services.exe (PID: 2992 cmdline: C:\Users\user\AppData\Local\Temp\services.exe MD5: B0FE74719B1B647E2056641931907F4A)
  • services.exe (PID: 5308 cmdline: "C:\Windows\services.exe" MD5: B0FE74719B1B647E2056641931907F4A)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000007.00000002.4568272926.0000000000501000.00000040.00000001.01000000.00000007.sdmpJoeSecurity_MyDoomYara detected MyDoomJoe Security
    00000000.00000002.2204036339.0000000000501000.00000040.00000001.01000000.00000003.sdmpJoeSecurity_MyDoomYara detected MyDoomJoe Security
      Process Memory Space: .com.exe PID: 3416JoeSecurity_MyDoomYara detected MyDoomJoe Security
        Process Memory Space: java.exe PID: 3384JoeSecurity_MyDoomYara detected MyDoomJoe Security
          SourceRuleDescriptionAuthorStrings
          0.2. .com.exe.500000.0.unpackJoeSecurity_MyDoomYara detected MyDoomJoe Security
            7.2.java.exe.500000.0.unpackJoeSecurity_MyDoomYara detected MyDoomJoe Security

              System Summary

              barindex
              Source: File createdAuthor: Sander Wiebing, Tim Shelton, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Users\user\Desktop\ .com.exe, ProcessId: 3416, TargetFilename: C:\Windows\services.exe
              Source: Process startedAuthor: Florian Roth (Nextron Systems), Patrick Bareiss, Anton Kutepov, oscd.community, Nasreddine Bencherchali: Data: Command: C:\Windows\services.exe, CommandLine: C:\Windows\services.exe, CommandLine|base64offset|contains: , Image: C:\Windows\services.exe, NewProcessName: C:\Windows\services.exe, OriginalFileName: C:\Windows\services.exe, ParentCommandLine: C:\Users\user\Desktop\ .com.exe, ParentImage: C:\Users\user\Desktop\ .com.exe, ParentProcessId: 3416, ParentProcessName: .com.exe, ProcessCommandLine: C:\Windows\services.exe, ProcessId: 2680, ProcessName: services.exe
              Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Windows\java.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\ .com.exe, ProcessId: 3416, TargetObject: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\JavaVM
              Source: Process startedAuthor: vburov: Data: Command: C:\Windows\services.exe, CommandLine: C:\Windows\services.exe, CommandLine|base64offset|contains: , Image: C:\Windows\services.exe, NewProcessName: C:\Windows\services.exe, OriginalFileName: C:\Windows\services.exe, ParentCommandLine: C:\Users\user\Desktop\ .com.exe, ParentImage: C:\Users\user\Desktop\ .com.exe, ParentProcessId: 3416, ParentProcessName: .com.exe, ProcessCommandLine: C:\Windows\services.exe, ProcessId: 2680, ProcessName: services.exe
              No Snort rule has matched

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: .com.exeAvira: detected
              Source: C:\Windows\java.exeAvira: detection malicious, Label: TR/Spy.Banker.Gen
              Source: C:\Users\user\AppData\Local\Temp\services.exeAvira: detection malicious, Label: BDS/Backdoor.fszhy
              Source: C:\Users\user\AppData\Local\Temp\tmpF245.tmpAvira: detection malicious, Label: TR/Spy.Banker.Gen
              Source: C:\Windows\services.exeAvira: detection malicious, Label: BDS/Backdoor.fszhy
              Source: C:\Users\user\AppData\Local\Temp\services.exeReversingLabs: Detection: 100%
              Source: C:\Windows\java.exeReversingLabs: Detection: 73%
              Source: C:\Windows\services.exeReversingLabs: Detection: 100%
              Source: .com.exeReversingLabs: Detection: 73%
              Source: C:\Windows\java.exeJoe Sandbox ML: detected
              Source: C:\Users\user\AppData\Local\Temp\services.exeJoe Sandbox ML: detected
              Source: C:\Windows\services.exeJoe Sandbox ML: detected
              Source: .com.exeJoe Sandbox ML: detected

              Exploits

              barindex
              Source: global trafficTCP traffic: 192.168.2.18:1034Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.9:1034Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.14:1034Jump to behavior
              Source: .com.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE

              Spreading

              barindex
              Source: Yara matchFile source: 0.2. .com.exe.500000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.java.exe.500000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000007.00000002.4568272926.0000000000501000.00000040.00000001.01000000.00000007.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.2204036339.0000000000501000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: .com.exe PID: 3416, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: java.exe PID: 3384, type: MEMORYSTR
              Source: C:\Users\user\Desktop\ .com.exeCode function: 0_2_005052AD lstrcat,Sleep,lstrcpy,lstrcpy,lstrlen,lstrcat,lstrcat,memset,FindFirstFileA,FindNextFileA,lstrcpy,lstrlen,lstrcat,lstrcat,Sleep,FindClose,0_2_005052AD
              Source: C:\Windows\java.exeCode function: 7_2_005052AD lstrcat,Sleep,lstrcpy,lstrcpy,lstrlen,lstrcat,lstrcat,memset,FindFirstFileA,FindNextFileA,lstrcpy,lstrlen,lstrcat,lstrcat,Sleep,FindClose,7_2_005052AD
              Source: C:\Windows\java.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\dc-desktop-app-dropin\Jump to behavior
              Source: C:\Windows\java.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\UIThemes\Jump to behavior
              Source: C:\Windows\java.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Jump to behavior
              Source: C:\Windows\java.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\dc-desktop-app-dropin\1.0.0_1.0.0\Jump to behavior
              Source: C:\Windows\java.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\Jump to behavior
              Source: C:\Windows\java.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\Jump to behavior

              Software Vulnerabilities

              barindex
              Source: C:\Windows\java.exeProcess created: C:\Users\user\AppData\Local\Temp\services.exe
              Source: C:\Users\user\Desktop\ .com.exeCode function: 0_2_00506AB8 select,recv,0_2_00506AB8
              Source: .com.exe, 00000000.00000002.2204036339.0000000000501000.00000040.00000001.01000000.00000003.sdmp, java.exe, 00000007.00000002.4568272926.0000000000501000.00000040.00000001.01000000.00000007.sdmpString found in binary or memory: HLOToFrom%s %sSMTPServerSoftware\Microsoft\%s %s Manager\%ssInternetAccountmx.mail.smtp..logzincite"%s"servicesurlmon.dllURLDownloadToCacheFileAhttp://search.lycos.com/default.asp?lpv=1&loc=searchhp&tab=web&query=%s&nbq=%dhttp://www.altavista.com/web/results?q=%s&kgs=0&kls=0&n=%dhttp://search.yahoo.com/search?p=%s&ei=UTF-8&fr=fp-tab-web-t&cop=mss&tab=&num=%dhttp://www.google.com/search?hl=en&ie=UTF-8&oe=UTF-8&q=%s%s+%s-contact+replymailtoU equals www.yahoo.com (Yahoo)
              Source: .com.exe, .com.exe, 00000000.00000002.2204036339.0000000000501000.00000040.00000001.01000000.00000003.sdmp, java.exe, java.exe, 00000007.00000002.4568272926.0000000000501000.00000040.00000001.01000000.00000007.sdmpString found in binary or memory: http://search.lycos.com/default.asp?lpv=1&loc=searchhp&tab=web&query=%s
              Source: .com.exe, 00000000.00000002.2204036339.0000000000501000.00000040.00000001.01000000.00000003.sdmp, java.exe, 00000007.00000002.4568272926.0000000000501000.00000040.00000001.01000000.00000007.sdmpString found in binary or memory: http://search.lycos.com/default.asp?lpv=1&loc=searchhp&tab=web&query=%s&nbq=%dhttp://www.altavista.c
              Source: .com.exe, .com.exe, 00000000.00000002.2204036339.0000000000501000.00000040.00000001.01000000.00000003.sdmp, java.exe, java.exe, 00000007.00000002.4568272926.0000000000501000.00000040.00000001.01000000.00000007.sdmpString found in binary or memory: http://search.yahoo.com/search?p=%s&ei=UTF-8&fr=fp-tab-web-t&cop=mss&tab=
              Source: Amcache.hve.6.drString found in binary or memory: http://upx.sf.net
              Source: .com.exe, .com.exe, 00000000.00000002.2204036339.0000000000501000.00000040.00000001.01000000.00000003.sdmp, java.exe, java.exe, 00000007.00000002.4568272926.0000000000501000.00000040.00000001.01000000.00000007.sdmpString found in binary or memory: http://www.altavista.com/web/results?q=%s&kgs=0&kls=0
              Source: .com.exe, .com.exe, 00000000.00000002.2204036339.0000000000501000.00000040.00000001.01000000.00000003.sdmp, java.exe, java.exe, 00000007.00000002.4568272926.0000000000501000.00000040.00000001.01000000.00000007.sdmpString found in binary or memory: http://www.google.com/search?hl=en&ie=UTF-8&oe=UTF-8&q=%s
              Source: .com.exe, 00000000.00000002.2204403538.0000000000668000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://denmark.smartscre_
              Source: .com.exe, 00000000.00000002.2204403538.0000000000668000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://denmark.smartscre_curlrcom
              Source: .com.exe, 00000000.00000002.2204403538.0000000000668000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://europe.d
              Source: .com.exe, 00000000.00000002.2204403538.0000000000668000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://europe.dbgcreepp
              Source: .com.exe, 00000000.00000002.2204403538.0000000000668000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://southafrica.smartscreen.microsoft
              Source: .com.exe, 00000000.00000002.2204403538.0000000000668000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://southkoreregid.1991-06.com.microsoftza
              Source: .com.exe, 00000000.00000002.2204403538.0000000000668000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://unitedstates1.ss.wd.microsoft.us
              Source: .com.exe, 00000000.00000002.2204403538.000000000061E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://unitedstates2.ss.wd.microsoft.us
              Source: .com.exe, 00000000.00000002.2204403538.0000000000668000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://unitedstates4.ss.wd.microsoft.us

              Spam, unwanted Advertisements and Ransom Demands

              barindex
              Source: Yara matchFile source: 0.2. .com.exe.500000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.java.exe.500000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000007.00000002.4568272926.0000000000501000.00000040.00000001.01000000.00000007.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.2204036339.0000000000501000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: .com.exe PID: 3416, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: java.exe PID: 3384, type: MEMORYSTR

              System Summary

              barindex
              Source: .com.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              Source: java.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              Source: tmpF245.tmp.7.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              Source: C:\Users\user\Desktop\ .com.exeFile created: C:\Windows\services.exeJump to behavior
              Source: C:\Users\user\Desktop\ .com.exeFile created: C:\Windows\java.exeJump to behavior
              Source: C:\Users\user\Desktop\ .com.exeFile created: C:\Windows\java.exeJump to behavior
              Source: C:\Users\user\Desktop\ .com.exeFile created: C:\Windows\java.exe\:Zone.Identifier:$DATAJump to behavior
              Source: C:\Users\user\Desktop\ .com.exeFile deleted: C:\Windows\java.exeJump to behavior
              Source: C:\Users\user\Desktop\ .com.exeCode function: 0_2_005077300_2_00507730
              Source: C:\Users\user\Desktop\ .com.exeCode function: 0_2_005011C90_2_005011C9
              Source: C:\Windows\java.exeCode function: 7_2_005077307_2_00507730
              Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\services.exe BF316F51D0C345D61EAEE3940791B64E81F676E3BCA42BAD61073227BEE6653C
              Source: C:\Users\user\Desktop\ .com.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 3416 -s 1188
              Source: C:\Users\user\Desktop\ .com.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\ .com.exeSection loaded: ntmarta.dllJump to behavior
              Source: C:\Users\user\Desktop\ .com.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Users\user\Desktop\ .com.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Users\user\Desktop\ .com.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\ .com.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\ .com.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\ .com.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\ .com.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\ .com.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Users\user\Desktop\ .com.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Users\user\Desktop\ .com.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\ .com.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Users\user\Desktop\ .com.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\services.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\services.exeSection loaded: napinsp.dllJump to behavior
              Source: C:\Windows\services.exeSection loaded: pnrpnsp.dllJump to behavior
              Source: C:\Windows\services.exeSection loaded: wshbth.dllJump to behavior
              Source: C:\Windows\services.exeSection loaded: nlaapi.dllJump to behavior
              Source: C:\Windows\services.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\services.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\services.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\services.exeSection loaded: winrnr.dllJump to behavior
              Source: C:\Windows\services.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\services.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\services.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Windows\services.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\services.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\services.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\services.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\services.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\services.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\services.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\services.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\services.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\java.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\java.exeSection loaded: napinsp.dllJump to behavior
              Source: C:\Windows\java.exeSection loaded: pnrpnsp.dllJump to behavior
              Source: C:\Windows\java.exeSection loaded: wshbth.dllJump to behavior
              Source: C:\Windows\java.exeSection loaded: nlaapi.dllJump to behavior
              Source: C:\Windows\java.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\java.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\java.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\java.exeSection loaded: winrnr.dllJump to behavior
              Source: C:\Windows\java.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Windows\java.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\java.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\java.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\java.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\java.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\java.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\java.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\java.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\java.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\java.exeSection loaded: ntmarta.dllJump to behavior
              Source: C:\Windows\java.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\java.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\services.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\services.exeSection loaded: napinsp.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\services.exeSection loaded: pnrpnsp.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\services.exeSection loaded: wshbth.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\services.exeSection loaded: nlaapi.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\services.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\services.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\services.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\services.exeSection loaded: winrnr.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\services.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\services.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\services.exeSection loaded: napinsp.dllJump to behavior
              Source: C:\Windows\services.exeSection loaded: pnrpnsp.dllJump to behavior
              Source: C:\Windows\services.exeSection loaded: wshbth.dllJump to behavior
              Source: C:\Windows\services.exeSection loaded: nlaapi.dllJump to behavior
              Source: C:\Windows\services.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\services.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\services.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\services.exeSection loaded: winrnr.dllJump to behavior
              Source: C:\Windows\services.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\services.exeSection loaded: rasadhlp.dllJump to behavior
              Source: .com.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
              Source: .com.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              Source: java.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              Source: tmpF245.tmp.7.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              Source: classification engineClassification label: mal100.spre.expl.evad.winEXE@8/13@0/9
              Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess3416
              Source: C:\Windows\java.exeMutant created: \Sessions\1\BaseNamedObjects\494126root494126root4494126root494126root44
              Source: C:\Users\user\Desktop\ .com.exeFile created: C:\Users\user\AppData\Local\Temp\zincite.logJump to behavior
              Source: C:\Users\user\Desktop\ .com.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: .com.exeReversingLabs: Detection: 73%
              Source: C:\Users\user\Desktop\ .com.exeFile read: C:\Users\user\Desktop\ .com.exeJump to behavior
              Source: unknownProcess created: C:\Users\user\Desktop\ .com.exe C:\Users\user\Desktop\ .com.exe
              Source: C:\Users\user\Desktop\ .com.exeProcess created: C:\Windows\services.exe C:\Windows\services.exe
              Source: C:\Users\user\Desktop\ .com.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 3416 -s 1188
              Source: unknownProcess created: C:\Windows\java.exe "C:\Windows\java.exe"
              Source: C:\Windows\java.exeProcess created: C:\Users\user\AppData\Local\Temp\services.exe C:\Users\user\AppData\Local\Temp\services.exe
              Source: unknownProcess created: C:\Windows\services.exe "C:\Windows\services.exe"
              Source: C:\Users\user\Desktop\ .com.exeProcess created: C:\Windows\services.exe C:\Windows\services.exeJump to behavior
              Source: C:\Windows\java.exeProcess created: C:\Users\user\AppData\Local\Temp\services.exe C:\Users\user\AppData\Local\Temp\services.exeJump to behavior
              Source: C:\Users\user\Desktop\ .com.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
              Source: C:\Users\user\Desktop\ .com.exeCode function: 0_2_00503620 GetModuleHandleA,LoadLibraryA,GetProcAddress,InternetGetConnectedState,0_2_00503620
              Source: services.exe.0.drStatic PE information: section name: UPX2
              Source: services.exe.7.drStatic PE information: section name: UPX2
              Source: C:\Users\user\Desktop\ .com.exeCode function: 0_2_0050A42D push ds; ret 0_2_0050A42E
              Source: C:\Users\user\Desktop\ .com.exeCode function: 0_2_0050DEA6 push ds; ret 0_2_0050DEBE
              Source: C:\Users\user\Desktop\ .com.exeCode function: 0_2_0050A501 push ecx; retf 0_2_0050A53F
              Source: C:\Users\user\Desktop\ .com.exeCode function: 0_2_0050A50F push ecx; retf 0_2_0050A53F
              Source: C:\Users\user\Desktop\ .com.exeCode function: 0_2_00509BA2 push edx; retf 0_2_00509BAB
              Source: C:\Windows\services.exeCode function: 1_2_00405A55 push es; iretd 1_2_00405A8E
              Source: C:\Windows\java.exeCode function: 7_2_0050A42D push ds; ret 7_2_0050A42E
              Source: C:\Windows\java.exeCode function: 7_2_0050DEA6 push ds; ret 7_2_0050DEBE
              Source: C:\Windows\java.exeCode function: 7_2_0050A501 push ecx; retf 7_2_0050A53F
              Source: C:\Windows\java.exeCode function: 7_2_0050A50F push ecx; retf 7_2_0050A53F
              Source: C:\Windows\java.exeCode function: 7_2_00509BA2 push edx; retf 7_2_00509BAB
              Source: .com.exeStatic PE information: section name: .text entropy: 6.805048281534057
              Source: java.exe.0.drStatic PE information: section name: .text entropy: 6.805048281534057
              Source: tmpF245.tmp.7.drStatic PE information: section name: .text entropy: 6.805048281534057
              Source: initial sampleStatic PE information: section name: UPX0
              Source: initial sampleStatic PE information: section name: UPX1
              Source: initial sampleStatic PE information: section name: UPX0
              Source: initial sampleStatic PE information: section name: UPX1
              Source: initial sampleStatic PE information: section name: UPX0
              Source: initial sampleStatic PE information: section name: UPX1
              Source: initial sampleStatic PE information: section name: UPX0
              Source: initial sampleStatic PE information: section name: UPX1
              Source: initial sampleStatic PE information: section name: UPX0
              Source: initial sampleStatic PE information: section name: UPX1

              Persistence and Installation Behavior

              barindex
              Source: C:\Users\user\Desktop\ .com.exeFile created: C:\Windows\services.exeJump to dropped file
              Source: C:\Windows\java.exeFile created: C:\Users\user\AppData\Local\Temp\services.exeJump to dropped file
              Source: C:\Users\user\Desktop\ .com.exeExecutable created and started: C:\Windows\services.exeJump to behavior
              Source: unknownExecutable created and started: C:\Windows\java.exe
              Source: C:\Windows\java.exeFile created: tmpF245.tmp.7.drJump to dropped file
              Source: C:\Users\user\Desktop\ .com.exeFile created: C:\Windows\java.exeJump to dropped file
              Source: C:\Users\user\Desktop\ .com.exeFile created: C:\Windows\services.exeJump to dropped file
              Source: C:\Windows\java.exeFile created: C:\Users\user\AppData\Local\Temp\services.exeJump to dropped file
              Source: C:\Windows\java.exeFile created: C:\Users\user\AppData\Local\Temp\tmpF245.tmpJump to dropped file
              Source: C:\Users\user\Desktop\ .com.exeFile created: C:\Windows\java.exeJump to dropped file
              Source: C:\Users\user\Desktop\ .com.exeFile created: C:\Windows\services.exeJump to dropped file
              Source: C:\Users\user\Desktop\ .com.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run JavaVMJump to behavior
              Source: C:\Users\user\Desktop\ .com.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run JavaVMJump to behavior
              Source: C:\Windows\services.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run ServicesJump to behavior
              Source: C:\Windows\services.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run ServicesJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: C:\Users\user\Desktop\ .com.exeEvasive API call chain: CreateMutex,DecisionNodes,Sleepgraph_0-3007
              Source: C:\Users\user\Desktop\ .com.exeEvasive API call chain: CreateMutex,DecisionNodes,ExitProcessgraph_0-3007
              Source: C:\Users\user\AppData\Local\Temp\services.exeFile opened: \Device\Afd\Endpoint count: 30496Jump to behavior
              Source: C:\Windows\services.exeWindow / User API: threadDelayed 2844Jump to behavior
              Source: C:\Windows\java.exeWindow / User API: threadDelayed 1778Jump to behavior
              Source: C:\Windows\java.exeWindow / User API: threadDelayed 7290Jump to behavior
              Source: C:\Users\user\AppData\Local\Temp\services.exeWindow / User API: threadDelayed 7518Jump to behavior
              Source: C:\Users\user\AppData\Local\Temp\services.exeWindow / User API: threadDelayed 2480Jump to behavior
              Source: C:\Windows\services.exeWindow / User API: threadDelayed 9950Jump to behavior
              Source: C:\Windows\java.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_7-2834
              Source: C:\Windows\services.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_1-1036
              Source: C:\Windows\java.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\tmpF245.tmpJump to dropped file
              Source: C:\Users\user\Desktop\ .com.exe TID: 5536Thread sleep time: -48000s >= -30000sJump to behavior
              Source: C:\Windows\services.exe TID: 6480Thread sleep count: 2844 > 30Jump to behavior
              Source: C:\Windows\java.exe TID: 3328Thread sleep count: 1778 > 30Jump to behavior
              Source: C:\Windows\java.exe TID: 3328Thread sleep time: -1422400s >= -30000sJump to behavior
              Source: C:\Windows\java.exe TID: 2612Thread sleep count: 43 > 30Jump to behavior
              Source: C:\Windows\java.exe TID: 2612Thread sleep count: 258 > 30Jump to behavior
              Source: C:\Windows\java.exe TID: 3328Thread sleep count: 7290 > 30Jump to behavior
              Source: C:\Windows\java.exe TID: 3328Thread sleep time: -5832000s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\services.exe TID: 3524Thread sleep count: 7518 > 30Jump to behavior
              Source: C:\Users\user\AppData\Local\Temp\services.exe TID: 3524Thread sleep time: -1879500s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\services.exe TID: 3524Thread sleep count: 2480 > 30Jump to behavior
              Source: C:\Users\user\AppData\Local\Temp\services.exe TID: 3524Thread sleep time: -620000s >= -30000sJump to behavior
              Source: C:\Windows\services.exe TID: 6768Thread sleep count: 9950 > 30Jump to behavior
              Source: C:\Windows\services.exe TID: 6768Thread sleep time: -2487500s >= -30000sJump to behavior
              Source: C:\Windows\services.exe TID: 6768Thread sleep count: 48 > 30Jump to behavior
              Source: C:\Users\user\Desktop\ .com.exeLast function: Thread delayed
              Source: C:\Users\user\Desktop\ .com.exeCode function: 0_2_00505717 GetSystemTime followed by cmp: cmp word ptr [ebp-10h], 07dch and CTI: jbe 00505758h0_2_00505717
              Source: C:\Windows\java.exeCode function: 7_2_00505717 GetSystemTime followed by cmp: cmp word ptr [ebp-10h], 07dch and CTI: jbe 00505758h7_2_00505717
              Source: C:\Users\user\Desktop\ .com.exeCode function: 0_2_005052AD lstrcat,Sleep,lstrcpy,lstrcpy,lstrlen,lstrcat,lstrcat,memset,FindFirstFileA,FindNextFileA,lstrcpy,lstrlen,lstrcat,lstrcat,Sleep,FindClose,0_2_005052AD
              Source: C:\Windows\java.exeCode function: 7_2_005052AD lstrcat,Sleep,lstrcpy,lstrcpy,lstrlen,lstrcat,lstrcat,memset,FindFirstFileA,FindNextFileA,lstrcpy,lstrlen,lstrcat,lstrcat,Sleep,FindClose,7_2_005052AD
              Source: C:\Users\user\Desktop\ .com.exeThread delayed: delay time: 48000Jump to behavior
              Source: C:\Windows\java.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\dc-desktop-app-dropin\Jump to behavior
              Source: C:\Windows\java.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\UIThemes\Jump to behavior
              Source: C:\Windows\java.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Jump to behavior
              Source: C:\Windows\java.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\dc-desktop-app-dropin\1.0.0_1.0.0\Jump to behavior
              Source: C:\Windows\java.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\Jump to behavior
              Source: C:\Windows\java.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\Jump to behavior
              Source: Amcache.hve.6.drBinary or memory string: VMware
              Source: Amcache.hve.6.drBinary or memory string: VMware Virtual USB Mouse
              Source: Amcache.hve.6.drBinary or memory string: vmci.syshbin
              Source: Amcache.hve.6.drBinary or memory string: VMware, Inc.
              Source: Amcache.hve.6.drBinary or memory string: VMware20,1hbin@
              Source: Amcache.hve.6.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
              Source: Amcache.hve.6.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
              Source: Amcache.hve.6.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
              Source: Amcache.hve.6.drBinary or memory string: VMware-42 27 80 4d 99 30 0e 9c-c1 9b 2a 23 ea 1f c4 20
              Source: Amcache.hve.6.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
              Source: Amcache.hve.6.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
              Source: Amcache.hve.6.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
              Source: Amcache.hve.6.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
              Source: services.exe, 00000001.00000002.4568799988.0000000000812000.00000004.00000020.00020000.00000000.sdmp, java.exe, 00000007.00000002.4570438309.000000000088E000.00000004.00000020.00020000.00000000.sdmp, services.exe, 00000009.00000002.4568741820.0000000000800000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
              Source: Amcache.hve.6.drBinary or memory string: vmci.sys
              Source: Amcache.hve.6.drBinary or memory string: vmci.syshbin`
              Source: Amcache.hve.6.drBinary or memory string: \driver\vmci,\driver\pci
              Source: services.exe, 00000008.00000002.4568761248.0000000000812000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dlln
              Source: Amcache.hve.6.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
              Source: Amcache.hve.6.drBinary or memory string: VMware20,1
              Source: Amcache.hve.6.drBinary or memory string: Microsoft Hyper-V Generation Counter
              Source: Amcache.hve.6.drBinary or memory string: NECVMWar VMware SATA CD00
              Source: Amcache.hve.6.drBinary or memory string: VMware Virtual disk SCSI Disk Device
              Source: Amcache.hve.6.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
              Source: Amcache.hve.6.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
              Source: Amcache.hve.6.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
              Source: Amcache.hve.6.drBinary or memory string: VMware PCI VMCI Bus Device
              Source: Amcache.hve.6.drBinary or memory string: VMware VMCI Bus Device
              Source: Amcache.hve.6.drBinary or memory string: VMware Virtual RAM
              Source: Amcache.hve.6.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
              Source: .com.exe, 00000000.00000002.2204403538.000000000061E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllD
              Source: Amcache.hve.6.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
              Source: C:\Users\user\Desktop\ .com.exeAPI call chain: ExitProcess graph end nodegraph_0-2984
              Source: C:\Windows\services.exeAPI call chain: ExitProcess graph end nodegraph_1-1005
              Source: C:\Users\user\Desktop\ .com.exeProcess queried: DebugPortJump to behavior
              Source: C:\Users\user\Desktop\ .com.exeCode function: 0_2_00505A45 LdrInitializeThunk,lstrcpy,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcpy,lstrcat,lstrcat,lstrcpy,lstrcpy,0_2_00505A45
              Source: C:\Users\user\Desktop\ .com.exeCode function: 0_2_00503620 GetModuleHandleA,LoadLibraryA,GetProcAddress,InternetGetConnectedState,0_2_00503620
              Source: C:\Users\user\Desktop\ .com.exeCode function: 0_2_00504E00 GetProcessHeap,RtlAllocateHeap,CreateFileA,ReadFile,ReadFile,FindCloseChangeNotification,GetProcessHeap,HeapFree,0_2_00504E00
              Source: C:\Users\user\Desktop\ .com.exeProcess created: C:\Windows\services.exe C:\Windows\services.exeJump to behavior
              Source: C:\Windows\java.exeProcess created: C:\Users\user\AppData\Local\Temp\services.exe C:\Users\user\AppData\Local\Temp\services.exeJump to behavior
              Source: C:\Users\user\Desktop\ .com.exeCode function: 0_2_005032CB lstrlen,GetLocalTime,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeZoneInformation,lstrcat,wsprintfA,0_2_005032CB
              Source: C:\Users\user\Desktop\ .com.exeCode function: 0_2_005032CB lstrlen,GetLocalTime,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeZoneInformation,lstrcat,wsprintfA,0_2_005032CB
              Source: Amcache.hve.6.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
              Source: Amcache.hve.6.drBinary or memory string: msmpeng.exe
              Source: Amcache.hve.6.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
              Source: Amcache.hve.6.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
              Source: Amcache.hve.6.drBinary or memory string: MsMpEng.exe
              Source: C:\Users\user\Desktop\ .com.exeCode function: 0_2_0050311C FindWindowA,FindWindowA,FindWindowA,FindWindowA,RtlExitUserThread,0_2_0050311C
              Source: C:\Windows\java.exeCode function: 7_2_0050311C FindWindowA,FindWindowA,FindWindowA,FindWindowA,RtlExitUserThread,GetModuleHandleA,GetProcAddress,7_2_0050311C
              Source: C:\Windows\services.exeCode function: 1_2_00401F0E GetProcessHeap,RtlAllocateHeap,htons,htons,socket,closesocket,Sleep,htons,socket,bind,listen,CreateThread,select,Sleep,GetProcessHeap,RtlAllocateHeap,accept,closesocket,accept,GetProcessHeap,HeapFree,CreateThread,CloseHandle,1_2_00401F0E
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts11
              Native API
              1
              Registry Run Keys / Startup Folder
              11
              Process Injection
              22
              Masquerading
              OS Credential Dumping12
              System Time Discovery
              Remote Services1
              Email Collection
              1
              Encrypted Channel
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault Accounts2
              Exploitation for Client Execution
              1
              DLL Side-Loading
              1
              Registry Run Keys / Startup Folder
              121
              Virtualization/Sandbox Evasion
              LSASS Memory131
              Security Software Discovery
              Remote Desktop Protocol1
              Archive Collected Data
              1
              Ingress Tool Transfer
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
              DLL Side-Loading
              11
              Process Injection
              Security Account Manager121
              Virtualization/Sandbox Evasion
              SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook21
              Obfuscated Files or Information
              NTDS1
              Application Window Discovery
              Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script21
              Software Packing
              LSA Secrets2
              File and Directory Discovery
              SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
              DLL Side-Loading
              Cached Domain Credentials2
              System Information Discovery
              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
              File Deletion
              DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 signatures2 2 Behavior Graph ID: 1410989 Sample: .com.exe Startdate: 18/03/2024 Architecture: WINDOWS Score: 100 38 Antivirus detection for dropped file 2->38 40 Antivirus / Scanner detection for submitted sample 2->40 42 Multi AV Scanner detection for submitted file 2->42 44 8 other signatures 2->44 6 java.exe 4 2->6         started        10    .com.exe 1 5 2->10         started        12 services.exe 2->12         started        process3 file4 22 C:\Users\user\AppData\Local\...\tmpF245.tmp, PE32 6->22 dropped 24 C:\Users\user\AppData\Local\...\services.exe, PE32 6->24 dropped 26 C:\Users\user\AppData\Local\...\tmp5339.tmp, Zip 6->26 dropped 46 Antivirus detection for dropped file 6->46 48 Multi AV Scanner detection for dropped file 6->48 50 Machine Learning detection for dropped file 6->50 54 3 other signatures 6->54 14 services.exe 6->14         started        28 C:\Windows\services.exe, PE32 10->28 dropped 30 C:\Windows\java.exe, PE32 10->30 dropped 52 Drops executables to the windows directory (C:\Windows) and starts them 10->52 17 services.exe 1 1 10->17         started        20 WerFault.exe 22 16 10->20         started        signatures5 process6 dnsIp7 56 Machine Learning detection for dropped file 14->56 58 Opens the same file many times (likely Sandbox evasion) 14->58 32 192.168.2.14 unknown unknown 17->32 34 192.168.2.18 unknown unknown 17->34 36 7 other IPs or domains 17->36 60 Antivirus detection for dropped file 17->60 62 Multi AV Scanner detection for dropped file 17->62 64 Connects to many different private IPs (likely to spread or exploit) 17->64 signatures8

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              .com.exe74%ReversingLabsWin32.Trojan.FlyAgent
              .com.exe100%AviraTR/Spy.Banker.Gen
              .com.exe100%Joe Sandbox ML
              SourceDetectionScannerLabelLink
              C:\Windows\java.exe100%AviraTR/Spy.Banker.Gen
              C:\Users\user\AppData\Local\Temp\services.exe100%AviraBDS/Backdoor.fszhy
              C:\Users\user\AppData\Local\Temp\tmpF245.tmp100%AviraTR/Spy.Banker.Gen
              C:\Windows\services.exe100%AviraBDS/Backdoor.fszhy
              C:\Users\user\AppData\Local\Temp\tmp5339.tmp100%Joe Sandbox ML
              C:\Windows\java.exe100%Joe Sandbox ML
              C:\Users\user\AppData\Local\Temp\services.exe100%Joe Sandbox ML
              C:\Users\user\AppData\Local\Temp\tmpF245.tmp100%Joe Sandbox ML
              C:\Windows\services.exe100%Joe Sandbox ML
              C:\Users\user\AppData\Local\Temp\services.exe100%ReversingLabsWin32.Worm.Mydoom
              C:\Windows\java.exe74%ReversingLabsWin32.Trojan.FlyAgent
              C:\Windows\services.exe100%ReversingLabsWin32.Worm.Mydoom
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              https://europe.dbgcreepp0%Avira URL Cloudsafe
              https://denmark.smartscre_0%Avira URL Cloudsafe
              https://denmark.smartscre_curlrcom0%Avira URL Cloudsafe
              http://www.altavista.com/web/results?q=%s&kgs=0&kls=00%Avira URL Cloudsafe
              https://southkoreregid.1991-06.com.microsoftza0%Avira URL Cloudsafe
              https://europe.d0%Avira URL Cloudsafe
              https://unitedstates4.ss.wd.microsoft.us0%Avira URL Cloudsafe
              https://southafrica.smartscreen.microsoft0%Avira URL Cloudsafe
              https://unitedstates1.ss.wd.microsoft.us0%Avira URL Cloudsafe
              https://unitedstates2.ss.wd.microsoft.us0%Avira URL Cloudsafe
              No contacted domains info
              NameSourceMaliciousAntivirus DetectionReputation
              https://southafrica.smartscreen.microsoft .com.exe, 00000000.00000002.2204403538.0000000000668000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.altavista.com/web/results?q=%s&kgs=0&kls=0 .com.exe, .com.exe, 00000000.00000002.2204036339.0000000000501000.00000040.00000001.01000000.00000003.sdmp, java.exe, java.exe, 00000007.00000002.4568272926.0000000000501000.00000040.00000001.01000000.00000007.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.google.com/search?hl=en&ie=UTF-8&oe=UTF-8&q=%s .com.exe, .com.exe, 00000000.00000002.2204036339.0000000000501000.00000040.00000001.01000000.00000003.sdmp, java.exe, java.exe, 00000007.00000002.4568272926.0000000000501000.00000040.00000001.01000000.00000007.sdmpfalse
                high
                https://denmark.smartscre_ .com.exe, 00000000.00000002.2204403538.0000000000668000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                low
                http://search.lycos.com/default.asp?lpv=1&loc=searchhp&tab=web&query=%s&nbq=%dhttp://www.altavista.c .com.exe, 00000000.00000002.2204036339.0000000000501000.00000040.00000001.01000000.00000003.sdmp, java.exe, 00000007.00000002.4568272926.0000000000501000.00000040.00000001.01000000.00000007.sdmpfalse
                  high
                  http://upx.sf.netAmcache.hve.6.drfalse
                    high
                    https://europe.dbgcreepp .com.exe, 00000000.00000002.2204403538.0000000000668000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://search.lycos.com/default.asp?lpv=1&loc=searchhp&tab=web&query=%s .com.exe, .com.exe, 00000000.00000002.2204036339.0000000000501000.00000040.00000001.01000000.00000003.sdmp, java.exe, java.exe, 00000007.00000002.4568272926.0000000000501000.00000040.00000001.01000000.00000007.sdmpfalse
                      high
                      https://europe.d .com.exe, 00000000.00000002.2204403538.0000000000668000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://search.yahoo.com/search?p=%s&ei=UTF-8&fr=fp-tab-web-t&cop=mss&tab= .com.exe, .com.exe, 00000000.00000002.2204036339.0000000000501000.00000040.00000001.01000000.00000003.sdmp, java.exe, java.exe, 00000007.00000002.4568272926.0000000000501000.00000040.00000001.01000000.00000007.sdmpfalse
                        high
                        https://denmark.smartscre_curlrcom .com.exe, 00000000.00000002.2204403538.0000000000668000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        low
                        https://unitedstates4.ss.wd.microsoft.us .com.exe, 00000000.00000002.2204403538.0000000000668000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://southkoreregid.1991-06.com.microsoftza .com.exe, 00000000.00000002.2204403538.0000000000668000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://unitedstates2.ss.wd.microsoft.us .com.exe, 00000000.00000002.2204403538.000000000061E000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://unitedstates1.ss.wd.microsoft.us .com.exe, 00000000.00000002.2204403538.0000000000668000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs
                        IPDomainCountryFlagASNASN NameMalicious
                        IP
                        172.16.1.166
                        10.0.2.15
                        172.16.1.4
                        192.168.2.14
                        10.127.0.3
                        172.16.1.2
                        172.16.1.104
                        192.168.2.18
                        192.168.2.9
                        Joe Sandbox version:40.0.0 Tourmaline
                        Analysis ID:1410989
                        Start date and time:2024-03-18 14:35:59 +01:00
                        Joe Sandbox product:CloudBasic
                        Overall analysis duration:0h 7m 48s
                        Hypervisor based Inspection enabled:false
                        Report type:full
                        Cookbook file name:default.jbs
                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                        Number of analysed new started processes analysed:12
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Sample name: .com.exe
                        renamed because original name is a hash value
                        Original Sample Name:instruction.htm .com.exe
                        Detection:MAL
                        Classification:mal100.spre.expl.evad.winEXE@8/13@0/9
                        EGA Information:
                        • Successful, ratio: 100%
                        HCA Information:
                        • Successful, ratio: 100%
                        • Number of executed functions: 68
                        • Number of non-executed functions: 66
                        Cookbook Comments:
                        • Found application associated with file extension: .exe
                        • Override analysis time to 240000 for current running targets taking high CPU consumption
                        • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
                        • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                        • Excluded IPs from analysis (whitelisted): 20.42.65.92, 17.179.253.242
                        • Excluded domains from analysis (whitelisted): apple.com, client.wns.windows.com, onedsblobprdeus17.eastus.cloudapp.azure.com, ocsp.digicert.com, mx-in-rno.apple.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                        • Report size exceeded maximum capacity and may have missing behavior information.
                        • Report size getting too big, too many NtOpenFile calls found.
                        • Report size getting too big, too many NtQueryValueKey calls found.
                        • VT rate limit hit for: .com.exe
                        TimeTypeDescription
                        14:36:45API Interceptor1x Sleep call for process: .com.exe modified
                        14:36:47AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run JavaVM C:\Windows\java.exe
                        14:36:55AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run Services C:\Windows\services.exe
                        14:36:56API Interceptor1x Sleep call for process: WerFault.exe modified
                        14:37:29API Interceptor2500110x Sleep call for process: java.exe modified
                        14:37:31API Interceptor2166023x Sleep call for process: services.exe modified
                        No context
                        No context
                        No context
                        No context
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        C:\Users\user\AppData\Local\Temp\services.exeinstruction.scr.exeGet hashmaliciousMyDoomBrowse
                          .scr.exeGet hashmaliciousMyDoomBrowse
                            message.com.exeGet hashmaliciousMyDoomBrowse
                              letter.com.exeGet hashmaliciousMyDoomBrowse
                                yBvb5QQho4.exeGet hashmaliciousMyDoomBrowse
                                  fsjRK2SX4t.exeGet hashmaliciousMyDoomBrowse
                                    SecuriteInfo.com.Win32.HLLM.MyDoom.54464.3216.exeGet hashmaliciousMyDoomBrowse
                                      .exeGet hashmaliciousMyDoomBrowse
                                        Cg7HLh2mus.exeGet hashmaliciousMyDoomBrowse
                                          AHnFoINkgu.exeGet hashmaliciousMyDoomBrowse
                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                            File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):65536
                                            Entropy (8bit):0.8543619628301916
                                            Encrypted:false
                                            SSDEEP:96:g+FxLlLAx9syhM1yDfwQXIDcQvc6QcEVcw3cE/n+HbHg/opAnQzOqg7TlOy4aEuE:Pux9H0BU/gjdKzuiFrZ24IO87OM
                                            MD5:20673EC9C7AFCC45F423994ADC299BED
                                            SHA1:2388865D5980FB02F7FEF2D267E1255A1535EECD
                                            SHA-256:B7EF9675D9A94E35DAB6ADBC86A6BE09B6B03FCAE499F986D1698CB4B839A262
                                            SHA-512:8B97480448D97EE2D7B0E91549719670E6E57B6B18A0531411066FDE7F8A124BE1591E797A139A1FF988C62356744D888202C3F1C40FFEF06823F2C6D0F8D1C9
                                            Malicious:false
                                            Reputation:low
                                            Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.5.5.2.4.2.6.1.4.3.8.3.5.0.8.0.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.5.5.2.4.2.6.1.5.2.1.1.6.3.2.0.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.b.d.3.9.4.4.8.2.-.4.0.c.b.-.4.7.d.e.-.8.4.b.e.-.3.e.f.2.a.f.d.4.0.a.7.d.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.7.3.b.a.f.6.a.e.-.1.d.f.6.-.4.0.d.a.-.8.e.3.b.-.2.0.0.6.3.8.2.c.5.7.8.3.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=. . . . ...c.o.m...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.d.5.8.-.0.0.0.1.-.0.0.1.5.-.5.7.1.8.-.f.b.5.1.3.9.7.9.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.7.7.9.4.0.b.a.5.7.6.a.a.8.4.6.3.5.d.9.1.d.7.b.1.9.9.5.7.e.7.5.d.0.0.0.0.f.f.f.f.!.0.0.0.0.d.b.2.d.b.1.7.c.1.d.3.e.2.c.4.f.3.a.4.5.a.a.d.9.2.1.5.c.c.7.7.e.d.4.5.5.f.f.c.c.!. . . . ...c.o.m...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.
                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                            File Type:Mini DuMP crash report, 14 streams, Mon Mar 18 13:36:54 2024, 0x1205a4 type
                                            Category:dropped
                                            Size (bytes):99082
                                            Entropy (8bit):1.9719455879344538
                                            Encrypted:false
                                            SSDEEP:384:jna14Oqq498D+jmihIhhtqLItZSjopqNOCpyuNOfSU7ep/x:KjZ4HhINqo778
                                            MD5:BF830199210033620FC920E07D18EB81
                                            SHA1:B83577224BAF2095D266F26DEC5917219206DDAF
                                            SHA-256:7C50178B702FCAA9FDFADA2DF8CBF59681396AA44B3951F21186B29BC10A7F1A
                                            SHA-512:DDC2FD56BA951A6885F882FCAC794CE308B4467A74E5F444CBA9EFB6C882B2C409EA8EAF2AACAD3D17D85038DBE4EB11FC96C2181610CC224645C646788D2090
                                            Malicious:false
                                            Reputation:low
                                            Preview:MDMP..a..... .......vC.e........................................*>..........T.......8...........T...............BT......................x...............................................................................eJ..............GenuineIntel............T.......X...mC.e.............................0..2...............W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .S.u.m.m.e.r. .T.i.m.e...........................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                            File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):8316
                                            Entropy (8bit):3.693237086548923
                                            Encrypted:false
                                            SSDEEP:192:R6l7wVeJev626Y2DNSU9FTgmfnJjBpr189bansfk+m:R6lXJm626YASU9FTgmfnJj+asfU
                                            MD5:88977EC5A0476C714715927E9D7432C9
                                            SHA1:DDD1B3B8790DC43AA068F7AB49F4F0C1BC13981A
                                            SHA-256:C874A6AD45DD5413BDB47279BFCA653E54E4CE8B543E58AAFB799EA4547DA5FE
                                            SHA-512:7041D732BA069D28F21956D1C485012610FCCF3382B2EE5364A3A598FD0C8DE8B696186C009B2EC67ADD36B2B3102024928AFE143334402C7D073B8FF700176D
                                            Malicious:false
                                            Reputation:low
                                            Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.3.4.1.6.<./.P.i.
                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):4567
                                            Entropy (8bit):4.414719805422548
                                            Encrypted:false
                                            SSDEEP:48:cvIwWl8zsnJg77aI9ZmWpW8VYoYm8M4J58FAvc+q8oTsjtR/x3mJd:uIjfJI77n7VUJTU/sjt5x3mJd
                                            MD5:C214B4089F941DC6F9DE76272113F1BF
                                            SHA1:017CC8C83D28931641575DE55667F0102A98ACEF
                                            SHA-256:E1E3B1B89FD579E01F2508548B63DD27F01631EE95AC436D9D84E34A795C5270
                                            SHA-512:CA10638BA95B4C591A42528600D49127670E2A813FAFB596D1B6DBB033B8137245766E5922B2AE524F0DEADE83E73F8D2F92F66A11A7E89DF810E15B02D812DE
                                            Malicious:false
                                            Reputation:low
                                            Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="240759" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                            Process:C:\Windows\java.exe
                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
                                            Category:dropped
                                            Size (bytes):8192
                                            Entropy (8bit):6.951274251785221
                                            Encrypted:false
                                            SSDEEP:192:tZWNqWKIzebvOZnzCj6juhEJS3/Uf/tpfmG62X9f3:tZ6qWTYvczfahX/UHtF6e9f3
                                            MD5:B0FE74719B1B647E2056641931907F4A
                                            SHA1:E858C206D2D1542A79936CB00D85DA853BFC95E2
                                            SHA-256:BF316F51D0C345D61EAEE3940791B64E81F676E3BCA42BAD61073227BEE6653C
                                            SHA-512:9C82E88264696D0DADEF9C0442AD8D1183E48F0FB355A4FC9BF4FA5DB4E27745039F98B1FD1FEBFF620A5DED6DD493227F00D7D2E74B19757685AA8655F921C2
                                            Malicious:true
                                            Antivirus:
                                            • Antivirus: Avira, Detection: 100%
                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                            • Antivirus: ReversingLabs, Detection: 100%
                                            Joe Sandbox View:
                                            • Filename: instruction.scr.exe, Detection: malicious, Browse
                                            • Filename: .scr.exe, Detection: malicious, Browse
                                            • Filename: message.com.exe, Detection: malicious, Browse
                                            • Filename: letter.com.exe, Detection: malicious, Browse
                                            • Filename: yBvb5QQho4.exe, Detection: malicious, Browse
                                            • Filename: fsjRK2SX4t.exe, Detection: malicious, Browse
                                            • Filename: SecuriteInfo.com.Win32.HLLM.MyDoom.54464.3216.exe, Detection: malicious, Browse
                                            • Filename: .exe, Detection: malicious, Browse
                                            • Filename: Cg7HLh2mus.exe, Detection: malicious, Browse
                                            • Filename: AHnFoINkgu.exe, Detection: malicious, Browse
                                            Reputation:moderate, very likely benign file
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......................................................................PE..L........................ .......@..pg...P...p....@..........................................................................p......................................................................................................................UPX0.....@..............................UPX1..... ...P......................@...UPX2.........p......................@..............................................................................................................................................................................................................................................................................................................................................................................................................................................1.24.UPX!....
                                            Process:C:\Windows\java.exe
                                            File Type:Zip archive data, at least v1.0 to extract, compression method=store
                                            Category:modified
                                            Size (bytes):43082
                                            Entropy (8bit):5.919302793183291
                                            Encrypted:false
                                            SSDEEP:768:8EwHupU99d2JE0jNJJ83+8zzqgTdVY9/V:8EwVs+0jNDY1qi/qd
                                            MD5:124B7F11670EACBEF87715EB5246BF72
                                            SHA1:4150723F29428194B2C4A95A87353842D927EB26
                                            SHA-256:850AFFEA519E6280CCA2812E52BD61FC97C83CA9301D4A60FDFE9A46261B95B7
                                            SHA-512:2B535530CCD530A95B3A9768A91B97CED5B88E098D1AB8B366BC338F6D02748F34E43566DB9CA40B69B0BC8C2250D2AAB7CE47513AA71C85CE4C6C9A0122507D
                                            Malicious:true
                                            Antivirus:
                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                            Reputation:low
                                            Preview:PK........Wf.0A.Uj..........apple.comMZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...............................................................................................PE..L........................b..........$.............P.............................................................................0...................................................................................................................UPX0....................................UPX1.....`.......`..................@....rsrc................d..............@....text................r.............. ....................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Windows\java.exe
                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
                                            Category:dropped
                                            Size (bytes):42966
                                            Entropy (8bit):5.920540053120464
                                            Encrypted:false
                                            SSDEEP:768:AEwHupU99d2JE0jNJJ83+8zzqgTdVY9/:AEwVs+0jNDY1qi/q
                                            MD5:29E4B34709AA95FA4189F0340FCD3869
                                            SHA1:579935A09FEB86FE6ED921B89C1D1C2AA7C116A8
                                            SHA-256:2EB6D37566A40E43AB4206214556921CA0F62AD8D76FF15CD9385BCA2365B46F
                                            SHA-512:679482ACD5F7F7638749A92BB05BB11C52FD2215C7D3D4C986BC172D266FAC42714B86D76AB387C682A12A073EE9703609CF923F4B68AAF9777082AB767E8DB1
                                            Malicious:true
                                            Antivirus:
                                            • Antivirus: Avira, Detection: 100%
                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                            Reputation:low
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...............................................................................................PE..L........................b..........$.............P.............................................................................0...................................................................................................................UPX0....................................UPX1.....`.......`..................@....rsrc................d..............@....text................r.............. ..............................................................................................................................................................................................................................................................................................................................................................................1.24.UPX!....
                                            Process:C:\Windows\java.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):26
                                            Entropy (8bit):3.95006375643621
                                            Encrypted:false
                                            SSDEEP:3:ggPYV:rPYV
                                            MD5:187F488E27DB4AF347237FE461A079AD
                                            SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                            SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                            SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                            Malicious:false
                                            Preview:[ZoneTransfer]....ZoneId=0
                                            Process:C:\Users\user\Desktop\ .com.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):128
                                            Entropy (8bit):5.7528209267673045
                                            Encrypted:false
                                            SSDEEP:3:v+71kalcQ9VdJgjJZGpyPtPsbgqYUqXbGfL97t8Qh:vi1kutNJg4pylCg7XSfL97uQh
                                            MD5:0159C0BB4689222E72001A5D33336D4B
                                            SHA1:77E06830296F998584B2B9949C366822E4A4718D
                                            SHA-256:3BF6AF374EBA669A13BDEA8CED3C4D284616C5FB92F8199C465F54546485D023
                                            SHA-512:5B896547BF23FCA6EB0B9B7C2C339C8F85E76B3C6C5B2147E480B0790DC73F6C74B108D6FDA56B1955E7F1BE3808DCAF9D8450B9F9B38588C1A16B7A3ED7CFE2
                                            Malicious:false
                                            Preview:..`....^...Q.NN.@;7.@.r...0..(..y...*8.'F..EF..BF..^F..A.W.LF..@0..k.Wa..Wa..Wa..Wa..W..c.b2.Wa...Pc....8.................p.Q
                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                            File Type:MS Windows registry file, NT/2000 or above
                                            Category:dropped
                                            Size (bytes):1835008
                                            Entropy (8bit):4.4685561320578495
                                            Encrypted:false
                                            SSDEEP:6144:ozZfpi6ceLPx9skLmb0fpZWSP3aJG8nAgeiJRMMhA2zX4WABluuN5jDH5S:+ZHtpZWOKnMM6bFpnj4
                                            MD5:0979DB735B9DA0AF767D4F71077D959E
                                            SHA1:CBD04A82A455F507CD444C56FC0E31B36BC22630
                                            SHA-256:8C858C0E3E4449C2422A147931BC3EB8A042715BF45A90488DE3602FE3D04771
                                            SHA-512:8A1D483D0CBBCF9856CF8765AE0EF858FB0B3465F9FA243A2636270373674D7BB52D34733CCE1D1E5F3F8FA0667650790B9E44C8B39C785E57C6532462FE4C42
                                            Malicious:false
                                            Preview:regfH...H....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm...W9y..............................................................................................................................................................................................................................................................................................................................................e..c........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Users\user\Desktop\ .com.exe
                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
                                            Category:dropped
                                            Size (bytes):42966
                                            Entropy (8bit):5.920676271954214
                                            Encrypted:false
                                            SSDEEP:768:AEwHupU99d2JE0jNJJ83+8zzqgTdVY9/:AEwVs+0jNDY1qi/q
                                            MD5:B1F6A4CC592F3C9F7D4B69C02AC74D11
                                            SHA1:DB2DB17C1D3E2C4F3A45AAD9215CC77ED455FFCC
                                            SHA-256:3DB846A796CAA001666DF8F7CAE709FFF02F984711B0E70E0E79C457D631B4E5
                                            SHA-512:66C3D5CB3C9BF13604748853797E4C1A1EAE13D52CDF43F16DA0B1B180AD0C10102A2935D4D6BD0549F6E48427C0181CBB07F1EE664274727DFF0CC61E5075C5
                                            Malicious:true
                                            Antivirus:
                                            • Antivirus: Avira, Detection: 100%
                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                            • Antivirus: ReversingLabs, Detection: 74%
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...............................................................................................PE..L........................b..........$.............P.............................................................................0...................................................................................................................UPX0....................................UPX1.....`.......`..................@....rsrc................d..............@....text................r.............. ..............................................................................................................................................................................................................................................................................................................................................................................1.24.UPX!....
                                            Process:C:\Users\user\Desktop\ .com.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:modified
                                            Size (bytes):26
                                            Entropy (8bit):3.95006375643621
                                            Encrypted:false
                                            SSDEEP:3:ggPYV:rPYV
                                            MD5:187F488E27DB4AF347237FE461A079AD
                                            SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                            SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                            SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                            Malicious:false
                                            Preview:[ZoneTransfer]....ZoneId=0
                                            Process:C:\Users\user\Desktop\ .com.exe
                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
                                            Category:dropped
                                            Size (bytes):8192
                                            Entropy (8bit):6.951274251785221
                                            Encrypted:false
                                            SSDEEP:192:tZWNqWKIzebvOZnzCj6juhEJS3/Uf/tpfmG62X9f3:tZ6qWTYvczfahX/UHtF6e9f3
                                            MD5:B0FE74719B1B647E2056641931907F4A
                                            SHA1:E858C206D2D1542A79936CB00D85DA853BFC95E2
                                            SHA-256:BF316F51D0C345D61EAEE3940791B64E81F676E3BCA42BAD61073227BEE6653C
                                            SHA-512:9C82E88264696D0DADEF9C0442AD8D1183E48F0FB355A4FC9BF4FA5DB4E27745039F98B1FD1FEBFF620A5DED6DD493227F00D7D2E74B19757685AA8655F921C2
                                            Malicious:true
                                            Antivirus:
                                            • Antivirus: Avira, Detection: 100%
                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                            • Antivirus: ReversingLabs, Detection: 100%
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......................................................................PE..L........................ .......@..pg...P...p....@..........................................................................p......................................................................................................................UPX0.....@..............................UPX1..... ...P......................@...UPX2.........p......................@..............................................................................................................................................................................................................................................................................................................................................................................................................................................1.24.UPX!....
                                            File type:PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
                                            Entropy (8bit):5.920676271954214
                                            TrID:
                                            • Win32 Executable (generic) a (10002005/4) 99.37%
                                            • UPX compressed Win32 Executable (30571/9) 0.30%
                                            • Win32 EXE Yoda's Crypter (26571/9) 0.26%
                                            • Clipper DOS Executable (2020/12) 0.02%
                                            • Generic Win/DOS Executable (2004/3) 0.02%
                                            File name: .com.exe
                                            File size:42'966 bytes
                                            MD5:b1f6a4cc592f3c9f7d4b69c02ac74d11
                                            SHA1:db2db17c1d3e2c4f3a45aad9215cc77ed455ffcc
                                            SHA256:3db846a796caa001666df8f7cae709fff02f984711b0e70e0e79c457d631b4e5
                                            SHA512:66c3d5cb3c9bf13604748853797e4c1a1eae13d52cdf43f16da0b1b180ad0c10102a2935d4d6bd0549f6e48427c0181cbb07f1ee664274727dff0cc61e5075c5
                                            SSDEEP:768:AEwHupU99d2JE0jNJJ83+8zzqgTdVY9/:AEwVs+0jNDY1qi/q
                                            TLSH:8D13E0983E8FBD42D2840C382903EE7ABE52FD444D09268BB5B87B0BBDB1F95455DC46
                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...............................................................................................PE..L........................b.........
                                            Icon Hash:9361c4a092b08082
                                            Entrypoint:0x510024
                                            Entrypoint Section:.text
                                            Digitally signed:false
                                            Imagebase:0x500000
                                            Subsystem:windows gui
                                            Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                            DLL Characteristics:
                                            Time Stamp:0x0 [Thu Jan 1 00:00:00 1970 UTC]
                                            TLS Callbacks:
                                            CLR (.Net) Version:
                                            OS Version Major:4
                                            OS Version Minor:0
                                            File Version Major:4
                                            File Version Minor:0
                                            Subsystem Version Major:4
                                            Subsystem Version Minor:0
                                            Import Hash:98cd465c2ab2841f9fd90d5e847563f4
                                            Instruction
                                            stc
                                            jc 00007F6EC0C2DE49h
                                            pop ds
                                            xor esi, dword ptr [ecx-49h]
                                            cwde
                                            leave
                                            jmp 00007F6EC0C2DEA2h
                                            jmp 00007F6EC0C2DE45h
                                            cmp dl, byte ptr [ebp+0006E8D2h]
                                            add byte ptr [eax], al
                                            dec ecx
                                            stc
                                            mov dl, EDh
                                            pop ecx
                                            pop ebx
                                            jc 00007F6EC0C2DE49h
                                            jne 00007F6EC0C2DDD7h
                                            jnl 00007F6EC0C2DE25h
                                            sbb dword ptr [edx-383C7EDCh], FFFFFFFFh
                                            NameVirtual AddressVirtual Size Is in Section
                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IMPORT0xf5140x130.rsrc
                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0xf0000x514.rsrc
                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x101f70x8.text
                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                            UPX00x10000x80000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                            UPX10x90000x60000x600095e7e2aea06fcf90374e473c416d1137False0.9812825520833334data7.938048293950375IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                            .rsrc0xf0000x10000x80060d328df3a5dff05a8db261a75a0dedaFalse0.27880859375data2.6542421841999686IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                            .text0x100000x1ff0x20049d1ec1d6eed7ca336017bbbebab7b7dFalse0.978515625data6.805048281534057IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                            NameRVASizeTypeLanguageCountryZLIB Complexity
                                            RT_ICON0xf0d80x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640EnglishUnited States0.2782258064516129
                                            RT_ICON0xf3c40x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishUnited States0.4189189189189189
                                            RT_GROUP_ICON0xf4f00x22dataEnglishUnited States1.0
                                            DLLImport
                                            KERNEL32.DLLLoadLibraryA, GetProcAddress, ExitProcess
                                            ADVAPI32.dllRegCloseKey
                                            MSVCRT.dllmemset
                                            USER32.dllwsprintfA
                                            WS2_32.dllgethostname
                                            Language of compilation systemCountry where language is spokenMap
                                            EnglishUnited States
                                            TimestampSource PortDest PortSource IPDest IP
                                            Mar 18, 2024 14:36:47.602288961 CET497131034192.168.2.6172.16.1.2
                                            Mar 18, 2024 14:36:48.601149082 CET497131034192.168.2.6172.16.1.2
                                            Mar 18, 2024 14:36:50.601166964 CET497131034192.168.2.6172.16.1.2
                                            Mar 18, 2024 14:36:54.601149082 CET497131034192.168.2.6172.16.1.2
                                            Mar 18, 2024 14:37:02.601167917 CET497131034192.168.2.6172.16.1.2
                                            Mar 18, 2024 14:37:08.603070974 CET497211034192.168.2.6172.16.1.4
                                            Mar 18, 2024 14:37:09.616800070 CET497211034192.168.2.6172.16.1.4
                                            Mar 18, 2024 14:37:11.632421017 CET497211034192.168.2.6172.16.1.4
                                            Mar 18, 2024 14:37:15.632402897 CET497211034192.168.2.6172.16.1.4
                                            Mar 18, 2024 14:37:23.632411003 CET497211034192.168.2.6172.16.1.4
                                            Mar 18, 2024 14:37:29.633754969 CET497241034192.168.2.6172.16.1.166
                                            Mar 18, 2024 14:37:30.632405996 CET497241034192.168.2.6172.16.1.166
                                            Mar 18, 2024 14:37:32.632445097 CET497241034192.168.2.6172.16.1.166
                                            Mar 18, 2024 14:37:36.632396936 CET497241034192.168.2.6172.16.1.166
                                            Mar 18, 2024 14:37:44.632435083 CET497241034192.168.2.6172.16.1.166
                                            Mar 18, 2024 14:38:11.634995937 CET497301034192.168.2.610.0.2.15
                                            Mar 18, 2024 14:38:12.648094893 CET497301034192.168.2.610.0.2.15
                                            Mar 18, 2024 14:38:14.663645983 CET497301034192.168.2.610.0.2.15
                                            Mar 18, 2024 14:38:18.757368088 CET497301034192.168.2.610.0.2.15
                                            Mar 18, 2024 14:38:26.757381916 CET497301034192.168.2.610.0.2.15
                                            Mar 18, 2024 14:38:54.555514097 CET497331034192.168.2.610.127.0.3
                                            Mar 18, 2024 14:38:55.648008108 CET497331034192.168.2.610.127.0.3
                                            Mar 18, 2024 14:38:57.648058891 CET497331034192.168.2.610.127.0.3
                                            Mar 18, 2024 14:39:01.648014069 CET497331034192.168.2.610.127.0.3
                                            Mar 18, 2024 14:39:09.648015976 CET497331034192.168.2.610.127.0.3
                                            Mar 18, 2024 14:39:36.932564974 CET497361034192.168.2.6172.16.1.4
                                            Mar 18, 2024 14:39:37.944891930 CET497361034192.168.2.6172.16.1.4
                                            Mar 18, 2024 14:39:40.054251909 CET497361034192.168.2.6172.16.1.4
                                            Mar 18, 2024 14:39:44.054244041 CET497361034192.168.2.6172.16.1.4
                                            Mar 18, 2024 14:39:52.148000956 CET497361034192.168.2.6172.16.1.4
                                            Mar 18, 2024 14:40:19.259031057 CET497381034192.168.2.6172.16.1.4
                                            Mar 18, 2024 14:40:20.351142883 CET497381034192.168.2.6172.16.1.4
                                            Mar 18, 2024 14:40:22.444873095 CET497381034192.168.2.6172.16.1.4
                                            Mar 18, 2024 14:40:26.554239035 CET497381034192.168.2.6172.16.1.4
                                            Mar 18, 2024 14:40:34.554217100 CET497381034192.168.2.6172.16.1.4
                                            Mar 18, 2024 14:40:40.555363894 CET497401034192.168.2.6172.16.1.104
                                            Mar 18, 2024 14:40:41.554260015 CET497401034192.168.2.6172.16.1.104
                                            Mar 18, 2024 14:40:43.554259062 CET497401034192.168.2.6172.16.1.104
                                            Mar 18, 2024 14:40:47.757380962 CET497401034192.168.2.6172.16.1.104
                                            Mar 18, 2024 14:40:55.851130962 CET497401034192.168.2.6172.16.1.104

                                            Click to jump to process

                                            Click to jump to process

                                            Click to dive into process behavior distribution

                                            Click to jump to process

                                            Target ID:0
                                            Start time:14:36:45
                                            Start date:18/03/2024
                                            Path:C:\Users\user\Desktop\ .com.exe
                                            Wow64 process (32bit):true
                                            Commandline:C:\Users\user\Desktop\ .com.exe
                                            Imagebase:0x500000
                                            File size:42'966 bytes
                                            MD5 hash:B1F6A4CC592F3C9F7D4B69C02AC74D11
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_MyDoom, Description: Yara detected MyDoom, Source: 00000000.00000002.2204036339.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                                            Reputation:low
                                            Has exited:true

                                            Target ID:1
                                            Start time:14:36:45
                                            Start date:18/03/2024
                                            Path:C:\Windows\services.exe
                                            Wow64 process (32bit):true
                                            Commandline:C:\Windows\services.exe
                                            Imagebase:0x400000
                                            File size:8'192 bytes
                                            MD5 hash:B0FE74719B1B647E2056641931907F4A
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Antivirus matches:
                                            • Detection: 100%, Avira
                                            • Detection: 100%, Joe Sandbox ML
                                            • Detection: 100%, ReversingLabs
                                            Reputation:moderate
                                            Has exited:false

                                            Target ID:6
                                            Start time:14:36:54
                                            Start date:18/03/2024
                                            Path:C:\Windows\SysWOW64\WerFault.exe
                                            Wow64 process (32bit):true
                                            Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 3416 -s 1188
                                            Imagebase:0x260000
                                            File size:483'680 bytes
                                            MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:7
                                            Start time:14:36:55
                                            Start date:18/03/2024
                                            Path:C:\Windows\java.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Windows\java.exe"
                                            Imagebase:0x500000
                                            File size:42'966 bytes
                                            MD5 hash:B1F6A4CC592F3C9F7D4B69C02AC74D11
                                            Has elevated privileges:false
                                            Has administrator privileges:false
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_MyDoom, Description: Yara detected MyDoom, Source: 00000007.00000002.4568272926.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Author: Joe Security
                                            Antivirus matches:
                                            • Detection: 100%, Avira
                                            • Detection: 100%, Joe Sandbox ML
                                            • Detection: 74%, ReversingLabs
                                            Reputation:low
                                            Has exited:false

                                            Target ID:8
                                            Start time:14:36:55
                                            Start date:18/03/2024
                                            Path:C:\Users\user\AppData\Local\Temp\services.exe
                                            Wow64 process (32bit):true
                                            Commandline:C:\Users\user\AppData\Local\Temp\services.exe
                                            Imagebase:0x400000
                                            File size:8'192 bytes
                                            MD5 hash:B0FE74719B1B647E2056641931907F4A
                                            Has elevated privileges:false
                                            Has administrator privileges:false
                                            Programmed in:C, C++ or other language
                                            Antivirus matches:
                                            • Detection: 100%, Avira
                                            • Detection: 100%, Joe Sandbox ML
                                            • Detection: 100%, ReversingLabs
                                            Reputation:moderate
                                            Has exited:false

                                            Target ID:9
                                            Start time:14:37:03
                                            Start date:18/03/2024
                                            Path:C:\Windows\services.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Windows\services.exe"
                                            Imagebase:0x400000
                                            File size:8'192 bytes
                                            MD5 hash:B0FE74719B1B647E2056641931907F4A
                                            Has elevated privileges:false
                                            Has administrator privileges:false
                                            Programmed in:C, C++ or other language
                                            Reputation:moderate
                                            Has exited:false

                                            Reset < >

                                              Execution Graph

                                              Execution Coverage:11.8%
                                              Dynamic/Decrypted Code Coverage:0%
                                              Signature Coverage:13.7%
                                              Total number of Nodes:651
                                              Total number of Limit Nodes:13
                                              execution_graph 2970 503280 WSAStartup 2975 5033a8 GetTickCount 2970->2975 2972 5032a0 memset 2976 5031e4 2972->2976 2975->2972 2998 502c90 2976->2998 2979 5031ff 2984 50327c ExitProcess 2979->2984 3009 5075e5 2979->3009 2990 503255 2994 50325a CreateThread 2990->2994 2991 50322c CreateThread 3038 5033b4 2991->3038 3254 50311c FindWindowA 2991->3254 2993 503240 Sleep 2993->2990 2995 50326e 2994->2995 3261 504c1b 2994->3261 3039 50565b GetCurrentThread SetThreadPriority 2995->3039 3000 502caa 2998->3000 2999 502d0f RegOpenKeyExA 2999->3000 3001 502d83 RegCloseKey 2999->3001 3000->2999 3003 502d3a 3000->3003 3002 502d7e 3001->3002 3002->2979 3006 502d8e memset gethostname lstrcat 3002->3006 3003->3002 3004 502d43 RegCreateKeyExA 3003->3004 3004->3003 3005 502d6c RegCloseKey 3004->3005 3005->3003 3007 502e0b lstrcat lstrcat CreateMutexA GetLastError 3006->3007 3008 502ddd 3006->3008 3007->2979 3008->3007 3046 50746b GetModuleFileNameA CreateFileA 3009->3046 3011 507627 GetTempPathA 3014 5075f6 3011->3014 3012 507619 GetWindowsDirectoryA 3012->3014 3013 50766b lstrcat lstrcat lstrcat CreateFileA 3013->3014 3015 5076c8 3013->3015 3014->3011 3014->3012 3014->3013 3014->3014 3016 503209 3014->3016 3057 50737c 3015->3057 3019 502e50 GetModuleFileNameA lstrcpy 3016->3019 3026 502eb6 3019->3026 3020 502ec1 GetWindowsDirectoryA 3020->3026 3021 502ecf GetTempPathA 3021->3026 3022 502ee7 lstrlen 3023 502f01 lstrcat 3022->3023 3024 502f0f lstrcat SetFileAttributesA CreateFileA 3022->3024 3023->3024 3024->3026 3027 502f7e GetFileAttributesA 3024->3027 3025 502f9d 3030 502fb0 RegOpenKeyExA 3025->3030 3026->3020 3026->3021 3026->3022 3026->3025 3026->3027 3028 502f51 CloseHandle DeleteFileA CopyFileA 3026->3028 3029 502f9f lstrcpy 3026->3029 3027->3026 3028->3026 3029->3025 3031 5030c2 lstrlen RegSetValueExA RegCloseKey 3030->3031 3032 5030ad RegOpenKeyExA 3030->3032 3033 5030eb 3031->3033 3032->3031 3032->3033 3034 50315c GetModuleHandleA 3033->3034 3035 5031e2 3034->3035 3036 5031cd GetProcAddress 3034->3036 3035->2990 3035->2991 3036->3035 3037 5031dc 3036->3037 3037->3035 3038->2993 3074 504ff8 RegOpenKeyExA 3039->3074 3043 505674 3091 5055b4 memset GetWindowsDirectoryA lstrcpy 3043->3091 3047 507545 3046->3047 3048 5074b8 3046->3048 3047->3014 3063 5073e8 GetTempPathA lstrlen 3048->3063 3050 5074c4 CreateFileA 3050->3047 3051 5074e6 3050->3051 3066 503697 SetFilePointer ReadFile 3051->3066 3054 50751b ReadFile 3055 507503 WriteFile 3054->3055 3056 507535 FindCloseChangeNotification CloseHandle 3054->3056 3055->3054 3056->3047 3058 507391 3057->3058 3059 5073ac WriteFile 3058->3059 3060 5073cd 3058->3060 3059->3058 3061 5073d1 WriteFile 3060->3061 3062 5073e4 FindCloseChangeNotification wsprintfA memset CreateProcessA 3060->3062 3061->3062 3062->3016 3064 507414 3063->3064 3065 507435 lstrcat lstrcat lstrcpy 3063->3065 3064->3065 3065->3050 3067 5036d4 SetFilePointer 3066->3067 3068 503772 SetFilePointer 3066->3068 3067->3068 3069 5036e7 ReadFile 3067->3069 3068->3054 3069->3068 3070 5036fd 3069->3070 3070->3068 3071 50371e SetFilePointer 3070->3071 3071->3068 3072 50373f ReadFile 3071->3072 3072->3068 3073 503758 3072->3073 3073->3068 3073->3072 3075 5050c8 memset RegQueryValueExA RegCloseKey 3074->3075 3076 505119 3074->3076 3075->3076 3077 50510c 3075->3077 3080 505449 3076->3080 3099 504eea CreateFileA 3077->3099 3081 505503 memset 3080->3081 3082 505521 GetWindowsDirectoryA 3081->3082 3083 505529 GetEnvironmentVariableA 3081->3083 3084 505534 3082->3084 3083->3084 3084->3081 3085 50553c lstrlen 3084->3085 3087 5055af 3084->3087 3088 505585 lstrcat 3084->3088 3089 50556a lstrcat lstrcat 3084->3089 3085->3084 3086 505556 lstrcat 3085->3086 3086->3084 3087->3043 3192 5052ad 3088->3192 3089->3088 3092 5052ad 82 API calls 3091->3092 3093 50560a 3092->3093 3094 50561b GetDriveTypeA 3093->3094 3096 505657 Sleep 3093->3096 3094->3093 3095 50562d Sleep 3094->3095 3097 5052ad 82 API calls 3095->3097 3096->3043 3098 505646 3097->3098 3098->3093 3100 504fee 3099->3100 3101 504f1f 3099->3101 3100->3076 3101->3100 3102 504f28 GetFileSize CreateFileMappingA 3101->3102 3103 504fe9 3102->3103 3104 504f4b 3102->3104 3106 504fdc CloseHandle 3103->3106 3104->3103 3105 504f54 MapViewOfFile 3104->3105 3107 504f67 3105->3107 3112 504f6c 3105->3112 3106->3100 3108 504fd2 CloseHandle 3107->3108 3108->3106 3109 504fcb UnmapViewOfFile 3109->3108 3110 504f7c memset 3110->3112 3112->3109 3112->3110 3113 50463f lstrlen 3112->3113 3114 50465b 3113->3114 3115 50466d 3113->3115 3121 5045cf 3114->3121 3115->3112 3117 504669 3117->3115 3118 50469a lstrlen GetProcessHeap RtlAllocateHeap 3117->3118 3119 50467e lstrcmpiA 3117->3119 3118->3115 3120 5046c5 memset GetTickCount lstrcpy 3118->3120 3119->3115 3119->3117 3120->3115 3131 50402f lstrlen 3121->3131 3123 50461e 3130 5045e1 3123->3130 3173 504449 3123->3173 3126 50462b 3126->3130 3177 50450e 3126->3177 3127 5045f2 lstrlen 3128 5045dc 3127->3128 3128->3123 3128->3127 3128->3130 3156 5042ce 3128->3156 3130->3117 3132 504044 3131->3132 3137 50404c 3131->3137 3132->3128 3133 504055 isspace 3135 504065 isalnum 3133->3135 3133->3137 3134 504090 3136 504092 strchr 3134->3136 3140 5040af 3134->3140 3135->3134 3135->3137 3136->3134 3136->3140 3137->3133 3137->3134 3138 5040fa 3138->3132 3142 50410b lstrlen 3138->3142 3139 5040bb isalnum 3139->3140 3141 5040de tolower 3139->3141 3140->3138 3140->3139 3140->3141 3141->3140 3143 504150 3142->3143 3144 50411a isspace 3143->3144 3149 50416d 3143->3149 3144->3143 3145 50412a strchr 3144->3145 3145->3143 3148 504140 isalnum 3145->3148 3146 5041c2 lstrlen 3155 504209 3146->3155 3147 50417f isalnum 3147->3149 3148->3143 3149->3146 3149->3147 3152 5041ad tolower 3149->3152 3150 5041d3 isspace 3153 5041e5 strchr 3150->3153 3150->3155 3151 504224 lstrlen 3151->3132 3152->3149 3154 5041fa isalnum 3153->3154 3153->3155 3154->3155 3155->3150 3155->3151 3157 5042d7 3156->3157 3158 5042da 3156->3158 3157->3128 3159 50430a lstrlen 3158->3159 3172 504417 3158->3172 3160 504315 3159->3160 3161 504339 lstrlen 3160->3161 3160->3172 3162 504354 3161->3162 3161->3172 3162->3172 3183 504244 3162->3183 3165 504383 3166 50438c lstrlen 3165->3166 3165->3172 3167 50439d 3166->3167 3166->3172 3168 5043a2 lstrlen 3167->3168 3167->3172 3170 5043a7 3168->3170 3169 5043fa lstrlen lstrlen 3171 504425 lstrlen 3169->3171 3169->3172 3170->3169 3170->3172 3171->3172 3172->3128 3174 50445a 3173->3174 3175 50447a tolower 3174->3175 3176 504469 3174->3176 3175->3174 3175->3176 3176->3126 3178 504520 3177->3178 3179 50452a tolower 3178->3179 3182 504546 3178->3182 3179->3178 3179->3182 3180 50457d 3180->3130 3181 504561 lstrcmp 3181->3180 3181->3182 3182->3180 3182->3181 3184 504279 3183->3184 3186 504252 3183->3186 3185 5042b8 3184->3185 3191 504286 3184->3191 3188 5042b3 lstrlen 3185->3188 3189 5042bf lstrcpy 3185->3189 3186->3184 3187 50425d isspace 3186->3187 3187->3186 3188->3165 3188->3172 3189->3188 3190 504299 isspace 3190->3191 3191->3188 3191->3190 3193 5052bf 3192->3193 3194 5052cb 3192->3194 3193->3194 3195 5052d2 Sleep 3193->3195 3196 5052e5 lstrcpy lstrlen 3193->3196 3194->3084 3195->3193 3197 505310 lstrcat 3196->3197 3198 505322 lstrcat memset 3196->3198 3197->3198 3205 50534c 3198->3205 3199 505358 FindFirstFileA 3199->3205 3200 50537b FindNextFileA 3201 505438 FindClose 3200->3201 3200->3205 3201->3194 3202 5053b0 lstrcpy lstrlen 3203 5053e1 lstrcat 3202->3203 3204 5053cf lstrcat 3202->3204 3203->3205 3206 5053fe Sleep 3203->3206 3204->3203 3205->3194 3205->3199 3205->3200 3205->3202 3209 505131 3205->3209 3208 5052ad 68 API calls 3206->3208 3208->3205 3210 505299 3209->3210 3212 505141 3209->3212 3210->3205 3211 505167 3211->3210 3214 505278 Sleep 3211->3214 3215 50528c 3211->3215 3212->3211 3213 50516e lstrcpyn CharLowerA 3212->3213 3213->3211 3214->3211 3216 505291 3215->3216 3217 50529b 3215->3217 3221 504e00 GetProcessHeap RtlAllocateHeap 3216->3221 3217->3210 3219 5052a0 3217->3219 3220 504eea 48 API calls 3219->3220 3220->3210 3222 504e23 3221->3222 3223 504e2b CreateFileA 3221->3223 3222->3210 3224 504ed0 3223->3224 3230 504e50 3223->3230 3225 504ed3 GetProcessHeap HeapFree 3224->3225 3225->3222 3226 504eb6 ReadFile 3227 504ec2 FindCloseChangeNotification 3226->3227 3226->3230 3227->3225 3230->3224 3230->3226 3230->3227 3231 504c29 3230->3231 3237 504d0c 3230->3237 3236 504c38 3231->3236 3234 504d05 3234->3230 3235 504c8b memcpy 3235->3236 3236->3234 3236->3235 3241 50343e 3236->3241 3245 5034b8 3236->3245 3238 504df8 3237->3238 3239 504d24 3237->3239 3238->3230 3239->3238 3240 50463f 40 API calls 3239->3240 3240->3239 3242 50344b 3241->3242 3243 50347c 3241->3243 3242->3243 3244 503454 tolower tolower 3242->3244 3243->3236 3244->3242 3244->3243 3246 503618 3245->3246 3253 5034d1 3245->3253 3246->3236 3247 5034ed isdigit 3247->3253 3248 50353f memset 3249 503562 WideCharToMultiByte 3248->3249 3248->3253 3249->3253 3250 503582 lstrlen 3251 50359b lstrlen 3250->3251 3252 5035ec lstrlen memcpy 3250->3252 3251->3253 3252->3253 3253->3246 3253->3247 3253->3248 3253->3250 3253->3252 3264 5030f0 3254->3264 3257 5030f0 3 API calls 3258 503142 FindWindowA 3257->3258 3259 5030f0 3 API calls 3258->3259 3260 503152 RtlExitUserThread 3259->3260 3267 504ae2 3261->3267 3265 503119 FindWindowA 3264->3265 3266 5030fc PostMessageA PostMessageA PostMessageA 3264->3266 3265->3257 3266->3265 3270 504af2 3267->3270 3269 504b00 Sleep 3269->3270 3270->3269 3271 504b99 CreateThread 3270->3271 3272 504b61 3270->3272 3275 504bec GetTickCount 3270->3275 3278 503620 GetModuleHandleA 3270->3278 3271->3272 3338 504a37 InterlockedIncrement GetCurrentThread SetThreadPriority 3271->3338 3272->3270 3274 504bba CloseHandle 3272->3274 3283 504a85 3272->3283 3274->3269 3275->3270 3276 504bfd 3275->3276 3276->3269 3288 5047b7 3276->3288 3279 503672 GetProcAddress 3278->3279 3280 503664 LoadLibraryA 3278->3280 3281 503682 3279->3281 3282 503687 InternetGetConnectedState 3279->3282 3280->3279 3280->3281 3281->3270 3282->3270 3284 504a94 3283->3284 3285 504adf 3284->3285 3286 504a9a GetTickCount 3284->3286 3287 504ac1 GetProcessHeap HeapFree 3284->3287 3285->3272 3286->3284 3286->3287 3287->3284 3289 50486e 3288->3289 3290 5047d2 3288->3290 3289->3276 3290->3289 3291 50481c lstrcpyn lstrlen GetProcessHeap RtlAllocateHeap 3290->3291 3291->3289 3292 50484d lstrcpy CreateThread 3291->3292 3292->3289 3293 50477f GetCurrentThread SetThreadPriority 3292->3293 3294 504797 3293->3294 3295 5047ae RtlExitUserThread 3293->3295 3298 504708 memset 3294->3298 3306 507730 memset memset 3298->3306 3301 504741 memset 3330 507940 3301->3330 3302 50477b GetProcessHeap HeapFree 3302->3295 3305 504e00 57 API calls 3305->3302 3309 507763 3306->3309 3307 507771 lstrcpy 3311 5077fc 3307->3311 3309->3307 3310 50779a 3309->3310 3313 5077b0 lstrcat 3310->3313 3314 5077bb 3310->3314 3312 50781f wsprintfA 3311->3312 3315 507835 3312->3315 3313->3314 3316 5077f1 lstrcat 3314->3316 3317 5077cb lstrcat 3314->3317 3318 50784d wsprintfA 3315->3318 3319 50789f 3315->3319 3316->3311 3320 5077db 3317->3320 3329 50785f 3318->3329 3321 5078a7 wsprintfA 3319->3321 3322 5078df 3319->3322 3320->3316 3325 5077e6 lstrcat 3320->3325 3321->3329 3323 5078e7 wsprintfA 3322->3323 3324 50792f 3322->3324 3323->3329 3326 507937 wsprintfA 3324->3326 3325->3316 3328 504735 3326->3328 3327 507920 lstrlen 3327->3326 3328->3301 3328->3302 3329->3327 3329->3328 3331 507952 3330->3331 3332 507955 GetModuleHandleA 3330->3332 3331->3332 3333 507970 GetProcAddress 3332->3333 3334 507965 LoadLibraryA 3332->3334 3335 504763 3333->3335 3336 507985 3333->3336 3334->3333 3334->3335 3335->3302 3335->3305 3336->3335 3337 5079a0 lstrcpy 3336->3337 3337->3335 3339 504a66 3338->3339 3340 504a5c 3338->3340 3342 504a74 InterlockedDecrement 3339->3342 3343 504a7b RtlExitUserThread 3339->3343 3344 5049c5 3340->3344 3342->3343 3345 5049d9 3344->3345 3346 5049ea lstrcpyn 3345->3346 3349 504a28 3345->3349 3354 504971 3346->3354 3348 504a02 3348->3349 3368 506966 3348->3368 3349->3339 3353 504a1f GlobalFree 3353->3349 3414 504874 3354->3414 3356 50497c 3357 504981 3356->3357 3419 503ff8 3356->3419 3357->3348 3360 5049a2 3422 50489d 3360->3422 3361 504994 GetTickCount 3361->3360 3363 50499e 3361->3363 3363->3348 3365 504874 lstrcmpiA 3366 5049af 3365->3366 3366->3363 3430 50400c 3366->3430 3369 504a0f 3368->3369 3370 50697e lstrlen 3368->3370 3369->3349 3395 5071f8 3369->3395 3370->3369 3371 50698e memset 3370->3371 3372 5069af 3371->3372 3441 505a21 3372->3441 3374 5069f2 3444 505a45 3374->3444 3383 506a25 GlobalAlloc 3384 506a75 3383->3384 3385 506a57 3383->3385 3387 506a8a 3384->3387 3388 506a7d DeleteFileA 3384->3388 3515 5067c2 3385->3515 3387->3369 3390 506a8f GlobalFree 3387->3390 3388->3387 3389 506a64 3520 506895 lstrlen wsprintfA lstrlen wsprintfA lstrlen 3389->3520 3390->3369 3393 506a9c 3393->3369 3394 506aa4 DeleteFileA 3393->3394 3394->3369 3396 507253 3395->3396 3397 507208 3395->3397 3396->3353 3610 506b89 3397->3610 3399 50721e 3399->3396 3400 507258 lstrcpy 3399->3400 3401 507271 3400->3401 3404 507280 htons 3401->3404 3410 5072e8 3401->3410 3413 5072aa 3401->3413 3616 506b54 inet_addr 3401->3616 3403 5072fd lstrcpy 3403->3413 3620 506e01 3404->3620 3405 507367 3649 507093 wsprintfA wsprintfA RegOpenKeyExA 3405->3649 3407 5072cd lstrcpy lstrcat 3407->3413 3408 506b54 2 API calls 3408->3413 3410->3353 3411 507328 htons 3412 506e01 16 API calls 3411->3412 3412->3413 3413->3403 3413->3405 3413->3407 3413->3408 3413->3410 3413->3411 3415 50488f 3414->3415 3416 504895 3415->3416 3417 50487d lstrcmpiA 3415->3417 3416->3356 3417->3415 3418 504899 3417->3418 3418->3356 3434 503e35 GetModuleHandleA 3419->3434 3423 5048da GetProcessHeap RtlAllocateHeap 3422->3423 3426 5048af 3422->3426 3424 5048f4 3423->3424 3425 5048f9 memset lstrcpyn GetTickCount 3423->3425 3424->3365 3425->3424 3426->3423 3426->3424 3427 504936 GetTickCount 3426->3427 3428 50400c 2 API calls 3427->3428 3429 504953 lstrcpyn 3428->3429 3429->3424 3431 504014 3430->3431 3432 50402d 3430->3432 3433 504015 GetProcessHeap HeapFree 3431->3433 3432->3363 3433->3432 3433->3433 3435 503e56 GetProcAddress 3434->3435 3436 503e4b LoadLibraryA 3434->3436 3437 503e7a 3435->3437 3438 503e66 3435->3438 3436->3435 3436->3437 3437->3360 3437->3361 3438->3437 3439 503e98 GetProcessHeap RtlAllocateHeap 3438->3439 3439->3437 3440 503eae memset lstrcpyn 3439->3440 3440->3438 3442 505a27 lstrcpy 3441->3442 3442->3374 3445 505a60 3444->3445 3446 505b25 3444->3446 3448 505ab7 lstrcpy lstrcat 3445->3448 3447 505b61 3446->3447 3452 505bba lstrcpy 3446->3452 3449 505b95 lstrcat lstrcpy 3447->3449 3453 505ad1 3448->3453 3450 505bd2 3449->3450 3455 505bf9 strstr 3450->3455 3451 505af5 lstrcat lstrcat lstrcat lstrcpy lstrcat 3451->3450 3454 505a21 lstrcpy 3452->3454 3453->3451 3454->3450 3456 505c13 3455->3456 3457 505c6e 3455->3457 3456->3457 3458 505c26 3456->3458 3461 505d08 lstrcpy 3457->3461 3462 505c81 3457->3462 3459 505c48 lstrcpy lstrcpy lstrcpy 3458->3459 3460 505dc3 3459->3460 3468 505dc7 3460->3468 3461->3462 3463 505d63 lstrcpy wsprintfA 3462->3463 3464 505d99 3463->3464 3465 505db7 3464->3465 3466 505dbc CharUpperA 3464->3466 3467 505dac CharUpperBuffA 3464->3467 3465->3460 3465->3466 3466->3460 3467->3460 3469 505dd0 3468->3469 3470 505e98 lstrcpy 3469->3470 3471 505dde 3469->3471 3470->3471 3472 505ece 3471->3472 3473 505ed3 CharUpperA 3471->3473 3474 505ebd CharUpperBuffA 3471->3474 3472->3473 3475 505ee0 3472->3475 3473->3475 3474->3475 3476 505faf 3475->3476 3477 505fcb 3476->3477 3478 505ff0 GetModuleFileNameA 3477->3478 3479 506014 GetTempPathA 3477->3479 3529 505f2a GetTempPathA GetTempFileNameA CopyFileA 3478->3529 3481 506036 GetTempFileNameA GetModuleFileNameA CopyFileA 3479->3481 3482 50632b 3479->3482 3534 505ee3 CreateFileA 3481->3534 3482->3369 3482->3383 3485 5062d0 CreateFileA 3487 5062f7 3485->3487 3495 50631d 3485->3495 3486 50600e 3486->3485 3491 50625d GetTempPathA GetTempFileNameA 3486->3491 3488 5062fc GetFileSize CloseHandle 3487->3488 3487->3495 3488->3482 3488->3495 3489 5060b8 3492 5060e2 3489->3492 3493 5060ef lstrcpy lstrcat 3489->3493 3490 506339 DeleteFileA 3490->3482 3494 5057e6 27 API calls 3491->3494 3541 5057e6 CreateFileA 3492->3541 3504 50611c 3493->3504 3496 50629f 3494->3496 3495->3482 3495->3490 3497 5062b5 DeleteFileA lstrcpy 3496->3497 3498 5062a6 DeleteFileA 3496->3498 3497->3485 3498->3485 3501 506219 DeleteFileA wsprintfA 3501->3486 3502 50614f lstrcat 3503 50615d 3502->3503 3505 506185 lstrcat 3503->3505 3506 506172 lstrcat 3503->3506 3504->3502 3507 506198 3505->3507 3506->3505 3506->3506 3508 5061d7 lstrcat 3507->3508 3509 5061ac 3507->3509 3512 5061c1 lstrcat 3508->3512 3510 5061c8 lstrcat 3509->3510 3511 5061af 3509->3511 3510->3512 3511->3512 3513 5061b2 lstrcat 3511->3513 3512->3492 3513->3512 3516 5067de 3515->3516 3517 5067ea 8 API calls 3516->3517 3576 5032cb 3517->3576 3519 506869 lstrcat lstrlen wsprintfA lstrcat 3519->3389 3582 506518 3520->3582 3522 5068ea lstrcat 3523 5068fd 3522->3523 3524 506915 lstrlen wsprintfA lstrlen 3523->3524 3586 50666d CreateFileA 3524->3586 3527 506947 3527->3384 3527->3393 3528 50694c lstrlen wsprintfA 3528->3527 3530 505ee3 18 API calls 3529->3530 3531 505f87 3530->3531 3532 505f93 DeleteFileA 3531->3532 3533 505f9a lstrcpy 3531->3533 3532->3533 3533->3486 3535 505f07 3534->3535 3536 505f28 GetTempPathA GetTempFileNameA 3534->3536 3537 503697 6 API calls 3535->3537 3536->3482 3536->3489 3538 505f11 SetFilePointer 3537->3538 3557 50754a 3538->3557 3542 505a19 3541->3542 3543 50581c 3541->3543 3542->3490 3542->3501 3543->3542 3544 505824 CreateFileA 3543->3544 3545 505843 3544->3545 3546 505a14 3544->3546 3545->3546 3548 50584b memset memset memset 3545->3548 3547 505a07 CloseHandle 3546->3547 3547->3542 3565 505717 GetSystemTime 3548->3565 3552 5058b7 8 API calls 3553 50595b ReadFile 3552->3553 3554 50593c 3553->3554 3555 50597c 6 API calls 3553->3555 3554->3555 3556 505941 WriteFile 3554->3556 3555->3547 3556->3553 3558 5073e8 5 API calls 3557->3558 3559 507560 CreateFileA 3558->3559 3560 505f20 CloseHandle 3559->3560 3561 507588 3559->3561 3560->3536 3562 5075cd ReadFile 3561->3562 3563 5075a5 WriteFile 3562->3563 3564 5075d7 CloseHandle 3562->3564 3563->3562 3564->3560 3566 50574a 3565->3566 3567 505772 SetFilePointer 3566->3567 3568 5057b9 ReadFile 3567->3568 3569 5057d2 SetFilePointer 3568->3569 3571 50579c 3568->3571 3569->3552 3571->3568 3571->3569 3572 5056d5 3571->3572 3573 5056de 3572->3573 3575 5056e3 3572->3575 3574 50568c malloc 3573->3574 3574->3575 3575->3571 3577 5032e8 FileTimeToLocalFileTime FileTimeToSystemTime 3576->3577 3578 5032dc GetLocalTime 3576->3578 3579 503303 GetTimeZoneInformation 3577->3579 3578->3579 3580 503319 wsprintfA 3579->3580 3580->3519 3584 506521 3582->3584 3583 50652f 3583->3522 3584->3583 3593 50641f 3584->3593 3587 50669c 3586->3587 3592 5066a4 3586->3592 3587->3527 3587->3528 3588 5066bb ReadFile 3590 50677d 3588->3590 3588->3592 3589 5067ab CloseHandle 3589->3587 3590->3589 3591 506767 memset 3591->3592 3592->3588 3592->3591 3597 50642d 3593->3597 3595 506509 lstrlen 3595->3597 3596 506452 3596->3583 3597->3596 3598 50641f 7 API calls 3597->3598 3599 506346 3597->3599 3598->3597 3600 5063b1 3599->3600 3604 506351 3599->3604 3601 5063b6 3600->3601 3608 5063d3 3600->3608 3602 5063bb 3601->3602 3601->3604 3605 5032cb GetLocalTime FileTimeToLocalFileTime FileTimeToSystemTime GetTimeZoneInformation wsprintfA 3602->3605 3607 506361 3602->3607 3603 506381 lstrcpy 3603->3595 3604->3603 3604->3607 3606 5063c8 3605->3606 3606->3595 3607->3595 3609 506400 wsprintfA 3608->3609 3609->3607 3613 506ba1 3610->3613 3615 506c8e 3610->3615 3611 506c38 lstrlen 3612 506c4e lstrlen 3611->3612 3611->3613 3612->3613 3613->3611 3614 506c6d CharLowerA lstrcmpiA 3613->3614 3613->3615 3614->3613 3614->3615 3615->3399 3617 506b6c gethostbyname 3616->3617 3618 506b63 3616->3618 3619 506b77 3617->3619 3618->3617 3618->3619 3619->3401 3621 506b89 4 API calls 3620->3621 3622 506e25 3621->3622 3623 506b89 4 API calls 3622->3623 3626 506e82 3622->3626 3624 506e4d 3623->3624 3625 506e8a lstrcpy socket 3624->3625 3624->3626 3625->3626 3627 506eb8 connect 3625->3627 3626->3401 3628 50707a closesocket 3627->3628 3629 506ecd 3627->3629 3628->3626 3660 506d65 3629->3660 3633 506d65 5 API calls 3634 506f12 3633->3634 3635 506f39 3634->3635 3636 506d65 5 API calls 3634->3636 3635->3628 3637 506d65 5 API calls 3635->3637 3636->3635 3638 506f6e 3637->3638 3638->3628 3639 506d65 5 API calls 3638->3639 3640 506fa0 3639->3640 3640->3628 3641 506d65 5 API calls 3640->3641 3643 506fc1 3641->3643 3642 507042 send 3644 506d65 5 API calls 3642->3644 3643->3628 3643->3642 3645 507017 send 3643->3645 3646 507028 send 3643->3646 3647 50705b 3644->3647 3645->3646 3646->3628 3646->3643 3647->3628 3648 506d65 5 API calls 3647->3648 3648->3628 3650 507103 3649->3650 3651 5070fb 3649->3651 3652 5071d5 RegEnumKeyA 3650->3652 3656 5071bc RegCloseKey 3650->3656 3657 506b54 2 API calls 3650->3657 3658 50718f htons 3650->3658 3651->3410 3653 5071e2 RegCloseKey 3652->3653 3654 507123 RegOpenKeyExA 3652->3654 3653->3651 3654->3650 3655 507148 memset RegQueryValueExA 3654->3655 3655->3650 3655->3656 3656->3650 3656->3653 3657->3650 3659 506e01 16 API calls 3658->3659 3659->3650 3661 506d78 wvsprintfA lstrlen send 3660->3661 3664 506daa 3660->3664 3661->3664 3663 506dfb 3663->3628 3663->3633 3664->3663 3665 506ab8 3664->3665 3666 506b41 3665->3666 3669 506acf 3665->3669 3666->3664 3667 506b1c recv 3667->3666 3667->3669 3668 506adf select 3668->3666 3668->3667 3669->3666 3669->3667 3669->3668 3678 503ef3 GetModuleHandleA 3679 503f11 LoadLibraryA 3678->3679 3680 503f0c 3678->3680 3681 503f18 3679->3681 3680->3679 3680->3681 3682 503ff1 3681->3682 3683 503f29 GetProcAddress 3681->3683 3683->3682 3684 503f3f GetProcessHeap RtlAllocateHeap 3683->3684 3688 503f63 3684->3688 3685 503fde GetProcessHeap HeapFree 3685->3682 3686 503f80 htons inet_addr 3687 503fa5 gethostbyname 3686->3687 3686->3688 3687->3688 3688->3682 3688->3685 3688->3686 3688->3687 3690 503dff 3688->3690 3692 503e06 3690->3692 3693 503e30 3692->3693 3694 503e22 Sleep 3692->3694 3695 503b7c GetProcessHeap RtlAllocateHeap 3692->3695 3693->3688 3694->3692 3694->3693 3696 503bb3 socket 3695->3696 3697 503bac 3695->3697 3698 503de7 GetProcessHeap HeapFree 3696->3698 3699 503bce 3696->3699 3697->3692 3698->3697 3699->3698 3707 503bd7 3699->3707 3700 503bf5 htons 3715 503819 memset GetTickCount htons 3700->3715 3702 503c1b select 3704 503c4d memset recv 3702->3704 3702->3707 3703 503db8 3705 503dc7 GetProcessHeap HeapFree closesocket 3703->3705 3704->3707 3705->3697 3706 503c7d htons 3706->3703 3706->3707 3707->3700 3707->3702 3707->3703 3707->3705 3707->3706 3708 503c9e htons 3707->3708 3711 503d08 GetProcessHeap RtlAllocateHeap 3707->3711 3714 503d61 GetProcessHeap HeapFree 3707->3714 3718 503a35 3707->3718 3732 503a16 3707->3732 3708->3703 3708->3707 3711->3707 3712 503d23 memset htons 3711->3712 3728 503983 3712->3728 3714->3707 3716 5038d7 htons htons sendto 3715->3716 3717 503881 3715->3717 3716->3707 3717->3716 3719 503a56 3718->3719 3721 503a4f 3718->3721 3736 50392a htons 3719->3736 3721->3707 3722 503aa2 memset 3723 503983 htons 3722->3723 3727 503a66 3723->3727 3724 503ad8 htons htons htons 3724->3721 3725 503b13 GetProcessHeap RtlAllocateHeap 3724->3725 3725->3721 3726 503b31 memset 3725->3726 3726->3727 3727->3721 3727->3722 3727->3724 3729 5039f5 3728->3729 3731 50399b 3728->3731 3729->3707 3730 5039d5 htons 3730->3729 3730->3731 3731->3729 3731->3730 3733 503a1a 3732->3733 3735 503a33 3732->3735 3734 503a1b GetProcessHeap HeapFree 3733->3734 3734->3734 3734->3735 3735->3707 3737 50397d 3736->3737 3738 503948 3736->3738 3737->3727 3738->3737 3739 50396e htons 3738->3739 3739->3737 3739->3738 3670 5011c9 3671 5011e3 3670->3671 3672 502d0f RegOpenKeyExA 3671->3672 3674 502d3a 3671->3674 3672->3671 3673 502d83 RegCloseKey 3672->3673 3675 502d7e 3673->3675 3674->3675 3676 502d43 RegCreateKeyExA 3674->3676 3676->3674 3677 502d6c RegCloseKey 3676->3677 3677->3674

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 6 5052ad-5052bd 7 5052cb-5052cd 6->7 8 5052bf-5052c4 6->8 10 5052ce-5052d1 7->10 8->7 9 5052c6-5052c9 8->9 9->7 11 5052dd-5052e3 9->11 12 5052d2-5052d7 Sleep 11->12 13 5052e5-50530e lstrcpy lstrlen 11->13 12->11 14 505310-50531c lstrcat 13->14 15 505322-505349 lstrcat memset 13->15 14->15 16 50534c-505356 15->16 17 505358-50536b FindFirstFileA 16->17 18 50537b-505386 FindNextFileA 16->18 19 505370-505373 17->19 20 50536d 17->20 21 505438-50543b FindClose 18->21 22 50538c-505393 18->22 23 505441-505444 19->23 24 505379 19->24 20->19 21->23 25 5053b0-5053cd lstrcpy lstrlen 22->25 26 505395-50539c 22->26 23->10 24->22 28 5053e1-5053fc lstrcat 25->28 29 5053cf-5053db lstrcat 25->29 26->16 27 50539e-5053a5 26->27 27->25 30 5053a7-5053ae 27->30 31 50541e-50542b call 505131 28->31 32 5053fe-505412 Sleep call 5052ad 28->32 29->28 30->16 30->25 35 505430-505433 31->35 36 505417-505419 32->36 35->16 36->16
                                              APIs
                                              • Sleep.KERNEL32(00000800,76228A60,00000184), ref: 005052D7
                                              • lstrcpy.KERNEL32(?,?), ref: 005052F4
                                              • lstrlen.KERNEL32(?), ref: 00505304
                                              • lstrcat.KERNEL32(?,00501190), ref: 0050531C
                                              • lstrcat.KERNEL32(?,*.*), ref: 0050532E
                                              • memset.MSVCRT ref: 00505341
                                              • FindFirstFileA.KERNELBASE(?,00000010), ref: 0050535F
                                              • FindNextFileA.KERNELBASE(?,?), ref: 0050537E
                                              • lstrcpy.KERNEL32(?,?), ref: 005053BA
                                              • lstrlen.KERNEL32(?), ref: 005053C3
                                              • lstrcat.KERNEL32(?,00501190), ref: 005053DB
                                              • lstrcat.KERNEL32(?,0000002E), ref: 005053EF
                                              • Sleep.KERNELBASE(0000004B), ref: 00505400
                                              • FindClose.KERNELBASE(?), ref: 0050543B
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2204036339.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000000.00000002.2204022399.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204184037.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204200248.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_500000_ .jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: lstrcat$Find$FileSleeplstrcpylstrlen$CloseFirstNextmemset
                                              • String ID: *.*$.$.
                                              • API String ID: 56755240-1892373925
                                              • Opcode ID: 4a0de44cde8d01dfa769ae8b9abc51166f6d7055e572fb8d163d85066ff3cfd8
                                              • Instruction ID: dd7eaa64cc3021d8f9cf9a778dce5b9b88d54ccfb1cc30c989f9fa4e0a5d9972
                                              • Opcode Fuzzy Hash: 4a0de44cde8d01dfa769ae8b9abc51166f6d7055e572fb8d163d85066ff3cfd8
                                              • Instruction Fuzzy Hash: 3B417B71C40A5DEBDF219BA0DC4DBDEBF7CBB05301F1084A2E645A2090E7749A89DF95
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • RegOpenKeyExA.KERNELBASE(?,Software\Microsoft\Daemon,00000000,00020019,?), ref: 00502D27
                                              • RegCreateKeyExA.KERNELBASE(00000002,00000053,00000000,00000000,00000000,00020006,00000000,?,?), ref: 00502D62
                                              • RegCloseKey.KERNELBASE(?), ref: 00502D6F
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2204036339.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000000.00000002.2204022399.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204184037.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204200248.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_500000_ .jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: CloseCreateOpen
                                              • String ID: "%s"$"%s"$"%s"$%P$1&lo$Software\Microsoft\Daemon$UTF-$fp-t$mss&
                                              • API String ID: 199004384-1742729895
                                              • Opcode ID: 54c313d72eed5809ea717c3aaa2ef99b5af84961543d7f94290a47e14dd327ee
                                              • Instruction ID: 5ddebe979ae4482ff55674c5fd03efcc6dad104ab151d763a66a24a0e48becba
                                              • Opcode Fuzzy Hash: 54c313d72eed5809ea717c3aaa2ef99b5af84961543d7f94290a47e14dd327ee
                                              • Instruction Fuzzy Hash: 3A13CA6284DBD54ECB278B704A6E26D7FA5BB23310B1D49CEC8818B1F3D2589905D36F
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 923 504e00-504e21 GetProcessHeap RtlAllocateHeap 924 504e23-504e26 923->924 925 504e2b-504e4a CreateFileA 923->925 926 504ee7-504ee9 924->926 927 504ed0-504ed2 925->927 928 504e50-504e53 925->928 929 504ed3-504ee6 GetProcessHeap HeapFree 927->929 928->927 930 504e55-504e71 928->930 929->926 931 504eb6-504ec0 ReadFile 930->931 932 504ec2-504ece FindCloseChangeNotification 931->932 933 504e73-504e75 931->933 932->929 934 504e77-504e79 933->934 935 504e7c-504e9f call 504c29 call 504d0c 933->935 934->935 940 504ea1-504ea8 935->940 941 504eaa-504eb3 935->941 940->932 940->941 941->931
                                              APIs
                                              • GetProcessHeap.KERNEL32(00000000,00008010,?,?,?,?,0050477B,00000000), ref: 00504E0F
                                              • RtlAllocateHeap.NTDLL(00000000), ref: 00504E16
                                              • CreateFileA.KERNELBASE({GP,80000000,00000003,00000000,00000003,00000080,00000000,00000200,?,?,?,?,0050477B,00000000), ref: 00504E3F
                                              • ReadFile.KERNELBASE(00000000,?,00008000,?,00000000,?,?,?,?,?,0050477B,00000000), ref: 00504EB9
                                              • FindCloseChangeNotification.KERNELBASE(?,?,?,?,?,?,?,?,0050477B,00000000), ref: 00504EC5
                                              • GetProcessHeap.KERNEL32(00000000,?,?,?,?,?,0050477B,00000000), ref: 00504ED7
                                              • HeapFree.KERNEL32(00000000,?,?,?,?,0050477B,00000000), ref: 00504EDE
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2204036339.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000000.00000002.2204022399.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204184037.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204200248.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_500000_ .jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Heap$FileProcess$AllocateChangeCloseCreateFindFreeNotificationRead
                                              • String ID: {GP
                                              • API String ID: 3486390565-1941362325
                                              • Opcode ID: 428cdfe4e4e56a777748bbb5e178a34146adc0e2ef22d4898716c37ae4cd4343
                                              • Instruction ID: cde6f649d8a6e970d913e8d6152b8159acc1393c7919c2b618bcbc601deb3034
                                              • Opcode Fuzzy Hash: 428cdfe4e4e56a777748bbb5e178a34146adc0e2ef22d4898716c37ae4cd4343
                                              • Instruction Fuzzy Hash: 8A216BB5D00208FBDF119FA4DD48AAEBFBDFB04394F204469F642A2190D3304E54AF66
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              APIs
                                              • FindWindowA.USER32(rctrl_renwnd32,00000000), ref: 0050312A
                                                • Part of subcall function 005030F0: PostMessageA.USER32(?,00000012,00000000,00000000), ref: 00503108
                                                • Part of subcall function 005030F0: PostMessageA.USER32(?,00000010,00000000,00000000), ref: 0050310F
                                                • Part of subcall function 005030F0: PostMessageA.USER32(?,00000002,00000000,00000000), ref: 00503116
                                              • FindWindowA.USER32(ATH_Note,00000000), ref: 0050313A
                                              • FindWindowA.USER32(IEFrame,00000000), ref: 0050314A
                                              • RtlExitUserThread.NTDLL(00000000), ref: 00503155
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2204036339.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000000.00000002.2204022399.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204184037.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204200248.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_500000_ .jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: FindMessagePostWindow$ExitThreadUser
                                              • String ID: ATH_Note$IEFrame$rctrl_renwnd32
                                              • API String ID: 2235905160-3881057634
                                              • Opcode ID: 3dc4a38075e9342e6b02805258b341f4c805c4931865141f3460f12dc90b924c
                                              • Instruction ID: a650038179976161dc88b4fd2029094447a0c5a8afe537662e8923af550cda7c
                                              • Opcode Fuzzy Hash: 3dc4a38075e9342e6b02805258b341f4c805c4931865141f3460f12dc90b924c
                                              • Instruction Fuzzy Hash: 79D06776AC172579E63C33B96D1FF9E1E1CAB44B61F200406B2459A4C35DE4664085BE
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 988 503620-503662 GetModuleHandleA 989 503672-503680 GetProcAddress 988->989 990 503664-503670 LoadLibraryA 988->990 991 503682-503686 989->991 992 503687-503696 InternetGetConnectedState 989->992 990->989 990->991
                                              APIs
                                              • GetModuleHandleA.KERNEL32(?), ref: 0050365A
                                              • LoadLibraryA.KERNELBASE(wininet.dll), ref: 00503668
                                              • GetProcAddress.KERNEL32(00000000,InternetGetConnectedState), ref: 00503678
                                              • InternetGetConnectedState.WININET(?,00000000), ref: 0050368D
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2204036339.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000000.00000002.2204022399.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204184037.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204200248.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_500000_ .jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: AddressConnectedHandleInternetLibraryLoadModuleProcState
                                              • String ID: InternetGetConnectedState$wininet.dll
                                              • API String ID: 1505668628-596207600
                                              • Opcode ID: 383ecea641d6cbcfcb23eacf179140b95e1886bb47d9fb192bb945b850ba0d9a
                                              • Instruction ID: 2b294e7ad4bcb9401aef01a1c95623af15c32a98deb04781e5990a6f2b8114d4
                                              • Opcode Fuzzy Hash: 383ecea641d6cbcfcb23eacf179140b95e1886bb47d9fb192bb945b850ba0d9a
                                              • Instruction Fuzzy Hash: 5F011620A083C9E9EF11D7F8D81DBAD7FA91B21748F0485D89185E61C1D7BB8358C776
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              APIs
                                              • RegOpenKeyExA.KERNELBASE(80000001,?,00000000,00020019,?,76230F00), ref: 005050BE
                                              • memset.MSVCRT ref: 005050D5
                                              • RegQueryValueExA.KERNELBASE(?,00000000,00000000,00000000,?,?), ref: 005050F5
                                              • RegCloseKey.KERNELBASE(?), ref: 005050FE
                                                • Part of subcall function 00504EEA: CreateFileA.KERNEL32(00000020,80000000,00000003,00000000,00000003,00000080,00000000,76230F10,00000000), ref: 00504F0C
                                                • Part of subcall function 00504EEA: GetFileSize.KERNEL32(00000000,00000000), ref: 00504F2A
                                                • Part of subcall function 00504EEA: CreateFileMappingA.KERNEL32(00000000,00000000,00000002,00000000,00000000,00000000), ref: 00504F3A
                                                • Part of subcall function 00504EEA: MapViewOfFile.KERNEL32(00000000,00000004,00000000,00000000,00000000,00000000), ref: 00504F5B
                                                • Part of subcall function 00504EEA: CloseHandle.KERNEL32(?), ref: 00504FD5
                                                • Part of subcall function 00504EEA: CloseHandle.KERNEL32(?), ref: 00504FDF
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2204036339.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000000.00000002.2204022399.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204184037.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204200248.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_500000_ .jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: File$Close$CreateHandle$MappingOpenQuerySizeValueViewmemset
                                              • String ID: $ $4$A$A$B$B$F$M$N$S$W$W$W$\$\$\$\$a$a$a$b$c$e$e$e$f$f$i$i$l$m$o$o$o$r$r$s$t$t$w
                                              • API String ID: 1447734293-2356155605
                                              • Opcode ID: d70b678158a2ddeabdc93fb81de4d72fe2e86aa731343c368a4f6e47c38d2075
                                              • Instruction ID: d5002688ff9bd9582a131d6a7ee4c8a73c9f60058928140604e211d2a98eee7b
                                              • Opcode Fuzzy Hash: d70b678158a2ddeabdc93fb81de4d72fe2e86aa731343c368a4f6e47c38d2075
                                              • Instruction Fuzzy Hash: 5141F050D082CDDDFB02C6A8D948BDEBFB55B26748F0840D8D5847A282D3FB1658C77A
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              APIs
                                              • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 00502E8E
                                              • lstrcpy.KERNEL32(.exe,?), ref: 00502EAB
                                              • GetWindowsDirectoryA.KERNEL32(?,00000118), ref: 00502EC7
                                              • GetTempPathA.KERNEL32(00000118,?), ref: 00502ED5
                                              • lstrlen.KERNEL32(?), ref: 00502EEE
                                              • lstrcat.KERNEL32(?,00501190), ref: 00502F0D
                                              • lstrcat.KERNEL32(?,java.exe), ref: 00502F1A
                                              • SetFileAttributesA.KERNELBASE(?,00000020), ref: 00502F25
                                              • CreateFileA.KERNELBASE(?,40000000,00000003,00000000,00000002,00000080,00000000), ref: 00502F42
                                              • CloseHandle.KERNEL32(00000000), ref: 00502F52
                                              • DeleteFileA.KERNELBASE(?), ref: 00502F5F
                                              • CopyFileA.KERNEL32(?,?,00000000), ref: 00502F74
                                              • GetFileAttributesA.KERNEL32(?), ref: 00502F85
                                              • lstrcpy.KERNEL32(?,?), ref: 00502FA9
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2204036339.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000000.00000002.2204022399.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204184037.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204200248.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_500000_ .jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: File$Attributeslstrcatlstrcpy$CloseCopyCreateDeleteDirectoryHandleModuleNamePathTempWindowslstrlen
                                              • String ID: .exe$java.exe
                                              • API String ID: 3096175462-2602780958
                                              • Opcode ID: 473512d9f1244c06d08cbd740965cc33da0b9b43a2f3904d5a041e8f1c7c422d
                                              • Instruction ID: dece3f8ae99a5382c4877d1b044eea6b25dfa7d2f7fe03871ebba1afd8658fdb
                                              • Opcode Fuzzy Hash: 473512d9f1244c06d08cbd740965cc33da0b9b43a2f3904d5a041e8f1c7c422d
                                              • Instruction Fuzzy Hash: 72416A7190429DAFEB10DBA4DC8DBDEBFBCAB18354F104096F585E6090DB749AC8CB21
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              APIs
                                                • Part of subcall function 0050746B: GetModuleFileNameA.KERNEL32(00000000,?,00000100,00000000,?), ref: 00507487
                                                • Part of subcall function 0050746B: CreateFileA.KERNELBASE(?,80000000,00000003,00000000,00000003,00000080,00000000), ref: 005074AA
                                                • Part of subcall function 0050746B: CreateFileA.KERNELBASE(?,C0000000,00000003,00000000,00000002,00000080,00000000), ref: 005074DC
                                                • Part of subcall function 0050746B: SetFilePointer.KERNELBASE(?,00000000,00000000,00000000), ref: 005074F5
                                                • Part of subcall function 0050746B: ReadFile.KERNELBASE(?,?,00000100,?,00000000), ref: 0050752E
                                                • Part of subcall function 0050746B: FindCloseChangeNotification.KERNELBASE(00000000), ref: 0050753E
                                                • Part of subcall function 0050746B: CloseHandle.KERNEL32(?), ref: 00507543
                                              • GetWindowsDirectoryA.KERNEL32(?,00000100,00000000,?), ref: 0050761F
                                                • Part of subcall function 0050737C: WriteFile.KERNELBASE(00000000,?,00000001,?,00000000,00000000,76228A60), ref: 005073BD
                                                • Part of subcall function 0050737C: WriteFile.KERNEL32(00000000,?,00000001,?,00000000,00000000,76228A60), ref: 005073E2
                                              • GetTempPathA.KERNEL32(00000100,?,00000000,?), ref: 0050762D
                                              • lstrcat.KERNEL32(?,services), ref: 00507677
                                              • lstrcat.KERNEL32(?,00501830), ref: 00507685
                                              • lstrcat.KERNEL32(?,exe), ref: 00507693
                                              • CreateFileA.KERNELBASE(?,C0000000,00000003,00000000,00000002,00000080,00000000), ref: 005076AC
                                              • FindCloseChangeNotification.KERNELBASE(00000000), ref: 005076D0
                                              • wsprintfA.USER32 ref: 005076E9
                                              • memset.MSVCRT ref: 005076F8
                                              • CreateProcessA.KERNELBASE(00000000,?,00000000,00000000,00000001,00000000,00000000,00000000,?,?), ref: 00507725
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2204036339.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000000.00000002.2204022399.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204184037.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204200248.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_500000_ .jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: File$Create$Closelstrcat$ChangeFindNotificationWrite$DirectoryHandleModuleNamePathPointerProcessReadTempWindowsmemsetwsprintf
                                              • String ID: "%s"$\$exe$services
                                              • API String ID: 1621132550-3764781487
                                              • Opcode ID: 4e5a91acdd77911c355f3c749416d69306de053efc37594798bdc49c714c615a
                                              • Instruction ID: 5cab7ea6ea662128e4a800645ff2ec6955619924f35eec1abec093929e757c50
                                              • Opcode Fuzzy Hash: 4e5a91acdd77911c355f3c749416d69306de053efc37594798bdc49c714c615a
                                              • Instruction Fuzzy Hash: 6D3184B1D04A9CEAEB109BA49C8DFEE7F7CFB48341F1004A1F245E61C1D6705E898A65
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 909 505449-5054fe 910 505503-50551f memset 909->910 911 505521-505527 GetWindowsDirectoryA 910->911 912 505529-50552e GetEnvironmentVariableA 910->912 913 505534-50553a 911->913 912->913 914 5055a2-5055a9 913->914 915 50553c-505554 lstrlen 913->915 914->910 918 5055af-5055b3 914->918 916 505564-505568 915->916 917 505556-505562 lstrcat 915->917 919 505585-50559b lstrcat call 5052ad 916->919 920 50556a-505583 lstrcat * 2 916->920 917->916 922 5055a0-5055a1 919->922 920->919 922->914
                                              APIs
                                              • memset.MSVCRT ref: 0050550C
                                              • GetWindowsDirectoryA.KERNEL32(?,00000184,00000000,76230F10,76230F00), ref: 00505521
                                              • GetEnvironmentVariableA.KERNEL32(USERPROFILE,?,00000184,00000000,76230F10,76230F00), ref: 0050552E
                                              • lstrlen.KERNEL32(?), ref: 00505543
                                              • lstrcat.KERNEL32(?,00501190), ref: 00505562
                                              • lstrcat.KERNEL32(?,Local Settings), ref: 00505575
                                              • lstrcat.KERNEL32(?,00501190), ref: 00505583
                                              • lstrcat.KERNEL32(?,Temporary Internet Files), ref: 00505590
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2204036339.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000000.00000002.2204022399.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204184037.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204200248.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_500000_ .jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: lstrcat$DirectoryEnvironmentVariableWindowslstrlenmemset
                                              • String ID: Local Settings$Temporary Internet Files$USERPROFILE
                                              • API String ID: 527352983-4053592351
                                              • Opcode ID: d89d942958c9cba20cc904a98748bb533d06aa26e497641e0aaf6626ffe246d0
                                              • Instruction ID: cacbc361b4096883e695f9cd27b791d52763dfaa7485a7004b5a6053e68340e0
                                              • Opcode Fuzzy Hash: d89d942958c9cba20cc904a98748bb533d06aa26e497641e0aaf6626ffe246d0
                                              • Instruction Fuzzy Hash: 63410C61C083CCDAEB11D7A8D9087DEBFB95F26348F0840D9D18476282D7BA5758CB76
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 942 502fb0-5030ab RegOpenKeyExA 943 5030c2-5030e5 lstrlen RegSetValueExA RegCloseKey 942->943 944 5030ad-5030c0 RegOpenKeyExA 942->944 945 5030eb-5030ef 943->945 944->943 944->945
                                              APIs
                                              • RegOpenKeyExA.KERNELBASE(80000002,?,00000000,00020006,?), ref: 005030A7
                                              • RegOpenKeyExA.ADVAPI32(80000001,Software\Microsoft\Windows\CurrentVersion\Run,00000000,00020006,?), ref: 005030BC
                                              • lstrlen.KERNEL32(00000052), ref: 005030C9
                                              • RegSetValueExA.KERNELBASE(?,JavaVM,00000000,00000001,00000052,00000001), ref: 005030DC
                                              • RegCloseKey.ADVAPI32(?), ref: 005030E5
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2204036339.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000000.00000002.2204022399.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204184037.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204200248.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_500000_ .jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Open$CloseValuelstrlen
                                              • String ID: JavaVM$Software\Microsoft\Windows\CurrentVersion\Run
                                              • API String ID: 1812710942-1525231178
                                              • Opcode ID: e7c4ab6b2f41031e5725f1ab95989c2709ffec37f0edb752e120a5812798a4be
                                              • Instruction ID: cd70c8d2d714d64a17d00ab414c80a8edff05e1f62e6019a642830455d294362
                                              • Opcode Fuzzy Hash: e7c4ab6b2f41031e5725f1ab95989c2709ffec37f0edb752e120a5812798a4be
                                              • Instruction Fuzzy Hash: 6241BC10D0C2C9EDFB02C2A8D8487DEBFB65B26748F084099D5847A292C2FF1658C77A
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 946 503697-5036ce SetFilePointer ReadFile 947 5036d4-5036e1 SetFilePointer 946->947 948 503776 946->948 947->948 950 5036e7-5036fb ReadFile 947->950 949 503778-50377c 948->949 950->948 951 5036fd-50370f 950->951 951->948 952 503711-503715 951->952 952->948 953 503717-50371c 952->953 953->948 954 50371e-50373d SetFilePointer 953->954 955 503772-503774 954->955 956 50373f-503756 ReadFile 954->956 955->949 956->948 957 503758-503762 956->957 958 503764 957->958 959 503766-503770 957->959 958->959 959->955 959->956
                                              APIs
                                              • SetFilePointer.KERNELBASE(00000000,0000003C,00000000,00000000,00000100,00000000,76233130), ref: 005036AF
                                              • ReadFile.KERNELBASE(00000000,00000000,00000004,?,00000000), ref: 005036C8
                                              • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00000000), ref: 005036DC
                                              • ReadFile.KERNELBASE(00000000,?,00000016,00000004,00000000), ref: 005036F5
                                              • SetFilePointer.KERNELBASE(00000000,00000018,00000000,00000000), ref: 00503732
                                              • ReadFile.KERNEL32(00000000,?,00000028,00000500,00000000), ref: 00503750
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2204036339.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000000.00000002.2204022399.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204184037.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204200248.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_500000_ .jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: File$PointerRead
                                              • String ID: (
                                              • API String ID: 3154509469-3887548279
                                              • Opcode ID: 8d052d63ba2457e03fe9d7e8e13cec42e15aac050f382052b2be9159c5306ec8
                                              • Instruction ID: f73d0bf622d8b4d7441a19c50e1fac5286902f701a87a8b44225c7f7ee392bb3
                                              • Opcode Fuzzy Hash: 8d052d63ba2457e03fe9d7e8e13cec42e15aac050f382052b2be9159c5306ec8
                                              • Instruction Fuzzy Hash: 8C3106B6901118FBDF21DF95CE849EEBFBDFF04790F108065E905A2190E6319B81DBA0
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              APIs
                                              • GetModuleFileNameA.KERNEL32(00000000,?,00000100,00000000,?), ref: 00507487
                                              • CreateFileA.KERNELBASE(?,80000000,00000003,00000000,00000003,00000080,00000000), ref: 005074AA
                                                • Part of subcall function 005073E8: GetTempPathA.KERNEL32(00000104,?), ref: 005073FD
                                                • Part of subcall function 005073E8: lstrlen.KERNEL32(?), ref: 0050740A
                                                • Part of subcall function 005073E8: lstrcat.KERNEL32(?,zincite), ref: 00507448
                                                • Part of subcall function 005073E8: lstrcat.KERNEL32(?,.log), ref: 00507456
                                                • Part of subcall function 005073E8: lstrcpy.KERNEL32(?,?), ref: 00507462
                                              • CreateFileA.KERNELBASE(?,C0000000,00000003,00000000,00000002,00000080,00000000), ref: 005074DC
                                                • Part of subcall function 00503697: SetFilePointer.KERNELBASE(00000000,0000003C,00000000,00000000,00000100,00000000,76233130), ref: 005036AF
                                                • Part of subcall function 00503697: ReadFile.KERNELBASE(00000000,00000000,00000004,?,00000000), ref: 005036C8
                                                • Part of subcall function 00503697: SetFilePointer.KERNELBASE(00000000,00000000,00000000,00000000), ref: 005036DC
                                                • Part of subcall function 00503697: ReadFile.KERNELBASE(00000000,?,00000016,00000004,00000000), ref: 005036F5
                                                • Part of subcall function 00503697: SetFilePointer.KERNELBASE(00000000,00000018,00000000,00000000), ref: 00503732
                                                • Part of subcall function 00503697: ReadFile.KERNEL32(00000000,?,00000028,00000500,00000000), ref: 00503750
                                              • SetFilePointer.KERNELBASE(?,00000000,00000000,00000000), ref: 005074F5
                                              • WriteFile.KERNELBASE(00000000,?,?,?,00000000), ref: 00507515
                                              • ReadFile.KERNELBASE(?,?,00000100,?,00000000), ref: 0050752E
                                              • FindCloseChangeNotification.KERNELBASE(00000000), ref: 0050753E
                                              • CloseHandle.KERNEL32(?), ref: 00507543
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2204036339.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000000.00000002.2204022399.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204184037.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204200248.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_500000_ .jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: File$PointerRead$CloseCreatelstrcat$ChangeFindHandleModuleNameNotificationPathTempWritelstrcpylstrlen
                                              • String ID:
                                              • API String ID: 3217969230-0
                                              • Opcode ID: 945720a1fce9431e2360ffcd8314ee30a754bd9a45bede0f71f403d5586aa745
                                              • Instruction ID: 3ee29f7f2fe5b884bcaff3a16fbbd882d52692b313de89af8fed5149c55411fd
                                              • Opcode Fuzzy Hash: 945720a1fce9431e2360ffcd8314ee30a754bd9a45bede0f71f403d5586aa745
                                              • Instruction Fuzzy Hash: 1521F875D00128BBDB219BA1DC48FDEBF7CEF15360F104292B654A2090D6706B84DFA4
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 978 5055b4-505605 memset GetWindowsDirectoryA lstrcpy call 5052ad 980 50560a-505612 978->980 981 505613-505619 980->981 982 505648-505655 981->982 983 50561b-50562b GetDriveTypeA 981->983 982->981 985 505657-50565a 982->985 983->982 984 50562d-505647 Sleep call 5052ad 983->984 984->982
                                              APIs
                                              • memset.MSVCRT ref: 005055CE
                                              • GetWindowsDirectoryA.KERNEL32(?,00000104,?,76230F10,76230F00), ref: 005055DE
                                              • lstrcpy.KERNEL32(?,00501888), ref: 005055F6
                                              • GetDriveTypeA.KERNEL32(00000043,?,76230F10,76230F00), ref: 00505622
                                              • Sleep.KERNEL32(00001194,?,76230F10,76230F00), ref: 00505632
                                                • Part of subcall function 005052AD: Sleep.KERNEL32(00000800,76228A60,00000184), ref: 005052D7
                                                • Part of subcall function 005052AD: lstrcpy.KERNEL32(?,?), ref: 005052F4
                                                • Part of subcall function 005052AD: lstrlen.KERNEL32(?), ref: 00505304
                                                • Part of subcall function 005052AD: lstrcat.KERNEL32(?,00501190), ref: 0050531C
                                                • Part of subcall function 005052AD: lstrcat.KERNEL32(?,*.*), ref: 0050532E
                                                • Part of subcall function 005052AD: memset.MSVCRT ref: 00505341
                                                • Part of subcall function 005052AD: FindFirstFileA.KERNELBASE(?,00000010), ref: 0050535F
                                                • Part of subcall function 005052AD: FindNextFileA.KERNELBASE(?,?), ref: 0050537E
                                                • Part of subcall function 005052AD: lstrcpy.KERNEL32(?,?), ref: 005053BA
                                                • Part of subcall function 005052AD: lstrlen.KERNEL32(?), ref: 005053C3
                                                • Part of subcall function 005052AD: lstrcat.KERNEL32(?,00501190), ref: 005053DB
                                                • Part of subcall function 005052AD: lstrcat.KERNEL32(?,0000002E), ref: 005053EF
                                                • Part of subcall function 005052AD: Sleep.KERNELBASE(0000004B), ref: 00505400
                                                • Part of subcall function 005052AD: FindClose.KERNELBASE(?), ref: 0050543B
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2204036339.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000000.00000002.2204022399.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204184037.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204200248.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_500000_ .jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: lstrcat$FindSleeplstrcpy$Filelstrlenmemset$CloseDirectoryDriveFirstNextTypeWindows
                                              • String ID: Z
                                              • API String ID: 798667630-1505515367
                                              • Opcode ID: c6931e2ca908d11bfe10dd74d10df2d0473876e0ea701a3d5757cf76e3dc8de0
                                              • Instruction ID: c2197e004829da8253717f8257516700dd35be32272eb9ca971d862e6122c766
                                              • Opcode Fuzzy Hash: c6931e2ca908d11bfe10dd74d10df2d0473876e0ea701a3d5757cf76e3dc8de0
                                              • Instruction Fuzzy Hash: B5016DB5D046AA6BDB2093609D89BDE7B6CAB21314F0404D1E389E20C1E6B49AC88F55
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 993 502c90-502d0a 996 502d0f-502d2f RegOpenKeyExA 993->996 997 502d31-502d38 996->997 998 502d83-502d8c RegCloseKey 996->998 997->996 1000 502d3a-502d40 997->1000 999 502d7e-502d82 998->999 1001 502d43-502d6a RegCreateKeyExA 1000->1001 1002 502d75-502d7c 1001->1002 1003 502d6c-502d6f RegCloseKey 1001->1003 1002->999 1002->1001 1003->1002
                                              APIs
                                              • RegOpenKeyExA.KERNELBASE(?,Software\Microsoft\Daemon,00000000,00020019,?), ref: 00502D27
                                              • RegCreateKeyExA.KERNELBASE(00000002,00000053,00000000,00000000,00000000,00020006,00000000,?,?), ref: 00502D62
                                              • RegCloseKey.KERNELBASE(?), ref: 00502D6F
                                              • RegCloseKey.ADVAPI32(?), ref: 00502D86
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2204036339.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000000.00000002.2204022399.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204184037.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204200248.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_500000_ .jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Close$CreateOpen
                                              • String ID: Software\Microsoft\Daemon
                                              • API String ID: 1299239824-1912283813
                                              • Opcode ID: dca647fb5f665cc76b449c390acf53b1ca5190e4f5961b617e44826d8c6e7f19
                                              • Instruction ID: a7eee4beb99658644a23fa6dbb2239ba827f2e479c7b42f201d4ea8a8906cff2
                                              • Opcode Fuzzy Hash: dca647fb5f665cc76b449c390acf53b1ca5190e4f5961b617e44826d8c6e7f19
                                              • Instruction Fuzzy Hash: 033168519082CDEDEF02C7A8C94C7DEBFB95F22748F084099D584BA182D3BA4B58C776
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1004 505131-50513b 1005 505141-505149 1004->1005 1006 5052ab-5052ac 1004->1006 1007 505167-50516c 1005->1007 1008 50514b-505150 1005->1008 1011 50518c-505198 1007->1011 1009 505152-505157 1008->1009 1010 505163-505165 1008->1010 1012 505159 1009->1012 1013 50515b-505161 1009->1013 1010->1007 1014 50516e-505189 lstrcpyn CharLowerA 1010->1014 1015 5051a4-5051a9 1011->1015 1016 50519a-50519f 1011->1016 1012->1013 1013->1008 1013->1010 1014->1011 1018 5051ab-5051ae 1015->1018 1019 5051bd-5051c2 1015->1019 1017 50525f-505266 1016->1017 1020 505271-505274 1017->1020 1021 505268-50526d 1017->1021 1018->1017 1022 5051b4-5051b7 1018->1022 1023 5051c4-5051c7 1019->1023 1024 5051de-5051e0 1019->1024 1028 505276 1020->1028 1029 5052a9-5052aa 1020->1029 1021->1020 1027 50526f 1021->1027 1022->1017 1022->1019 1030 5051d3-5051d6 1023->1030 1031 5051c9-5051ce 1023->1031 1025 5051e2-5051e5 1024->1025 1026 5051e7-5051e9 1024->1026 1025->1017 1025->1026 1032 5051f5-5051f7 1026->1032 1033 5051eb-5051ee 1026->1033 1027->1020 1034 505283-50528a 1028->1034 1029->1006 1035 5051d8-5051da 1030->1035 1036 50521f-505224 1030->1036 1031->1017 1042 505203-505205 1032->1042 1043 5051f9-5051fc 1032->1043 1040 5051f0-5051f3 1033->1040 1041 505207-50520a 1033->1041 1044 505278-50527d Sleep 1034->1044 1045 50528c-50528f 1034->1045 1035->1036 1037 5051dc 1035->1037 1038 505226-505229 1036->1038 1039 505237-50523e 1036->1039 1048 505230-505235 1037->1048 1038->1039 1049 50522b-50522e 1038->1049 1039->1029 1050 505240-505251 call 5033b4 1039->1050 1040->1017 1040->1032 1041->1036 1053 50520c-50520f 1041->1053 1042->1041 1052 505211-505213 1042->1052 1043->1036 1051 5051fe-505201 1043->1051 1044->1034 1046 505291-505294 call 504e00 1045->1046 1047 50529b-50529e 1045->1047 1058 505299 1046->1058 1047->1029 1055 5052a0-5052a3 call 504eea 1047->1055 1048->1017 1049->1039 1049->1048 1050->1029 1063 505253-50525c 1050->1063 1051->1017 1051->1042 1052->1036 1057 505215-505218 1052->1057 1053->1017 1053->1052 1062 5052a8 1055->1062 1057->1036 1061 50521a-50521d 1057->1061 1058->1062 1061->1017 1061->1036 1062->1029 1063->1017
                                              APIs
                                              • lstrcpyn.KERNEL32(?,00000070,0000000F,?,?,00505430,?), ref: 00505179
                                              • CharLowerA.USER32(?,?,?,00505430,?), ref: 00505183
                                              • Sleep.KERNEL32(00000800,?,762283C0,?,?,00505430,?), ref: 0050527D
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2204036339.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000000.00000002.2204022399.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204184037.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204200248.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_500000_ .jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: CharLowerSleeplstrcpyn
                                              • String ID: 0TP
                                              • API String ID: 267381043-1855386918
                                              • Opcode ID: 076539342993601403a397f8d3848ee9606f614aa553588212fb02b9d72115e3
                                              • Instruction ID: 8274f9cbfd694f8c2d5fe74a321f0c892786a0426ba65b7b33d98da66336cf23
                                              • Opcode Fuzzy Hash: 076539342993601403a397f8d3848ee9606f614aa553588212fb02b9d72115e3
                                              • Instruction Fuzzy Hash: 2841C168A44E4A4EFF344624C9497BF2F5B7FB2314F98491BD193420D3FA264C8ACE16
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1064 504ae2-504af0 1065 504b06-504b0d call 503620 1064->1065 1068 504af2-504af9 call 505127 1065->1068 1069 504b0f-504b2f call 505127 1065->1069 1076 504b00 Sleep 1068->1076 1074 504b31-504b36 1069->1074 1075 504b7a 1069->1075 1078 504b45-504b4c 1074->1078 1079 504b38-504b3b 1074->1079 1077 504b7c-504b80 1075->1077 1076->1065 1080 504b82-504b84 1077->1080 1081 504bd6-504be3 call 505127 1077->1081 1084 504b52-504b57 1078->1084 1085 504b4e 1078->1085 1082 504b43 1079->1082 1083 504b3d-504b41 1079->1083 1080->1081 1086 504b86-504b8d 1080->1086 1096 504be5-504bea 1081->1096 1097 504bcc-504bd1 1081->1097 1082->1078 1083->1078 1083->1082 1084->1074 1087 504b59-504b5f 1084->1087 1085->1084 1089 504b99-504bb3 CreateThread 1086->1089 1090 504b8f-504b94 1086->1090 1087->1075 1091 504b61-504b6e call 504a85 1087->1091 1093 504bb5-504bb8 1089->1093 1094 504bc8 1089->1094 1090->1076 1091->1077 1101 504b70-504b78 call 505127 1091->1101 1093->1094 1098 504bba-504bc3 CloseHandle 1093->1098 1094->1097 1096->1097 1100 504bec-504bfb GetTickCount 1096->1100 1097->1076 1098->1076 1100->1097 1102 504bfd-504c04 call 5047b7 1100->1102 1101->1077 1102->1076
                                              APIs
                                                • Part of subcall function 00503620: GetModuleHandleA.KERNEL32(?), ref: 0050365A
                                                • Part of subcall function 00503620: LoadLibraryA.KERNELBASE(wininet.dll), ref: 00503668
                                                • Part of subcall function 00503620: GetProcAddress.KERNEL32(00000000,InternetGetConnectedState), ref: 00503678
                                              • Sleep.KERNELBASE(00000001,?,?,?,?,?,?,00504C20), ref: 00504B00
                                              • CreateThread.KERNEL32(00000000,00000000,00504A37,00000000,00000000,?), ref: 00504BAB
                                              • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,00504C20), ref: 00504BBB
                                              • GetTickCount.KERNEL32 ref: 00504BEC
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2204036339.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000000.00000002.2204022399.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204184037.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204200248.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_500000_ .jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Handle$AddressCloseCountCreateLibraryLoadModuleProcSleepThreadTick
                                              • String ID:
                                              • API String ID: 50151514-0
                                              • Opcode ID: 7bd039e2053160122893935ea775d366336ab228428e61975a78905543a36c9c
                                              • Instruction ID: ab1ee794b50bf540a74e33d7e95b3844ad5376a59cf73203d230b0ff36f6ead8
                                              • Opcode Fuzzy Hash: 7bd039e2053160122893935ea775d366336ab228428e61975a78905543a36c9c
                                              • Instruction Fuzzy Hash: 2331BFF06047829AEB24AF749C9DF7FBED9BB90301F114A19F695C61D1EB60C844CE62
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                                • Part of subcall function 00502C90: RegOpenKeyExA.KERNELBASE(?,Software\Microsoft\Daemon,00000000,00020019,?), ref: 00502D27
                                                • Part of subcall function 00502C90: RegCreateKeyExA.KERNELBASE(00000002,00000053,00000000,00000000,00000000,00020006,00000000,?,?), ref: 00502D62
                                                • Part of subcall function 00502C90: RegCloseKey.KERNELBASE(?), ref: 00502D6F
                                              • CreateThread.KERNELBASE(00000000,00000000,Function_0000311C,00000000,00000000,?), ref: 00503239
                                              • Sleep.KERNELBASE ref: 00503253
                                              • CreateThread.KERNELBASE(00000000,00000000,Function_00004C1B,00000000,00000000,?), ref: 00503267
                                              • Sleep.KERNEL32(000003E8), ref: 00503278
                                                • Part of subcall function 00502D8E: memset.MSVCRT ref: 00502DA8
                                                • Part of subcall function 00502D8E: gethostname.WS2_32(?,00000100), ref: 00502DB8
                                                • Part of subcall function 00502D8E: lstrcat.KERNEL32(?,root), ref: 00502DD0
                                                • Part of subcall function 00502D8E: lstrcat.KERNEL32(00000000,00000000), ref: 00502E19
                                                • Part of subcall function 00502D8E: lstrcat.KERNEL32(00000000,00000000), ref: 00502E29
                                                • Part of subcall function 00502D8E: CreateMutexA.KERNEL32(00000000,00000001,00000000), ref: 00502E36
                                                • Part of subcall function 00502D8E: GetLastError.KERNEL32 ref: 00502E3C
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2204036339.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000000.00000002.2204022399.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204184037.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204200248.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_500000_ .jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Create$lstrcat$SleepThread$CloseErrorLastMutexOpengethostnamememset
                                              • String ID:
                                              • API String ID: 2995464708-0
                                              • Opcode ID: 5b84a6266cc0cddde8327f0e5fcd076bdfc815fbfa76804f980ebbea6f6bd2a6
                                              • Instruction ID: c3a13703e42c1b4ec363eec73e7dae4186dad5f565332290872ed40493be106c
                                              • Opcode Fuzzy Hash: 5b84a6266cc0cddde8327f0e5fcd076bdfc815fbfa76804f980ebbea6f6bd2a6
                                              • Instruction Fuzzy Hash: B701B13A14065676D71177729C4FDAF6F6CFFC6B11B10041AFA44920C2DE349A4589B9
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • WSAStartup.WS2_32(00000101,?), ref: 00503295
                                                • Part of subcall function 005033A8: GetTickCount.KERNEL32 ref: 005033A8
                                              • memset.MSVCRT ref: 005032AE
                                                • Part of subcall function 005031E4: CreateThread.KERNELBASE(00000000,00000000,Function_0000311C,00000000,00000000,?), ref: 00503239
                                                • Part of subcall function 005031E4: Sleep.KERNELBASE ref: 00503253
                                                • Part of subcall function 005031E4: CreateThread.KERNELBASE(00000000,00000000,Function_00004C1B,00000000,00000000,?), ref: 00503267
                                                • Part of subcall function 005031E4: Sleep.KERNEL32(000003E8), ref: 00503278
                                              • ExitProcess.KERNEL32 ref: 005032C4
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2204036339.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000000.00000002.2204022399.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204184037.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204200248.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_500000_ .jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: CreateSleepThread$CountExitProcessStartupTickmemset
                                              • String ID:
                                              • API String ID: 3857727052-0
                                              • Opcode ID: 88d01b5b5f6c5010676a2a66d5ceb351fe4fc908ad08d7981e774765898afe9f
                                              • Instruction ID: e6c800b91a5105f6af05a8ed022c94dfcb71a2cb97930a29ec3ddceb2131e2e1
                                              • Opcode Fuzzy Hash: 88d01b5b5f6c5010676a2a66d5ceb351fe4fc908ad08d7981e774765898afe9f
                                              • Instruction Fuzzy Hash: 93E08C309442086BEB50B7A0CC0EFDD7B2CAB14701F8008A1B284950D2EEA166C88AA6
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • GetCurrentThread.KERNEL32 ref: 0050565D
                                              • SetThreadPriority.KERNELBASE(00000000), ref: 00505664
                                                • Part of subcall function 00504FF8: RegOpenKeyExA.KERNELBASE(80000001,?,00000000,00020019,?,76230F00), ref: 005050BE
                                                • Part of subcall function 00504FF8: memset.MSVCRT ref: 005050D5
                                                • Part of subcall function 00504FF8: RegQueryValueExA.KERNELBASE(?,00000000,00000000,00000000,?,?), ref: 005050F5
                                                • Part of subcall function 00504FF8: RegCloseKey.KERNELBASE(?), ref: 005050FE
                                                • Part of subcall function 00505449: memset.MSVCRT ref: 0050550C
                                                • Part of subcall function 00505449: GetWindowsDirectoryA.KERNEL32(?,00000184,00000000,76230F10,76230F00), ref: 00505521
                                                • Part of subcall function 00505449: lstrlen.KERNEL32(?), ref: 00505543
                                                • Part of subcall function 00505449: lstrcat.KERNEL32(?,00501190), ref: 00505562
                                                • Part of subcall function 00505449: lstrcat.KERNEL32(?,Local Settings), ref: 00505575
                                                • Part of subcall function 00505449: lstrcat.KERNEL32(?,00501190), ref: 00505583
                                                • Part of subcall function 00505449: lstrcat.KERNEL32(?,Temporary Internet Files), ref: 00505590
                                                • Part of subcall function 005055B4: memset.MSVCRT ref: 005055CE
                                                • Part of subcall function 005055B4: GetWindowsDirectoryA.KERNEL32(?,00000104,?,76230F10,76230F00), ref: 005055DE
                                                • Part of subcall function 005055B4: lstrcpy.KERNEL32(?,00501888), ref: 005055F6
                                                • Part of subcall function 005055B4: GetDriveTypeA.KERNEL32(00000043,?,76230F10,76230F00), ref: 00505622
                                                • Part of subcall function 005055B4: Sleep.KERNEL32(00001194,?,76230F10,76230F00), ref: 00505632
                                              • Sleep.KERNEL32(000061A8), ref: 00505684
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2204036339.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000000.00000002.2204022399.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204184037.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204200248.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_500000_ .jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: lstrcat$memset$DirectorySleepThreadWindows$CloseCurrentDriveOpenPriorityQueryTypeValuelstrcpylstrlen
                                              • String ID:
                                              • API String ID: 1200182354-0
                                              • Opcode ID: d3dfe3ca985f4e689f16a7144f6eb9c4b7e5f550bcfda9f1fc34b3dd57ffe1dd
                                              • Instruction ID: a00bd4ce691c911287dc50f1ec9ddfcc97e79f3b0b06d643ae5355c187a33e16
                                              • Opcode Fuzzy Hash: d3dfe3ca985f4e689f16a7144f6eb9c4b7e5f550bcfda9f1fc34b3dd57ffe1dd
                                              • Instruction Fuzzy Hash: 94C0123100098687DF043BF49C1E49E3E21BFA13623384701F263840E3DF2004C86E2B
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • WriteFile.KERNELBASE(00000000,?,00000001,?,00000000,00000000,76228A60), ref: 005073BD
                                              • WriteFile.KERNEL32(00000000,?,00000001,?,00000000,00000000,76228A60), ref: 005073E2
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2204036339.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000000.00000002.2204022399.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204184037.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204200248.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_500000_ .jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: FileWrite
                                              • String ID:
                                              • API String ID: 3934441357-0
                                              • Opcode ID: 3c2d70d6b2ebeca3607b6924ad4f9547b586735f7dfb2575c4133ed41483a66d
                                              • Instruction ID: 22b37714542d64fe014a8661f32d504f0c3aa166d1667109d1551e00d35c67e0
                                              • Opcode Fuzzy Hash: 3c2d70d6b2ebeca3607b6924ad4f9547b586735f7dfb2575c4133ed41483a66d
                                              • Instruction Fuzzy Hash: DAF0C8B2D0025DBEEB00DB65CD49BEF7BACFB48300F1044B5AA15E3182E230AE449B90
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              Strings
                                              • http://www.google.com/search?hl=en&ie=UTF-8&oe=UTF-8&q=%s, xrefs: 0050784D
                                              • &num=%d, xrefs: 00507895
                                              • mailto, xrefs: 00507771
                                              • http://www.altavista.com/web/results?q=%s&kgs=0&kls=0, xrefs: 005078E7
                                              • contact+, xrefs: 005077B3
                                              • reply, xrefs: 00507793
                                              • &n=%d, xrefs: 005078D8
                                              • w, xrefs: 005077E9
                                              • %s+%s, xrefs: 00507825
                                              • http://search.yahoo.com/search?p=%s&ei=UTF-8&fr=fp-tab-web-t&cop=mss&tab=, xrefs: 005078A7
                                              • http://search.lycos.com/default.asp?lpv=1&loc=searchhp&tab=web&query=%s, xrefs: 0050792F
                                              • &nbq=%d, xrefs: 0050791B
                                              • mail, xrefs: 005077F4
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2204036339.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000000.00000002.2204022399.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204184037.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204200248.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_500000_ .jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: wsprintf$lstrcat$memset$lstrcpylstrlen
                                              • String ID: %s+%s$&n=%d$&nbq=%d$&num=%d$contact+$http://search.lycos.com/default.asp?lpv=1&loc=searchhp&tab=web&query=%s$http://search.yahoo.com/search?p=%s&ei=UTF-8&fr=fp-tab-web-t&cop=mss&tab=$http://www.altavista.com/web/results?q=%s&kgs=0&kls=0$http://www.google.com/search?hl=en&ie=UTF-8&oe=UTF-8&q=%s$mail$mailto$reply$w
                                              • API String ID: 3204893122-2625203255
                                              • Opcode ID: 635e0927980e0d4f1e152389c1cd3419be9ed90e47190587e3b17e1ee343d797
                                              • Instruction ID: ded823d3f8bc32eef99a2724958b2501f44dba1139f3c98e25ba8aed4e19c952
                                              • Opcode Fuzzy Hash: 635e0927980e0d4f1e152389c1cd3419be9ed90e47190587e3b17e1ee343d797
                                              • Instruction Fuzzy Hash: D551E430F4450C7AEF08A6669D8EEEE3E5FBBDCB10F18C827F105610D6DDB0AA158525
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • lstrcpy.KERNEL32(?,"Postmaster"), ref: 00505AB8
                                              • lstrcat.KERNEL32(?,00502644), ref: 00505ACA
                                              • lstrcat.KERNEL32(?,postmaster), ref: 00505AF6
                                              • lstrcat.KERNEL32(?,00501868), ref: 00505AFE
                                              • lstrcat.KERNEL32(?,?), ref: 00505B05
                                              • lstrcpy.KERNEL32(?,?), ref: 00505B12
                                              • lstrcat.KERNEL32(?,0050261C), ref: 00505B1E
                                              • lstrcat.KERNEL32(?,yahoo.com), ref: 00505BA4
                                              • lstrcpy.KERNEL32(?,yahoo.com), ref: 00505BB2
                                              • lstrcpy.KERNEL32(?,0000000A), ref: 00505BBF
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2204036339.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000000.00000002.2204022399.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204184037.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204200248.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_500000_ .jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: lstrcat$lstrcpy
                                              • String ID: "Automatic Email Delivery Software"$"Bounced mail"$"MAILER-DAEMON"$"Mail Administrator"$"Mail Delivery Subsystem"$"Post Office"$"Postmaster"$"Returned mail"$"The Post Office"$MAILER-DAEMON$noreply$postmaster$yahoo.com
                                              • API String ID: 2482611188-423193620
                                              • Opcode ID: 7d073a5acc986f1f03e9c764ca59b1a8bfb834ff45090a4b13ef80b0dc7bb979
                                              • Instruction ID: a9b0a225ccebaa74ed32a98531ce4ef3425950baae9838941721c6dfd1e2a18b
                                              • Opcode Fuzzy Hash: 7d073a5acc986f1f03e9c764ca59b1a8bfb834ff45090a4b13ef80b0dc7bb979
                                              • Instruction Fuzzy Hash: D8417771340B11A7E71097259CCEBBF7E9CFB91B01F144016F982960C2FEE59845AEB6
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • GetLocalTime.KERNEL32(?), ref: 005032E0
                                              • FileTimeToLocalFileTime.KERNEL32(00000000,?), ref: 005032EF
                                              • FileTimeToSystemTime.KERNEL32(?,?), ref: 005032FD
                                              • GetTimeZoneInformation.KERNEL32(?), ref: 0050330B
                                              • wsprintfA.USER32 ref: 00503399
                                              Strings
                                              • %s, %u %s %u %.2u:%.2u:%.2u %c%.2u%.2u, xrefs: 00503391
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2204036339.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000000.00000002.2204022399.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204184037.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204200248.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_500000_ .jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Time$File$Local$InformationSystemZonewsprintf
                                              • String ID: %s, %u %s %u %.2u:%.2u:%.2u %c%.2u%.2u
                                              • API String ID: 4026320513-1580571061
                                              • Opcode ID: 3a7b98e65f6c78f5d9b51af2aadc7aef16cb77ea1e4a24cd175063a99b3a5637
                                              • Instruction ID: a724780acf2ae77f2b438354054414b458c2743b998ef78bcc664df01f72aa73
                                              • Opcode Fuzzy Hash: 3a7b98e65f6c78f5d9b51af2aadc7aef16cb77ea1e4a24cd175063a99b3a5637
                                              • Instruction Fuzzy Hash: 7921287290024CAADF24DF99DC59AFE3BBDBF08705F10441AF956C2090E778CA88DB65
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • select.WS2_32(00000001,?,00000000,00000000,00000200), ref: 00506B12
                                              • recv.WS2_32(00000000,?,00000001,00000000), ref: 00506B21
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2204036339.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000000.00000002.2204022399.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204184037.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204200248.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_500000_ .jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: recvselect
                                              • String ID:
                                              • API String ID: 741273618-0
                                              • Opcode ID: c7b9de3faed6e7e385b1f76ede6720dd13d837e2c864222dfe83f2688b9843cd
                                              • Instruction ID: 03514d87830b8e2bd1425e58e666e4343d3a5ee024025f41421e549905ad165e
                                              • Opcode Fuzzy Hash: c7b9de3faed6e7e385b1f76ede6720dd13d837e2c864222dfe83f2688b9843cd
                                              • Instruction Fuzzy Hash: 7511B271A00208ABDB15CF59CC86BEEBBB8FF81700F104059A915E62C0DB30DA91CB24
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • GetSystemTime.KERNEL32(0000002E,0000002E,?,00000000,0000001E), ref: 00505721
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2204036339.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000000.00000002.2204022399.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204184037.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204200248.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_500000_ .jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: SystemTime
                                              • String ID:
                                              • API String ID: 2656138-0
                                              • Opcode ID: c9c0e3fb25f61834500a3681515ade6d4997d58bd528bc0d92d3ea59b26e053d
                                              • Instruction ID: 19201fb6aed2fae6b5a5d3050ea43a42579a100c3c4deb84fc8169bf925c8c27
                                              • Opcode Fuzzy Hash: c9c0e3fb25f61834500a3681515ade6d4997d58bd528bc0d92d3ea59b26e053d
                                              • Instruction Fuzzy Hash: 50F0BD78D10629EBDB00DBA8C4984AEB7B4FF44744B405A55D421E7390E3B0E645CB95
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • GetModuleFileNameA.KERNEL32(00000000,?,00000104,?,00000000), ref: 00506002
                                              • GetTempPathA.KERNEL32(00000104,?,?,00000000), ref: 00506023
                                              • GetTempFileNameA.KERNEL32(00000000,tmp,00000000,?), ref: 0050604C
                                              • GetModuleFileNameA.KERNEL32(00000000,00000000,00000104), ref: 0050605B
                                              • CopyFileA.KERNEL32(00000000,?,00000000), ref: 00506070
                                                • Part of subcall function 00505EE3: CreateFileA.KERNEL32(00000003,C0000000,00000003,00000000,00000003,00000080,00000000,?,00506082,?), ref: 00505EFA
                                                • Part of subcall function 00505EE3: SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 00505F14
                                                • Part of subcall function 00505EE3: CloseHandle.KERNEL32(00000000), ref: 00505F22
                                              • GetTempPathA.KERNEL32(00000104,00000000), ref: 00506094
                                              • GetTempFileNameA.KERNEL32(00000000,tmp,00000000,?), ref: 005060A9
                                              • lstrcpy.KERNEL32(?,?), ref: 005060FD
                                              • lstrcat.KERNEL32(?,00501830), ref: 00506115
                                              • lstrcat.KERNEL32(?,doc), ref: 00506156
                                              • lstrcat.KERNEL32(?,00501870), ref: 0050617E
                                              • lstrcat.KERNEL32(?,00501830), ref: 00506191
                                              • lstrcat.KERNEL32(?,00502734), ref: 005061B8
                                              • lstrcat.KERNEL32(?,0050272C), ref: 005061CE
                                              • lstrcat.KERNEL32(?,00502724), ref: 005061DD
                                              • lstrcat.KERNEL32(?,00502720), ref: 005061EB
                                              • DeleteFileA.KERNEL32(?), ref: 00506219
                                              • wsprintfA.USER32 ref: 00506232
                                              • GetTempPathA.KERNEL32(00000104,?), ref: 00506265
                                              • GetTempFileNameA.KERNEL32(?,tmp,00000000,00000000), ref: 0050627F
                                              • DeleteFileA.KERNEL32(00000000), ref: 005062AD
                                              • DeleteFileA.KERNEL32(?), ref: 005062B6
                                              • lstrcpy.KERNEL32(?,00000000), ref: 005062C4
                                              • CreateFileA.KERNEL32(?,80000000,00000003,00000000,00000003,00000080,00000000), ref: 005062EA
                                              • GetFileSize.KERNEL32(00000000,00000000), ref: 00506304
                                              • CloseHandle.KERNEL32( jP), ref: 0050630F
                                              • DeleteFileA.KERNEL32(?), ref: 00506339
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2204036339.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000000.00000002.2204022399.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204184037.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204200248.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_500000_ .jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: File$lstrcat$Temp$Name$Delete$Path$CloseCreateHandleModulelstrcpy$CopyPointerSizewsprintf
                                              • String ID: jP$%s.zip$com$doc$htm$html$tmp$txt
                                              • API String ID: 3181343175-3074387375
                                              • Opcode ID: a5d0772700f06ebca4c143b7e350f5dc79510eb46c2f0f3208337496e6dbf733
                                              • Instruction ID: 215d56b1a9a915398b7b7de64b2b15009c2de42112ae2f90419e4ee996d24c39
                                              • Opcode Fuzzy Hash: a5d0772700f06ebca4c143b7e350f5dc79510eb46c2f0f3208337496e6dbf733
                                              • Instruction Fuzzy Hash: 54A1B4B1940659AEDB209760CC8DFEF7FADFB51300F04085AF296D20C1D6B49A98DB66
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • CreateFileA.KERNEL32(?,80000000,00000003,00000000,00000003,00000080,00000000,76228A60,?,00000104), ref: 0050580E
                                              • CreateFileA.KERNEL32(?,40000000,00000003,00000000,00000002,00000080,00000000), ref: 00505833
                                              • memset.MSVCRT ref: 00505852
                                              • memset.MSVCRT ref: 0050585E
                                              • memset.MSVCRT ref: 0050586A
                                                • Part of subcall function 00505717: GetSystemTime.KERNEL32(0000002E,0000002E,?,00000000,0000001E), ref: 00505721
                                                • Part of subcall function 00505772: SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,76233130), ref: 00505786
                                                • Part of subcall function 00505772: ReadFile.KERNEL32(00000000,?,00000400,0000001E,00000000), ref: 005057CC
                                                • Part of subcall function 00505772: SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 005057D8
                                              • GetFileSize.KERNEL32(?,00000000), ref: 005058CA
                                              • GetFileSize.KERNEL32(?,00000000), ref: 005058D6
                                              • lstrlen.KERNEL32(00506207), ref: 005058E7
                                              • WriteFile.KERNEL32(00000000,04034B50,0000001E,?,00000000), ref: 0050590E
                                              • lstrlen.KERNEL32(00506207,?,00000000), ref: 00505918
                                              • WriteFile.KERNEL32(?,00506207,00000000), ref: 00505921
                                              • lstrlen.KERNEL32(00506207), ref: 00505926
                                              • SetFilePointer.KERNEL32(?,00000000,00000000,00000000), ref: 00505934
                                              • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 00505953
                                              • ReadFile.KERNEL32(?,?,00000400,?,00000000), ref: 00505972
                                              • WriteFile.KERNEL32(?,?,0000002E,?,00000000), ref: 005059A8
                                              • lstrlen.KERNEL32(00506207,?,00000000), ref: 005059B2
                                              • WriteFile.KERNEL32(?,00506207,00000000), ref: 005059BB
                                              • lstrlen.KERNEL32(00506207), ref: 005059C0
                                              • WriteFile.KERNEL32(?,06054B50,00000016,?,00000000), ref: 005059FC
                                              • CloseHandle.KERNEL32(?), ref: 00505A01
                                              • CloseHandle.KERNEL32(?), ref: 00505A0A
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2204036339.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000000.00000002.2204022399.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204184037.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204200248.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_500000_ .jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: File$Write$lstrlen$Pointermemset$CloseCreateHandleReadSize$SystemTime
                                              • String ID:
                                              • API String ID: 2136260124-3916222277
                                              • Opcode ID: d3892d766c3aa4be7e112a987401fd98666d2ac7ac1380c23e6cc41f9b4c72c6
                                              • Instruction ID: 773f872c4516b25f3d46c8f58171cf100fa68b818a43c43766e7d6fd81e4158a
                                              • Opcode Fuzzy Hash: d3892d766c3aa4be7e112a987401fd98666d2ac7ac1380c23e6cc41f9b4c72c6
                                              • Instruction Fuzzy Hash: F0710275D1125CAADF21DFA4DD88ADFBBB8FF08350F10011AF514A6260E7319A44DBA9
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                                • Part of subcall function 00506B89: lstrlen.KERNEL32(00000000,00000000,00000000), ref: 00506C46
                                                • Part of subcall function 00506B89: lstrlen.KERNEL32(00000000), ref: 00506C55
                                                • Part of subcall function 00506B89: CharLowerA.USER32(00000000), ref: 00506C74
                                                • Part of subcall function 00506B89: lstrcmpiA.KERNEL32(00000000,?), ref: 00506C84
                                              • lstrcpy.KERNEL32(?,?), ref: 00506E94
                                              • socket.WS2_32(00000002,00000001,00000006), ref: 00506EA0
                                              • connect.WS2_32(00000000,00000002,00000010), ref: 00506EBF
                                              • send.WS2_32(00000000,00501830,00000001,00000000), ref: 00507023
                                              • send.WS2_32(00000000,005071AD,00000002,00000000), ref: 00507034
                                              • send.WS2_32(00000000,.,00000005,00000000), ref: 0050704E
                                              • closesocket.WS2_32(00000000), ref: 00507086
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2204036339.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000000.00000002.2204022399.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204184037.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204200248.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_500000_ .jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: send$lstrlen$CharLowerclosesocketconnectlstrcmpilstrcpysocket
                                              • String ID: .$%sO %s$DATA$E%s %s$From$HEL$HLO$IL F$MA%sROM:<%s>$PT T$QUIT$RC%sO:<%s>
                                              • API String ID: 461202756-3815809343
                                              • Opcode ID: 137dcdbcc398edce13df37ae931c225a0fe07400167ff2055b513371b32ddfb0
                                              • Instruction ID: 33585215259ea1a97b37e4a6d099c67cd5c3f73b094bdd9841701b712144618c
                                              • Opcode Fuzzy Hash: 137dcdbcc398edce13df37ae931c225a0fe07400167ff2055b513371b32ddfb0
                                              • Instruction Fuzzy Hash: 31611936F0421D6FDB309BA4CC5DBEE7FACBB58710F204562F644E22C1D6B09A948B50
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • lstrlen.KERNEL32(00000000,?,?,?,005045DC,?,76230440,?,?,00504669), ref: 00504039
                                              • isspace.MSVCRT ref: 0050405A
                                              • isalnum.MSVCRT ref: 0050406A
                                              • lstrlen.KERNEL32(?,005045DC,?,76230440,?,?,00504669), ref: 00504110
                                              • lstrlen.KERNEL32(?), ref: 005041CD
                                              • lstrlen.KERNEL32(?), ref: 0050422A
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2204036339.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000000.00000002.2204022399.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204184037.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204200248.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_500000_ .jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: lstrlen$isalnumisspace
                                              • String ID: _-!.$_-!.@
                                              • API String ID: 942633883-1107819772
                                              • Opcode ID: 13f1972239871b3c44236b19c0e3c7acdde54ddd6e475e0e74b5625e8a80bea5
                                              • Instruction ID: 46a4e0ed4f2d23864a61de77937e1c011c01544acd97643bc178da60782ba0d3
                                              • Opcode Fuzzy Hash: 13f1972239871b3c44236b19c0e3c7acdde54ddd6e475e0e74b5625e8a80bea5
                                              • Instruction Fuzzy Hash: FA61F6F5908B925EEB255BB06C5833F7F98BF62312F28045EEBC1C90C2E668C481CE15
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • wsprintfA.USER32 ref: 00506807
                                              • wsprintfA.USER32 ref: 00506816
                                              • lstrlen.KERNEL32(?,To: %s,?), ref: 0050682D
                                              • wsprintfA.USER32 ref: 00506832
                                              • lstrlen.KERNEL32(?,Subject: %s,?), ref: 00506844
                                              • wsprintfA.USER32 ref: 00506849
                                              • lstrcat.KERNEL32(?,Date: ), ref: 0050685A
                                              • lstrlen.KERNEL32(?), ref: 0050685D
                                                • Part of subcall function 005032CB: GetLocalTime.KERNEL32(?), ref: 005032E0
                                                • Part of subcall function 005032CB: GetTimeZoneInformation.KERNEL32(?), ref: 0050330B
                                                • Part of subcall function 005032CB: wsprintfA.USER32 ref: 00503399
                                              • lstrcat.KERNEL32(?,MIME-Version: 1.0), ref: 00506871
                                              • lstrlen.KERNEL32(?,Content-Type: multipart/mixed;boundary="%s",?), ref: 0050687D
                                              • wsprintfA.USER32 ref: 00506882
                                              • lstrcat.KERNEL32(?,X-Priority: 3X-MSMail-Priority: NormalX-Mailer: Microsoft Outlook Express 6.00.2600.0000X-MIMEOLE: Produced By Microsoft MimeOLE V6.00.2600.0000), ref: 0050688D
                                              Strings
                                              • Content-Type: multipart/mixed;boundary="%s", xrefs: 00506877
                                              • X-Priority: 3X-MSMail-Priority: NormalX-Mailer: Microsoft Outlook Express 6.00.2600.0000X-MIMEOLE: Produced By Microsoft MimeOLE V6.00.2600.0000, xrefs: 00506887
                                              • Date: , xrefs: 00506854
                                              • ----=_%s_%.3u_%.4u_%.8X.%.8X, xrefs: 005067FB
                                              • NextPart, xrefs: 005067F6
                                              • From: %s, xrefs: 00506810
                                              • MIME-Version: 1.0, xrefs: 0050686B
                                              • Subject: %s, xrefs: 0050683E
                                              • To: %s, xrefs: 00506827
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2204036339.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000000.00000002.2204022399.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204184037.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204200248.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_500000_ .jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: wsprintf$lstrlen$lstrcat$Time$InformationLocalZone
                                              • String ID: MIME-Version: 1.0$----=_%s_%.3u_%.4u_%.8X.%.8X$Content-Type: multipart/mixed;boundary="%s"$Date: $From: %s$NextPart$Subject: %s$To: %s$X-Priority: 3X-MSMail-Priority: NormalX-Mailer: Microsoft Outlook Express 6.00.2600.0000X-MIMEOLE: Produced By Microsoft MimeOLE V6.00.2600.0000
                                              • API String ID: 1752939335-3336112092
                                              • Opcode ID: 4b9b89b98c63909c37f3a55d16aa84089577f12d36d32ece7d67388f72588239
                                              • Instruction ID: 516944fcafe1d406c4de45a34c5fbbf3ebfe04e920b5b8b11edbf61359fe2e0a
                                              • Opcode Fuzzy Hash: 4b9b89b98c63909c37f3a55d16aa84089577f12d36d32ece7d67388f72588239
                                              • Instruction Fuzzy Hash: E111BF767817153AD2047721AC8FFAFBE4CFF81B20F040425F908A21C2DAA9B61995BD
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • GetProcessHeap.KERNEL32(00000000,00001000,00000000), ref: 00503B9D
                                              • RtlAllocateHeap.NTDLL(00000000), ref: 00503BA0
                                              • socket.WS2_32(00000002,00000002,00000011), ref: 00503BBA
                                              • htons.WS2_32(00000000), ref: 00503BF5
                                              • select.WS2_32 ref: 00503C3F
                                              • memset.MSVCRT ref: 00503C51
                                              • recv.WS2_32(?,00000000,00001000,00000000), ref: 00503C61
                                              • htons.WS2_32(?), ref: 00503C88
                                              • htons.WS2_32(?), ref: 00503CA3
                                              • GetProcessHeap.KERNEL32(00000000,00000108), ref: 00503D10
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2204036339.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000000.00000002.2204022399.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204184037.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204200248.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_500000_ .jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Heaphtons$Process$Allocatememsetrecvselectsocket
                                              • String ID:
                                              • API String ID: 1083883850-0
                                              • Opcode ID: 2774ab65e68e478f934b67ed2fed43b34ffd1c969f5f9ebea79d8cc2d8644057
                                              • Instruction ID: 407117dfceaa818f317e20e129298f2efd80ccf421d121f9015e9229cc58b6dd
                                              • Opcode Fuzzy Hash: 2774ab65e68e478f934b67ed2fed43b34ffd1c969f5f9ebea79d8cc2d8644057
                                              • Instruction Fuzzy Hash: 8F61D2769047069FD720AF64DC48B6FBFECFF94784F100809F98997290D7709A489BA2
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • wsprintfA.USER32 ref: 005070BC
                                              • wsprintfA.USER32 ref: 005070D4
                                              • RegOpenKeyExA.ADVAPI32(80000001,?,00000000,00020019,?), ref: 005070F1
                                              • RegEnumKeyA.ADVAPI32(?,00000000,?,00000100), ref: 005071D8
                                              • RegCloseKey.ADVAPI32(?), ref: 005071E5
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2204036339.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000000.00000002.2204022399.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204184037.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204200248.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_500000_ .jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: wsprintf$CloseEnumOpen
                                              • String ID: %s %s$Account$Internet$SMTP$Server$Software\Microsoft\%s %s Manager\%ss
                                              • API String ID: 1693054222-1692917665
                                              • Opcode ID: d5346e02a52f48e42c981e2d26ebe83a68710e29bf017808395a5baaf78aa8eb
                                              • Instruction ID: 919e163466d9f41961a9d57fd17da3ca6bbeb631558065ae4de98a1fa7a4ba0d
                                              • Opcode Fuzzy Hash: d5346e02a52f48e42c981e2d26ebe83a68710e29bf017808395a5baaf78aa8eb
                                              • Instruction Fuzzy Hash: 7641F671E0021DABDB21DBA1DD49EEFBBBCFF88741F0000A5A905E2090E774AA44DB61
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • lstrlen.KERNEL32(?,This is a multi-part message in MIME format.,?,?,00000000,?,?,00506A70,?), ref: 005068B1
                                              • wsprintfA.USER32 ref: 005068BC
                                              • lstrlen.KERNEL32(?,--%sContent-Type: text/plain;charset=us-asciiContent-Transfer-Encoding: 7bit,?,?,?,00506A70,?), ref: 005068D2
                                              • wsprintfA.USER32 ref: 005068D7
                                              • lstrlen.KERNEL32(?,?,?,?,?,?), ref: 005068DD
                                              • lstrcat.KERNEL32(?,), ref: 005068F2
                                              • lstrlen.KERNEL32(?,--%sContent-Type: application/octet-stream;name="%s"Content-Transfer-Encoding: base64Content-Disposition: %s;filename="%s",?,?,attachment,?,?,?,?,?,?), ref: 00506929
                                              • wsprintfA.USER32 ref: 0050692E
                                              • lstrlen.KERNEL32(?,?), ref: 00506937
                                              • lstrlen.KERNEL32(?,--%s--,?), ref: 00506955
                                              • wsprintfA.USER32 ref: 0050695A
                                              Strings
                                              • inline, xrefs: 00506910, 0050691E
                                              • This is a multi-part message in MIME format., xrefs: 005068AB
                                              • --%sContent-Type: application/octet-stream;name="%s"Content-Transfer-Encoding: base64Content-Disposition: %s;filename="%s", xrefs: 00506923
                                              • attachment, xrefs: 00506906
                                              • --%s--, xrefs: 0050694F
                                              • --%sContent-Type: text/plain;charset=us-asciiContent-Transfer-Encoding: 7bit, xrefs: 005068C9
                                              • , xrefs: 005068EC
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2204036339.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000000.00000002.2204022399.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204184037.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204200248.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_500000_ .jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: lstrlen$wsprintf$lstrcat
                                              • String ID: $--%s--$--%sContent-Type: application/octet-stream;name="%s"Content-Transfer-Encoding: base64Content-Disposition: %s;filename="%s"$--%sContent-Type: text/plain;charset=us-asciiContent-Transfer-Encoding: 7bit$This is a multi-part message in MIME format.$attachment$inline
                                              • API String ID: 3012818462-48772991
                                              • Opcode ID: cae06789496e9d4e026e2ffa55617fbe67ac389098ddb8fb236da88765f6ea02
                                              • Instruction ID: 3fdca0e5f0ffa1fa4bef71aa3ca571d11d6ceae177e96fc01e7fdd5b86b94422
                                              • Opcode Fuzzy Hash: cae06789496e9d4e026e2ffa55617fbe67ac389098ddb8fb236da88765f6ea02
                                              • Instruction Fuzzy Hash: 2B11E472A402047BDB04A769DC8EDBF3FADEFC1720F180426F904D61C1DA39D95066B5
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2204036339.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000000.00000002.2204022399.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204184037.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204200248.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_500000_ .jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: lstrcpy$CharUpper$Buffstrstrwsprintf
                                              • String ID: %s.%s$.com$com
                                              • API String ID: 1204462619-569357965
                                              • Opcode ID: aff7aef32e20002ebd41d7685b69dc327a5e07d15891742e9745e351183a1eb9
                                              • Instruction ID: 2a81d91e2002685be900b6559790254c352ea299669c914cf5c60e1db04ad5da
                                              • Opcode Fuzzy Hash: aff7aef32e20002ebd41d7685b69dc327a5e07d15891742e9745e351183a1eb9
                                              • Instruction Fuzzy Hash: FF414BB7340B425AE7046326AC8DBBF3A9AFBD0711F11041AF781C20C1EE758A469E35
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • GetModuleHandleA.KERNEL32(iphlpapi.dll), ref: 00503F02
                                              • LoadLibraryA.KERNEL32(iphlpapi.dll), ref: 00503F12
                                              • GetProcAddress.KERNEL32(00000000,GetNetworkParams), ref: 00503F2F
                                              • GetProcessHeap.KERNEL32(00000000,00004000), ref: 00503F4D
                                              • RtlAllocateHeap.NTDLL(00000000), ref: 00503F50
                                              • htons.WS2_32(00000035), ref: 00503F88
                                              • inet_addr.WS2_32(?), ref: 00503F93
                                              • gethostbyname.WS2_32(?), ref: 00503FA6
                                              • GetProcessHeap.KERNEL32(00000000,?), ref: 00503FE3
                                              • HeapFree.KERNEL32(00000000), ref: 00503FE6
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2204036339.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000000.00000002.2204022399.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204184037.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204200248.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_500000_ .jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Heap$Process$AddressAllocateFreeHandleLibraryLoadModuleProcgethostbynamehtonsinet_addr
                                              • String ID: GetNetworkParams$iphlpapi.dll
                                              • API String ID: 2899438970-2099955842
                                              • Opcode ID: e30f29e266a04806bc51eef7561a6e33902f13042b838279bdac54ccba920e99
                                              • Instruction ID: acfe8a1e42ac83ed393b8fa399d380572ad7b045617876d8cdea66422d8a7479
                                              • Opcode Fuzzy Hash: e30f29e266a04806bc51eef7561a6e33902f13042b838279bdac54ccba920e99
                                              • Instruction Fuzzy Hash: C5319F35E00A07AFDF109BB89C49AAE7FBCBF14361B140115F914E32D0DB38DA459BA5
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                                • Part of subcall function 00506B89: lstrlen.KERNEL32(00000000,00000000,00000000), ref: 00506C46
                                                • Part of subcall function 00506B89: lstrlen.KERNEL32(00000000), ref: 00506C55
                                                • Part of subcall function 00506B89: CharLowerA.USER32(00000000), ref: 00506C74
                                                • Part of subcall function 00506B89: lstrcmpiA.KERNEL32(00000000,?), ref: 00506C84
                                              • lstrcpy.KERNEL32(?,?), ref: 0050726A
                                              • htons.WS2_32(00000019), ref: 00507288
                                              • lstrcpy.KERNEL32(00000000,mx.), ref: 005072D4
                                              • lstrcat.KERNEL32(00000000,?), ref: 005072E4
                                              • lstrcpy.KERNEL32(?,?), ref: 0050730B
                                              • htons.WS2_32(00000019), ref: 00507330
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2204036339.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000000.00000002.2204022399.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204184037.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204200248.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_500000_ .jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: lstrcpy$htonslstrlen$CharLowerlstrcatlstrcmpi
                                              • String ID: mail.$mx.$smtp.
                                              • API String ID: 3218502294-1213875280
                                              • Opcode ID: 804a74257488d78c00b214698439b83876a0d802025c44b510a4b9a1897df326
                                              • Instruction ID: 61d13515a21d5bbe502a9dd85473b184d0e7fa3ad14d9318c08b4ea8da931990
                                              • Opcode Fuzzy Hash: 804a74257488d78c00b214698439b83876a0d802025c44b510a4b9a1897df326
                                              • Instruction Fuzzy Hash: 7B417076E0821E9BDF25DBA0DD49BEE7BB8BF48300F100496F905E61C1DB70AA449B61
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • GetModuleHandleA.KERNEL32(dnsapi.dll,?,?,?,?,00504001,?,0050498D,?,?,?,00504A02,?), ref: 00503E3F
                                              • LoadLibraryA.KERNEL32(dnsapi.dll,?,?,?,00504001,?,0050498D,?,?,?,00504A02,?), ref: 00503E4C
                                              • GetProcAddress.KERNEL32(00000000,DnsQuery_A), ref: 00503E5C
                                              • GetProcessHeap.KERNEL32(00000000,00000108,?,?,?,?,?,00504001,?,0050498D,?,?,?,00504A02,?), ref: 00503E9B
                                              • RtlAllocateHeap.NTDLL(00000000,?,?), ref: 00503EA2
                                              • memset.MSVCRT ref: 00503EB2
                                              • lstrcpyn.KERNEL32(00000008,0027D9E8,000000FF,?), ref: 00503ECD
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2204036339.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000000.00000002.2204022399.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204184037.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204200248.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_500000_ .jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Heap$AddressAllocateHandleLibraryLoadModuleProcProcesslstrcpynmemset
                                              • String ID: DnsQuery_A$dnsapi.dll
                                              • API String ID: 979329682-3847274415
                                              • Opcode ID: dca0aab8c91f9d596bb827dcb1b0edf6cee5f3e290248c7e98bdbcda5f02536a
                                              • Instruction ID: 40075319653eeb29a435cd9483c3460f96daf6c4fdfe13ee8d6bb4df6979a84e
                                              • Opcode Fuzzy Hash: dca0aab8c91f9d596bb827dcb1b0edf6cee5f3e290248c7e98bdbcda5f02536a
                                              • Instruction Fuzzy Hash: 09210276504B0AABC7209F52DC08A3FBFACFF54780F104A29F145D2180DBB1E98897A5
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • CreateFileA.KERNEL32(?,80000000,00000003,00000000,00000003,00000000,00000000,?), ref: 0050668E
                                              • ReadFile.KERNEL32(?,?,00000400,?,00000000,?,76230440,76938400), ref: 005066CF
                                              • memset.MSVCRT ref: 0050676E
                                              • CloseHandle.KERNEL32(?,?,76230440,76938400), ref: 005067B5
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2204036339.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000000.00000002.2204022399.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204184037.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204200248.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_500000_ .jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: File$CloseCreateHandleReadmemset
                                              • String ID: =$AiP$AiP$L
                                              • API String ID: 1934991721-3068730819
                                              • Opcode ID: 4b4b3571be216019aa3e8e3fed23bcde9ca09769882202b2b4a052264b8fe6bc
                                              • Instruction ID: 75c36a7ddd45a5937c5c7dc736fdda1d92c830406bf875cefc640d4579443e51
                                              • Opcode Fuzzy Hash: 4b4b3571be216019aa3e8e3fed23bcde9ca09769882202b2b4a052264b8fe6bc
                                              • Instruction Fuzzy Hash: 24418034900299EBDF11CF98C884AEEBFB9FF46304F1045A5E991A7182D3709A51CBA1
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • memset.MSVCRT ref: 00502DA8
                                              • gethostname.WS2_32(?,00000100), ref: 00502DB8
                                              • lstrcat.KERNEL32(?,root), ref: 00502DD0
                                              • lstrcat.KERNEL32(00000000,00000000), ref: 00502E19
                                              • lstrcat.KERNEL32(00000000,00000000), ref: 00502E29
                                              • CreateMutexA.KERNEL32(00000000,00000001,00000000), ref: 00502E36
                                              • GetLastError.KERNEL32 ref: 00502E3C
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2204036339.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000000.00000002.2204022399.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204184037.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204200248.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_500000_ .jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: lstrcat$CreateErrorLastMutexgethostnamememset
                                              • String ID: root
                                              • API String ID: 3016363891-385153371
                                              • Opcode ID: 8a72bc0ed65294613998b6506ccfb39ae7e57c9a2bb16a50c2e50e91b418762a
                                              • Instruction ID: f5e5deb4a2873d9f3c4a82aa4f30ac048af43ff210c46692099915afef873f95
                                              • Opcode Fuzzy Hash: 8a72bc0ed65294613998b6506ccfb39ae7e57c9a2bb16a50c2e50e91b418762a
                                              • Instruction Fuzzy Hash: 1511E67794025C6BDB229B74EC49FEE3B6CBB69300F0401D6E585E20C1D6B49ACB8B65
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2204036339.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000000.00000002.2204022399.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204184037.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204200248.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_500000_ .jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: lstrcat$PathTemplstrcpylstrlen
                                              • String ID: .log$\$zincite
                                              • API String ID: 1195028341-2520228640
                                              • Opcode ID: 9b8db98ae055c8dff7040cdb26ef09709199bca6636e77b7a4b7fff887e6c2cb
                                              • Instruction ID: b4afade12c0fc9fcd69d2ee1c841bfa627f913ce1fee5f64901a70284f785ff6
                                              • Opcode Fuzzy Hash: 9b8db98ae055c8dff7040cdb26ef09709199bca6636e77b7a4b7fff887e6c2cb
                                              • Instruction Fuzzy Hash: B70186B180455D9BDF109F74DD9DFDE7FBCAB24300F5000A1A6C4D2091D6B0AAC88F51
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • CreateFileA.KERNEL32(00000020,80000000,00000003,00000000,00000003,00000080,00000000,76230F10,00000000), ref: 00504F0C
                                              • GetFileSize.KERNEL32(00000000,00000000), ref: 00504F2A
                                              • CreateFileMappingA.KERNEL32(00000000,00000000,00000002,00000000,00000000,00000000), ref: 00504F3A
                                              • MapViewOfFile.KERNEL32(00000000,00000004,00000000,00000000,00000000,00000000), ref: 00504F5B
                                              • memset.MSVCRT ref: 00504F89
                                              • UnmapViewOfFile.KERNEL32(00000000), ref: 00504FCC
                                              • CloseHandle.KERNEL32(?), ref: 00504FD5
                                              • CloseHandle.KERNEL32(?), ref: 00504FDF
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2204036339.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000000.00000002.2204022399.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204184037.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204200248.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_500000_ .jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: File$CloseCreateHandleView$MappingSizeUnmapmemset
                                              • String ID:
                                              • API String ID: 3315828190-0
                                              • Opcode ID: ea459288a82a99d4b24cf1e29823d3646dec14334e4c9beca5f678ee1d7cd67b
                                              • Instruction ID: 0ab0f1c3a718459e2b74eb1b04299cdf3ef3ce68078fedbeea16834dce009e45
                                              • Opcode Fuzzy Hash: ea459288a82a99d4b24cf1e29823d3646dec14334e4c9beca5f678ee1d7cd67b
                                              • Instruction Fuzzy Hash: 1D31D5F190438AAFDB206F649C88EAE7FACFB04359F100529FB92D22D1D7209C45CB61
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • lstrlen.KERNEL32(00000000,?), ref: 00504652
                                              • lstrcmpiA.KERNEL32(0000000A,?), ref: 00504689
                                              • lstrlen.KERNEL32(?), ref: 005046A1
                                              • GetProcessHeap.KERNEL32(?,-0000000F), ref: 005046AA
                                              • RtlAllocateHeap.NTDLL(00000000), ref: 005046B1
                                              • memset.MSVCRT ref: 005046C9
                                              • GetTickCount.KERNEL32 ref: 005046D5
                                              • lstrcpy.KERNEL32(0000000A,?), ref: 005046EE
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2204036339.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000000.00000002.2204022399.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204184037.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204200248.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_500000_ .jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Heaplstrlen$AllocateCountProcessTicklstrcmpilstrcpymemset
                                              • String ID:
                                              • API String ID: 518059893-0
                                              • Opcode ID: 1daf1c05f38e62147fa237e0655a6596e761156900e08a1e520a1545e835069c
                                              • Instruction ID: 707180101a398f47e83f4d7edf7de099827023ee405d7e436c1cd2a4ce101803
                                              • Opcode Fuzzy Hash: 1daf1c05f38e62147fa237e0655a6596e761156900e08a1e520a1545e835069c
                                              • Instruction Fuzzy Hash: E2212676800655ABC7219F64DC08BDF7BE8FB19350F004865EA86D3290E770E9489FA1
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • isdigit.MSVCRT ref: 005034F2
                                              • memset.MSVCRT ref: 00503548
                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000014,00000000,00000000,?,?,00000000), ref: 00503572
                                              • lstrlen.KERNEL32(00000000,?,?,00000000), ref: 0050358E
                                              • lstrlen.KERNEL32(?,?,?,00000000), ref: 005035A9
                                              • lstrlen.KERNEL32(00000000,?,?,00000000), ref: 005035F0
                                              • memcpy.MSVCRT ref: 00503602
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2204036339.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000000.00000002.2204022399.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204184037.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204200248.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_500000_ .jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: lstrlen$ByteCharMultiWideisdigitmemcpymemset
                                              • String ID:
                                              • API String ID: 3478709927-0
                                              • Opcode ID: 20185cf25f03a19cac97d795cc106f02322d58cc053b962646699da87d9d3388
                                              • Instruction ID: 23a442e20ae22f83cb2f45545b469242e3b658874f908f9248848cc5510e9995
                                              • Opcode Fuzzy Hash: 20185cf25f03a19cac97d795cc106f02322d58cc053b962646699da87d9d3388
                                              • Instruction Fuzzy Hash: BE41B471804299AFDB25CFA4C988AEE7FACAF19344F14019DD882A7191D6719F49CB60
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2204036339.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000000.00000002.2204022399.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204184037.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204200248.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_500000_ .jbxd
                                              Yara matches
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 4b01e0d636c3c5e7f2603455e11ec21e70862c83b27c4529908b2baa5dc44e6a
                                              • Instruction ID: 1af87907bf89bedeb0649b551357384cbbe48afd0fdc4005cd780a5b5450faca
                                              • Opcode Fuzzy Hash: 4b01e0d636c3c5e7f2603455e11ec21e70862c83b27c4529908b2baa5dc44e6a
                                              • Instruction Fuzzy Hash: 7841B039A00219ABCB00DFA5CC84AEEBBF8FF48715F104456E959E7291E3749A41CB64
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • GetProcessHeap.KERNEL32(00000000,00000090,00000000,?,?,005049A9,?,00000000,?,?,00504A02,?), ref: 005048E1
                                              • RtlAllocateHeap.NTDLL(00000000,?,005049A9), ref: 005048E8
                                              • memset.MSVCRT ref: 005048FC
                                              • lstrcpyn.KERNEL32(00000010,?,0000007F,?), ref: 00504915
                                              • GetTickCount.KERNEL32 ref: 0050491B
                                              • GetTickCount.KERNEL32 ref: 00504942
                                              • lstrcpyn.KERNEL32(00000010,?,0000007F,?,005049A9,?,00000000,?,?,00504A02,?), ref: 0050495B
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2204036339.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000000.00000002.2204022399.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204184037.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204200248.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_500000_ .jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: CountHeapTicklstrcpyn$AllocateProcessmemset
                                              • String ID:
                                              • API String ID: 2696074827-0
                                              • Opcode ID: 1c86731311e4b75f3192dccd85ac791b4297224c5a05b58980cdcf0866b5c10e
                                              • Instruction ID: 703d1ba90af1539a1c1e71d69a92d341ab7fc86eaf6e4218c2875852d7dfb891
                                              • Opcode Fuzzy Hash: 1c86731311e4b75f3192dccd85ac791b4297224c5a05b58980cdcf0866b5c10e
                                              • Instruction Fuzzy Hash: A0214AB2900B919FD730DF64D98896FBBE4FF54700B108D2DE69AD3691D334A8489F51
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                                • Part of subcall function 005073E8: GetTempPathA.KERNEL32(00000104,?), ref: 005073FD
                                                • Part of subcall function 005073E8: lstrlen.KERNEL32(?), ref: 0050740A
                                                • Part of subcall function 005073E8: lstrcat.KERNEL32(?,zincite), ref: 00507448
                                                • Part of subcall function 005073E8: lstrcat.KERNEL32(?,.log), ref: 00507456
                                                • Part of subcall function 005073E8: lstrcpy.KERNEL32(?,?), ref: 00507462
                                              • CreateFileA.KERNEL32(?,80000000,00000003,00000000,00000003,00000080,00000000,00000104), ref: 0050757A
                                              • WriteFile.KERNEL32( _P,?,00000000,00000000,00000000), ref: 005075B7
                                              • ReadFile.KERNEL32(00000000,?,00000100,00000000,00000000,00000000,00000000), ref: 005075D0
                                              • CloseHandle.KERNEL32(?), ref: 005075DA
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2204036339.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000000.00000002.2204022399.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204184037.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204200248.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_500000_ .jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: File$lstrcat$CloseCreateHandlePathReadTempWritelstrcpylstrlen
                                              • String ID: _P$ _P
                                              • API String ID: 285733917-3595566573
                                              • Opcode ID: a1883ad2f206a693e9717ab779b99790b24625ca6c7e82073e9dc987f6aa6288
                                              • Instruction ID: 95e29d51a280f3ee1416f365a270c88ebcaea3d62707c39128d041610a3427a9
                                              • Opcode Fuzzy Hash: a1883ad2f206a693e9717ab779b99790b24625ca6c7e82073e9dc987f6aa6288
                                              • Instruction Fuzzy Hash: 3211FAB690410CFFEB11DB94DC88EEEBB7CEB58354F1001A6B681A2090DA706F84DB60
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • GetModuleHandleA.KERNEL32(urlmon.dll,?,00000200), ref: 0050795B
                                              • LoadLibraryA.KERNEL32(urlmon.dll,?,00000200), ref: 00507966
                                              • GetProcAddress.KERNEL32(00000000,URLDownloadToCacheFileA), ref: 00507976
                                              • lstrcpy.KERNEL32(?,?), ref: 005079A8
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2204036339.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000000.00000002.2204022399.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204184037.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204200248.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_500000_ .jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: AddressHandleLibraryLoadModuleProclstrcpy
                                              • String ID: URLDownloadToCacheFileA$urlmon.dll
                                              • API String ID: 1765825236-446873360
                                              • Opcode ID: 8d756ae2cdbdadfac3edac27fec9d7869389870997cdf4f7ecb942f188448ba0
                                              • Instruction ID: 185a24763c0bcb0fc453a4a8a7a4dc2d3681b975c5b2d20548b30850ca32465b
                                              • Opcode Fuzzy Hash: 8d756ae2cdbdadfac3edac27fec9d7869389870997cdf4f7ecb942f188448ba0
                                              • Instruction Fuzzy Hash: A0F0C872A0861977E7115B748C59FEF7F6CAF59B40F000424FA45D10C0EBB0E54986A5
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • GetTempPathA.KERNEL32(00000104,?,00000000,?), ref: 00505F41
                                              • GetTempFileNameA.KERNEL32(?,tmp,00000000,?), ref: 00505F5C
                                              • CopyFileA.KERNEL32(005065B9,?,00000000), ref: 00505F75
                                                • Part of subcall function 00505EE3: CreateFileA.KERNEL32(00000003,C0000000,00000003,00000000,00000003,00000080,00000000,?,00506082,?), ref: 00505EFA
                                                • Part of subcall function 00505EE3: SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 00505F14
                                                • Part of subcall function 00505EE3: CloseHandle.KERNEL32(00000000), ref: 00505F22
                                              • DeleteFileA.KERNEL32(005065B9), ref: 00505F94
                                              • lstrcpy.KERNEL32(005065B9,?), ref: 00505FA2
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2204036339.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000000.00000002.2204022399.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204184037.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204200248.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_500000_ .jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: File$Temp$CloseCopyCreateDeleteHandleNamePathPointerlstrcpy
                                              • String ID: tmp
                                              • API String ID: 2319981759-753892680
                                              • Opcode ID: edf9a31c2175ba5224d3b1140d48908c277679a7e7ee6f9f0873a1c53c273d39
                                              • Instruction ID: b6d547f1361db50440f4c558ef177c196600c1e2c9737aacd924c07538a66ded
                                              • Opcode Fuzzy Hash: edf9a31c2175ba5224d3b1140d48908c277679a7e7ee6f9f0873a1c53c273d39
                                              • Instruction Fuzzy Hash: B101A2B690065AAFDB109B60DC8DFDE7BBCAB54700F000095F6C5E2091E6B466C9CF62
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • lstrlen.KERNEL32(?,?,?,?,005045EB,76230440,?,?,00504669), ref: 00504311
                                              • lstrlen.KERNEL32(?,?,005045EB,76230440,?,?,00504669), ref: 0050433A
                                              • lstrlen.KERNEL32(0050B178,?,005045EB,76230440,?,?,00504669), ref: 00504373
                                              • lstrlen.KERNEL32(0050B280,?,005045EB,76230440,?,?,00504669), ref: 0050438D
                                              • lstrlen.KERNEL32(0050B280,?,005045EB,76230440,?,?,00504669), ref: 005043A3
                                              • lstrlen.KERNEL32(0050B178,?,005045EB,76230440,?,?,00504669), ref: 005043FB
                                              • lstrlen.KERNEL32(0050B178,?,005045EB,76230440,?,?,00504669), ref: 00504410
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2204036339.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000000.00000002.2204022399.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204184037.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204200248.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_500000_ .jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: lstrlen
                                              • String ID:
                                              • API String ID: 1659193697-0
                                              • Opcode ID: 7234369e607e997fc05737b92fa64be9d20d6ac8b389998761447fe385796dbe
                                              • Instruction ID: 2d6b92822a5ce253097b69b3c07574bdd26a63d487101100c5e09b38dca8b49d
                                              • Opcode Fuzzy Hash: 7234369e607e997fc05737b92fa64be9d20d6ac8b389998761447fe385796dbe
                                              • Instruction Fuzzy Hash: CB419FF0A4564ACBFB214F34AEF836E3EE4B759705F90152ADB41C72A1E7248889DF01
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2204036339.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000000.00000002.2204022399.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204184037.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204200248.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_500000_ .jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: DeleteFileGlobal$AllocFreelstrlenmemset
                                              • String ID:
                                              • API String ID: 986129705-0
                                              • Opcode ID: c0b672306122552f2995b5b1776029508f415337df1c08127a0dd511841b9662
                                              • Instruction ID: 64ff1dbb5a700912d54094296ca3f5a4976b8a1cb91408c58090539e8bb41b0b
                                              • Opcode Fuzzy Hash: c0b672306122552f2995b5b1776029508f415337df1c08127a0dd511841b9662
                                              • Instruction Fuzzy Hash: 6631AA72D04259DBDB10EB61DC89ADD7BB9FF85700F1044EAE109E6181D734AE948FA0
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2204036339.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000000.00000002.2204022399.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204184037.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204200248.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_500000_ .jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: htons$CountTickmemsetsendto
                                              • String ID:
                                              • API String ID: 2621409306-0
                                              • Opcode ID: b3b5947bce572049420d80081d79d006cc1fcd4d3d740dc27c7c1cedb21463b1
                                              • Instruction ID: db08ba042e804f953b88991fca2d77eeadd2c4749c7c0b9e33eca97f00638003
                                              • Opcode Fuzzy Hash: b3b5947bce572049420d80081d79d006cc1fcd4d3d740dc27c7c1cedb21463b1
                                              • Instruction Fuzzy Hash: 1E312121A0025A5BDB258FB48C04BEE7BE8FF14304F1440B8EA09A7291E3B05E86CB59
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • lstrcpyn.KERNEL32(?,-00000009,0000007F,00000000), ref: 00504824
                                              • lstrlen.KERNEL32(?), ref: 0050482E
                                              • GetProcessHeap.KERNEL32(00000000,-0000000A), ref: 0050483A
                                              • RtlAllocateHeap.NTDLL(00000000), ref: 00504841
                                              • lstrcpy.KERNEL32(00000000,?), ref: 00504852
                                              • CreateThread.KERNEL32(00000000,00000000,0050477F,00000000,00000000,?), ref: 00504868
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2204036339.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000000.00000002.2204022399.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204184037.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204200248.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_500000_ .jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Heap$AllocateCreateProcessThreadlstrcpylstrcpynlstrlen
                                              • String ID:
                                              • API String ID: 3371211169-0
                                              • Opcode ID: b0110b9564446553085c75ac71a692edf586f148188e76fdc507fc1a0d64157a
                                              • Instruction ID: 07f746d2b3960384b515d2a8365d25916a05af25f1ccb339341a6fe92818cc76
                                              • Opcode Fuzzy Hash: b0110b9564446553085c75ac71a692edf586f148188e76fdc507fc1a0d64157a
                                              • Instruction Fuzzy Hash: AA11E2B5E00AA59BEB208BB59D5DBBE3BACFF50700F148811FB46D70D0EB20C8058B65
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • InterlockedIncrement.KERNEL32(0050B390), ref: 00504A3F
                                              • GetCurrentThread.KERNEL32 ref: 00504A47
                                              • SetThreadPriority.KERNEL32(00000000), ref: 00504A4E
                                              • InterlockedDecrement.KERNEL32(0050B390), ref: 00504A75
                                              • RtlExitUserThread.NTDLL(00000000), ref: 00504A7D
                                                • Part of subcall function 005049C5: lstrcpyn.KERNEL32(?,?,0000007F), ref: 005049F3
                                                • Part of subcall function 005049C5: GlobalFree.KERNEL32(00000000), ref: 00504A22
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2204036339.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000000.00000002.2204022399.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204184037.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204200248.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_500000_ .jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Thread$Interlocked$CurrentDecrementExitFreeGlobalIncrementPriorityUserlstrcpyn
                                              • String ID:
                                              • API String ID: 3760226487-0
                                              • Opcode ID: 4cbbf26141544510d966b90899a4a27ebab7c4cfef4a543942c3c1baaca5dbd7
                                              • Instruction ID: 59da798909faaf52fbb5bb2341fb00456894eff524a9a69de734a8fe505154a2
                                              • Opcode Fuzzy Hash: 4cbbf26141544510d966b90899a4a27ebab7c4cfef4a543942c3c1baaca5dbd7
                                              • Instruction Fuzzy Hash: 79E0E532504690DBD3105BA5AC1CB9F7FE8BB95721F05C519F19AC21D187701088AA7B
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • GetCurrentThread.KERNEL32 ref: 00504782
                                              • SetThreadPriority.KERNEL32(00000000), ref: 00504789
                                              • RtlExitUserThread.NTDLL(00000000), ref: 005047B0
                                                • Part of subcall function 00504708: memset.MSVCRT ref: 00504721
                                                • Part of subcall function 00504708: memset.MSVCRT ref: 0050474B
                                              • GetProcessHeap.KERNEL32(00000000,?), ref: 005047A1
                                              • HeapFree.KERNEL32(00000000), ref: 005047A8
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2204036339.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000000.00000002.2204022399.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204184037.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204200248.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_500000_ .jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Thread$Heapmemset$CurrentExitFreePriorityProcessUser
                                              • String ID:
                                              • API String ID: 2017824994-0
                                              • Opcode ID: 836c254a06e8348137cac086d59406f412e6514e815de78c3af08e5fd35cbc47
                                              • Instruction ID: 134dd03ee56ed5e35b093408589009be06d3af64b950e7fdb32cbac4dc487e3d
                                              • Opcode Fuzzy Hash: 836c254a06e8348137cac086d59406f412e6514e815de78c3af08e5fd35cbc47
                                              • Instruction Fuzzy Hash: 66E0EC72545A60ABD6102BA1AD1DB8E3FA8EF15762F054101F69A960E08B6054849ABB
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2204036339.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000000.00000002.2204022399.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204184037.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204200248.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_500000_ .jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: isspace$lstrcpy
                                              • String ID: EP
                                              • API String ID: 3591682678-39091752
                                              • Opcode ID: 97e05d28098dfa30c11553f396c773aa8e9dcaeee145c2bf642825238118a22f
                                              • Instruction ID: d322a60b3cd344418dea32cdce2ecae7b80887596fe3726befac56383c2b426d
                                              • Opcode Fuzzy Hash: 97e05d28098dfa30c11553f396c773aa8e9dcaeee145c2bf642825238118a22f
                                              • Instruction Fuzzy Hash: 2011E7E96087D39EEB224EB4444477E7FD87F56311F0805A9F7D0861D6C3A48885CBA1
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • GetModuleHandleA.KERNEL32(kernel32.dll), ref: 005031C3
                                              • GetProcAddress.KERNEL32(00000000,RegisterServiceProcess), ref: 005031D2
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2204036339.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000000.00000002.2204022399.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204184037.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204200248.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_500000_ .jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: AddressHandleModuleProc
                                              • String ID: RegisterServiceProcess$kernel32.dll
                                              • API String ID: 1646373207-4020013434
                                              • Opcode ID: 88f355962e72c872d7e8e3649b1a006756f8412f5a34d5979d28c820e35911b0
                                              • Instruction ID: a02a020f7e88b2a2deb55d5915b0d8113451b0eb92c2fbf378a69a289d5184d3
                                              • Opcode Fuzzy Hash: 88f355962e72c872d7e8e3649b1a006756f8412f5a34d5979d28c820e35911b0
                                              • Instruction Fuzzy Hash: A711BF10D0C6C999FB0297B8891979EBEA61F22749F0840C894846A2D2C6FF5718D3B6
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • lstrlen.KERNEL32(00000000,00000000,00000000), ref: 00506C46
                                              • lstrlen.KERNEL32(00000000), ref: 00506C55
                                              • CharLowerA.USER32(00000000), ref: 00506C74
                                              • lstrcmpiA.KERNEL32(00000000,?), ref: 00506C84
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2204036339.0000000000501000.00000040.00000001.01000000.00000003.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000000.00000002.2204022399.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.0000000000509000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204036339.000000000050D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204184037.000000000050F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2204200248.0000000000510000.00000040.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_500000_ .jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: lstrlen$CharLowerlstrcmpi
                                              • String ID:
                                              • API String ID: 1011886143-0
                                              • Opcode ID: 1614e062b7db843fd35929ba8e3fbe92fee8bfd64a38d3db1eeeb3163424b487
                                              • Instruction ID: a780f0e17b679421bcea0a2979c9bb813d318467be715c50e32b2a5f4f05fe6d
                                              • Opcode Fuzzy Hash: 1614e062b7db843fd35929ba8e3fbe92fee8bfd64a38d3db1eeeb3163424b487
                                              • Instruction Fuzzy Hash: F351D476A481994AFF364B2C84187FC7FD6FB26340F9814AAC8C1861D6D2648CF3C75A
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Execution Graph

                                              Execution Coverage:33.4%
                                              Dynamic/Decrypted Code Coverage:0%
                                              Signature Coverage:10.4%
                                              Total number of Nodes:230
                                              Total number of Limit Nodes:6
                                              execution_graph 798 402110 WSAStartup 801 401f0e GetProcessHeap RtlAllocateHeap 798->801 802 401f37 801->802 803 401f2e 801->803 833 4022e0 GetProcessHeap RtlAllocateHeap 802->833 814 401fb8 socket bind 815 401f94 closesocket Sleep htons 814->815 816 401fd5 listen 814->816 815->814 866 402b3b GetTickCount 816->866 820 40200a 821 402b3b GetTickCount 820->821 823 402043 select 820->823 826 401d22 6 API calls 820->826 829 401c50 34 API calls 820->829 872 402714 820->872 821->820 824 402085 GetProcessHeap RtlAllocateHeap 823->824 825 40207c Sleep 823->825 827 4020b2 accept 824->827 828 40209b accept closesocket 824->828 825->820 826->820 830 4020f0 CreateThread 827->830 831 4020dc GetProcessHeap HeapFree 827->831 828->820 829->820 832 40210b 830->832 831->820 832->820 834 4022fa 833->834 835 401f44 833->835 876 402180 834->876 835->803 837 402746 835->837 884 4028c8 837->884 839 40275b gethostname 840 402771 839->840 841 4027af lstrlen 840->841 842 4027df 840->842 841->840 843 4027ec GetProcessHeap RtlAllocateHeap 842->843 844 401f58 843->844 845 40280e GetTempPathA 843->845 850 40272d 844->850 846 402846 lstrlen 845->846 849 402825 845->849 847 4028b5 lstrcpy 846->847 848 40286b 846->848 847->844 848->847 849->846 851 401f64 850->851 852 402735 850->852 854 401d22 GetModuleFileNameA RegOpenKeyExA 851->854 852->851 885 402667 CreateFileA 852->885 855 401e52 lstrlen RegSetValueExA RegCloseKey 854->855 856 401e3d RegOpenKeyExA 854->856 857 401e81 855->857 856->855 856->857 858 401c50 GetTempPathA lstrlen 857->858 859 401c9d lstrcat lstrcat 858->859 862 401c7c 858->862 860 402667 18 API calls 859->860 861 401ccf CreateFileA 860->861 863 401cf7 861->863 864 401d15 htons 861->864 862->859 921 402528 863->921 864->814 867 401fe8 CreateThread 866->867 868 401e86 GetModuleHandleA 867->868 951 401c36 867->951 869 401ef7 GetProcAddress 868->869 870 401f0c 868->870 869->870 871 401f06 869->871 870->820 871->870 873 40272a 872->873 874 40271c 872->874 873->820 874->873 944 402409 CreateFileA 874->944 877 402184 876->877 878 402187 876->878 877->835 879 4021de GetProcessHeap RtlAllocateHeap 878->879 881 402197 878->881 882 4021bd 879->882 881->882 883 4021a1 GetProcessHeap RtlReAllocateHeap 881->883 882->835 883->882 884->839 886 402696 885->886 891 402691 885->891 893 402c20 SetFilePointer ReadFile 886->893 889 4026b1 890 4026c7 ReadFile 889->890 889->891 902 40238e 889->902 890->889 890->891 891->851 894 402c5d SetFilePointer 893->894 895 40269c SetFilePointer 893->895 894->895 896 402c70 ReadFile 894->896 895->889 896->895 897 402c86 896->897 897->895 898 402ca7 SetFilePointer 897->898 899 402cc8 ReadFile 898->899 900 402cfb 898->900 899->895 901 402ce1 899->901 900->895 901->899 901->900 903 40239e 902->903 903->903 904 4023aa htonl 903->904 905 4023c0 htonl 904->905 905->905 908 4023d1 905->908 906 4023d5 906->889 907 4023dd htonl 907->908 908->906 908->907 910 402241 908->910 917 402159 910->917 912 402286 912->908 913 40224d 913->912 914 402180 4 API calls 913->914 915 402275 914->915 915->912 916 402b3b GetTickCount 915->916 916->912 918 402168 917->918 919 402160 Sleep 918->919 920 40216e 918->920 919->918 920->913 932 4024ab gethostname gethostbyname 921->932 924 40257a 924->864 925 40255d GetProcessHeap RtlAllocateHeap 925->924 926 402580 925->926 927 402159 Sleep 926->927 929 402591 927->929 928 402650 GetProcessHeap HeapFree 928->924 929->928 937 402311 929->937 931 402632 WriteFile 931->928 931->929 933 402526 932->933 934 4024d9 932->934 933->924 933->925 934->933 935 402311 3 API calls 934->935 936 402510 WriteFile 935->936 936->933 942 402326 937->942 938 402355 939 40235d htonl 938->939 939->939 940 40236f htonl 939->940 941 40237d 940->941 941->931 941->941 942->938 943 402343 htonl 942->943 943->942 945 402433 944->945 946 402438 944->946 945->873 947 402159 Sleep 946->947 948 402442 947->948 948->945 949 402311 3 API calls 948->949 950 40247a WriteFile 949->950 950->945 950->948 952 401c47 RtlExitUserThread 951->952 953 401c3d 951->953 956 401af2 953->956 958 401b00 956->958 960 402159 Sleep 958->960 964 401b09 Sleep 958->964 965 402bdc GetModuleHandleA 958->965 970 401947 gethostname gethostbyname 958->970 972 4019a3 958->972 991 401a97 958->991 960->958 964->958 966 402bf9 GetProcAddress 965->966 967 402bee LoadLibraryA 965->967 968 402c09 966->968 969 402c0e InternetGetConnectedState 966->969 967->966 967->968 968->958 969->968 971 401973 970->971 971->958 973 401947 2 API calls 972->973 974 4019b3 973->974 975 4019c0 htons socket connect 974->975 976 4019b8 974->976 977 401a88 closesocket 975->977 978 4019fd 975->978 976->958 977->976 979 402159 Sleep 978->979 980 401a08 979->980 981 401a31 980->981 982 401a19 980->982 984 402241 6 API calls 981->984 983 402b3b GetTickCount 982->983 985 401a1e 983->985 984->985 986 401a43 send 985->986 987 401a56 recv 986->987 988 401a75 987->988 989 401a86 987->989 988->987 988->989 990 40238e 9 API calls 988->990 989->977 990->988 992 401aa5 991->992 996 401ae6 991->996 993 4019a3 17 API calls 992->993 994 401abd 993->994 994->996 997 402298 994->997 996->958 998 402159 Sleep 997->998 999 4022a3 998->999 999->996 1000 406770 1001 406788 1000->1001 1002 406882 LoadLibraryA 1001->1002 1003 4068c7 1001->1003 1004 4068ab GetProcAddress 1001->1004 1002->1001 1004->1001 1005 4068c1 ExitProcess 1004->1005 1006 401910 1007 401919 1006->1007 1008 40193e RtlExitUserThread 1006->1008 1013 4017e4 1007->1013 1010 40191f 1011 401927 closesocket 1010->1011 1012 40192e GetProcessHeap HeapFree 1010->1012 1011->1012 1012->1008 1014 402159 Sleep 1013->1014 1016 4017fa 1014->1016 1015 401811 1018 40181e recv 1015->1018 1016->1015 1017 402b3b GetTickCount 1016->1017 1017->1015 1019 401839 1018->1019 1032 40188c 1018->1032 1020 401902 1019->1020 1021 401848 1019->1021 1055 4015ee GetProcessHeap RtlAllocateHeap 1020->1055 1022 4018fa 1021->1022 1023 40184f 1021->1023 1035 4012c6 1022->1035 1025 401852 1023->1025 1026 40188e 1023->1026 1028 401859 recv 1025->1028 1030 40238e 9 API calls 1025->1030 1025->1032 1029 402159 Sleep 1026->1029 1028->1025 1028->1032 1031 401894 1029->1031 1030->1025 1031->1032 1033 402311 3 API calls 1031->1033 1032->1010 1034 4018d5 send 1033->1034 1034->1031 1034->1032 1036 4012f8 recv 1035->1036 1037 4015db 1036->1037 1038 40131d 1036->1038 1037->1032 1038->1036 1039 401323 GetTempPathA lstrlen 1038->1039 1040 401366 GetTickCount GetTickCount lstrlen wsprintfA CreateFileA 1039->1040 1041 401346 1039->1041 1040->1037 1045 4013cb 1040->1045 1041->1040 1042 401419 recv 1043 401432 closesocket 1042->1043 1042->1045 1047 40146a 1043->1047 1044 401403 WriteFile 1044->1042 1045->1042 1045->1044 1045->1045 1046 4015e3 1049 4015ce DeleteFileA 1046->1049 1047->1046 1048 4014ba SetFilePointer htonl 1047->1048 1050 4014d9 1048->1050 1052 40152a 1048->1052 1049->1037 1051 4014ea ReadFile 1050->1051 1050->1052 1051->1046 1051->1050 1052->1046 1053 401555 CloseHandle wsprintfA CreateProcessA 1052->1053 1053->1049 1054 4015b9 WaitForSingleObject CloseHandle CloseHandle 1053->1054 1054->1049 1056 401619 1055->1056 1061 4017dd 1055->1061 1057 402159 Sleep 1056->1057 1058 40162c 1057->1058 1062 402b9a htonl 1058->1062 1068 4016c2 1058->1068 1059 4017bf GetProcessHeap HeapFree 1060 402241 6 API calls 1059->1060 1060->1061 1061->1032 1062->1058 1063 40175d 1063->1059 1064 402311 3 API calls 1063->1064 1066 40179c send 1064->1066 1065 402b9a htonl 1065->1068 1066->1063 1067 4017bc 1066->1067 1067->1059 1068->1063 1068->1065

                                              Callgraph

                                              • Executed
                                              • Not Executed
                                              • Opacity -> Relevance
                                              • Disassembly available
                                              callgraph 0 Function_00402241 17 Function_00402159 0->17 45 Function_00402180 0->45 70 Function_0040221C 0->70 92 Function_00402B3B 0->92 1 Function_004057C5 2 Function_00402746 5 Function_004028C8 2->5 11 Function_00402AD0 2->11 78 Function_00402A28 2->78 3 Function_004012C6 3->5 3->11 40 Function_00402EFA 3->40 3->78 4 Function_00401947 6 Function_004054C8 7 Function_00405C49 8 Function_004010CA 9 Function_0040634E 10 Function_00401C50 27 Function_00402667 10->27 28 Function_00402B68 10->28 77 Function_00402528 10->77 11->78 12 Function_00405A55 13 Function_004064D5 14 Function_00405FD7 15 Function_00405BD8 16 Function_00405959 18 Function_00405C5A 19 Function_004066DB 20 Function_00402BDC 21 Function_0040545E 22 Function_0040595E 23 Function_004022E0 23->45 24 Function_00405C63 25 Function_004066E3 26 Function_004017E4 26->3 26->17 32 Function_004015EE 26->32 39 Function_00402177 26->39 59 Function_0040238E 26->59 63 Function_00402311 26->63 26->70 26->92 27->59 71 Function_00402C20 27->71 29 Function_004056E9 30 Function_0040566A 31 Function_00405B6B 32->0 32->17 32->39 48 Function_00402B84 32->48 32->63 69 Function_00402B9A 32->69 89 Function_00402134 32->89 33 Function_00405AEF 34 Function_00406770 35 Function_004028F0 36 Function_00406571 37 Function_00401AF2 37->4 37->17 37->20 37->28 37->39 66 Function_00401A97 37->66 75 Function_004019A3 37->75 38 Function_00405C72 44 Function_00402E80 40->44 41 Function_004054FC 42 Function_00405CFF 43 Function_00405500 49 Function_00402D06 44->49 57 Function_00402D8C 44->57 45->89 46 Function_00405702 47 Function_00406304 48->28 50 Function_00406506 51 Function_00401E86 52 Function_00405787 53 Function_00405908 54 Function_00402409 54->17 54->63 55 Function_00405F09 56 Function_00405D89 76 Function_00402D26 57->76 58 Function_00401F0E 58->2 58->10 58->23 58->51 64 Function_00402714 58->64 73 Function_00401D22 58->73 83 Function_0040272D 58->83 90 Function_00401C36 58->90 58->92 59->0 60 Function_00405A8F 61 Function_00402110 61->58 62 Function_00401910 62->26 63->28 63->48 64->54 65 Function_00406316 66->48 67 Function_00402298 66->67 66->75 67->17 67->70 68 Function_00406019 72 Function_00401120 74 Function_004055A2 75->0 75->4 75->17 75->39 75->59 75->70 75->92 77->17 77->63 80 Function_004024AB 77->80 77->89 78->35 79 Function_00406428 80->63 81 Function_0040552B 82 Function_004059AC 83->27 84 Function_00405C2E 85 Function_00405DAE 86 Function_00406130 87 Function_00405C32 88 Function_00401233 90->37 91 Function_004060B7 93 Function_004059BC 94 Function_0040123F

                                              Control-flow Graph

                                              APIs
                                              • GetProcessHeap.KERNEL32(00000000,0000001C), ref: 00401F19
                                              • RtlAllocateHeap.NTDLL(00000000), ref: 00401F20
                                                • Part of subcall function 00402746: gethostname.WS2_32(?,00000100), ref: 00402769
                                                • Part of subcall function 00402746: lstrlen.KERNEL32(00000000), ref: 004027B2
                                                • Part of subcall function 00402746: GetProcessHeap.KERNEL32(00000000,00000200), ref: 004027F5
                                                • Part of subcall function 00402746: RtlAllocateHeap.NTDLL(00000000), ref: 004027FC
                                                • Part of subcall function 00402746: GetTempPathA.KERNEL32(00000100,00000000), ref: 00402819
                                                • Part of subcall function 00401D22: GetModuleFileNameA.KERNEL32(00000000,?,00000100), ref: 00401E17
                                                • Part of subcall function 00401D22: RegOpenKeyExA.KERNELBASE(80000002,Software\Microsoft\Windows\CurrentVersion\Run,00000000,00020006,?), ref: 00401E37
                                                • Part of subcall function 00401D22: RegOpenKeyExA.ADVAPI32(80000001,Software\Microsoft\Windows\CurrentVersion\Run,00000000,00020006,?), ref: 00401E4C
                                                • Part of subcall function 00401D22: lstrlen.KERNEL32(?), ref: 00401E59
                                                • Part of subcall function 00401C50: GetTempPathA.KERNELBASE(00000104,?), ref: 00401C65
                                                • Part of subcall function 00401C50: lstrlen.KERNEL32(?), ref: 00401C72
                                                • Part of subcall function 00401C50: lstrcat.KERNEL32(?,zincite), ref: 00401CB0
                                                • Part of subcall function 00401C50: lstrcat.KERNEL32(?,.log), ref: 00401CBE
                                                • Part of subcall function 00401C50: CreateFileA.KERNELBASE(?,C0000000,00000003,00000000,00000002,00000080,00000000), ref: 00401CEA
                                                • Part of subcall function 00401C50: FindCloseChangeNotification.KERNELBASE(00000000), ref: 00401D19
                                              • htons.WS2_32(0000040A), ref: 00401F8A
                                              • closesocket.WS2_32(?), ref: 00401F97
                                              • Sleep.KERNEL32(000000FA), ref: 00401FA2
                                              • htons.WS2_32(0000040A), ref: 00401FB6
                                              • socket.WS2_32(00000002,00000001,00000006), ref: 00401FC2
                                              • bind.WS2_32(00000000,00000004,00000010), ref: 00401FCB
                                              • listen.WS2_32(?,7FFFFFFF), ref: 00401FDD
                                              • CreateThread.KERNELBASE(00000000,00000000,Function_00001C36,00000000,00000000,?), ref: 00401FFF
                                              • select.WS2_32(?,?), ref: 00402072
                                              • Sleep.KERNELBASE(00000001), ref: 0040207D
                                              • GetProcessHeap.KERNEL32(00000000,0000001C), ref: 00402088
                                              • RtlAllocateHeap.NTDLL(00000000), ref: 0040208F
                                              • accept.WS2_32(?,00000000,00000000), ref: 004020A0
                                              • closesocket.WS2_32(00000000), ref: 004020A7
                                              • accept.WS2_32(?,00000008,00000018), ref: 004020CE
                                              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 004020DE
                                              • HeapFree.KERNEL32(00000000), ref: 004020E5
                                              • CreateThread.KERNEL32(00000000,00000000,Function_00001910,00000000,00000000,00000000), ref: 004020FE
                                              • CloseHandle.KERNEL32(00000000), ref: 00402105
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.4568217985.0000000000401000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000001.00000002.4568182455.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000001.00000002.4568217985.0000000000405000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000001.00000002.4568276708.0000000000406000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000001.00000002.4568482141.0000000000407000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_400000_services.jbxd
                                              Similarity
                                              • API ID: Heap$Process$AllocateCreatelstrlen$CloseFileOpenPathSleepTempThreadacceptclosesockethtonslstrcat$ChangeFindFreeHandleModuleNameNotificationbindgethostnamelistenselectsocket
                                              • String ID: zincite$.#v
                                              • API String ID: 3879026950-3826641380
                                              • Opcode ID: fe2f1d9fdd21c84416cc25d48b1996b681bad49b490d28944656e069e58d6bc5
                                              • Instruction ID: 63643564f20939399de5e248beed26de427b9082207dbc7f249a8e94aa20677d
                                              • Opcode Fuzzy Hash: fe2f1d9fdd21c84416cc25d48b1996b681bad49b490d28944656e069e58d6bc5
                                              • Instruction Fuzzy Hash: E551BD70504304AFE320AF61DE49B1BBBF8FF44784F10453AF686E61F1DB78A8408A69
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 44 401c50-401c7a GetTempPathA lstrlen 45 401c7c-401c86 44->45 46 401c9d-401cf5 lstrcat * 2 call 402667 CreateFileA 44->46 45->46 47 401c88-401c8b 45->47 51 401cf7-401d18 call 402b68 call 402528 46->51 52 401d1f-401d21 46->52 47->46 50 401c8d-401c95 47->50 50->46 51->52
                                              APIs
                                              • GetTempPathA.KERNELBASE(00000104,?), ref: 00401C65
                                              • lstrlen.KERNEL32(?), ref: 00401C72
                                              • lstrcat.KERNEL32(?,zincite), ref: 00401CB0
                                              • lstrcat.KERNEL32(?,.log), ref: 00401CBE
                                              • CreateFileA.KERNELBASE(?,C0000000,00000003,00000000,00000002,00000080,00000000), ref: 00401CEA
                                              • FindCloseChangeNotification.KERNELBASE(00000000), ref: 00401D19
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.4568217985.0000000000401000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000001.00000002.4568182455.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000001.00000002.4568217985.0000000000405000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000001.00000002.4568276708.0000000000406000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000001.00000002.4568482141.0000000000407000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_400000_services.jbxd
                                              Similarity
                                              • API ID: lstrcat$ChangeCloseCreateFileFindNotificationPathTemplstrlen
                                              • String ID: .log$\$zincite$.#v
                                              • API String ID: 2721264048-3523226260
                                              • Opcode ID: 862124e1eb0eee65f550ee3459eb0c6eb416149437c4fea1a35bd8d2657bf9b4
                                              • Instruction ID: d308b9f2279752326791d57484c75deaf2d3a492223dede54109555acb1d5f82
                                              • Opcode Fuzzy Hash: 862124e1eb0eee65f550ee3459eb0c6eb416149437c4fea1a35bd8d2657bf9b4
                                              • Instruction Fuzzy Hash: 2411C8B59402586BEB206B64DD4EFFA37AC9B04710F1000B3F784F61E1D6F89AC88B58
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 57 402746-40276f call 4028c8 gethostname 60 402771-40277c 57->60 61 402787-402789 60->61 62 40277e-402785 60->62 63 4027a6-4027a8 61->63 64 40278b-4027a4 61->64 62->60 62->61 65 4027a9-4027ad 63->65 64->63 66 4027c8-4027dd call 402a28 65->66 67 4027af-4027c5 lstrlen call 402a28 65->67 66->65 72 4027df-402808 call 402ad0 GetProcessHeap RtlAllocateHeap 66->72 67->66 75 4028c3-4028c7 72->75 76 40280e-402823 GetTempPathA 72->76 77 402825-40282a 76->77 78 402846-402869 lstrlen 76->78 77->77 79 40282c-40282e 77->79 80 4028b5-4028c1 lstrcpy 78->80 81 40286b 78->81 79->78 82 402830-402838 79->82 80->75 83 40286e-402877 81->83 82->78 84 40283a-40283d 82->84 85 402889-4028a1 83->85 86 402879-402887 83->86 84->78 87 40283f-402842 84->87 88 4028a3-4028b3 85->88 86->88 87->78 88->80 88->83
                                              APIs
                                              • gethostname.WS2_32(?,00000100), ref: 00402769
                                              • lstrlen.KERNEL32(00000000), ref: 004027B2
                                              • GetProcessHeap.KERNEL32(00000000,00000200), ref: 004027F5
                                              • RtlAllocateHeap.NTDLL(00000000), ref: 004027FC
                                              • GetTempPathA.KERNEL32(00000100,00000000), ref: 00402819
                                              • lstrlen.KERNEL32(00000000), ref: 00402856
                                              • lstrcpy.KERNEL32(00000000,.log), ref: 004028BB
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.4568217985.0000000000401000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000001.00000002.4568182455.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000001.00000002.4568217985.0000000000405000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000001.00000002.4568276708.0000000000406000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000001.00000002.4568482141.0000000000407000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_400000_services.jbxd
                                              Similarity
                                              • API ID: Heaplstrlen$AllocatePathProcessTempgethostnamelstrcpy
                                              • String ID: .log
                                              • API String ID: 3142192315-299349702
                                              • Opcode ID: 4a549d7456097e64e3e163d2aeb9219a779bb868f440c68a974d96d48cf1f2d2
                                              • Instruction ID: 465d614720e4f98c554e9bbc52a771583fa62571e225c13d7661abedabf026f6
                                              • Opcode Fuzzy Hash: 4a549d7456097e64e3e163d2aeb9219a779bb868f440c68a974d96d48cf1f2d2
                                              • Instruction Fuzzy Hash: 5B41CD73A00204ABDB159BB8DE0CBFF3BE9BB49300F18407BE541E72C1D5B989458B54
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              APIs
                                              • GetModuleFileNameA.KERNEL32(00000000,?,00000100), ref: 00401E17
                                              • RegOpenKeyExA.KERNELBASE(80000002,Software\Microsoft\Windows\CurrentVersion\Run,00000000,00020006,?), ref: 00401E37
                                              • RegOpenKeyExA.ADVAPI32(80000001,Software\Microsoft\Windows\CurrentVersion\Run,00000000,00020006,?), ref: 00401E4C
                                              • lstrlen.KERNEL32(?), ref: 00401E59
                                              • RegSetValueExA.KERNELBASE(?,Services,00000000,00000001,?,00000001), ref: 00401E72
                                              • RegCloseKey.ADVAPI32(?), ref: 00401E7B
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.4568217985.0000000000401000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000001.00000002.4568182455.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000001.00000002.4568217985.0000000000405000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000001.00000002.4568276708.0000000000406000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000001.00000002.4568482141.0000000000407000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_400000_services.jbxd
                                              Similarity
                                              • API ID: Open$CloseFileModuleNameValuelstrlen
                                              • String ID: Services$Software\Microsoft\Windows\CurrentVersion\Run
                                              • API String ID: 3264941416-1243856414
                                              • Opcode ID: c0ff7b9709e14f39830c692d285c4254b3bd2cef27112853d439ce5e8ff935ad
                                              • Instruction ID: bab74bb5fb5e80abe69f2363fff059b18a7d2aa8d11ef8515edd262db9c0df91
                                              • Opcode Fuzzy Hash: c0ff7b9709e14f39830c692d285c4254b3bd2cef27112853d439ce5e8ff935ad
                                              • Instruction Fuzzy Hash: 0A51BE10D0C2C9EDFB02C6A8D9487EEBFB55B26749F084099D5847A292C2FF1658C776
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 93 402c20-402c57 SetFilePointer ReadFile 94 402c5d-402c6a SetFilePointer 93->94 95 402cff 93->95 94->95 96 402c70-402c84 ReadFile 94->96 97 402d01-402d05 95->97 96->95 98 402c86-402c98 96->98 98->95 99 402c9a-402c9e 98->99 99->95 100 402ca0-402ca5 99->100 100->95 101 402ca7-402cc6 SetFilePointer 100->101 102 402cc8-402cdf ReadFile 101->102 103 402cfb-402cfd 101->103 102->95 104 402ce1-402ceb 102->104 103->97 105 402ced 104->105 106 402cef-402cf9 104->106 105->106 106->102 106->103
                                              APIs
                                              • SetFilePointer.KERNELBASE(00000000,0000003C,00000000,00000000,?,00000000,00000000), ref: 00402C38
                                              • ReadFile.KERNELBASE(00000000,00000000,00000004,?,00000000,?,00000000,00000000), ref: 00402C51
                                              • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 00402C65
                                              • ReadFile.KERNELBASE(00000000,?,00000016,00000004,00000000,?,00000000,00000000), ref: 00402C7E
                                              • SetFilePointer.KERNEL32(00000000,00000018,00000000,00000000,?,00000000,00000000), ref: 00402CBB
                                              • ReadFile.KERNEL32(00000000,?,00000028,00000500,00000000,?,00000000,00000000), ref: 00402CD9
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.4568217985.0000000000401000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000001.00000002.4568182455.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000001.00000002.4568217985.0000000000405000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000001.00000002.4568276708.0000000000406000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000001.00000002.4568482141.0000000000407000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_400000_services.jbxd
                                              Similarity
                                              • API ID: File$PointerRead
                                              • String ID: (
                                              • API String ID: 3154509469-3887548279
                                              • Opcode ID: 6867e366b6f43ad089afff83f7b127a1952e869132ce6ddbdd4ebe026399a56d
                                              • Instruction ID: 0a2bc8566371eb4e5b481824b359c4a7693ed211b1de43140c1e77ab5c19bb7d
                                              • Opcode Fuzzy Hash: 6867e366b6f43ad089afff83f7b127a1952e869132ce6ddbdd4ebe026399a56d
                                              • Instruction Fuzzy Hash: 42313676901118BADF21DF94CE449EFBBB9FF04390F10406AE905B2290D6749A81EBA8
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 107 402667-40268f CreateFileA 108 402691-402694 107->108 109 402696-4026b0 call 402c20 SetFilePointer 107->109 111 402710-402713 108->111 113 4026b1-4026b6 109->113 114 4026c7-4026ea ReadFile 113->114 115 4026b8-4026bb 113->115 118 402706 114->118 119 4026ec-4026fc call 40238e 114->119 116 4026c2-4026c5 115->116 117 4026bd-4026c0 115->117 116->114 116->118 117->116 117->118 122 40270d-40270f 118->122 123 402701-402704 119->123 124 4026fe 119->124 122->111 123->113 124->123
                                              APIs
                                              • CreateFileA.KERNELBASE(?,80000000,00000003,00000000,00000003,00000080,00000000,76228A60), ref: 00402684
                                              • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,00401CCF,?,?), ref: 004026A4
                                              • ReadFile.KERNELBASE(00000000,?,00000020,?,00000000,?,?,?,?,?,?,?,?,?,00401CCF,?), ref: 004026E0
                                              • FindCloseChangeNotification.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,00401CCF,?,?), ref: 00402707
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.4568217985.0000000000401000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000001.00000002.4568182455.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000001.00000002.4568217985.0000000000405000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000001.00000002.4568276708.0000000000406000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000001.00000002.4568482141.0000000000407000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_400000_services.jbxd
                                              Similarity
                                              • API ID: File$ChangeCloseCreateFindNotificationPointerRead
                                              • String ID: $.#v
                                              • API String ID: 2405668454-136825063
                                              • Opcode ID: a846899278c3e595d7c3445bfc842bfb2744db7b400f7519058065fdcd010807
                                              • Instruction ID: 65b246ce000513070fce25458afbecf7756c4f1386a5a2a80221073d1864df85
                                              • Opcode Fuzzy Hash: a846899278c3e595d7c3445bfc842bfb2744db7b400f7519058065fdcd010807
                                              • Instruction Fuzzy Hash: 65118771900114FAEB209BA5DE88ADFBB7CEF05360F204537F915F61D1C7B49A448A69
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 125 402bdc-402bec GetModuleHandleA 126 402bf9-402c07 GetProcAddress 125->126 127 402bee-402bf7 LoadLibraryA 125->127 128 402c09-402c0c 126->128 129 402c0e-402c1b InternetGetConnectedState 126->129 127->126 127->128 130 402c1d-402c1f 128->130 129->130
                                              APIs
                                              • GetModuleHandleA.KERNEL32(wininet.dll,?,?,00401B05,?,?,?,?,?,00401C46,00000000), ref: 00402BE4
                                              • LoadLibraryA.KERNELBASE(wininet.dll,?,?,00401B05,?,?,?,?,?,00401C46,00000000), ref: 00402BEF
                                              • GetProcAddress.KERNEL32(00000000,InternetGetConnectedState), ref: 00402BFF
                                              • InternetGetConnectedState.WININET(00000000,00000000,?,?,00401B05,?,?,?,?,?,00401C46,00000000), ref: 00402C15
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.4568217985.0000000000401000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000001.00000002.4568182455.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000001.00000002.4568217985.0000000000405000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000001.00000002.4568276708.0000000000406000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000001.00000002.4568482141.0000000000407000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_400000_services.jbxd
                                              Similarity
                                              • API ID: AddressConnectedHandleInternetLibraryLoadModuleProcState
                                              • String ID: InternetGetConnectedState$wininet.dll
                                              • API String ID: 1505668628-596207600
                                              • Opcode ID: a37456e34d594103b89777690462d1489ba709ca72bb1b5dfb4240220dcd0849
                                              • Instruction ID: 9a479a25d9d6a13632a63e79a708e40800bebfc4b8359a5714031e7911cbad49
                                              • Opcode Fuzzy Hash: a37456e34d594103b89777690462d1489ba709ca72bb1b5dfb4240220dcd0849
                                              • Instruction Fuzzy Hash: 40E04F75655212ABF7201B719F4EF6B225C5B05B41F10497BF103F51E1EBBCD44055AC
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 131 4019a3-4019b6 call 401947 134 4019c0-4019f7 htons socket connect 131->134 135 4019b8-4019bb 131->135 137 401a88-401a93 closesocket 134->137 138 4019fd-401a17 call 402159 call 40221c 134->138 136 401a94-401a96 135->136 137->136 143 401a31-401a40 call 402177 call 402241 138->143 144 401a19-401a2f call 402b3b call 402177 138->144 153 401a43-401a55 send 143->153 144->153 154 401a56-401a73 recv 153->154 155 401a75-401a84 call 40238e 154->155 156 401a86 154->156 155->154 155->156 156->137
                                              APIs
                                                • Part of subcall function 00401947: gethostname.WS2_32(?,00000100), ref: 0040195C
                                                • Part of subcall function 00401947: gethostbyname.WS2_32(?), ref: 00401969
                                              • htons.WS2_32(0000040A), ref: 004019D0
                                              • socket.WS2_32(00000002,00000001,00000006), ref: 004019DF
                                              • connect.WS2_32(00000000,?,00000010), ref: 004019EF
                                              • send.WS2_32(00000000,00401164,00000001,00000000), ref: 00401A4F
                                              • recv.WS2_32(00000000,?,00000020,00000000), ref: 00401A6A
                                              • closesocket.WS2_32(00000000), ref: 00401A8B
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.4568217985.0000000000401000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000001.00000002.4568182455.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000001.00000002.4568217985.0000000000405000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000001.00000002.4568276708.0000000000406000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000001.00000002.4568482141.0000000000407000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_400000_services.jbxd
                                              Similarity
                                              • API ID: closesocketconnectgethostbynamegethostnamehtonsrecvsendsocket
                                              • String ID:
                                              • API String ID: 1510073661-0
                                              • Opcode ID: 2a21ca618489f6ec19938a17c44a3dae582688b32802aec640c23780eae26ec9
                                              • Instruction ID: 0b23af087cc8eec7cc1e21334d5c71020c57f0b57cd055084c320c5618d28d3d
                                              • Opcode Fuzzy Hash: 2a21ca618489f6ec19938a17c44a3dae582688b32802aec640c23780eae26ec9
                                              • Instruction Fuzzy Hash: F121C375600205FBEB10AFA1DE0AF9E7BB9EF04344F20003AFA85B61F1D7B549418B49
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 159 402528-40253b call 4024ab 162 402544-40254d 159->162 163 40253d 159->163 164 402552-402557 162->164 165 40254f 162->165 163->162 166 402664-402666 164->166 167 40255d-402578 GetProcessHeap RtlAllocateHeap 164->167 165->164 168 402580-402597 call 402134 call 402159 167->168 169 40257a-40257b 167->169 175 402599-4025a4 168->175 176 4025fa-402602 168->176 170 402662-402663 169->170 170->166 175->176 179 4025a6 175->179 177 402650-402660 GetProcessHeap HeapFree 176->177 178 402604-40260e 176->178 177->170 180 402611-402617 178->180 181 4025a9-4025b3 179->181 182 402629-40264e call 402311 WriteFile 180->182 183 402619-402627 180->183 184 4025c3-4025c8 181->184 185 4025b5-4025b8 181->185 182->177 182->178 183->180 183->182 186 4025d7-4025da 184->186 187 4025ca-4025d5 184->187 189 4025ba-4025bd 185->189 190 4025bf-4025c1 185->190 191 4025dd-4025e5 186->191 187->186 187->191 189->185 189->190 190->184 190->191 191->181 193 4025e7-4025ec 191->193 193->176 194 4025ee-4025f8 193->194 194->175 194->176
                                              APIs
                                                • Part of subcall function 004024AB: gethostname.WS2_32(?,00000100), ref: 004024C0
                                                • Part of subcall function 004024AB: gethostbyname.WS2_32(?), ref: 004024CD
                                                • Part of subcall function 004024AB: WriteFile.KERNELBASE(6%@,?,00000020,00000000,00000000), ref: 00402520
                                              • GetProcessHeap.KERNEL32(00000000,00000000,00000000,?,?,?,?,?,?,00401D15), ref: 00402567
                                              • RtlAllocateHeap.NTDLL(00000000), ref: 0040256E
                                              • WriteFile.KERNELBASE(00000000,?,00000020,?,00000000,?,?,?,?,?,?,00401D15), ref: 00402642
                                              • GetProcessHeap.KERNEL32(00000000,00000000,?,?,?,?,?,?,00401D15), ref: 00402653
                                              • HeapFree.KERNEL32(00000000,?,?,?,?,?,?,00401D15), ref: 0040265A
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.4568217985.0000000000401000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000001.00000002.4568182455.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000001.00000002.4568217985.0000000000405000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000001.00000002.4568276708.0000000000406000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000001.00000002.4568482141.0000000000407000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_400000_services.jbxd
                                              Similarity
                                              • API ID: Heap$FileProcessWrite$AllocateFreegethostbynamegethostname
                                              • String ID:
                                              • API String ID: 1381504460-0
                                              • Opcode ID: cb84bfe19f4f92fb60ffda4fede0af42123b7535614bf0299b989d0789685bc5
                                              • Instruction ID: e93690f6efb094d726be1ca240a6e8d252680ed4df48be1e4ed5d20c378adae6
                                              • Opcode Fuzzy Hash: cb84bfe19f4f92fb60ffda4fede0af42123b7535614bf0299b989d0789685bc5
                                              • Instruction Fuzzy Hash: BE419F71A00259EFCB14DF64CA98A9E77B5FB44304F20457AE915BB2C1CBB4EE50CB98
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 195 402409-402431 CreateFileA 196 402433-402436 195->196 197 402438-402445 call 402159 195->197 198 4024a8-4024aa 196->198 201 402447 197->201 202 402498-40249b 197->202 203 402448-402455 201->203 204 4024a5-4024a7 202->204 205 402457-40245c 203->205 204->198 206 402471-402495 call 402311 WriteFile 205->206 207 40245e-40246f 205->207 206->203 210 402497 206->210 207->205 207->206 210->202
                                              APIs
                                              • CreateFileA.KERNELBASE(?,40000000,00000003,00000000,00000002,00000080,00000000), ref: 00402425
                                              • WriteFile.KERNELBASE(?,?,00000020,?,00000000), ref: 0040248A
                                              • FindCloseChangeNotification.KERNELBASE(?), ref: 0040249F
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.4568217985.0000000000401000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000001.00000002.4568182455.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000001.00000002.4568217985.0000000000405000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000001.00000002.4568276708.0000000000406000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000001.00000002.4568482141.0000000000407000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_400000_services.jbxd
                                              Similarity
                                              • API ID: File$ChangeCloseCreateFindNotificationWrite
                                              • String ID: .#v
                                              • API String ID: 3805958096-507759092
                                              • Opcode ID: 02cce61bae3da03cfbe432f57d36e2110cdf58b40a94688df2534fc4476fb847
                                              • Instruction ID: 869e521865e1404736e4a209302c2f71d5a307e29bced8060bbcdd2507a7e97b
                                              • Opcode Fuzzy Hash: 02cce61bae3da03cfbe432f57d36e2110cdf58b40a94688df2534fc4476fb847
                                              • Instruction Fuzzy Hash: 5B11D672500208BFDB109F94DD84F9EB7B8EF44325F20853AF545F61D0D774A9858B64
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 211 4024ab-4024d7 gethostname gethostbyname 212 402526-402527 211->212 213 4024d9-4024e7 211->213 214 4024ea-4024f2 213->214 215 402503-402505 214->215 216 4024f4-402501 214->216 215->212 217 402507-402520 call 402311 WriteFile 215->217 216->214 216->215 217->212
                                              APIs
                                              • gethostname.WS2_32(?,00000100), ref: 004024C0
                                              • gethostbyname.WS2_32(?), ref: 004024CD
                                              • WriteFile.KERNELBASE(6%@,?,00000020,00000000,00000000), ref: 00402520
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.4568217985.0000000000401000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000001.00000002.4568182455.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000001.00000002.4568217985.0000000000405000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000001.00000002.4568276708.0000000000406000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000001.00000002.4568482141.0000000000407000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_400000_services.jbxd
                                              Similarity
                                              • API ID: FileWritegethostbynamegethostname
                                              • String ID: 6%@
                                              • API String ID: 318559467-1099485511
                                              • Opcode ID: f034063b5387ddc9d0de5fa9bbd9bc3ce1eafbdd233045a66a0e29a2c198d38c
                                              • Instruction ID: 54dfa080bba5bf9ad2062c22b38b8dcdf997bae28b9b2d9a825c475ac44d6093
                                              • Opcode Fuzzy Hash: f034063b5387ddc9d0de5fa9bbd9bc3ce1eafbdd233045a66a0e29a2c198d38c
                                              • Instruction Fuzzy Hash: 9F014071A00209ABDF14DF65DE59ADEB7BCEB48300F10407AE945F72D0E774EA448B58
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 220 401947-401971 gethostname gethostbyname 221 401973-401978 220->221 222 40197a-40197d 220->222 221->222 223 40197e-401982 221->223 224 401983-401987 223->224 225 401999 224->225 226 401989-40198e 224->226 229 40199b-40199d 225->229 227 401990-401997 226->227 228 40199e-4019a1 226->228 227->224 227->225 228->229
                                              APIs
                                              • gethostname.WS2_32(?,00000100), ref: 0040195C
                                              • gethostbyname.WS2_32(?), ref: 00401969
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.4568217985.0000000000401000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000001.00000002.4568182455.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000001.00000002.4568217985.0000000000405000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000001.00000002.4568276708.0000000000406000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000001.00000002.4568482141.0000000000407000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_400000_services.jbxd
                                              Similarity
                                              • API ID: gethostbynamegethostname
                                              • String ID:
                                              • API String ID: 3961807697-0
                                              • Opcode ID: 7f7489a05263d50e9f5280867374dca372806a9a6e7122dc19f1c9b7e6bb3912
                                              • Instruction ID: d087f8dd0fb0701926f1ae1460b74465c54af62c64bb0150b0245bb175ba3ed1
                                              • Opcode Fuzzy Hash: 7f7489a05263d50e9f5280867374dca372806a9a6e7122dc19f1c9b7e6bb3912
                                              • Instruction Fuzzy Hash: DCF054717101045BEF10DA799C14BFB73ECEB44344F1854B6A986F72B0E678ED41C694
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 230 402110-402126 WSAStartup call 401f0e 232 40212b-402131 230->232
                                              APIs
                                              • WSAStartup.WS2_32(00000101), ref: 00402120
                                                • Part of subcall function 00401F0E: GetProcessHeap.KERNEL32(00000000,0000001C), ref: 00401F19
                                                • Part of subcall function 00401F0E: RtlAllocateHeap.NTDLL(00000000), ref: 00401F20
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.4568217985.0000000000401000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000001.00000002.4568182455.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000001.00000002.4568217985.0000000000405000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000001.00000002.4568276708.0000000000406000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000001.00000002.4568482141.0000000000407000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_400000_services.jbxd
                                              Similarity
                                              • API ID: Heap$AllocateProcessStartup
                                              • String ID:
                                              • API String ID: 758850586-0
                                              • Opcode ID: e59473464d790235308ec1e16d264448846f175b2295cd92bdf9d6610ea48e59
                                              • Instruction ID: 394aaf448670e1c9671958fd0a23c61cfec1bbe2cdcd19ae9f34d9542a64428f
                                              • Opcode Fuzzy Hash: e59473464d790235308ec1e16d264448846f175b2295cd92bdf9d6610ea48e59
                                              • Instruction Fuzzy Hash: 4BC02B725000402FE301B300DC02FB6312C7704300F0004353581400E2E3F940184163
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 233 401af2-401afc 234 401b00-401b07 call 402bdc 233->234 237 401b13-401b26 call 402159 234->237 238 401b09-401b0e 234->238 242 401b67-401b71 call 402177 237->242 243 401b28-401b2a 237->243 239 401c24-401c2a Sleep 238->239 239->234 250 401b83-401b8b 242->250 251 401b73-401b7c call 4019a3 242->251 245 401b4c-401b54 call 401947 243->245 246 401b2c-401b37 243->246 253 401b59-401b5c 245->253 246->245 248 401b39-401b4a call 402b68 246->248 248->245 258 401b60-401b65 248->258 255 401b97-401b9d 250->255 256 401b8d-401b92 250->256 260 401b81-401b82 251->260 253->258 259 401b5e 253->259 261 401ba3-401ba6 255->261 262 401b9f-401ba1 255->262 256->239 258->242 258->243 259->258 260->250 264 401ba8-401baa 261->264 265 401bac-401baf 261->265 263 401bb3 262->263 267 401bb4-401bbf 263->267 264->263 266 401bb1 265->266 265->267 266->263 268 401bc1-401bc4 267->268 269 401bcf-401bd3 267->269 270 401bc6-401bc8 268->270 271 401bc9-401bcb 268->271 272 401bd5-401bd6 call 401a97 269->272 273 401bfa-401bfd 269->273 270->271 271->269 274 401bcd 271->274 280 401bdb-401bde 272->280 276 401c06-401c0f 273->276 277 401bff-401c04 273->277 274->269 278 401c11-401c16 276->278 279 401c18-401c1d 276->279 277->239 278->239 281 401c2f-401c34 279->281 282 401c1f 279->282 283 401be0-401bf2 call 402b68 280->283 284 401bf5-401bf8 280->284 281->239 282->239 283->284 287 401bf4 283->287 284->272 284->273 287->284
                                              APIs
                                                • Part of subcall function 00402BDC: GetModuleHandleA.KERNEL32(wininet.dll,?,?,00401B05,?,?,?,?,?,00401C46,00000000), ref: 00402BE4
                                                • Part of subcall function 00402BDC: LoadLibraryA.KERNELBASE(wininet.dll,?,?,00401B05,?,?,?,?,?,00401C46,00000000), ref: 00402BEF
                                                • Part of subcall function 00402BDC: GetProcAddress.KERNEL32(00000000,InternetGetConnectedState), ref: 00402BFF
                                              • Sleep.KERNEL32(0000EA60,?,?,?,?,?,00401C46,00000000), ref: 00401C24
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.4568217985.0000000000401000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000001.00000002.4568182455.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000001.00000002.4568217985.0000000000405000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000001.00000002.4568276708.0000000000406000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000001.00000002.4568482141.0000000000407000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_400000_services.jbxd
                                              Similarity
                                              • API ID: AddressHandleLibraryLoadModuleProcSleep
                                              • String ID:
                                              • API String ID: 598054177-0
                                              • Opcode ID: cc4ed5cdb316f89ee48a959f0db2784bda8b517e773fa2b5245cd414c5d5d6a3
                                              • Instruction ID: 556554e90d697c25865dfeac8bb208c10a23844f2c0764a878470f5d7dc47180
                                              • Opcode Fuzzy Hash: cc4ed5cdb316f89ee48a959f0db2784bda8b517e773fa2b5245cd414c5d5d6a3
                                              • Instruction Fuzzy Hash: 683113356442159BE224AA15C981E39B3F5EB01B18F21013FF251BB2F2EB7CEC41868E
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • recv.WS2_32(?,?,00000080,00000000), ref: 0040130C
                                              • GetTempPathA.KERNEL32(00000100,?,?,?), ref: 0040132F
                                              • lstrlen.KERNEL32(?,?,?), ref: 0040133C
                                              • GetTickCount.KERNEL32 ref: 00401372
                                              • GetTickCount.KERNEL32 ref: 0040137A
                                              • lstrlen.KERNEL32(?,%.8x.%c%c%c,?,?,?), ref: 0040138F
                                              • wsprintfA.USER32 ref: 0040139D
                                              • CreateFileA.KERNEL32(?,C0000000,00000003,00000000,00000002,00000080,00000000), ref: 004013B9
                                              • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 00401413
                                              • recv.WS2_32(?,?,00000200,00000000), ref: 00401425
                                              • closesocket.WS2_32(?), ref: 00401435
                                              • SetFilePointer.KERNEL32(?,00000000,00000000,00000000), ref: 004014C1
                                              • htonl.WS2_32(?), ref: 004014CA
                                              • ReadFile.KERNEL32(?,?,00000000,?,00000000), ref: 004014FA
                                              • CloseHandle.KERNEL32(?), ref: 0040155E
                                              • wsprintfA.USER32 ref: 00401573
                                              • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000001,00000000,00000000,00000000,?,?), ref: 004015AF
                                              • WaitForSingleObject.KERNEL32(?,000000FF), ref: 004015BE
                                              • CloseHandle.KERNEL32(?), ref: 004015C7
                                              • CloseHandle.KERNEL32(?), ref: 004015CC
                                              • DeleteFileA.KERNEL32(?), ref: 004015D5
                                              • CloseHandle.KERNEL32(?), ref: 004015E6
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.4568217985.0000000000401000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000001.00000002.4568182455.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000001.00000002.4568217985.0000000000405000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000001.00000002.4568276708.0000000000406000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000001.00000002.4568482141.0000000000407000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_400000_services.jbxd
                                              Similarity
                                              • API ID: File$CloseHandle$CountCreateTicklstrlenrecvwsprintf$DeleteObjectPathPointerProcessReadSingleTempWaitWriteclosesockethtonl
                                              • String ID: "%s"$%.8x.%c%c%c$.#v
                                              • API String ID: 2752258614-3072657041
                                              • Opcode ID: d87f23115844a503b3769bbd931cddded3c6aecd11922378917989d44afb3391
                                              • Instruction ID: 87b5d8eef72c4e099ef873e594ac55454593937c6fbe0acc7a325c837c011b3a
                                              • Opcode Fuzzy Hash: d87f23115844a503b3769bbd931cddded3c6aecd11922378917989d44afb3391
                                              • Instruction Fuzzy Hash: 1BA17AB290124CABEB119FA4DD88EDE7BADFB04300F104576FA09E31A1DB34D9858F64
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • GetProcessHeap.KERNEL32(00000000,00000200), ref: 004015FF
                                              • RtlAllocateHeap.NTDLL(00000000), ref: 00401606
                                              • send.WS2_32(00000000,?,00000020,00000000), ref: 004017AB
                                              • GetProcessHeap.KERNEL32(00000000,?), ref: 004017C4
                                              • HeapFree.KERNEL32(00000000), ref: 004017CB
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.4568217985.0000000000401000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000001.00000002.4568182455.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000001.00000002.4568217985.0000000000405000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000001.00000002.4568276708.0000000000406000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000001.00000002.4568482141.0000000000407000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_400000_services.jbxd
                                              Similarity
                                              • API ID: Heap$Process$AllocateFreesend
                                              • String ID:
                                              • API String ID: 4105135367-0
                                              • Opcode ID: 3d1d185d2aa9f56e36d5c05daaa268825108e9a00c95c9ce06bd95516940abd8
                                              • Instruction ID: 52fb6d836b38e9ee9535e48970a26cdb363203125a638cc4e1af546f8777f0e4
                                              • Opcode Fuzzy Hash: 3d1d185d2aa9f56e36d5c05daaa268825108e9a00c95c9ce06bd95516940abd8
                                              • Instruction Fuzzy Hash: 6D616F35A00105AFDB10DFA5C984AADB7B5EF44328F24847AE915BB2E1C779ED41CB48
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • GetModuleHandleA.KERNEL32(kernel32.dll), ref: 00401EED
                                              • GetProcAddress.KERNEL32(00000000,RegisterServiceProcess), ref: 00401EFC
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.4568217985.0000000000401000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000001.00000002.4568182455.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000001.00000002.4568217985.0000000000405000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000001.00000002.4568276708.0000000000406000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000001.00000002.4568482141.0000000000407000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_400000_services.jbxd
                                              Similarity
                                              • API ID: AddressHandleModuleProc
                                              • String ID: RegisterServiceProcess$kernel32.dll
                                              • API String ID: 1646373207-4020013434
                                              • Opcode ID: 88965b28d84923e145c86964e19b387d6cdeb36cc163beab82d193450ada039d
                                              • Instruction ID: fe3fddd0a83443da577e5a50337f346177ffc8e2680221d965c1de18958cb581
                                              • Opcode Fuzzy Hash: 88965b28d84923e145c86964e19b387d6cdeb36cc163beab82d193450ada039d
                                              • Instruction Fuzzy Hash: F611BF10D0C2C9D9FB0297E8895979FBEA51F22749F0840D895847A2D2C7FF5718C3B6
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • GetProcessHeap.KERNEL32(00000000,?,?,004026F8,761A5350,00402275,004026F8,00000007,004023FA,00000000,004026FC), ref: 004021AA
                                              • RtlReAllocateHeap.NTDLL(00000000), ref: 004021B1
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.4568217985.0000000000401000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000001.00000002.4568182455.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000001.00000002.4568217985.0000000000405000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000001.00000002.4568276708.0000000000406000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000001.00000002.4568482141.0000000000407000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_400000_services.jbxd
                                              Similarity
                                              • API ID: Heap$AllocateProcess
                                              • String ID:
                                              • API String ID: 1357844191-0
                                              • Opcode ID: 26a0c9002352f9922aa997980867025a6c0a5e0e25f200c771313e238489ce55
                                              • Instruction ID: b91e93daa79bc00c502a8745a29ed674d322f15872cdf6577bcb50ea8502c1c8
                                              • Opcode Fuzzy Hash: 26a0c9002352f9922aa997980867025a6c0a5e0e25f200c771313e238489ce55
                                              • Instruction Fuzzy Hash: 6D113A7130170157DB184AA98E8C63BB29AAFC4341714443EE657EF7D0EFB4C8428714
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • RtlExitUserThread.NTDLL(00000000), ref: 00401940
                                                • Part of subcall function 004017E4: recv.WS2_32(?,?,00000001,00000000), ref: 0040182A
                                                • Part of subcall function 004017E4: recv.WS2_32(?,?,00000020,00000000), ref: 0040186D
                                              • closesocket.WS2_32(?), ref: 00401928
                                              • GetProcessHeap.KERNEL32(00000000,?), ref: 00401931
                                              • HeapFree.KERNEL32(00000000), ref: 00401938
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.4568217985.0000000000401000.00000040.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000001.00000002.4568182455.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000001.00000002.4568217985.0000000000405000.00000040.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000001.00000002.4568276708.0000000000406000.00000080.00000001.01000000.00000004.sdmpDownload File
                                              • Associated: 00000001.00000002.4568482141.0000000000407000.00000004.00000001.01000000.00000004.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_400000_services.jbxd
                                              Similarity
                                              • API ID: Heaprecv$ExitFreeProcessThreadUserclosesocket
                                              • String ID:
                                              • API String ID: 2166171475-0
                                              • Opcode ID: f08946cb0ca92a7e7864d3179d4bb38cfe4129f2fea6f70c9f97e31e457419b4
                                              • Instruction ID: a39a1a5debe07bde33d46ee6b6cdb91c709c7e08ef56850422b225088ed05449
                                              • Opcode Fuzzy Hash: f08946cb0ca92a7e7864d3179d4bb38cfe4129f2fea6f70c9f97e31e457419b4
                                              • Instruction Fuzzy Hash: 19E08C36601260E7C6102BA09E0CB8B3BA8AF08762F040026F585F65B0CB348440C7A8
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Execution Graph

                                              Execution Coverage:29%
                                              Dynamic/Decrypted Code Coverage:0%
                                              Signature Coverage:0%
                                              Total number of Nodes:650
                                              Total number of Limit Nodes:24
                                              execution_graph 2137 503280 WSAStartup 2142 5033a8 GetTickCount 2137->2142 2139 5032a0 memset 2143 5031e4 2139->2143 2142->2139 2145 5031f2 2143->2145 2144 5031ff 2149 50327c ExitProcess 2144->2149 2167 5075e5 2144->2167 2145->2144 2164 502d8e memset gethostname lstrcat 2145->2164 2156 503255 2160 50325a CreateThread 2156->2160 2157 50322c CreateThread 2203 5033b4 2157->2203 2415 50311c FindWindowA 2157->2415 2159 503240 Sleep 2159->2156 2161 50326e 2160->2161 2412 504c1b 2160->2412 2196 50565b GetCurrentThread SetThreadPriority 2161->2196 2165 502e0b lstrcat lstrcat CreateMutexA GetLastError 2164->2165 2166 502ddd 2164->2166 2165->2144 2166->2165 2204 50746b GetModuleFileNameA CreateFileA 2167->2204 2169 5075f6 2170 507627 GetTempPathA 2169->2170 2171 507619 GetWindowsDirectoryA 2169->2171 2172 50766b lstrcat lstrcat lstrcat CreateFileA 2169->2172 2174 503209 2169->2174 2170->2169 2171->2169 2172->2169 2173 5076c8 2172->2173 2215 50737c 2173->2215 2177 502e50 GetModuleFileNameA lstrcpy 2174->2177 2184 502eb6 2177->2184 2178 502ec1 GetWindowsDirectoryA 2178->2184 2179 502ecf GetTempPathA 2179->2184 2180 502ee7 lstrlen 2181 502f01 lstrcat 2180->2181 2182 502f0f lstrcat SetFileAttributesA CreateFileA 2180->2182 2181->2182 2182->2184 2185 502f7e GetFileAttributesA 2182->2185 2183 502f9d 2188 502fb0 RegOpenKeyExA 2183->2188 2184->2178 2184->2179 2184->2180 2184->2183 2184->2185 2186 502f51 CloseHandle DeleteFileA CopyFileA 2184->2186 2187 502f9f lstrcpy 2184->2187 2185->2184 2186->2184 2187->2183 2189 5030c2 lstrlen RegSetValueExA RegCloseKey 2188->2189 2190 5030ad RegOpenKeyExA 2188->2190 2191 5030eb 2189->2191 2190->2189 2190->2191 2192 50315c GetModuleHandleA 2191->2192 2193 5031e2 2192->2193 2194 5031cd GetProcAddress 2192->2194 2193->2156 2193->2157 2194->2193 2195 5031dc 2194->2195 2195->2193 2232 504ff8 RegOpenKeyExA 2196->2232 2200 505674 2249 5055b4 memset GetWindowsDirectoryA lstrcpy 2200->2249 2203->2159 2205 507545 2204->2205 2206 5074b8 2204->2206 2205->2169 2221 5073e8 GetTempPathA lstrlen 2206->2221 2208 5074c4 CreateFileA 2208->2205 2209 5074e6 2208->2209 2224 503697 SetFilePointer ReadFile 2209->2224 2212 50751b ReadFile 2213 507503 WriteFile 2212->2213 2214 507535 FindCloseChangeNotification CloseHandle 2212->2214 2213->2212 2214->2205 2216 507391 2215->2216 2217 5073ac WriteFile 2216->2217 2218 5073cd 2216->2218 2217->2216 2219 5073d1 WriteFile 2218->2219 2220 5073e4 FindCloseChangeNotification wsprintfA memset CreateProcessA 2218->2220 2219->2220 2220->2174 2222 507414 2221->2222 2223 507435 lstrcat lstrcat lstrcpy 2221->2223 2222->2223 2223->2208 2225 5036d4 SetFilePointer 2224->2225 2226 503772 SetFilePointer 2224->2226 2225->2226 2227 5036e7 ReadFile 2225->2227 2226->2212 2227->2226 2228 5036fd 2227->2228 2228->2226 2229 50371e SetFilePointer 2228->2229 2229->2226 2230 50373f ReadFile 2229->2230 2230->2226 2231 503758 2230->2231 2231->2226 2231->2230 2233 5050c8 memset RegQueryValueExA RegCloseKey 2232->2233 2234 505119 2232->2234 2233->2234 2235 50510c 2233->2235 2238 505449 2234->2238 2257 504eea CreateFileA 2235->2257 2239 505503 memset 2238->2239 2240 505521 GetWindowsDirectoryA 2239->2240 2241 505529 GetEnvironmentVariableA 2239->2241 2244 505534 2240->2244 2241->2244 2242 50553c lstrlen 2242->2244 2245 505556 lstrcat 2242->2245 2243 5055af 2243->2200 2244->2239 2244->2242 2244->2243 2246 505585 lstrcat 2244->2246 2247 50556a lstrcat lstrcat 2244->2247 2245->2244 2350 5052ad 2246->2350 2247->2246 2250 5052ad 82 API calls 2249->2250 2251 50560a 2250->2251 2252 50561b GetDriveTypeA 2251->2252 2254 505657 Sleep 2251->2254 2252->2251 2253 50562d Sleep 2252->2253 2255 5052ad 82 API calls 2253->2255 2254->2200 2256 505646 2255->2256 2256->2251 2258 504fee 2257->2258 2259 504f1f 2257->2259 2258->2234 2259->2258 2260 504f28 GetFileSize CreateFileMappingA 2259->2260 2261 504fe9 2260->2261 2262 504f4b 2260->2262 2264 504fdc CloseHandle 2261->2264 2262->2261 2263 504f54 MapViewOfFile 2262->2263 2265 504f67 2263->2265 2270 504f6c 2263->2270 2264->2258 2266 504fd2 CloseHandle 2265->2266 2266->2264 2267 504fcb UnmapViewOfFile 2267->2266 2268 504f7c memset 2268->2270 2270->2267 2270->2268 2271 50463f lstrlen 2270->2271 2272 50465b 2271->2272 2273 50466d 2271->2273 2279 5045cf 2272->2279 2273->2270 2275 504669 2275->2273 2276 50469a lstrlen GetProcessHeap RtlAllocateHeap 2275->2276 2277 50467e lstrcmpiA 2275->2277 2276->2273 2278 5046c5 memset GetTickCount lstrcpy 2276->2278 2277->2273 2277->2275 2278->2273 2289 50402f lstrlen 2279->2289 2281 50461e 2288 5045e1 2281->2288 2331 504449 2281->2331 2284 5045dc 2284->2281 2286 5045f2 lstrlen 2284->2286 2284->2288 2314 5042ce 2284->2314 2285 50462b 2285->2288 2335 50450e 2285->2335 2286->2284 2288->2275 2290 504044 2289->2290 2295 50404c 2289->2295 2290->2284 2291 504055 isspace 2293 504065 isalnum 2291->2293 2291->2295 2292 504090 2294 504092 strchr 2292->2294 2299 5040af 2292->2299 2293->2292 2293->2295 2294->2292 2294->2299 2295->2291 2295->2292 2296 5040fa 2296->2290 2298 50410b lstrlen 2296->2298 2297 5040bb isalnum 2297->2299 2300 5040de tolower 2297->2300 2301 504150 2298->2301 2299->2296 2299->2297 2299->2300 2300->2299 2302 50411a isspace 2301->2302 2303 50416d 2301->2303 2302->2301 2304 50412a strchr 2302->2304 2305 5041c2 lstrlen 2303->2305 2306 50417f isalnum 2303->2306 2310 5041ad tolower 2303->2310 2304->2301 2307 504140 isalnum 2304->2307 2313 504209 2305->2313 2306->2303 2307->2301 2308 5041d3 isspace 2311 5041e5 strchr 2308->2311 2308->2313 2309 504224 lstrlen 2309->2290 2310->2303 2312 5041fa isalnum 2311->2312 2311->2313 2312->2313 2313->2308 2313->2309 2315 5042d7 2314->2315 2316 5042da 2314->2316 2315->2284 2317 50430a lstrlen 2316->2317 2330 504417 2316->2330 2318 504315 2317->2318 2319 504339 lstrlen 2318->2319 2318->2330 2320 504354 2319->2320 2319->2330 2320->2330 2341 504244 2320->2341 2323 504383 2324 50438c lstrlen 2323->2324 2323->2330 2325 50439d 2324->2325 2324->2330 2326 5043a2 lstrlen 2325->2326 2325->2330 2328 5043a7 2326->2328 2327 5043fa lstrlen lstrlen 2329 504425 lstrlen 2327->2329 2327->2330 2328->2327 2328->2330 2329->2330 2330->2284 2332 50445a 2331->2332 2333 50447a tolower 2332->2333 2334 504469 2332->2334 2333->2332 2333->2334 2334->2285 2336 504520 2335->2336 2337 50452a tolower 2336->2337 2340 504546 2336->2340 2337->2336 2337->2340 2338 504561 lstrcmp 2339 50457d 2338->2339 2338->2340 2339->2288 2340->2338 2340->2339 2342 504279 2341->2342 2344 504252 2341->2344 2343 5042b8 2342->2343 2349 504286 2342->2349 2346 5042b3 lstrlen 2343->2346 2347 5042bf lstrcpy 2343->2347 2344->2342 2345 50425d isspace 2344->2345 2345->2344 2346->2323 2346->2330 2347->2346 2348 504299 isspace 2348->2349 2349->2346 2349->2348 2351 5052bf 2350->2351 2359 5052cb 2350->2359 2352 5052d2 Sleep 2351->2352 2353 5052e5 lstrcpy lstrlen 2351->2353 2351->2359 2352->2351 2354 505310 lstrcat 2353->2354 2355 505322 lstrcat memset 2353->2355 2354->2355 2363 50534c 2355->2363 2356 505358 FindFirstFileA 2356->2363 2357 50537b FindNextFileA 2358 505438 FindClose 2357->2358 2357->2363 2358->2359 2359->2244 2360 5053b0 lstrcpy lstrlen 2361 5053e1 lstrcat 2360->2361 2362 5053cf lstrcat 2360->2362 2361->2363 2364 5053fe Sleep 2361->2364 2362->2361 2363->2356 2363->2357 2363->2359 2363->2360 2367 505131 2363->2367 2365 5052ad 68 API calls 2364->2365 2365->2363 2368 505299 2367->2368 2370 505141 2367->2370 2368->2363 2369 50516e lstrcpyn CharLowerA 2371 505167 2369->2371 2370->2369 2370->2371 2371->2368 2372 505278 Sleep 2371->2372 2373 50528c 2371->2373 2372->2371 2374 505291 2373->2374 2375 50529b 2373->2375 2379 504e00 GetProcessHeap RtlAllocateHeap 2374->2379 2375->2368 2376 5052a0 2375->2376 2378 504eea 48 API calls 2376->2378 2378->2368 2380 504e23 2379->2380 2381 504e2b CreateFileA 2379->2381 2380->2368 2382 504ed0 2381->2382 2388 504e50 2381->2388 2383 504ed3 GetProcessHeap RtlFreeHeap 2382->2383 2383->2380 2384 504eb6 ReadFile 2385 504ec2 FindCloseChangeNotification 2384->2385 2384->2388 2385->2383 2388->2382 2388->2384 2388->2385 2389 504c29 2388->2389 2395 504d0c 2388->2395 2394 504c38 2389->2394 2392 504d05 2392->2388 2393 504c8b memcpy 2393->2394 2394->2392 2394->2393 2399 50343e 2394->2399 2403 5034b8 2394->2403 2396 504df8 2395->2396 2397 504d24 2395->2397 2396->2388 2397->2396 2398 50463f 40 API calls 2397->2398 2398->2397 2400 50347c 2399->2400 2402 50344b 2399->2402 2400->2394 2401 503454 tolower tolower 2401->2400 2401->2402 2402->2400 2402->2401 2404 503618 2403->2404 2411 5034d1 2403->2411 2404->2394 2405 5034ed isdigit 2405->2411 2406 50353f memset 2407 503562 WideCharToMultiByte 2406->2407 2406->2411 2407->2411 2408 503582 lstrlen 2409 50359b lstrlen 2408->2409 2410 5035ec lstrlen memcpy 2408->2410 2409->2411 2410->2411 2411->2404 2411->2405 2411->2406 2411->2408 2411->2410 2425 504ae2 2412->2425 2836 5030f0 2415->2836 2418 5030f0 3 API calls 2419 503142 FindWindowA 2418->2419 2420 5030f0 3 API calls 2419->2420 2421 503152 RtlExitUserThread 2420->2421 2422 50315c GetModuleHandleA 2421->2422 2423 5031dc 2422->2423 2424 5031cd GetProcAddress 2422->2424 2424->2423 2428 504af2 2425->2428 2427 504b00 Sleep 2427->2428 2428->2427 2429 504b99 CreateThread 2428->2429 2431 504bba CloseHandle 2428->2431 2432 504bec GetTickCount 2428->2432 2433 504b61 2428->2433 2436 503620 GetModuleHandleA 2428->2436 2429->2428 2496 504a37 InterlockedIncrement GetCurrentThread SetThreadPriority 2429->2496 2431->2427 2432->2428 2434 504bfd 2432->2434 2433->2428 2441 504a85 2433->2441 2434->2427 2446 5047b7 2434->2446 2437 503672 GetProcAddress 2436->2437 2438 503664 LoadLibraryA 2436->2438 2439 503682 2437->2439 2440 503687 InternetGetConnectedState 2437->2440 2438->2437 2438->2439 2439->2428 2440->2428 2443 504a94 2441->2443 2442 504adf 2442->2433 2443->2442 2444 504a9a GetTickCount 2443->2444 2445 504ac1 GetProcessHeap HeapFree 2443->2445 2444->2443 2444->2445 2445->2443 2447 50486e 2446->2447 2448 5047d2 2446->2448 2447->2434 2448->2447 2449 50481c lstrcpyn lstrlen GetProcessHeap RtlAllocateHeap 2448->2449 2449->2447 2450 50484d lstrcpy CreateThread 2449->2450 2450->2447 2451 50477f GetCurrentThread SetThreadPriority 2450->2451 2452 504797 2451->2452 2453 5047ae RtlExitUserThread 2451->2453 2456 504708 memset 2452->2456 2464 507730 memset memset 2456->2464 2459 504741 memset 2488 507940 2459->2488 2460 50477b GetProcessHeap HeapFree 2460->2453 2463 504e00 57 API calls 2463->2460 2467 507763 2464->2467 2465 507771 lstrcpy 2469 5077fc 2465->2469 2467->2465 2468 50779a 2467->2468 2471 5077b0 lstrcat 2468->2471 2472 5077bb 2468->2472 2470 50781f wsprintfA 2469->2470 2473 507835 2470->2473 2471->2472 2476 5077f1 lstrcat 2472->2476 2477 5077cb lstrcat 2472->2477 2474 50784d wsprintfA 2473->2474 2475 50789f 2473->2475 2487 50785f 2474->2487 2478 5078a7 wsprintfA 2475->2478 2479 5078df 2475->2479 2476->2469 2480 5077db 2477->2480 2478->2487 2481 5078e7 wsprintfA 2479->2481 2482 50792f 2479->2482 2480->2476 2483 5077e6 lstrcat 2480->2483 2481->2487 2484 507937 wsprintfA 2482->2484 2483->2476 2486 504735 2484->2486 2485 507920 lstrlen 2485->2484 2486->2459 2486->2460 2487->2485 2487->2486 2489 507952 2488->2489 2490 507955 GetModuleHandleA 2488->2490 2489->2490 2491 507970 GetProcAddress 2490->2491 2492 507965 LoadLibraryA 2490->2492 2493 504763 2491->2493 2494 507985 2491->2494 2492->2491 2492->2493 2493->2460 2493->2463 2494->2493 2495 5079a0 lstrcpy 2494->2495 2495->2493 2497 504a66 2496->2497 2498 504a5c 2496->2498 2500 504a74 InterlockedDecrement 2497->2500 2501 504a7b RtlExitUserThread 2497->2501 2502 5049c5 2498->2502 2500->2501 2503 5049d9 2502->2503 2504 5049ea lstrcpyn 2503->2504 2509 504a28 2503->2509 2512 504971 2504->2512 2506 504a02 2506->2509 2527 506966 2506->2527 2509->2497 2511 504a1f GlobalFree 2511->2509 2574 504874 2512->2574 2514 504981 2514->2506 2515 50497c 2515->2514 2579 503ff8 2515->2579 2518 5049a2 2582 50489d 2518->2582 2519 504994 GetTickCount 2519->2518 2520 50499e 2519->2520 2520->2506 2523 504874 lstrcmpiA 2524 5049af 2523->2524 2525 5049bc 2524->2525 2590 50400c 2524->2590 2525->2520 2528 504a0f 2527->2528 2529 50697e lstrlen 2527->2529 2528->2509 2554 5071f8 2528->2554 2529->2528 2530 50698e memset 2529->2530 2531 5069af 2530->2531 2602 505a21 2531->2602 2533 5069f2 2605 505a45 2533->2605 2542 506a25 GlobalAlloc 2543 506a75 2542->2543 2544 506a57 2542->2544 2546 506a8a 2543->2546 2547 506a7d DeleteFileA 2543->2547 2679 5067c2 2544->2679 2546->2528 2549 506a8f GlobalFree 2546->2549 2547->2546 2548 506a64 2684 506895 lstrlen wsprintfA lstrlen wsprintfA lstrlen 2548->2684 2549->2528 2552 506a9c 2552->2528 2553 506aa4 DeleteFileA 2552->2553 2553->2528 2555 507253 2554->2555 2556 507208 2554->2556 2555->2511 2775 506b89 2556->2775 2558 50721e 2558->2555 2559 507258 lstrcpy 2558->2559 2564 507271 2559->2564 2560 5072aa 2562 5072fd lstrcpy 2560->2562 2565 5072cd lstrcpy lstrcat 2560->2565 2566 507367 2560->2566 2569 506b54 2 API calls 2560->2569 2571 5072e8 2560->2571 2572 507328 htons 2560->2572 2562->2560 2563 507280 htons 2785 506e01 2563->2785 2564->2560 2564->2563 2564->2571 2781 506b54 inet_addr 2564->2781 2565->2560 2815 507093 wsprintfA wsprintfA RegOpenKeyExA 2566->2815 2569->2560 2571->2511 2573 506e01 16 API calls 2572->2573 2573->2560 2575 50488f 2574->2575 2576 504895 2575->2576 2577 50487d lstrcmpiA 2575->2577 2576->2515 2577->2575 2578 504899 2577->2578 2578->2515 2594 503e35 GetModuleHandleA 2579->2594 2583 5048da GetProcessHeap RtlAllocateHeap 2582->2583 2584 5048af 2582->2584 2585 5048f4 2583->2585 2586 5048f9 memset lstrcpyn GetTickCount 2583->2586 2584->2583 2584->2585 2587 504936 GetTickCount 2584->2587 2585->2523 2586->2585 2588 50400c 2 API calls 2587->2588 2589 504953 lstrcpyn 2588->2589 2589->2585 2591 504014 2590->2591 2592 50402d 2590->2592 2593 504015 GetProcessHeap HeapFree 2591->2593 2592->2525 2593->2592 2593->2593 2595 503e56 GetProcAddress 2594->2595 2596 503e4b LoadLibraryA 2594->2596 2597 503e7a 2595->2597 2598 503e66 DnsQuery_A 2595->2598 2596->2595 2596->2597 2597->2518 2597->2519 2598->2597 2599 503e7e 2598->2599 2599->2597 2600 503e98 GetProcessHeap RtlAllocateHeap 2599->2600 2600->2597 2601 503eae memset lstrcpyn 2600->2601 2601->2599 2603 505a27 lstrcpy 2602->2603 2603->2533 2606 505a60 2605->2606 2607 505b25 2605->2607 2609 505ab7 lstrcpy lstrcat 2606->2609 2608 505b61 2607->2608 2613 505bba lstrcpy 2607->2613 2610 505b95 lstrcat lstrcpy 2608->2610 2614 505ad1 2609->2614 2611 505bd2 2610->2611 2616 505bf9 strstr 2611->2616 2612 505af5 lstrcat lstrcat lstrcat lstrcpy lstrcat 2612->2611 2615 505a21 lstrcpy 2613->2615 2614->2612 2615->2611 2617 505c13 2616->2617 2619 505c6e 2616->2619 2617->2619 2620 505c26 2617->2620 2618 505c81 2624 505d63 lstrcpy wsprintfA 2618->2624 2619->2618 2623 505d08 lstrcpy 2619->2623 2621 505c48 lstrcpy lstrcpy lstrcpy 2620->2621 2622 505dc3 2621->2622 2629 505dc7 2622->2629 2623->2618 2625 505d99 2624->2625 2626 505db7 2625->2626 2627 505dbc CharUpperA 2625->2627 2628 505dac CharUpperBuffA 2625->2628 2626->2622 2626->2627 2627->2622 2628->2622 2630 505dd0 2629->2630 2631 505e98 lstrcpy 2630->2631 2632 505dde 2630->2632 2631->2632 2633 505ece 2632->2633 2634 505ed3 CharUpperA 2632->2634 2635 505ebd CharUpperBuffA 2632->2635 2633->2634 2636 505ee0 2633->2636 2634->2636 2635->2636 2637 505faf 2636->2637 2638 505fcb 2637->2638 2639 505ff0 GetModuleFileNameA 2638->2639 2640 506014 GetTempPathA 2638->2640 2716 505f2a GetTempPathA GetTempFileNameA CopyFileA 2639->2716 2642 506036 GetTempFileNameA GetModuleFileNameA CopyFileA 2640->2642 2643 50633f 2640->2643 2693 505ee3 CreateFileA 2642->2693 2643->2528 2643->2542 2644 50600e 2646 50623d 2644->2646 2648 5062d0 CreateFileA 2646->2648 2653 50625d GetTempPathA GetTempFileNameA 2646->2653 2649 5062f7 2648->2649 2650 50632f 2648->2650 2649->2650 2651 5062fc GetFileSize CloseHandle 2649->2651 2650->2643 2655 50631d 2650->2655 2654 50632b 2651->2654 2651->2655 2652 506339 DeleteFileA 2652->2643 2659 5057e6 27 API calls 2653->2659 2654->2643 2655->2643 2655->2652 2656 5060b8 2657 5060e2 2656->2657 2658 5060ef lstrcpy lstrcat 2656->2658 2700 5057e6 CreateFileA 2657->2700 2668 50611c 2658->2668 2660 50629f 2659->2660 2661 5062b5 DeleteFileA lstrcpy 2660->2661 2662 5062a6 DeleteFileA 2660->2662 2661->2648 2662->2648 2665 50614f lstrcat 2667 50615d 2665->2667 2666 506219 DeleteFileA wsprintfA 2666->2646 2669 506185 lstrcat 2667->2669 2671 506172 lstrcat 2667->2671 2668->2665 2670 506198 2669->2670 2672 5061d7 lstrcat 2670->2672 2673 5061ac 2670->2673 2671->2669 2671->2671 2676 5061c1 lstrcat 2672->2676 2674 5061c8 lstrcat 2673->2674 2675 5061af 2673->2675 2674->2676 2675->2676 2677 5061b2 lstrcat 2675->2677 2676->2657 2677->2676 2680 5067de 2679->2680 2681 5067ea 8 API calls 2680->2681 2740 5032cb 2681->2740 2683 506869 lstrcat lstrlen wsprintfA lstrcat 2683->2548 2746 506518 2684->2746 2686 5068ea lstrcat 2687 5068fd 2686->2687 2688 506915 lstrlen wsprintfA lstrlen 2687->2688 2750 50666d CreateFileA 2688->2750 2691 506947 2691->2543 2691->2552 2692 50694c lstrlen wsprintfA 2692->2691 2694 505f07 2693->2694 2695 505f28 GetTempPathA GetTempFileNameA 2693->2695 2696 503697 6 API calls 2694->2696 2695->2643 2695->2656 2697 505f11 SetFilePointer 2696->2697 2721 50754a 2697->2721 2701 505a19 2700->2701 2702 50581c 2700->2702 2701->2652 2701->2666 2702->2701 2703 505824 CreateFileA 2702->2703 2704 505843 2703->2704 2705 505a14 2703->2705 2704->2705 2706 50584b memset memset memset 2704->2706 2707 505a07 CloseHandle 2705->2707 2729 505717 GetSystemTime 2706->2729 2707->2701 2711 5058b7 8 API calls 2712 50595b ReadFile 2711->2712 2713 50593c 2712->2713 2714 50597c 6 API calls 2712->2714 2713->2714 2715 505941 WriteFile 2713->2715 2714->2707 2715->2712 2717 505ee3 18 API calls 2716->2717 2718 505f87 2717->2718 2719 505f93 DeleteFileA 2718->2719 2720 505f9a lstrcpy 2718->2720 2719->2720 2720->2644 2722 5073e8 5 API calls 2721->2722 2723 507560 CreateFileA 2722->2723 2724 505f20 CloseHandle 2723->2724 2725 507588 2723->2725 2724->2695 2726 5075cd ReadFile 2725->2726 2727 5075a5 WriteFile 2726->2727 2728 5075d7 CloseHandle 2726->2728 2727->2726 2728->2724 2730 50574a 2729->2730 2731 505772 SetFilePointer 2730->2731 2732 5057b9 ReadFile 2731->2732 2733 5057d2 SetFilePointer 2732->2733 2734 50579c 2732->2734 2733->2711 2734->2732 2734->2733 2736 5056d5 2734->2736 2737 5056de 2736->2737 2739 5056e3 2736->2739 2738 50568c malloc 2737->2738 2738->2739 2739->2734 2741 5032e8 FileTimeToLocalFileTime FileTimeToSystemTime 2740->2741 2742 5032dc GetLocalTime 2740->2742 2743 503303 GetTimeZoneInformation 2741->2743 2742->2743 2744 503319 wsprintfA 2743->2744 2744->2683 2748 506521 2746->2748 2747 50652f 2747->2686 2748->2747 2758 50641f 2748->2758 2751 50669c 2750->2751 2757 5066a4 2750->2757 2751->2691 2751->2692 2752 5066bb ReadFile 2754 50677d 2752->2754 2752->2757 2753 5067ab CloseHandle 2753->2751 2754->2753 2755 50679a 2754->2755 2755->2753 2756 506767 memset 2756->2757 2757->2752 2757->2756 2762 50642d 2758->2762 2760 506509 lstrlen 2760->2762 2761 506452 2761->2747 2762->2761 2763 50641f 7 API calls 2762->2763 2764 506346 2762->2764 2763->2762 2765 5063b1 2764->2765 2768 506351 2764->2768 2766 5063b6 2765->2766 2773 5063d3 2765->2773 2767 5063bb 2766->2767 2766->2768 2770 5032cb GetLocalTime FileTimeToLocalFileTime FileTimeToSystemTime GetTimeZoneInformation wsprintfA 2767->2770 2772 506361 2767->2772 2769 506381 lstrcpy 2768->2769 2768->2772 2769->2760 2771 5063c8 2770->2771 2771->2760 2772->2760 2774 506400 wsprintfA 2773->2774 2774->2772 2779 506ba1 2775->2779 2780 506c8e 2775->2780 2776 506c38 lstrlen 2777 506c4e lstrlen 2776->2777 2776->2779 2777->2779 2778 506c6d CharLowerA lstrcmpiA 2778->2779 2778->2780 2779->2776 2779->2778 2779->2780 2780->2558 2782 506b63 2781->2782 2783 506b6c gethostbyname 2781->2783 2782->2783 2784 506b77 2782->2784 2783->2784 2784->2564 2786 506b89 4 API calls 2785->2786 2787 506e25 2786->2787 2788 506b89 4 API calls 2787->2788 2791 506e82 2787->2791 2789 506e4d 2788->2789 2790 506e8a lstrcpy socket 2789->2790 2789->2791 2790->2791 2792 506eb8 connect 2790->2792 2791->2564 2793 507080 2792->2793 2794 506ecd 2792->2794 2795 507083 closesocket 2793->2795 2826 506d65 2794->2826 2795->2791 2798 506d65 5 API calls 2799 506f12 2798->2799 2800 506f39 2799->2800 2801 506d65 5 API calls 2799->2801 2800->2793 2802 506d65 5 API calls 2800->2802 2801->2800 2803 506f6e 2802->2803 2803->2793 2804 506d65 5 API calls 2803->2804 2805 506fa0 2804->2805 2805->2793 2806 506d65 5 API calls 2805->2806 2808 506fc1 2806->2808 2807 507042 send 2809 506d65 5 API calls 2807->2809 2808->2793 2808->2807 2810 507017 send 2808->2810 2811 507028 send 2808->2811 2812 50705b 2809->2812 2810->2811 2811->2793 2811->2808 2812->2793 2813 506d65 5 API calls 2812->2813 2814 50707a 2813->2814 2814->2795 2816 507103 2815->2816 2817 5070fb 2815->2817 2818 5071d5 RegEnumKeyA 2816->2818 2822 5071bc RegCloseKey 2816->2822 2823 506b54 2 API calls 2816->2823 2824 50718f htons 2816->2824 2817->2571 2819 5071e2 RegCloseKey 2818->2819 2820 507123 RegOpenKeyExA 2818->2820 2819->2817 2820->2816 2821 507148 memset RegQueryValueExA 2820->2821 2821->2816 2821->2822 2822->2816 2822->2819 2823->2816 2825 506e01 16 API calls 2824->2825 2825->2816 2827 506d78 wvsprintfA lstrlen send 2826->2827 2830 506daa 2826->2830 2827->2830 2829 506dfb 2829->2793 2829->2798 2830->2829 2831 506ab8 2830->2831 2832 506b41 2831->2832 2835 506acf 2831->2835 2832->2830 2833 506b1c recv 2833->2832 2833->2835 2834 506adf select 2834->2832 2834->2833 2835->2832 2835->2833 2835->2834 2837 503119 FindWindowA 2836->2837 2838 5030fc PostMessageA PostMessageA PostMessageA 2836->2838 2837->2418 2838->2837 2839 503ef3 GetModuleHandleA 2840 503f11 LoadLibraryA 2839->2840 2841 503f0c 2839->2841 2842 503f18 2840->2842 2841->2840 2841->2842 2843 503ff1 2842->2843 2844 503f29 GetProcAddress 2842->2844 2844->2843 2845 503f3f GetProcessHeap RtlAllocateHeap 2844->2845 2849 503f63 2845->2849 2846 503fde GetProcessHeap HeapFree 2846->2843 2847 503f80 htons inet_addr 2848 503fa5 gethostbyname 2847->2848 2847->2849 2848->2849 2849->2843 2849->2846 2849->2847 2849->2848 2851 503dff 2849->2851 2852 503e06 2851->2852 2854 503e30 2852->2854 2855 503e22 Sleep 2852->2855 2856 503b7c GetProcessHeap RtlAllocateHeap 2852->2856 2854->2849 2855->2852 2855->2854 2857 503bb3 socket 2856->2857 2858 503bac 2856->2858 2859 503de7 GetProcessHeap HeapFree 2857->2859 2860 503bce 2857->2860 2858->2852 2859->2858 2860->2859 2875 503bd7 2860->2875 2861 503bf5 htons 2876 503819 memset GetTickCount htons 2861->2876 2863 503c1b select 2864 503c4d memset recv 2863->2864 2863->2875 2864->2875 2865 503db8 2866 503dc7 GetProcessHeap HeapFree closesocket 2865->2866 2866->2858 2867 503c7d htons 2867->2865 2867->2875 2868 503c9e htons 2868->2865 2868->2875 2871 503d08 GetProcessHeap RtlAllocateHeap 2872 503d23 memset htons 2871->2872 2871->2875 2889 503983 2872->2889 2874 503d61 GetProcessHeap HeapFree 2874->2875 2875->2861 2875->2863 2875->2865 2875->2866 2875->2867 2875->2868 2875->2871 2875->2874 2879 503a35 2875->2879 2893 503a16 2875->2893 2877 5038d7 htons htons sendto 2876->2877 2878 503881 2876->2878 2877->2875 2878->2877 2880 503a56 2879->2880 2882 503a4f 2879->2882 2897 50392a htons 2880->2897 2882->2875 2883 503aa2 memset 2884 503983 htons 2883->2884 2888 503a66 2884->2888 2885 503ad8 htons htons htons 2885->2882 2886 503b13 GetProcessHeap RtlAllocateHeap 2885->2886 2886->2882 2887 503b31 memset 2886->2887 2887->2888 2888->2882 2888->2883 2888->2885 2890 5039f5 2889->2890 2892 50399b 2889->2892 2890->2875 2891 5039d5 htons 2891->2890 2891->2892 2892->2890 2892->2891 2894 503a1a 2893->2894 2896 503a33 2893->2896 2895 503a1b GetProcessHeap HeapFree 2894->2895 2895->2895 2895->2896 2896->2875 2898 50397d 2897->2898 2899 503948 2897->2899 2898->2888 2899->2898 2900 50396e htons 2899->2900 2900->2898 2900->2899 2901 502d8a memset gethostname lstrcat 2902 502e0b lstrcat lstrcat CreateMutexA GetLastError 2901->2902 2903 502ddd 2901->2903 2903->2902

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 158 5052ad-5052bd 159 5052cb-5052cd 158->159 160 5052bf-5052c4 158->160 161 5052ce-5052d1 159->161 160->159 162 5052c6-5052c9 160->162 162->159 163 5052dd-5052e3 162->163 164 5052d2-5052d7 Sleep 163->164 165 5052e5-50530e lstrcpy lstrlen 163->165 164->163 166 505310-50531c lstrcat 165->166 167 505322-505349 lstrcat memset 165->167 166->167 168 50534c-505356 167->168 169 505358-50536b FindFirstFileA 168->169 170 50537b-505386 FindNextFileA 168->170 171 505370-505373 169->171 172 50536d 169->172 173 505438-50543b FindClose 170->173 174 50538c-505393 170->174 175 505441-505444 171->175 176 505379 171->176 172->171 173->175 177 5053b0-5053cd lstrcpy lstrlen 174->177 178 505395-50539c 174->178 175->161 176->174 179 5053e1-5053fc lstrcat 177->179 180 5053cf-5053db lstrcat 177->180 178->168 181 50539e-5053a5 178->181 182 50541e-50542b call 505131 179->182 183 5053fe-505412 Sleep call 5052ad 179->183 180->179 181->177 184 5053a7-5053ae 181->184 188 505430-505433 182->188 187 505417-505419 183->187 184->168 184->177 187->168 188->168
                                              APIs
                                              • Sleep.KERNEL32(00000800,76228A60,00000184), ref: 005052D7
                                              • lstrcpy.KERNEL32(?,?), ref: 005052F4
                                              • lstrlen.KERNEL32(?), ref: 00505304
                                              • lstrcat.KERNEL32(?,00501190), ref: 0050531C
                                              • lstrcat.KERNEL32(?,*.*), ref: 0050532E
                                              • memset.MSVCRT ref: 00505341
                                              • FindFirstFileA.KERNELBASE(?,00000010), ref: 0050535F
                                              • FindNextFileA.KERNELBASE(?,?), ref: 0050537E
                                              • lstrcpy.KERNEL32(?,?), ref: 005053BA
                                              • lstrlen.KERNEL32(?), ref: 005053C3
                                              • lstrcat.KERNEL32(?,00501190), ref: 005053DB
                                              • lstrcat.KERNEL32(?,0000002E), ref: 005053EF
                                              • Sleep.KERNELBASE(0000004B), ref: 00505400
                                              • FindClose.KERNELBASE(?), ref: 0050543B
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.4568272926.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000007.00000002.4568241188.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568560619.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568609836.0000000000510000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_500000_java.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: lstrcat$Find$FileSleeplstrcpylstrlen$CloseFirstNextmemset
                                              • String ID: *.*$.$.
                                              • API String ID: 56755240-1892373925
                                              • Opcode ID: 34cc2739efd55a8dec5c8707a28d88c0ae17d04aa17f36ad44157fb3d89b558b
                                              • Instruction ID: dd7eaa64cc3021d8f9cf9a778dce5b9b88d54ccfb1cc30c989f9fa4e0a5d9972
                                              • Opcode Fuzzy Hash: 34cc2739efd55a8dec5c8707a28d88c0ae17d04aa17f36ad44157fb3d89b558b
                                              • Instruction Fuzzy Hash: 3B417B71C40A5DEBDF219BA0DC4DBDEBF7CBB05301F1084A2E645A2090E7749A89DF95
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              APIs
                                              • RegOpenKeyExA.KERNELBASE(80000001,?,00000000,00020019,?,76230F00), ref: 005050BE
                                              • memset.MSVCRT ref: 005050D5
                                              • RegQueryValueExA.KERNELBASE(?,00000000,00000000,00000000,?,?), ref: 005050F5
                                              • RegCloseKey.KERNELBASE(?), ref: 005050FE
                                                • Part of subcall function 00504EEA: CreateFileA.KERNEL32(00000020,80000000,00000003,00000000,00000003,00000080,00000000,76230F10,00000000), ref: 00504F0C
                                                • Part of subcall function 00504EEA: GetFileSize.KERNEL32(00000000,00000000), ref: 00504F2A
                                                • Part of subcall function 00504EEA: CreateFileMappingA.KERNEL32(00000000,00000000,00000002,00000000,00000000,00000000), ref: 00504F3A
                                                • Part of subcall function 00504EEA: MapViewOfFile.KERNEL32(00000000,00000004,00000000,00000000,00000000,00000000), ref: 00504F5B
                                                • Part of subcall function 00504EEA: CloseHandle.KERNEL32(?), ref: 00504FD5
                                                • Part of subcall function 00504EEA: CloseHandle.KERNEL32(?), ref: 00504FDF
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.4568272926.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000007.00000002.4568241188.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568560619.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568609836.0000000000510000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_500000_java.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: File$Close$CreateHandle$MappingOpenQuerySizeValueViewmemset
                                              • String ID: $ $4$A$A$B$B$F$M$N$S$W$W$W$\$\$\$\$a$a$a$b$c$e$e$e$f$f$i$i$l$m$o$o$o$r$r$s$t$t$w
                                              • API String ID: 1447734293-2356155605
                                              • Opcode ID: 677459de2a13ac9aaaeb7965c8c2d1de803a57408f06097325033d5e59273e1f
                                              • Instruction ID: d5002688ff9bd9582a131d6a7ee4c8a73c9f60058928140604e211d2a98eee7b
                                              • Opcode Fuzzy Hash: 677459de2a13ac9aaaeb7965c8c2d1de803a57408f06097325033d5e59273e1f
                                              • Instruction Fuzzy Hash: 5141F050D082CDDDFB02C6A8D948BDEBFB55B26748F0840D8D5847A282D3FB1658C77A
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 6 505faf-505fd7 call 5033b4 9 505fe0-505fee 6->9 10 505fd9 6->10 11 505ff0-50600f GetModuleFileNameA call 505f2a 9->11 12 506014-506030 GetTempPathA 9->12 10->9 19 50623d-506244 11->19 14 506036-5060b2 GetTempFileNameA GetModuleFileNameA CopyFileA call 505ee3 GetTempPathA GetTempFileNameA 12->14 15 50633f-506341 12->15 14->15 23 5060b8-5060d0 call 5033b4 14->23 16 506342-506345 15->16 21 5062d0-5062f5 CreateFileA 19->21 22 50624a-50625b call 5033b4 19->22 25 5062f7-5062fa 21->25 26 50632f-506336 21->26 22->21 33 50625d-5062a4 GetTempPathA GetTempFileNameA call 5057e6 22->33 36 5060d2 23->36 37 5060d9-5060e0 23->37 25->26 29 5062fc-50631b GetFileSize CloseHandle 25->29 26->15 31 506338 26->31 34 50632b-50632d 29->34 35 50631d-506324 29->35 32 506339 DeleteFileA 31->32 32->15 46 5062b5-5062ca DeleteFileA lstrcpy 33->46 47 5062a6-5062b3 DeleteFileA 33->47 34->16 35->15 41 506326-506329 35->41 36->37 38 5060e2-5060ea 37->38 39 5060ef-506127 lstrcpy lstrcat call 5033b4 37->39 42 5061fb-506213 call 5057e6 38->42 49 506129 39->49 50 50614a 39->50 41->32 42->32 55 506219-50623b DeleteFileA wsprintfA 42->55 46->21 47->21 52 506143-506148 49->52 53 50612b-50612e 49->53 54 50614f-50616d lstrcat call 5033b4 50->54 52->54 56 506130-506133 53->56 57 50613c-506141 53->57 61 506185-5061aa lstrcat call 5033b4 54->61 62 50616f 54->62 55->19 56->52 59 506135-50613a 56->59 57->54 59->54 66 5061d7-5061df lstrcat 61->66 67 5061ac-5061ad 61->67 64 506172-506183 lstrcat 62->64 64->61 64->64 70 5061e4 66->70 68 5061c8-5061d5 lstrcat 67->68 69 5061af-5061b0 67->69 68->70 71 5061c1-5061c6 69->71 72 5061b2-5061bf lstrcat 69->72 73 5061ea-5061fa lstrcat 70->73 71->73 72->70 73->42
                                              APIs
                                              • GetModuleFileNameA.KERNEL32(00000000,?,00000104,00504A0F,00000000), ref: 00506002
                                              • GetTempPathA.KERNEL32(00000104,?,00504A0F,00000000), ref: 00506023
                                              • GetTempFileNameA.KERNELBASE(00000000,tmp,00000000,?), ref: 0050604C
                                              • GetModuleFileNameA.KERNEL32(00000000,00000000,00000104), ref: 0050605B
                                              • CopyFileA.KERNEL32(00000000,?,00000000), ref: 00506070
                                                • Part of subcall function 00505EE3: CreateFileA.KERNELBASE(00000003,C0000000,00000003,00000000,00000003,00000080,00000000,?,00506082,?), ref: 00505EFA
                                                • Part of subcall function 00505EE3: SetFilePointer.KERNELBASE(00000000,00000000,00000000,00000000), ref: 00505F14
                                                • Part of subcall function 00505EE3: CloseHandle.KERNEL32(00000000), ref: 00505F22
                                              • GetTempPathA.KERNEL32(00000104,00000000), ref: 00506094
                                              • GetTempFileNameA.KERNELBASE(00000000,tmp,00000000,?), ref: 005060A9
                                              • lstrcpy.KERNEL32(?,?), ref: 005060FD
                                              • lstrcat.KERNEL32(?,00501830), ref: 00506115
                                              • lstrcat.KERNEL32(?,doc), ref: 00506156
                                              • lstrcat.KERNEL32(?,00501870), ref: 0050617E
                                              • lstrcat.KERNEL32(?,00501830), ref: 00506191
                                              • lstrcat.KERNEL32(?,00502734), ref: 005061B8
                                              • lstrcat.KERNEL32(?,0050272C), ref: 005061CE
                                              • lstrcat.KERNEL32(?,00502724), ref: 005061DD
                                              • lstrcat.KERNEL32(?,00502720), ref: 005061EB
                                              • DeleteFileA.KERNELBASE(?), ref: 00506219
                                              • wsprintfA.USER32 ref: 00506232
                                              • GetTempPathA.KERNEL32(00000104,?), ref: 00506265
                                              • GetTempFileNameA.KERNEL32(?,tmp,00000000,00000000), ref: 0050627F
                                              • DeleteFileA.KERNEL32(00000000), ref: 005062AD
                                              • DeleteFileA.KERNEL32(?), ref: 005062B6
                                              • lstrcpy.KERNEL32(?,00000000), ref: 005062C4
                                              • CreateFileA.KERNELBASE(?,80000000,00000003,00000000,00000003,00000080,00000000), ref: 005062EA
                                              • GetFileSize.KERNEL32(00000000,00000000), ref: 00506304
                                              • CloseHandle.KERNEL32( jP), ref: 0050630F
                                              • DeleteFileA.KERNEL32(?), ref: 00506339
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.4568272926.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000007.00000002.4568241188.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568560619.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568609836.0000000000510000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_500000_java.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: File$lstrcat$Temp$Name$Delete$Path$CloseCreateHandleModulelstrcpy$CopyPointerSizewsprintf
                                              • String ID: jP$%s.zip$com$doc$htm$html$tmp$txt
                                              • API String ID: 3181343175-3074387375
                                              • Opcode ID: 094a3e60c7db3f626dd2b72ad45e081d1d3724dcec7c9d95af63d3e43eb12e98
                                              • Instruction ID: 215d56b1a9a915398b7b7de64b2b15009c2de42112ae2f90419e4ee996d24c39
                                              • Opcode Fuzzy Hash: 094a3e60c7db3f626dd2b72ad45e081d1d3724dcec7c9d95af63d3e43eb12e98
                                              • Instruction Fuzzy Hash: 54A1B4B1940659AEDB209760CC8DFEF7FADFB51300F04085AF296D20C1D6B49A98DB66
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              APIs
                                              • CreateFileA.KERNELBASE(?,80000000,00000003,00000000,00000003,00000080,00000000,76228A60,?,00000104), ref: 0050580E
                                              • CreateFileA.KERNELBASE(?,40000000,00000003,00000000,00000002,00000080,00000000), ref: 00505833
                                              • memset.MSVCRT ref: 00505852
                                              • memset.MSVCRT ref: 0050585E
                                              • memset.MSVCRT ref: 0050586A
                                                • Part of subcall function 00505717: GetSystemTime.KERNEL32(0000002E,0000002E,?,00000000,0000001E), ref: 00505721
                                                • Part of subcall function 00505772: SetFilePointer.KERNELBASE(00000000,00000000,00000000,00000000,00000000,00000000,76233130), ref: 00505786
                                                • Part of subcall function 00505772: ReadFile.KERNELBASE(00000000,?,00000400,0000001E,00000000), ref: 005057CC
                                                • Part of subcall function 00505772: SetFilePointer.KERNELBASE(00000000,00000000,00000000,00000000), ref: 005057D8
                                              • GetFileSize.KERNEL32(?,00000000), ref: 005058CA
                                              • GetFileSize.KERNEL32(?,00000000), ref: 005058D6
                                              • lstrlen.KERNEL32(00506207), ref: 005058E7
                                              • WriteFile.KERNELBASE(00000000,04034B50,0000001E,?,00000000), ref: 0050590E
                                              • lstrlen.KERNEL32(00506207,?,00000000), ref: 00505918
                                              • WriteFile.KERNELBASE(?,00506207,00000000), ref: 00505921
                                              • lstrlen.KERNEL32(00506207), ref: 00505926
                                              • SetFilePointer.KERNELBASE(?,00000000,00000000,00000000), ref: 00505934
                                              • WriteFile.KERNELBASE(?,?,?,?,00000000), ref: 00505953
                                              • ReadFile.KERNELBASE(?,?,00000400,?,00000000), ref: 00505972
                                              • WriteFile.KERNELBASE(?,?,0000002E,?,00000000), ref: 005059A8
                                              • lstrlen.KERNEL32(00506207,?,00000000), ref: 005059B2
                                              • WriteFile.KERNELBASE(?,00506207,00000000), ref: 005059BB
                                              • lstrlen.KERNEL32(00506207), ref: 005059C0
                                              • WriteFile.KERNELBASE(?,06054B50,00000016,?,00000000), ref: 005059FC
                                              • CloseHandle.KERNEL32(?), ref: 00505A01
                                              • CloseHandle.KERNEL32(?), ref: 00505A0A
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.4568272926.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000007.00000002.4568241188.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568560619.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568609836.0000000000510000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_500000_java.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: File$Write$lstrlen$Pointermemset$CloseCreateHandleReadSize$SystemTime
                                              • String ID:
                                              • API String ID: 2136260124-3916222277
                                              • Opcode ID: 481d2e45d31b4b1407c013f5c1c3bd1dc6fb6bd0b0a7f5ed78220b9d1ce30f4e
                                              • Instruction ID: 773f872c4516b25f3d46c8f58171cf100fa68b818a43c43766e7d6fd81e4158a
                                              • Opcode Fuzzy Hash: 481d2e45d31b4b1407c013f5c1c3bd1dc6fb6bd0b0a7f5ed78220b9d1ce30f4e
                                              • Instruction Fuzzy Hash: F0710275D1125CAADF21DFA4DD88ADFBBB8FF08350F10011AF514A6260E7319A44DBA9
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 91 506e01-506e2a call 506b89 94 506e82-506e85 91->94 95 506e2c-506e52 call 506d35 call 506b89 91->95 96 507090-507092 94->96 95->94 101 506e54-506e6f call 506d35 95->101 101->94 104 506e71-506e74 101->104 105 506e76-506e7b 104->105 106 506e7d-506e80 104->106 105->104 105->106 106->94 107 506e8a-506eae lstrcpy socket 106->107 108 506eb0-506eb3 107->108 109 506eb8-506ec7 connect 107->109 110 50708f 108->110 111 507080-507082 109->111 112 506ecd-506ee3 call 506d65 109->112 110->96 113 507083-50708e closesocket 111->113 112->111 116 506ee9-506eee 112->116 113->110 116->111 117 506ef4-506f17 call 506d65 116->117 120 506f20-506f3e call 506d65 117->120 121 506f19-506f1e 117->121 120->111 126 506f44-506f49 120->126 121->120 122 506f4f-506f73 call 506d65 121->122 122->111 128 506f79-506f80 122->128 126->111 126->122 128->111 129 506f86-506fa5 call 506d65 128->129 129->111 132 506fab-506fad 129->132 132->111 133 506fb3-506fc5 call 506d65 132->133 133->111 136 506fcb-506fd0 133->136 136->111 137 506fd6-506fdf 136->137 138 506fe2-506fe6 137->138 139 506ff5-506ffa 138->139 140 506fe8-506feb 139->140 141 506ffc-507001 139->141 142 507008-50700c 140->142 143 506fed-506ff0 140->143 141->142 144 507003-507006 141->144 142->141 143->141 145 506ff2-506ff3 143->145 144->142 146 50700e-507010 144->146 145->139 147 507042-50705f send call 506d65 146->147 148 507012-507015 146->148 147->111 154 507061-507066 147->154 150 507017-507025 send 148->150 151 507028-507038 send 148->151 150->151 151->111 152 50703a-507040 151->152 152->138 154->111 155 507068-50707e call 506d65 154->155 155->113
                                              APIs
                                                • Part of subcall function 00506B89: lstrlen.KERNEL32(00000000,00000000,00000000), ref: 00506C46
                                                • Part of subcall function 00506B89: lstrlen.KERNEL32(00000000), ref: 00506C55
                                                • Part of subcall function 00506B89: CharLowerA.USER32(00000000), ref: 00506C74
                                                • Part of subcall function 00506B89: lstrcmpiA.KERNEL32(00000000,?), ref: 00506C84
                                              • lstrcpy.KERNEL32(?,?), ref: 00506E94
                                              • socket.WS2_32(00000002,00000001,00000006), ref: 00506EA0
                                              • connect.WS2_32(00000000,00000002,00000010), ref: 00506EBF
                                              • send.WS2_32(00000000,00501830,00000001,00000000), ref: 00507023
                                              • send.WS2_32(00000000,005071AD,00000002,00000000), ref: 00507034
                                              • send.WS2_32(00000000,.,00000005,00000000), ref: 0050704E
                                              • closesocket.WS2_32(00000000), ref: 00507086
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.4568272926.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000007.00000002.4568241188.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568560619.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568609836.0000000000510000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_500000_java.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: send$lstrlen$CharLowerclosesocketconnectlstrcmpilstrcpysocket
                                              • String ID: .$%sO %s$DATA$E%s %s$From$HEL$HLO$IL F$MA%sROM:<%s>$PT T$QUIT$RC%sO:<%s>
                                              • API String ID: 461202756-3815809343
                                              • Opcode ID: 137dcdbcc398edce13df37ae931c225a0fe07400167ff2055b513371b32ddfb0
                                              • Instruction ID: 33585215259ea1a97b37e4a6d099c67cd5c3f73b094bdd9841701b712144618c
                                              • Opcode Fuzzy Hash: 137dcdbcc398edce13df37ae931c225a0fe07400167ff2055b513371b32ddfb0
                                              • Instruction Fuzzy Hash: 31611936F0421D6FDB309BA4CC5DBEE7FACBB58710F204562F644E22C1D6B09A948B50
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 189 502e50-502eb3 GetModuleFileNameA lstrcpy 190 502eb6-502ebf 189->190 191 502ec1-502ecd GetWindowsDirectoryA 190->191 192 502ecf-502ed5 GetTempPathA 190->192 193 502edb-502ee1 191->193 192->193 194 502f90-502f97 193->194 195 502ee7-502eff lstrlen 193->195 194->190 198 502f9d 194->198 196 502f01-502f0d lstrcat 195->196 197 502f0f-502f4a lstrcat SetFileAttributesA CreateFileA 195->197 196->197 199 502f4c-502f4f 197->199 200 502f7e-502f8b GetFileAttributesA 197->200 201 502fab-502faf 198->201 199->200 202 502f51-502f7c CloseHandle DeleteFileA CopyFileA 199->202 203 502f8e 200->203 202->203 203->194 204 502f9f-502fa9 lstrcpy 203->204 204->201
                                              APIs
                                              • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 00502E8E
                                              • lstrcpy.KERNEL32(.exe,?), ref: 00502EAB
                                              • GetWindowsDirectoryA.KERNEL32(?,00000118), ref: 00502EC7
                                              • GetTempPathA.KERNEL32(00000118,?), ref: 00502ED5
                                              • lstrlen.KERNEL32(?), ref: 00502EEE
                                              • lstrcat.KERNEL32(?,00501190), ref: 00502F0D
                                              • lstrcat.KERNEL32(?,java.exe), ref: 00502F1A
                                              • SetFileAttributesA.KERNELBASE(?,00000020), ref: 00502F25
                                              • CreateFileA.KERNELBASE(?,40000000,00000003,00000000,00000002,00000080,00000000), ref: 00502F42
                                              • CloseHandle.KERNEL32(00000000), ref: 00502F52
                                              • DeleteFileA.KERNEL32(?), ref: 00502F5F
                                              • CopyFileA.KERNEL32(?,?,00000000), ref: 00502F74
                                              • GetFileAttributesA.KERNELBASE(?), ref: 00502F85
                                              • lstrcpy.KERNEL32(?,?), ref: 00502FA9
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.4568272926.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000007.00000002.4568241188.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568560619.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568609836.0000000000510000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_500000_java.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: File$Attributeslstrcatlstrcpy$CloseCopyCreateDeleteDirectoryHandleModuleNamePathTempWindowslstrlen
                                              • String ID: .exe$java.exe
                                              • API String ID: 3096175462-2602780958
                                              • Opcode ID: 473512d9f1244c06d08cbd740965cc33da0b9b43a2f3904d5a041e8f1c7c422d
                                              • Instruction ID: dece3f8ae99a5382c4877d1b044eea6b25dfa7d2f7fe03871ebba1afd8658fdb
                                              • Opcode Fuzzy Hash: 473512d9f1244c06d08cbd740965cc33da0b9b43a2f3904d5a041e8f1c7c422d
                                              • Instruction Fuzzy Hash: 72416A7190429DAFEB10DBA4DC8DBDEBFBCAB18354F104096F585E6090DB749AC8CB21
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              APIs
                                              • lstrlen.KERNEL32(?,This is a multi-part message in MIME format.,00504A0F,?,00000000,?,?,00506A70,?), ref: 005068B1
                                              • wsprintfA.USER32 ref: 005068BC
                                              • lstrlen.KERNEL32(?,--%sContent-Type: text/plain;charset=us-asciiContent-Transfer-Encoding: 7bit,?,?,?,00506A70,?), ref: 005068D2
                                              • wsprintfA.USER32 ref: 005068D7
                                              • lstrlen.KERNEL32(?,?,?,?,?,?), ref: 005068DD
                                              • lstrcat.KERNEL32(?,), ref: 005068F2
                                              • lstrlen.KERNEL32(?,--%sContent-Type: application/octet-stream;name="%s"Content-Transfer-Encoding: base64Content-Disposition: %s;filename="%s",?,?,attachment,?,?,?,?,?,?), ref: 00506929
                                              • wsprintfA.USER32 ref: 0050692E
                                              • lstrlen.KERNEL32(?,?), ref: 00506937
                                              • lstrlen.KERNEL32(?,--%s--,?), ref: 00506955
                                              • wsprintfA.USER32 ref: 0050695A
                                              Strings
                                              • This is a multi-part message in MIME format., xrefs: 005068AB
                                              • --%s--, xrefs: 0050694F
                                              • --%sContent-Type: application/octet-stream;name="%s"Content-Transfer-Encoding: base64Content-Disposition: %s;filename="%s", xrefs: 00506923
                                              • attachment, xrefs: 00506906
                                              • , xrefs: 005068EC
                                              • --%sContent-Type: text/plain;charset=us-asciiContent-Transfer-Encoding: 7bit, xrefs: 005068C9
                                              • inline, xrefs: 00506910, 0050691E
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.4568272926.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000007.00000002.4568241188.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568560619.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568609836.0000000000510000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_500000_java.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: lstrlen$wsprintf$lstrcat
                                              • String ID: $--%s--$--%sContent-Type: application/octet-stream;name="%s"Content-Transfer-Encoding: base64Content-Disposition: %s;filename="%s"$--%sContent-Type: text/plain;charset=us-asciiContent-Transfer-Encoding: 7bit$This is a multi-part message in MIME format.$attachment$inline
                                              • API String ID: 3012818462-48772991
                                              • Opcode ID: d8a5b4ba0c87a80df2ab2dbe0b27be4406f16275184a865202cdbe473250b1af
                                              • Instruction ID: 3fdca0e5f0ffa1fa4bef71aa3ca571d11d6ceae177e96fc01e7fdd5b86b94422
                                              • Opcode Fuzzy Hash: d8a5b4ba0c87a80df2ab2dbe0b27be4406f16275184a865202cdbe473250b1af
                                              • Instruction Fuzzy Hash: 2B11E472A402047BDB04A769DC8EDBF3FADEFC1720F180426F904D61C1DA39D95066B5
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 217 5075e5-5075fe call 50746b 220 507601-507617 217->220 221 507627-50762d GetTempPathA 220->221 222 507619-507625 GetWindowsDirectoryA 220->222 223 507633-50763b 221->223 222->223 224 50766b-5076b7 lstrcat * 3 CreateFileA 223->224 225 50763d-507645 223->225 227 5076c8-507725 call 50737c FindCloseChangeNotification wsprintfA memset CreateProcessA 224->227 228 5076b9-5076c0 224->228 225->225 226 507647-507649 225->226 226->224 229 50764b-507655 226->229 233 50772b-50772f 227->233 228->220 230 5076c6 228->230 229->224 232 507657-50765a 229->232 230->233 232->224 235 50765c-507664 232->235 235->224
                                              APIs
                                                • Part of subcall function 0050746B: GetModuleFileNameA.KERNEL32(00000000,?,00000100,00000000,?), ref: 00507487
                                                • Part of subcall function 0050746B: CreateFileA.KERNELBASE(?,80000000,00000003,00000000,00000003,00000080,00000000), ref: 005074AA
                                                • Part of subcall function 0050746B: CreateFileA.KERNELBASE(?,C0000000,00000003,00000000,00000002,00000080,00000000), ref: 005074DC
                                                • Part of subcall function 0050746B: SetFilePointer.KERNELBASE(?,00000000,00000000,00000000), ref: 005074F5
                                                • Part of subcall function 0050746B: ReadFile.KERNELBASE(?,?,00000100,?,00000000), ref: 0050752E
                                                • Part of subcall function 0050746B: FindCloseChangeNotification.KERNELBASE(00000000), ref: 0050753E
                                                • Part of subcall function 0050746B: CloseHandle.KERNEL32(?), ref: 00507543
                                              • GetWindowsDirectoryA.KERNEL32(?,00000100,00000000,?), ref: 0050761F
                                                • Part of subcall function 0050737C: WriteFile.KERNELBASE(00000000,?,00000001,?,00000000,00000000,76228A60), ref: 005073BD
                                                • Part of subcall function 0050737C: WriteFile.KERNEL32(00000000,?,00000001,?,00000000,00000000,76228A60), ref: 005073E2
                                              • GetTempPathA.KERNEL32(00000100,?,00000000,?), ref: 0050762D
                                              • lstrcat.KERNEL32(?,services), ref: 00507677
                                              • lstrcat.KERNEL32(?,00501830), ref: 00507685
                                              • lstrcat.KERNEL32(?,exe), ref: 00507693
                                              • CreateFileA.KERNELBASE(?,C0000000,00000003,00000000,00000002,00000080,00000000), ref: 005076AC
                                              • FindCloseChangeNotification.KERNELBASE(00000000), ref: 005076D0
                                              • wsprintfA.USER32 ref: 005076E9
                                              • memset.MSVCRT ref: 005076F8
                                              • CreateProcessA.KERNELBASE(00000000,?,00000000,00000000,00000001,00000000,00000000,00000000,?,?), ref: 00507725
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.4568272926.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000007.00000002.4568241188.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568560619.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568609836.0000000000510000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_500000_java.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: File$Create$Closelstrcat$ChangeFindNotificationWrite$DirectoryHandleModuleNamePathPointerProcessReadTempWindowsmemsetwsprintf
                                              • String ID: "%s"$\$exe$services
                                              • API String ID: 1621132550-3764781487
                                              • Opcode ID: 5c317b5b59bea286267556cb9c01fb929164c3676ee251d47bdff0a625850d3a
                                              • Instruction ID: 5cab7ea6ea662128e4a800645ff2ec6955619924f35eec1abec093929e757c50
                                              • Opcode Fuzzy Hash: 5c317b5b59bea286267556cb9c01fb929164c3676ee251d47bdff0a625850d3a
                                              • Instruction Fuzzy Hash: 6D3184B1D04A9CEAEB109BA49C8DFEE7F7CFB48341F1004A1F245E61C1D6705E898A65
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 236 505449-5054fe 237 505503-50551f memset 236->237 238 505521-505527 GetWindowsDirectoryA 237->238 239 505529-50552e GetEnvironmentVariableA 237->239 240 505534-50553a 238->240 239->240 241 5055a2-5055a9 240->241 242 50553c-505554 lstrlen 240->242 241->237 243 5055af-5055b3 241->243 244 505564-505568 242->244 245 505556-505562 lstrcat 242->245 246 505585-50559b lstrcat call 5052ad 244->246 247 50556a-505583 lstrcat * 2 244->247 245->244 249 5055a0-5055a1 246->249 247->246 249->241
                                              APIs
                                              • memset.MSVCRT ref: 0050550C
                                              • GetWindowsDirectoryA.KERNEL32(?,00000184,00000000,76230F10,76230F00), ref: 00505521
                                              • GetEnvironmentVariableA.KERNEL32(USERPROFILE,?,00000184,00000000,76230F10,76230F00), ref: 0050552E
                                              • lstrlen.KERNEL32(?), ref: 00505543
                                              • lstrcat.KERNEL32(?,00501190), ref: 00505562
                                              • lstrcat.KERNEL32(?,Local Settings), ref: 00505575
                                              • lstrcat.KERNEL32(?,00501190), ref: 00505583
                                              • lstrcat.KERNEL32(?,Temporary Internet Files), ref: 00505590
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.4568272926.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000007.00000002.4568241188.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568560619.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568609836.0000000000510000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_500000_java.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: lstrcat$DirectoryEnvironmentVariableWindowslstrlenmemset
                                              • String ID: Local Settings$Temporary Internet Files$USERPROFILE
                                              • API String ID: 527352983-4053592351
                                              • Opcode ID: d3d72fad8d95c92e9146461b2fa435eca7b58b323d94a8347745e93cc0012726
                                              • Instruction ID: cacbc361b4096883e695f9cd27b791d52763dfaa7485a7004b5a6053e68340e0
                                              • Opcode Fuzzy Hash: d3d72fad8d95c92e9146461b2fa435eca7b58b323d94a8347745e93cc0012726
                                              • Instruction Fuzzy Hash: 63410C61C083CCDAEB11D7A8D9087DEBFB95F26348F0840D9D18476282D7BA5758CB76
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 250 503e35-503e49 GetModuleHandleA 251 503e56-503e64 GetProcAddress 250->251 252 503e4b-503e54 LoadLibraryA 250->252 253 503e7a-503e7c 251->253 254 503e66-503e78 DnsQuery_A 251->254 252->251 252->253 256 503eee-503ef2 253->256 254->253 255 503e7e-503e89 254->255 257 503ee9-503eed 255->257 258 503e8b-503e8c 255->258 257->256 259 503e91-503e96 258->259 260 503ee2-503ee6 259->260 261 503e98-503eac GetProcessHeap RtlAllocateHeap 259->261 260->259 262 503ee8 260->262 261->262 263 503eae-503ed5 memset lstrcpyn 261->263 262->257 264 503ed7-503edb 263->264 265 503edd 263->265 266 503ee0 264->266 265->266 266->260
                                              APIs
                                              • GetModuleHandleA.KERNEL32(dnsapi.dll,00504A02,?,00504A02,00504A02,00504001,?,0050498D,00504A02,?,?,00504A02,?), ref: 00503E3F
                                              • LoadLibraryA.KERNEL32(dnsapi.dll,?,00504A02,00504A02,00504001,?,0050498D,00504A02,?,?,00504A02,?), ref: 00503E4C
                                              • GetProcAddress.KERNEL32(00000000,DnsQuery_A), ref: 00503E5C
                                              • DnsQuery_A.DNSAPI(00504A02,0000000F,00000000,00000000,?,00000000,?,00504A02,00504A02,00504001,?,0050498D,00504A02,?,?,00504A02), ref: 00503E74
                                              • GetProcessHeap.KERNEL32(00000000,00000108,?,?,?,00504A02,00504A02,00504001,?,0050498D,00504A02,?,?,00504A02,?), ref: 00503E9B
                                              • RtlAllocateHeap.NTDLL(00000000,?,?), ref: 00503EA2
                                              • memset.MSVCRT ref: 00503EB2
                                              • lstrcpyn.KERNEL32(00000008,?,000000FF,?,00504A02,?), ref: 00503ECD
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.4568272926.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000007.00000002.4568241188.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568560619.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568609836.0000000000510000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_500000_java.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Heap$AddressAllocateHandleLibraryLoadModuleProcProcessQuery_lstrcpynmemset
                                              • String ID: DnsQuery_A$dnsapi.dll
                                              • API String ID: 2609538583-3847274415
                                              • Opcode ID: d2971f3d149bab432924e85564ded9411b60e21a70f7c7355013299d56644311
                                              • Instruction ID: 40075319653eeb29a435cd9483c3460f96daf6c4fdfe13ee8d6bb4df6979a84e
                                              • Opcode Fuzzy Hash: d2971f3d149bab432924e85564ded9411b60e21a70f7c7355013299d56644311
                                              • Instruction Fuzzy Hash: 09210276504B0AABC7209F52DC08A3FBFACFF54780F104A29F145D2180DBB1E98897A5
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 267 5071f8-507206 268 507253-507257 267->268 269 507208-507223 call 506b89 267->269 269->268 272 507225-507240 call 506d35 269->272 272->268 275 507242-507245 272->275 276 507247-50724c 275->276 277 50724e-507251 275->277 276->275 276->277 277->268 278 507258-50726f lstrcpy 277->278 279 5072a6-5072a8 278->279 280 507271-50727e call 506b54 279->280 281 5072aa-5072ad 279->281 290 507280-507299 htons call 506e01 280->290 291 5072a4 280->291 282 5072b3-5072b9 281->282 284 5072bb-5072bc 282->284 285 5072fd-50730b lstrcpy 282->285 287 5072f6-5072fb 284->287 288 5072be-5072bf 284->288 289 50730d-507314 285->289 294 5072cd-5072e6 lstrcpy lstrcat 287->294 292 5072c1-5072c2 288->292 293 5072ef-5072f4 288->293 295 507316-507326 call 506b54 289->295 296 50736e-507376 call 507093 289->296 302 50729e-5072a2 290->302 291->279 298 507367 292->298 299 5072c8 292->299 293->294 294->289 307 507328-50734a htons call 506e01 295->307 308 50735f-507362 295->308 306 507377-50737b 296->306 298->296 299->294 302->291 305 5072e8-5072ea 302->305 305->306 307->305 311 50734c-50735d call 5033b4 307->311 308->282 311->296 311->308
                                              APIs
                                                • Part of subcall function 00506B89: lstrlen.KERNEL32(00000000,00000000,00000000), ref: 00506C46
                                                • Part of subcall function 00506B89: lstrlen.KERNEL32(00000000), ref: 00506C55
                                                • Part of subcall function 00506B89: CharLowerA.USER32(00000000), ref: 00506C74
                                                • Part of subcall function 00506B89: lstrcmpiA.KERNEL32(00000000,?), ref: 00506C84
                                              • lstrcpy.KERNEL32(?,?), ref: 0050726A
                                              • htons.WS2_32(00000019), ref: 00507288
                                              • lstrcpy.KERNEL32(00000000,mx.), ref: 005072D4
                                              • lstrcat.KERNEL32(00000000,?), ref: 005072E4
                                              • lstrcpy.KERNEL32(?,?), ref: 0050730B
                                              • htons.WS2_32(00000019), ref: 00507330
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.4568272926.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000007.00000002.4568241188.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568560619.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568609836.0000000000510000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_500000_java.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: lstrcpy$htonslstrlen$CharLowerlstrcatlstrcmpi
                                              • String ID: mail.$mx.$smtp.
                                              • API String ID: 3218502294-1213875280
                                              • Opcode ID: bec314be6d6f3dd3130de3883a57f7864911e9e3467cbc4de992e4fb4bfe4188
                                              • Instruction ID: 61d13515a21d5bbe502a9dd85473b184d0e7fa3ad14d9318c08b4ea8da931990
                                              • Opcode Fuzzy Hash: bec314be6d6f3dd3130de3883a57f7864911e9e3467cbc4de992e4fb4bfe4188
                                              • Instruction Fuzzy Hash: 7B417076E0821E9BDF25DBA0DD49BEE7BB8BF48300F100496F905E61C1DB70AA449B61
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 314 50666d-50669a CreateFileA 315 5066a4-5066b0 314->315 316 50669c-50669f 314->316 318 5066b3-5066b9 315->318 317 5067bf-5067c1 316->317 319 5066e1-5066f6 318->319 320 5066bb-5066d8 ReadFile 318->320 319->318 321 5066f8-506703 call 506609 319->321 322 50677d-50677f 320->322 323 5066de 320->323 330 506705-50670e 321->330 324 506781-50678f call 506609 322->324 325 5067ab-5067be CloseHandle 322->325 323->319 331 506791 324->331 332 506795-506798 324->332 325->317 333 506740-506752 330->333 334 506710-506723 call 5033b4 330->334 331->332 335 50679a 332->335 336 50679e-5067aa 332->336 338 506761-506765 333->338 339 506754-506760 333->339 342 506725-50672c 334->342 343 50672e-506731 334->343 335->336 336->325 338->330 341 506767-506778 memset 338->341 339->338 341->318 344 50673f 342->344 343->333 345 506733-50673b 343->345 344->333 345->344
                                              APIs
                                              • CreateFileA.KERNELBASE(?,80000000,00000003,00000000,00000003,00000000,00000000,?), ref: 0050668E
                                              • ReadFile.KERNELBASE(?,?,00000400,?,00000000,?,76230440,76938400), ref: 005066CF
                                              • memset.MSVCRT ref: 0050676E
                                              • CloseHandle.KERNEL32(?,?,76230440,76938400), ref: 005067B5
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.4568272926.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000007.00000002.4568241188.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568560619.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568609836.0000000000510000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_500000_java.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: File$CloseCreateHandleReadmemset
                                              • String ID: =$AiP$AiP$L
                                              • API String ID: 1934991721-3068730819
                                              • Opcode ID: d3fd9ca8599230727a5ff21a4c33e8c9938b9a13f51fbc19e9badfacaad136ea
                                              • Instruction ID: 75c36a7ddd45a5937c5c7dc736fdda1d92c830406bf875cefc640d4579443e51
                                              • Opcode Fuzzy Hash: d3fd9ca8599230727a5ff21a4c33e8c9938b9a13f51fbc19e9badfacaad136ea
                                              • Instruction Fuzzy Hash: 24418034900299EBDF11CF98C884AEEBFB9FF46304F1045A5E991A7182D3709A51CBA1
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 346 504e00-504e21 GetProcessHeap RtlAllocateHeap 347 504e23-504e26 346->347 348 504e2b-504e4a CreateFileA 346->348 349 504ee7-504ee9 347->349 350 504ed0-504ed2 348->350 351 504e50-504e53 348->351 352 504ed3-504ee6 GetProcessHeap RtlFreeHeap 350->352 351->350 353 504e55-504e71 351->353 352->349 354 504eb6-504ec0 ReadFile 353->354 355 504ec2-504ece FindCloseChangeNotification 354->355 356 504e73-504e75 354->356 355->352 357 504e77-504e79 356->357 358 504e7c-504e9f call 504c29 call 504d0c 356->358 357->358 363 504ea1-504ea8 358->363 364 504eaa-504eb3 358->364 363->355 363->364 364->354
                                              APIs
                                              • GetProcessHeap.KERNEL32(00000000,00008010,?,?,?,?,0050477B,00000000), ref: 00504E0F
                                              • RtlAllocateHeap.NTDLL(00000000), ref: 00504E16
                                              • CreateFileA.KERNELBASE({GP,80000000,00000003,00000000,00000003,00000080,00000000,00000200,?,?,?,?,0050477B,00000000), ref: 00504E3F
                                              • ReadFile.KERNELBASE(00000000,?,00008000,?,00000000,?,?,?,?,?,0050477B,00000000), ref: 00504EB9
                                              • FindCloseChangeNotification.KERNELBASE(?,?,?,?,?,?,?,?,0050477B,00000000), ref: 00504EC5
                                              • GetProcessHeap.KERNEL32(00000000,?,?,?,?,?,0050477B,00000000), ref: 00504ED7
                                              • RtlFreeHeap.NTDLL(00000000,?,?,?,?,0050477B,00000000), ref: 00504EDE
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.4568272926.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000007.00000002.4568241188.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568560619.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568609836.0000000000510000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_500000_java.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Heap$FileProcess$AllocateChangeCloseCreateFindFreeNotificationRead
                                              • String ID: {GP
                                              • API String ID: 3486390565-1941362325
                                              • Opcode ID: 428cdfe4e4e56a777748bbb5e178a34146adc0e2ef22d4898716c37ae4cd4343
                                              • Instruction ID: cde6f649d8a6e970d913e8d6152b8159acc1393c7919c2b618bcbc601deb3034
                                              • Opcode Fuzzy Hash: 428cdfe4e4e56a777748bbb5e178a34146adc0e2ef22d4898716c37ae4cd4343
                                              • Instruction Fuzzy Hash: 8A216BB5D00208FBDF119FA4DD48AAEBFBDFB04394F204469F642A2190D3304E54AF66
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 365 502d8a-502ddb memset gethostname lstrcat 366 502e0b-502e4f lstrcat * 2 CreateMutexA GetLastError 365->366 367 502ddd 365->367 368 502dde-502dec 367->368 369 502dee-502df0 368->369 370 502dff-502e08 368->370 369->370 371 502df2-502dfd 369->371 370->368 372 502e0a 370->372 371->370 372->366
                                              APIs
                                              • memset.MSVCRT ref: 00502DA8
                                              • gethostname.WS2_32(?,00000100), ref: 00502DB8
                                              • lstrcat.KERNEL32(?,root), ref: 00502DD0
                                              • lstrcat.KERNEL32(00000000,00000000), ref: 00502E19
                                              • lstrcat.KERNEL32(00000000,00000000), ref: 00502E29
                                              • CreateMutexA.KERNELBASE(00000000,00000001,00000000), ref: 00502E36
                                              • GetLastError.KERNEL32 ref: 00502E3C
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.4568272926.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000007.00000002.4568241188.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568560619.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568609836.0000000000510000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_500000_java.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: lstrcat$CreateErrorLastMutexgethostnamememset
                                              • String ID: root
                                              • API String ID: 3016363891-385153371
                                              • Opcode ID: 8b525dd58b779d996fb6a8d86ac4fd597cf676b2815009214a9b3c48bfcca267
                                              • Instruction ID: f0f7e16a089310aca742f5238602011a20bf225b974dc6b71ad344aa0a64dbe1
                                              • Opcode Fuzzy Hash: 8b525dd58b779d996fb6a8d86ac4fd597cf676b2815009214a9b3c48bfcca267
                                              • Instruction Fuzzy Hash: 7D11067294025C6BDB229774EC49FEA3B6CBB69310F0401D6E585E20C1D6B49ACB8B61
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 373 502d8e-502ddb memset gethostname lstrcat 374 502e0b-502e4f lstrcat * 2 CreateMutexA GetLastError 373->374 375 502ddd 373->375 376 502dde-502dec 375->376 377 502dee-502df0 376->377 378 502dff-502e08 376->378 377->378 379 502df2-502dfd 377->379 378->376 380 502e0a 378->380 379->378 380->374
                                              APIs
                                              • memset.MSVCRT ref: 00502DA8
                                              • gethostname.WS2_32(?,00000100), ref: 00502DB8
                                              • lstrcat.KERNEL32(?,root), ref: 00502DD0
                                              • lstrcat.KERNEL32(00000000,00000000), ref: 00502E19
                                              • lstrcat.KERNEL32(00000000,00000000), ref: 00502E29
                                              • CreateMutexA.KERNELBASE(00000000,00000001,00000000), ref: 00502E36
                                              • GetLastError.KERNEL32 ref: 00502E3C
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.4568272926.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000007.00000002.4568241188.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568560619.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568609836.0000000000510000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_500000_java.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: lstrcat$CreateErrorLastMutexgethostnamememset
                                              • String ID: root
                                              • API String ID: 3016363891-385153371
                                              • Opcode ID: cf7a759d958d5d5df551feae167fd14b3451636c600fc75c24892226733576e4
                                              • Instruction ID: f5e5deb4a2873d9f3c4a82aa4f30ac048af43ff210c46692099915afef873f95
                                              • Opcode Fuzzy Hash: cf7a759d958d5d5df551feae167fd14b3451636c600fc75c24892226733576e4
                                              • Instruction Fuzzy Hash: 1511E67794025C6BDB229B74EC49FEE3B6CBB69300F0401D6E585E20C1D6B49ACB8B65
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • RegOpenKeyExA.KERNELBASE(80000002,?,00000000,00020006,?), ref: 005030A7
                                              • RegOpenKeyExA.ADVAPI32(80000001,Software\Microsoft\Windows\CurrentVersion\Run,00000000,00020006,?), ref: 005030BC
                                              • lstrlen.KERNEL32(00000052), ref: 005030C9
                                              • RegSetValueExA.KERNELBASE(?,JavaVM,00000000,00000001,00000052,00000001), ref: 005030DC
                                              • RegCloseKey.KERNELBASE(?), ref: 005030E5
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.4568272926.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000007.00000002.4568241188.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568560619.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568609836.0000000000510000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_500000_java.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Open$CloseValuelstrlen
                                              • String ID: JavaVM$Software\Microsoft\Windows\CurrentVersion\Run
                                              • API String ID: 1812710942-1525231178
                                              • Opcode ID: e7c4ab6b2f41031e5725f1ab95989c2709ffec37f0edb752e120a5812798a4be
                                              • Instruction ID: cd70c8d2d714d64a17d00ab414c80a8edff05e1f62e6019a642830455d294362
                                              • Opcode Fuzzy Hash: e7c4ab6b2f41031e5725f1ab95989c2709ffec37f0edb752e120a5812798a4be
                                              • Instruction Fuzzy Hash: 6241BC10D0C2C9EDFB02C2A8D8487DEBFB65B26748F084099D5847A292C2FF1658C77A
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • SetFilePointer.KERNELBASE(00000000,0000003C,00000000,00000000,00000000,00000000,00000104), ref: 005036AF
                                              • ReadFile.KERNELBASE(00000000,00000000,00000004,00000000,00000000), ref: 005036C8
                                              • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00000000), ref: 005036DC
                                              • ReadFile.KERNELBASE(00000000,?,00000016,00000004,00000000), ref: 005036F5
                                              • SetFilePointer.KERNELBASE(00000000,00000018,00000000,00000000), ref: 00503732
                                              • ReadFile.KERNEL32(00000000,?,00000028,00000500,00000000), ref: 00503750
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.4568272926.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000007.00000002.4568241188.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568560619.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568609836.0000000000510000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_500000_java.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: File$PointerRead
                                              • String ID: (
                                              • API String ID: 3154509469-3887548279
                                              • Opcode ID: 8d052d63ba2457e03fe9d7e8e13cec42e15aac050f382052b2be9159c5306ec8
                                              • Instruction ID: f73d0bf622d8b4d7441a19c50e1fac5286902f701a87a8b44225c7f7ee392bb3
                                              • Opcode Fuzzy Hash: 8d052d63ba2457e03fe9d7e8e13cec42e15aac050f382052b2be9159c5306ec8
                                              • Instruction Fuzzy Hash: 8C3106B6901118FBDF21DF95CE849EEBFBDFF04790F108065E905A2190E6319B81DBA0
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • GetModuleFileNameA.KERNEL32(00000000,?,00000100,00000000,?), ref: 00507487
                                              • CreateFileA.KERNELBASE(?,80000000,00000003,00000000,00000003,00000080,00000000), ref: 005074AA
                                                • Part of subcall function 005073E8: GetTempPathA.KERNEL32(00000104,?), ref: 005073FD
                                                • Part of subcall function 005073E8: lstrlen.KERNEL32(?), ref: 0050740A
                                                • Part of subcall function 005073E8: lstrcat.KERNEL32(?,zincite), ref: 00507448
                                                • Part of subcall function 005073E8: lstrcat.KERNEL32(?,.log), ref: 00507456
                                                • Part of subcall function 005073E8: lstrcpy.KERNEL32(?,?), ref: 00507462
                                              • CreateFileA.KERNELBASE(?,C0000000,00000003,00000000,00000002,00000080,00000000), ref: 005074DC
                                                • Part of subcall function 00503697: SetFilePointer.KERNELBASE(00000000,0000003C,00000000,00000000,00000000,00000000,00000104), ref: 005036AF
                                                • Part of subcall function 00503697: ReadFile.KERNELBASE(00000000,00000000,00000004,00000000,00000000), ref: 005036C8
                                                • Part of subcall function 00503697: SetFilePointer.KERNELBASE(00000000,00000000,00000000,00000000), ref: 005036DC
                                                • Part of subcall function 00503697: ReadFile.KERNELBASE(00000000,?,00000016,00000004,00000000), ref: 005036F5
                                                • Part of subcall function 00503697: SetFilePointer.KERNELBASE(00000000,00000018,00000000,00000000), ref: 00503732
                                                • Part of subcall function 00503697: ReadFile.KERNEL32(00000000,?,00000028,00000500,00000000), ref: 00503750
                                              • SetFilePointer.KERNELBASE(?,00000000,00000000,00000000), ref: 005074F5
                                              • WriteFile.KERNELBASE(00000000,?,?,?,00000000), ref: 00507515
                                              • ReadFile.KERNELBASE(?,?,00000100,?,00000000), ref: 0050752E
                                              • FindCloseChangeNotification.KERNELBASE(00000000), ref: 0050753E
                                              • CloseHandle.KERNEL32(?), ref: 00507543
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.4568272926.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000007.00000002.4568241188.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568560619.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568609836.0000000000510000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_500000_java.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: File$PointerRead$CloseCreatelstrcat$ChangeFindHandleModuleNameNotificationPathTempWritelstrcpylstrlen
                                              • String ID:
                                              • API String ID: 3217969230-0
                                              • Opcode ID: ce32c246a33f20e58d6278d0f612e51c5e19eb005e251be8a3b6b2944cde01c9
                                              • Instruction ID: 3ee29f7f2fe5b884bcaff3a16fbbd882d52692b313de89af8fed5149c55411fd
                                              • Opcode Fuzzy Hash: ce32c246a33f20e58d6278d0f612e51c5e19eb005e251be8a3b6b2944cde01c9
                                              • Instruction Fuzzy Hash: 1521F875D00128BBDB219BA1DC48FDEBF7CEF15360F104292B654A2090D6706B84DFA4
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • GetLocalTime.KERNELBASE(?), ref: 005032E0
                                              • FileTimeToLocalFileTime.KERNEL32(00000000,?), ref: 005032EF
                                              • FileTimeToSystemTime.KERNEL32(?,?), ref: 005032FD
                                              • GetTimeZoneInformation.KERNELBASE(?), ref: 0050330B
                                              • wsprintfA.USER32 ref: 00503399
                                              Strings
                                              • %s, %u %s %u %.2u:%.2u:%.2u %c%.2u%.2u, xrefs: 00503391
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.4568272926.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000007.00000002.4568241188.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568560619.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568609836.0000000000510000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_500000_java.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Time$File$Local$InformationSystemZonewsprintf
                                              • String ID: %s, %u %s %u %.2u:%.2u:%.2u %c%.2u%.2u
                                              • API String ID: 4026320513-1580571061
                                              • Opcode ID: 3a7b98e65f6c78f5d9b51af2aadc7aef16cb77ea1e4a24cd175063a99b3a5637
                                              • Instruction ID: a724780acf2ae77f2b438354054414b458c2743b998ef78bcc664df01f72aa73
                                              • Opcode Fuzzy Hash: 3a7b98e65f6c78f5d9b51af2aadc7aef16cb77ea1e4a24cd175063a99b3a5637
                                              • Instruction Fuzzy Hash: 7921287290024CAADF24DF99DC59AFE3BBDBF08705F10441AF956C2090E778CA88DB65
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                                • Part of subcall function 005073E8: GetTempPathA.KERNEL32(00000104,?), ref: 005073FD
                                                • Part of subcall function 005073E8: lstrlen.KERNEL32(?), ref: 0050740A
                                                • Part of subcall function 005073E8: lstrcat.KERNEL32(?,zincite), ref: 00507448
                                                • Part of subcall function 005073E8: lstrcat.KERNEL32(?,.log), ref: 00507456
                                                • Part of subcall function 005073E8: lstrcpy.KERNEL32(?,?), ref: 00507462
                                              • CreateFileA.KERNELBASE(?,80000000,00000003,00000000,00000003,00000080,00000000,00000104), ref: 0050757A
                                              • WriteFile.KERNELBASE( _P,?,00000000,00000000,00000000), ref: 005075B7
                                              • ReadFile.KERNELBASE(00000000,?,00000100,00000000,00000000,00000000,00000000), ref: 005075D0
                                              • CloseHandle.KERNEL32(?), ref: 005075DA
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.4568272926.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000007.00000002.4568241188.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568560619.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568609836.0000000000510000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_500000_java.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: File$lstrcat$CloseCreateHandlePathReadTempWritelstrcpylstrlen
                                              • String ID: _P$ _P
                                              • API String ID: 285733917-3595566573
                                              • Opcode ID: f913fd42e879a096b32d6719d4cc10f2557aa5c1de87ce01b876391c2f5311ba
                                              • Instruction ID: 95e29d51a280f3ee1416f365a270c88ebcaea3d62707c39128d041610a3427a9
                                              • Opcode Fuzzy Hash: f913fd42e879a096b32d6719d4cc10f2557aa5c1de87ce01b876391c2f5311ba
                                              • Instruction Fuzzy Hash: 3211FAB690410CFFEB11DB94DC88EEEBB7CEB58354F1001A6B681A2090DA706F84DB60
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • memset.MSVCRT ref: 005055CE
                                              • GetWindowsDirectoryA.KERNEL32(?,00000104,?,76230F10,76230F00), ref: 005055DE
                                              • lstrcpy.KERNEL32(?,00501888), ref: 005055F6
                                              • GetDriveTypeA.KERNEL32(00000043,?,76230F10,76230F00), ref: 00505622
                                              • Sleep.KERNEL32(00001194,?,76230F10,76230F00), ref: 00505632
                                                • Part of subcall function 005052AD: Sleep.KERNEL32(00000800,76228A60,00000184), ref: 005052D7
                                                • Part of subcall function 005052AD: lstrcpy.KERNEL32(?,?), ref: 005052F4
                                                • Part of subcall function 005052AD: lstrlen.KERNEL32(?), ref: 00505304
                                                • Part of subcall function 005052AD: lstrcat.KERNEL32(?,00501190), ref: 0050531C
                                                • Part of subcall function 005052AD: lstrcat.KERNEL32(?,*.*), ref: 0050532E
                                                • Part of subcall function 005052AD: memset.MSVCRT ref: 00505341
                                                • Part of subcall function 005052AD: FindFirstFileA.KERNELBASE(?,00000010), ref: 0050535F
                                                • Part of subcall function 005052AD: FindNextFileA.KERNELBASE(?,?), ref: 0050537E
                                                • Part of subcall function 005052AD: lstrcpy.KERNEL32(?,?), ref: 005053BA
                                                • Part of subcall function 005052AD: lstrlen.KERNEL32(?), ref: 005053C3
                                                • Part of subcall function 005052AD: lstrcat.KERNEL32(?,00501190), ref: 005053DB
                                                • Part of subcall function 005052AD: lstrcat.KERNEL32(?,0000002E), ref: 005053EF
                                                • Part of subcall function 005052AD: Sleep.KERNELBASE(0000004B), ref: 00505400
                                                • Part of subcall function 005052AD: FindClose.KERNELBASE(?), ref: 0050543B
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.4568272926.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000007.00000002.4568241188.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568560619.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568609836.0000000000510000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_500000_java.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: lstrcat$FindSleeplstrcpy$Filelstrlenmemset$CloseDirectoryDriveFirstNextTypeWindows
                                              • String ID: Z
                                              • API String ID: 798667630-1505515367
                                              • Opcode ID: 9ee661453eb1d2122f14e4296619a70f61453c8a90dd75b8a2c9885480629b10
                                              • Instruction ID: c2197e004829da8253717f8257516700dd35be32272eb9ca971d862e6122c766
                                              • Opcode Fuzzy Hash: 9ee661453eb1d2122f14e4296619a70f61453c8a90dd75b8a2c9885480629b10
                                              • Instruction Fuzzy Hash: B5016DB5D046AA6BDB2093609D89BDE7B6CAB21314F0404D1E389E20C1E6B49AC88F55
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • GetModuleHandleA.KERNEL32(?), ref: 0050365A
                                              • LoadLibraryA.KERNELBASE(wininet.dll), ref: 00503668
                                              • GetProcAddress.KERNEL32(00000000,InternetGetConnectedState), ref: 00503678
                                              • InternetGetConnectedState.WININET(?,00000000), ref: 0050368D
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.4568272926.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000007.00000002.4568241188.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568560619.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568609836.0000000000510000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_500000_java.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: AddressConnectedHandleInternetLibraryLoadModuleProcState
                                              • String ID: InternetGetConnectedState$wininet.dll
                                              • API String ID: 1505668628-596207600
                                              • Opcode ID: 383ecea641d6cbcfcb23eacf179140b95e1886bb47d9fb192bb945b850ba0d9a
                                              • Instruction ID: 2b294e7ad4bcb9401aef01a1c95623af15c32a98deb04781e5990a6f2b8114d4
                                              • Opcode Fuzzy Hash: 383ecea641d6cbcfcb23eacf179140b95e1886bb47d9fb192bb945b850ba0d9a
                                              • Instruction Fuzzy Hash: 5F011620A083C9E9EF11D7F8D81DBAD7FA91B21748F0485D89185E61C1D7BB8358C776
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • lstrlen.KERNEL32(00504A0F,?), ref: 0050697F
                                              • memset.MSVCRT ref: 0050699C
                                              • GlobalAlloc.KERNELBASE(00000040,?,00000000), ref: 00506A4A
                                              • DeleteFileA.KERNEL32(?), ref: 00506A84
                                              • GlobalFree.KERNEL32(?), ref: 00506A92
                                              • DeleteFileA.KERNELBASE(?), ref: 00506AAB
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.4568272926.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000007.00000002.4568241188.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568560619.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568609836.0000000000510000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_500000_java.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: DeleteFileGlobal$AllocFreelstrlenmemset
                                              • String ID:
                                              • API String ID: 986129705-0
                                              • Opcode ID: 6dd78a900dba814e068311bea715ff8960b663710d4381be50eb23fc4b887274
                                              • Instruction ID: 64ff1dbb5a700912d54094296ca3f5a4976b8a1cb91408c58090539e8bb41b0b
                                              • Opcode Fuzzy Hash: 6dd78a900dba814e068311bea715ff8960b663710d4381be50eb23fc4b887274
                                              • Instruction Fuzzy Hash: 6631AA72D04259DBDB10EB61DC89ADD7BB9FF85700F1044EAE109E6181D734AE948FA0
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • InterlockedIncrement.KERNEL32(0050B390), ref: 00504A3F
                                              • GetCurrentThread.KERNEL32 ref: 00504A47
                                              • SetThreadPriority.KERNELBASE(00000000), ref: 00504A4E
                                              • InterlockedDecrement.KERNEL32(0050B390), ref: 00504A75
                                              • RtlExitUserThread.NTDLL(00000000), ref: 00504A7D
                                                • Part of subcall function 005049C5: lstrcpyn.KERNEL32(?,?,0000007F,?,0050B390), ref: 005049F3
                                                • Part of subcall function 005049C5: GlobalFree.KERNEL32(00000000), ref: 00504A22
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.4568272926.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000007.00000002.4568241188.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568560619.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568609836.0000000000510000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_500000_java.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Thread$Interlocked$CurrentDecrementExitFreeGlobalIncrementPriorityUserlstrcpyn
                                              • String ID:
                                              • API String ID: 3760226487-0
                                              • Opcode ID: 4cbbf26141544510d966b90899a4a27ebab7c4cfef4a543942c3c1baaca5dbd7
                                              • Instruction ID: 59da798909faaf52fbb5bb2341fb00456894eff524a9a69de734a8fe505154a2
                                              • Opcode Fuzzy Hash: 4cbbf26141544510d966b90899a4a27ebab7c4cfef4a543942c3c1baaca5dbd7
                                              • Instruction Fuzzy Hash: 79E0E532504690DBD3105BA5AC1CB9F7FE8BB95721F05C519F19AC21D187701088AA7B
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • lstrcpyn.KERNEL32(?,00000070,0000000F,?,?,00505430,?), ref: 00505179
                                              • CharLowerA.USER32(?,?,?,00505430,?), ref: 00505183
                                              • Sleep.KERNEL32(00000800,?,762283C0,?,?,00505430,?), ref: 0050527D
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.4568272926.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000007.00000002.4568241188.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568560619.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568609836.0000000000510000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_500000_java.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: CharLowerSleeplstrcpyn
                                              • String ID: 0TP
                                              • API String ID: 267381043-1855386918
                                              • Opcode ID: 58247fd17fb87f74bb58f54966b4e5650545c160f13571a61582d6b25f85bdbb
                                              • Instruction ID: 8274f9cbfd694f8c2d5fe74a321f0c892786a0426ba65b7b33d98da66336cf23
                                              • Opcode Fuzzy Hash: 58247fd17fb87f74bb58f54966b4e5650545c160f13571a61582d6b25f85bdbb
                                              • Instruction Fuzzy Hash: 2841C168A44E4A4EFF344624C9497BF2F5B7FB2314F98491BD193420D3FA264C8ACE16
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                                • Part of subcall function 00503620: GetModuleHandleA.KERNEL32(?), ref: 0050365A
                                                • Part of subcall function 00503620: LoadLibraryA.KERNELBASE(wininet.dll), ref: 00503668
                                                • Part of subcall function 00503620: GetProcAddress.KERNEL32(00000000,InternetGetConnectedState), ref: 00503678
                                              • Sleep.KERNELBASE(00000001,?,?,?,?,?,?,00504C20), ref: 00504B00
                                              • CreateThread.KERNELBASE(00000000,00000000,Function_00004A37,00000000,00000000,?), ref: 00504BAB
                                              • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,00504C20), ref: 00504BBB
                                              • GetTickCount.KERNEL32 ref: 00504BEC
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.4568272926.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000007.00000002.4568241188.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568560619.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568609836.0000000000510000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_500000_java.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Handle$AddressCloseCountCreateLibraryLoadModuleProcSleepThreadTick
                                              • String ID:
                                              • API String ID: 50151514-0
                                              • Opcode ID: 7bd039e2053160122893935ea775d366336ab228428e61975a78905543a36c9c
                                              • Instruction ID: ab1ee794b50bf540a74e33d7e95b3844ad5376a59cf73203d230b0ff36f6ead8
                                              • Opcode Fuzzy Hash: 7bd039e2053160122893935ea775d366336ab228428e61975a78905543a36c9c
                                              • Instruction Fuzzy Hash: 2331BFF06047829AEB24AF749C9DF7FBED9BB90301F114A19F695C61D1EB60C844CE62
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • CreateThread.KERNEL32(00000000,00000000,0050311C,00000000,00000000,?), ref: 00503239
                                              • Sleep.KERNEL32 ref: 00503253
                                              • CreateThread.KERNELBASE(00000000,00000000,Function_00004C1B,00000000,00000000,?), ref: 00503267
                                              • Sleep.KERNEL32(000003E8), ref: 00503278
                                                • Part of subcall function 00502D8E: memset.MSVCRT ref: 00502DA8
                                                • Part of subcall function 00502D8E: gethostname.WS2_32(?,00000100), ref: 00502DB8
                                                • Part of subcall function 00502D8E: lstrcat.KERNEL32(?,root), ref: 00502DD0
                                                • Part of subcall function 00502D8E: lstrcat.KERNEL32(00000000,00000000), ref: 00502E19
                                                • Part of subcall function 00502D8E: lstrcat.KERNEL32(00000000,00000000), ref: 00502E29
                                                • Part of subcall function 00502D8E: CreateMutexA.KERNELBASE(00000000,00000001,00000000), ref: 00502E36
                                                • Part of subcall function 00502D8E: GetLastError.KERNEL32 ref: 00502E3C
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.4568272926.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000007.00000002.4568241188.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568560619.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568609836.0000000000510000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_500000_java.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Createlstrcat$SleepThread$ErrorLastMutexgethostnamememset
                                              • String ID:
                                              • API String ID: 1090214876-0
                                              • Opcode ID: 56b857bb58b019830c55899e3dc40cd59a11f718e304888cd94b7654b28f1510
                                              • Instruction ID: c3a13703e42c1b4ec363eec73e7dae4186dad5f565332290872ed40493be106c
                                              • Opcode Fuzzy Hash: 56b857bb58b019830c55899e3dc40cd59a11f718e304888cd94b7654b28f1510
                                              • Instruction Fuzzy Hash: B701B13A14065676D71177729C4FDAF6F6CFFC6B11B10041AFA44920C2DE349A4589B9
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00000000,00000000,00000000,76233130), ref: 00505786
                                              • ReadFile.KERNELBASE(00000000,?,00000400,0000001E,00000000), ref: 005057CC
                                              • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00000000), ref: 005057D8
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.4568272926.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000007.00000002.4568241188.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568560619.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568609836.0000000000510000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_500000_java.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: File$Pointer$Read
                                              • String ID:
                                              • API String ID: 2010065189-0
                                              • Opcode ID: bb546912d54678a9d0532169b250e9a907e6a5e32c21b8bb19504821abbee549
                                              • Instruction ID: 2023e3fc1b6d4fef64246fcfcc3d40c5cb703b471bd574507167deff65189e91
                                              • Opcode Fuzzy Hash: bb546912d54678a9d0532169b250e9a907e6a5e32c21b8bb19504821abbee549
                                              • Instruction Fuzzy Hash: AC015A75801528FBCB219B91CD48CDF7FBCFF043A0F1000A6FA08A2150E6305A85EFA4
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • CreateFileA.KERNELBASE(00000003,C0000000,00000003,00000000,00000003,00000080,00000000,?,00506082,?), ref: 00505EFA
                                                • Part of subcall function 00503697: SetFilePointer.KERNELBASE(00000000,0000003C,00000000,00000000,00000000,00000000,00000104), ref: 005036AF
                                                • Part of subcall function 00503697: ReadFile.KERNELBASE(00000000,00000000,00000004,00000000,00000000), ref: 005036C8
                                                • Part of subcall function 00503697: SetFilePointer.KERNELBASE(00000000,00000000,00000000,00000000), ref: 005036DC
                                                • Part of subcall function 00503697: ReadFile.KERNELBASE(00000000,?,00000016,00000004,00000000), ref: 005036F5
                                                • Part of subcall function 00503697: SetFilePointer.KERNELBASE(00000000,00000018,00000000,00000000), ref: 00503732
                                                • Part of subcall function 00503697: ReadFile.KERNEL32(00000000,?,00000028,00000500,00000000), ref: 00503750
                                              • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00000000), ref: 00505F14
                                                • Part of subcall function 0050754A: CreateFileA.KERNELBASE(?,80000000,00000003,00000000,00000003,00000080,00000000,00000104), ref: 0050757A
                                                • Part of subcall function 0050754A: ReadFile.KERNELBASE(00000000,?,00000100,00000000,00000000,00000000,00000000), ref: 005075D0
                                                • Part of subcall function 0050754A: CloseHandle.KERNEL32(?), ref: 005075DA
                                              • CloseHandle.KERNEL32(00000000), ref: 00505F22
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.4568272926.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000007.00000002.4568241188.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568560619.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568609836.0000000000510000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_500000_java.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: File$PointerRead$CloseCreateHandle
                                              • String ID:
                                              • API String ID: 683849867-0
                                              • Opcode ID: b99fe2f45e5bde572de9b7e7ed92353d3095358bd454211046ec1452de006103
                                              • Instruction ID: 775e82f229dd3032f6fe67c201e338f7e7adaa5fd3f05fa10755dd2907732c0f
                                              • Opcode Fuzzy Hash: b99fe2f45e5bde572de9b7e7ed92353d3095358bd454211046ec1452de006103
                                              • Instruction Fuzzy Hash: ACE08631181B60BBF1312320BC1FFDE2A5CBF05721F200200F690790E05B942B46459E
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • WSAStartup.WS2_32(00000101,?), ref: 00503295
                                                • Part of subcall function 005033A8: GetTickCount.KERNEL32 ref: 005033A8
                                              • memset.MSVCRT ref: 005032AE
                                                • Part of subcall function 005031E4: CreateThread.KERNEL32(00000000,00000000,0050311C,00000000,00000000,?), ref: 00503239
                                                • Part of subcall function 005031E4: Sleep.KERNEL32 ref: 00503253
                                                • Part of subcall function 005031E4: CreateThread.KERNELBASE(00000000,00000000,Function_00004C1B,00000000,00000000,?), ref: 00503267
                                                • Part of subcall function 005031E4: Sleep.KERNEL32(000003E8), ref: 00503278
                                              • ExitProcess.KERNEL32 ref: 005032C4
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.4568272926.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000007.00000002.4568241188.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568560619.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568609836.0000000000510000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_500000_java.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: CreateSleepThread$CountExitProcessStartupTickmemset
                                              • String ID:
                                              • API String ID: 3857727052-0
                                              • Opcode ID: d350899a09f95ef6e7ab3bbd56bc2704d28786e2137af9dc1514bced35b22768
                                              • Instruction ID: e6c800b91a5105f6af05a8ed022c94dfcb71a2cb97930a29ec3ddceb2131e2e1
                                              • Opcode Fuzzy Hash: d350899a09f95ef6e7ab3bbd56bc2704d28786e2137af9dc1514bced35b22768
                                              • Instruction Fuzzy Hash: 93E08C309442086BEB50B7A0CC0EFDD7B2CAB14701F8008A1B284950D2EEA166C88AA6
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • GetCurrentThread.KERNEL32 ref: 0050565D
                                              • SetThreadPriority.KERNELBASE(00000000), ref: 00505664
                                                • Part of subcall function 00504FF8: RegOpenKeyExA.KERNELBASE(80000001,?,00000000,00020019,?,76230F00), ref: 005050BE
                                                • Part of subcall function 00504FF8: memset.MSVCRT ref: 005050D5
                                                • Part of subcall function 00504FF8: RegQueryValueExA.KERNELBASE(?,00000000,00000000,00000000,?,?), ref: 005050F5
                                                • Part of subcall function 00504FF8: RegCloseKey.KERNELBASE(?), ref: 005050FE
                                                • Part of subcall function 00505449: memset.MSVCRT ref: 0050550C
                                                • Part of subcall function 00505449: GetWindowsDirectoryA.KERNEL32(?,00000184,00000000,76230F10,76230F00), ref: 00505521
                                                • Part of subcall function 00505449: lstrlen.KERNEL32(?), ref: 00505543
                                                • Part of subcall function 00505449: lstrcat.KERNEL32(?,00501190), ref: 00505562
                                                • Part of subcall function 00505449: lstrcat.KERNEL32(?,Local Settings), ref: 00505575
                                                • Part of subcall function 00505449: lstrcat.KERNEL32(?,00501190), ref: 00505583
                                                • Part of subcall function 00505449: lstrcat.KERNEL32(?,Temporary Internet Files), ref: 00505590
                                                • Part of subcall function 005055B4: memset.MSVCRT ref: 005055CE
                                                • Part of subcall function 005055B4: GetWindowsDirectoryA.KERNEL32(?,00000104,?,76230F10,76230F00), ref: 005055DE
                                                • Part of subcall function 005055B4: lstrcpy.KERNEL32(?,00501888), ref: 005055F6
                                                • Part of subcall function 005055B4: GetDriveTypeA.KERNEL32(00000043,?,76230F10,76230F00), ref: 00505622
                                                • Part of subcall function 005055B4: Sleep.KERNEL32(00001194,?,76230F10,76230F00), ref: 00505632
                                              • Sleep.KERNEL32(000061A8), ref: 00505684
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.4568272926.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000007.00000002.4568241188.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568560619.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568609836.0000000000510000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_500000_java.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: lstrcat$memset$DirectorySleepThreadWindows$CloseCurrentDriveOpenPriorityQueryTypeValuelstrcpylstrlen
                                              • String ID:
                                              • API String ID: 1200182354-0
                                              • Opcode ID: d3dfe3ca985f4e689f16a7144f6eb9c4b7e5f550bcfda9f1fc34b3dd57ffe1dd
                                              • Instruction ID: a00bd4ce691c911287dc50f1ec9ddfcc97e79f3b0b06d643ae5355c187a33e16
                                              • Opcode Fuzzy Hash: d3dfe3ca985f4e689f16a7144f6eb9c4b7e5f550bcfda9f1fc34b3dd57ffe1dd
                                              • Instruction Fuzzy Hash: 94C0123100098687DF043BF49C1E49E3E21BFA13623384701F263840E3DF2004C86E2B
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • WriteFile.KERNELBASE(00000000,?,00000001,?,00000000,00000000,76228A60), ref: 005073BD
                                              • WriteFile.KERNEL32(00000000,?,00000001,?,00000000,00000000,76228A60), ref: 005073E2
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.4568272926.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000007.00000002.4568241188.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568560619.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568609836.0000000000510000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_500000_java.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: FileWrite
                                              • String ID:
                                              • API String ID: 3934441357-0
                                              • Opcode ID: 3c2d70d6b2ebeca3607b6924ad4f9547b586735f7dfb2575c4133ed41483a66d
                                              • Instruction ID: 22b37714542d64fe014a8661f32d504f0c3aa166d1667109d1551e00d35c67e0
                                              • Opcode Fuzzy Hash: 3c2d70d6b2ebeca3607b6924ad4f9547b586735f7dfb2575c4133ed41483a66d
                                              • Instruction Fuzzy Hash: DAF0C8B2D0025DBEEB00DB65CD49BEF7BACFB48300F1044B5AA15E3182E230AE449B90
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.4568272926.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000007.00000002.4568241188.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568560619.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568609836.0000000000510000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_500000_java.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: gethostbynameinet_addr
                                              • String ID:
                                              • API String ID: 1594361348-0
                                              • Opcode ID: d80e6b9ccf96af150c4b4bc22e55b89b49174f73060853a5bde8afa2a2c8e0c9
                                              • Instruction ID: 501b0e01b687e7f67490080a527e39b23ae378a902b17d1d7521d5b9a2636822
                                              • Opcode Fuzzy Hash: d80e6b9ccf96af150c4b4bc22e55b89b49174f73060853a5bde8afa2a2c8e0c9
                                              • Instruction Fuzzy Hash: F5E04F72A015304FC775576CA84866E7F64AF06B707060390EDA0E72F0D3208C61D6C1
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • lstrcpyn.KERNEL32(?,?,0000007F,?,0050B390), ref: 005049F3
                                              • GlobalFree.KERNEL32(00000000), ref: 00504A22
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.4568272926.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000007.00000002.4568241188.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568560619.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568609836.0000000000510000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_500000_java.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: FreeGloballstrcpyn
                                              • String ID:
                                              • API String ID: 1459762280-0
                                              • Opcode ID: 7d035dee32a55ad060078f1a2d67e29d411d44635d7f6be3b5683acde2b4a0e8
                                              • Instruction ID: 93f080cd151b0566b5450e3832289e04369c3a844037cb3805327191c1a613e0
                                              • Opcode Fuzzy Hash: 7d035dee32a55ad060078f1a2d67e29d411d44635d7f6be3b5683acde2b4a0e8
                                              • Instruction Fuzzy Hash: 81012BB2A04A091FDB30966CE816BBF7FE9FF81760F24442AF749D35C0EA3498014B44
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              Strings
                                              • http://search.lycos.com/default.asp?lpv=1&loc=searchhp&tab=web&query=%s, xrefs: 0050792F
                                              • reply, xrefs: 00507793
                                              • http://www.google.com/search?hl=en&ie=UTF-8&oe=UTF-8&q=%s, xrefs: 0050784D
                                              • %s+%s, xrefs: 00507825
                                              • mail, xrefs: 005077F4
                                              • contact+, xrefs: 005077B3
                                              • mailto, xrefs: 00507771
                                              • &nbq=%d, xrefs: 0050791B
                                              • &num=%d, xrefs: 00507895
                                              • http://search.yahoo.com/search?p=%s&ei=UTF-8&fr=fp-tab-web-t&cop=mss&tab=, xrefs: 005078A7
                                              • http://www.altavista.com/web/results?q=%s&kgs=0&kls=0, xrefs: 005078E7
                                              • &n=%d, xrefs: 005078D8
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.4568272926.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000007.00000002.4568241188.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568560619.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568609836.0000000000510000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_500000_java.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: wsprintf$lstrcat$memset$lstrcpylstrlen
                                              • String ID: %s+%s$&n=%d$&nbq=%d$&num=%d$contact+$http://search.lycos.com/default.asp?lpv=1&loc=searchhp&tab=web&query=%s$http://search.yahoo.com/search?p=%s&ei=UTF-8&fr=fp-tab-web-t&cop=mss&tab=$http://www.altavista.com/web/results?q=%s&kgs=0&kls=0$http://www.google.com/search?hl=en&ie=UTF-8&oe=UTF-8&q=%s$mail$mailto$reply
                                              • API String ID: 3204893122-1703501390
                                              • Opcode ID: bcab0227e277082ccd510bc8d607ea9e91170f1f256f590e2014eab68a4d74d1
                                              • Instruction ID: ded823d3f8bc32eef99a2724958b2501f44dba1139f3c98e25ba8aed4e19c952
                                              • Opcode Fuzzy Hash: bcab0227e277082ccd510bc8d607ea9e91170f1f256f590e2014eab68a4d74d1
                                              • Instruction Fuzzy Hash: D551E430F4450C7AEF08A6669D8EEEE3E5FBBDCB10F18C827F105610D6DDB0AA158525
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • FindWindowA.USER32(rctrl_renwnd32,00000000), ref: 0050312A
                                                • Part of subcall function 005030F0: PostMessageA.USER32(?,00000012,00000000,00000000), ref: 00503108
                                                • Part of subcall function 005030F0: PostMessageA.USER32(?,00000010,00000000,00000000), ref: 0050310F
                                                • Part of subcall function 005030F0: PostMessageA.USER32(?,00000002,00000000,00000000), ref: 00503116
                                              • FindWindowA.USER32(ATH_Note,00000000), ref: 0050313A
                                              • FindWindowA.USER32(IEFrame,00000000), ref: 0050314A
                                              • RtlExitUserThread.NTDLL(00000000), ref: 00503155
                                              • GetModuleHandleA.KERNEL32(kernel32.dll), ref: 005031C3
                                              • GetProcAddress.KERNEL32(00000000,RegisterServiceProcess), ref: 005031D2
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.4568272926.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000007.00000002.4568241188.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568560619.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568609836.0000000000510000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_500000_java.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: FindMessagePostWindow$AddressExitHandleModuleProcThreadUser
                                              • String ID: ATH_Note$IEFrame$RegisterServiceProcess$kernel32.dll$rctrl_renwnd32
                                              • API String ID: 104824008-672394068
                                              • Opcode ID: 0e403a32e1aee024a8ab39fe307f344bc474e0f0a24a2a0af902c9252800bb10
                                              • Instruction ID: ca8937058ee0a95befedaf0986bb5ec46897f89f1bd3759e6bbb064e7f8aa431
                                              • Opcode Fuzzy Hash: 0e403a32e1aee024a8ab39fe307f344bc474e0f0a24a2a0af902c9252800bb10
                                              • Instruction Fuzzy Hash: C7211210D4C7C9A9FB1197F88C1E79EAEA95F22749F1440C8A1846A1C3CAFB5718C3B7
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • lstrcpy.KERNEL32(?,"Postmaster"), ref: 00505AB8
                                              • lstrcat.KERNEL32(?,00502644), ref: 00505ACA
                                              • lstrcat.KERNEL32(?,postmaster), ref: 00505AF6
                                              • lstrcat.KERNEL32(?,00501868), ref: 00505AFE
                                              • lstrcat.KERNEL32(?,?), ref: 00505B05
                                              • lstrcpy.KERNEL32(?,?), ref: 00505B12
                                              • lstrcat.KERNEL32(?,0050261C), ref: 00505B1E
                                              • lstrcat.KERNEL32(?,yahoo.com), ref: 00505BA4
                                              • lstrcpy.KERNEL32(?,yahoo.com), ref: 00505BB2
                                              • lstrcpy.KERNEL32(?,008BA0D2), ref: 00505BBF
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.4568272926.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000007.00000002.4568241188.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568560619.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568609836.0000000000510000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_500000_java.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: lstrcat$lstrcpy
                                              • String ID: "Automatic Email Delivery Software"$"Bounced mail"$"MAILER-DAEMON"$"Mail Administrator"$"Mail Delivery Subsystem"$"Post Office"$"Postmaster"$"Returned mail"$"The Post Office"$MAILER-DAEMON$noreply$postmaster$yahoo.com
                                              • API String ID: 2482611188-423193620
                                              • Opcode ID: f2ae21f6f0fc755f6ab651e23e7815c34ac089526878af3048900abbff2b26bb
                                              • Instruction ID: a9b0a225ccebaa74ed32a98531ce4ef3425950baae9838941721c6dfd1e2a18b
                                              • Opcode Fuzzy Hash: f2ae21f6f0fc755f6ab651e23e7815c34ac089526878af3048900abbff2b26bb
                                              • Instruction Fuzzy Hash: D8417771340B11A7E71097259CCEBBF7E9CFB91B01F144016F982960C2FEE59845AEB6
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • lstrlen.KERNEL32(00000000,?,?,?,005045DC,?,76230440,?,?,00504669), ref: 00504039
                                              • isspace.MSVCRT ref: 0050405A
                                              • isalnum.MSVCRT ref: 0050406A
                                              • lstrlen.KERNEL32(?,005045DC,?,76230440,?,?,00504669), ref: 00504110
                                              • lstrlen.KERNEL32(?), ref: 005041CD
                                              • lstrlen.KERNEL32(?), ref: 0050422A
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.4568272926.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000007.00000002.4568241188.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568560619.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568609836.0000000000510000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_500000_java.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: lstrlen$isalnumisspace
                                              • String ID: _-!.$_-!.@
                                              • API String ID: 942633883-1107819772
                                              • Opcode ID: 13f1972239871b3c44236b19c0e3c7acdde54ddd6e475e0e74b5625e8a80bea5
                                              • Instruction ID: 46a4e0ed4f2d23864a61de77937e1c011c01544acd97643bc178da60782ba0d3
                                              • Opcode Fuzzy Hash: 13f1972239871b3c44236b19c0e3c7acdde54ddd6e475e0e74b5625e8a80bea5
                                              • Instruction Fuzzy Hash: FA61F6F5908B925EEB255BB06C5833F7F98BF62312F28045EEBC1C90C2E668C481CE15
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • wsprintfA.USER32 ref: 00506807
                                              • wsprintfA.USER32 ref: 00506816
                                              • lstrlen.KERNEL32(?,To: %s,?), ref: 0050682D
                                              • wsprintfA.USER32 ref: 00506832
                                              • lstrlen.KERNEL32(?,Subject: %s,?), ref: 00506844
                                              • wsprintfA.USER32 ref: 00506849
                                              • lstrcat.KERNEL32(?,Date: ), ref: 0050685A
                                              • lstrlen.KERNEL32(?), ref: 0050685D
                                                • Part of subcall function 005032CB: GetLocalTime.KERNELBASE(?), ref: 005032E0
                                                • Part of subcall function 005032CB: GetTimeZoneInformation.KERNELBASE(?), ref: 0050330B
                                                • Part of subcall function 005032CB: wsprintfA.USER32 ref: 00503399
                                              • lstrcat.KERNEL32(?,MIME-Version: 1.0), ref: 00506871
                                              • lstrlen.KERNEL32(?,Content-Type: multipart/mixed;boundary="%s",?), ref: 0050687D
                                              • wsprintfA.USER32 ref: 00506882
                                              • lstrcat.KERNEL32(?,X-Priority: 3X-MSMail-Priority: NormalX-Mailer: Microsoft Outlook Express 6.00.2600.0000X-MIMEOLE: Produced By Microsoft MimeOLE V6.00.2600.0000), ref: 0050688D
                                              Strings
                                              • NextPart, xrefs: 005067F6
                                              • To: %s, xrefs: 00506827
                                              • Content-Type: multipart/mixed;boundary="%s", xrefs: 00506877
                                              • From: %s, xrefs: 00506810
                                              • X-Priority: 3X-MSMail-Priority: NormalX-Mailer: Microsoft Outlook Express 6.00.2600.0000X-MIMEOLE: Produced By Microsoft MimeOLE V6.00.2600.0000, xrefs: 00506887
                                              • Subject: %s, xrefs: 0050683E
                                              • MIME-Version: 1.0, xrefs: 0050686B
                                              • Date: , xrefs: 00506854
                                              • ----=_%s_%.3u_%.4u_%.8X.%.8X, xrefs: 005067FB
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.4568272926.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000007.00000002.4568241188.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568560619.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568609836.0000000000510000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_500000_java.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: wsprintf$lstrlen$lstrcat$Time$InformationLocalZone
                                              • String ID: MIME-Version: 1.0$----=_%s_%.3u_%.4u_%.8X.%.8X$Content-Type: multipart/mixed;boundary="%s"$Date: $From: %s$NextPart$Subject: %s$To: %s$X-Priority: 3X-MSMail-Priority: NormalX-Mailer: Microsoft Outlook Express 6.00.2600.0000X-MIMEOLE: Produced By Microsoft MimeOLE V6.00.2600.0000
                                              • API String ID: 1752939335-3336112092
                                              • Opcode ID: 65c65f0f7d9700eea59a9b15cfe4f069311947272235b1f9c059394cb26afcae
                                              • Instruction ID: 516944fcafe1d406c4de45a34c5fbbf3ebfe04e920b5b8b11edbf61359fe2e0a
                                              • Opcode Fuzzy Hash: 65c65f0f7d9700eea59a9b15cfe4f069311947272235b1f9c059394cb26afcae
                                              • Instruction Fuzzy Hash: E111BF767817153AD2047721AC8FFAFBE4CFF81B20F040425F908A21C2DAA9B61995BD
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • GetProcessHeap.KERNEL32(00000000,00001000,00000000), ref: 00503B9D
                                              • RtlAllocateHeap.NTDLL(00000000), ref: 00503BA0
                                              • socket.WS2_32(00000002,00000002,00000011), ref: 00503BBA
                                              • htons.WS2_32(00000000), ref: 00503BF5
                                              • select.WS2_32 ref: 00503C3F
                                              • memset.MSVCRT ref: 00503C51
                                              • recv.WS2_32(?,00000000,00001000,00000000), ref: 00503C61
                                              • htons.WS2_32(?), ref: 00503C88
                                              • htons.WS2_32(?), ref: 00503CA3
                                              • GetProcessHeap.KERNEL32(00000000,00000108), ref: 00503D10
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.4568272926.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000007.00000002.4568241188.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568560619.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568609836.0000000000510000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_500000_java.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Heaphtons$Process$Allocatememsetrecvselectsocket
                                              • String ID:
                                              • API String ID: 1083883850-0
                                              • Opcode ID: c9f7bc26b78ece624b09ac70a74073d8748b4f15b1362e67323826f7ad7e9130
                                              • Instruction ID: 407117dfceaa818f317e20e129298f2efd80ccf421d121f9015e9229cc58b6dd
                                              • Opcode Fuzzy Hash: c9f7bc26b78ece624b09ac70a74073d8748b4f15b1362e67323826f7ad7e9130
                                              • Instruction Fuzzy Hash: 8F61D2769047069FD720AF64DC48B6FBFECFF94784F100809F98997290D7709A489BA2
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • wsprintfA.USER32 ref: 005070BC
                                              • wsprintfA.USER32 ref: 005070D4
                                              • RegOpenKeyExA.ADVAPI32(80000001,?,00000000,00020019,?), ref: 005070F1
                                              • RegEnumKeyA.ADVAPI32(?,00000000,?,00000100), ref: 005071D8
                                              • RegCloseKey.ADVAPI32(?), ref: 005071E5
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.4568272926.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000007.00000002.4568241188.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568560619.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568609836.0000000000510000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_500000_java.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: wsprintf$CloseEnumOpen
                                              • String ID: %s %s$Account$Internet$SMTP$Server$Software\Microsoft\%s %s Manager\%ss
                                              • API String ID: 1693054222-1692917665
                                              • Opcode ID: a100bb0b5d2db9c482a7de813b13c352d9e9d523f33d783107d2be0624946bfd
                                              • Instruction ID: 919e163466d9f41961a9d57fd17da3ca6bbeb631558065ae4de98a1fa7a4ba0d
                                              • Opcode Fuzzy Hash: a100bb0b5d2db9c482a7de813b13c352d9e9d523f33d783107d2be0624946bfd
                                              • Instruction Fuzzy Hash: 7641F671E0021DABDB21DBA1DD49EEFBBBCFF88741F0000A5A905E2090E774AA44DB61
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.4568272926.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000007.00000002.4568241188.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568560619.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568609836.0000000000510000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_500000_java.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: lstrcpy$CharUpper$Buffstrstrwsprintf
                                              • String ID: %s.%s$.com$com
                                              • API String ID: 1204462619-569357965
                                              • Opcode ID: 0bd2fc9e38ccdf57edabb65dabad38c9a347dc46d3a870250db8cbaf424e98cf
                                              • Instruction ID: 2a81d91e2002685be900b6559790254c352ea299669c914cf5c60e1db04ad5da
                                              • Opcode Fuzzy Hash: 0bd2fc9e38ccdf57edabb65dabad38c9a347dc46d3a870250db8cbaf424e98cf
                                              • Instruction Fuzzy Hash: FF414BB7340B425AE7046326AC8DBBF3A9AFBD0711F11041AF781C20C1EE758A469E35
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • GetModuleHandleA.KERNEL32(iphlpapi.dll), ref: 00503F02
                                              • LoadLibraryA.KERNEL32(iphlpapi.dll), ref: 00503F12
                                              • GetProcAddress.KERNEL32(00000000,GetNetworkParams), ref: 00503F2F
                                              • GetProcessHeap.KERNEL32(00000000,00004000), ref: 00503F4D
                                              • RtlAllocateHeap.NTDLL(00000000), ref: 00503F50
                                              • htons.WS2_32(00000035), ref: 00503F88
                                              • inet_addr.WS2_32(?), ref: 00503F93
                                              • gethostbyname.WS2_32(?), ref: 00503FA6
                                              • GetProcessHeap.KERNEL32(00000000,?), ref: 00503FE3
                                              • HeapFree.KERNEL32(00000000), ref: 00503FE6
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.4568272926.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000007.00000002.4568241188.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568560619.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568609836.0000000000510000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_500000_java.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Heap$Process$AddressAllocateFreeHandleLibraryLoadModuleProcgethostbynamehtonsinet_addr
                                              • String ID: GetNetworkParams$iphlpapi.dll
                                              • API String ID: 2899438970-2099955842
                                              • Opcode ID: e30f29e266a04806bc51eef7561a6e33902f13042b838279bdac54ccba920e99
                                              • Instruction ID: acfe8a1e42ac83ed393b8fa399d380572ad7b045617876d8cdea66422d8a7479
                                              • Opcode Fuzzy Hash: e30f29e266a04806bc51eef7561a6e33902f13042b838279bdac54ccba920e99
                                              • Instruction Fuzzy Hash: C5319F35E00A07AFDF109BB89C49AAE7FBCBF14361B140115F914E32D0DB38DA459BA5
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • lstrlen.KERNEL32(?,?,?,?,005045EB,76230440,?,?,00504669), ref: 00504311
                                              • lstrlen.KERNEL32(?,?,005045EB,76230440,?,?,00504669), ref: 0050433A
                                              • lstrlen.KERNEL32(cpxlate,?,005045EB,76230440,?,?,00504669), ref: 00504373
                                              • lstrlen.KERNEL32(microsoft.com,?,005045EB,76230440,?,?,00504669), ref: 0050438D
                                              • lstrlen.KERNEL32(microsoft.com,?,005045EB,76230440,?,?,00504669), ref: 005043A3
                                              • lstrlen.KERNEL32(cpxlate,?,005045EB,76230440,?,?,00504669), ref: 005043FB
                                              • lstrlen.KERNEL32(cpxlate,?,005045EB,76230440,?,?,00504669), ref: 00504410
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.4568272926.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000007.00000002.4568241188.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568560619.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568609836.0000000000510000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_500000_java.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: lstrlen
                                              • String ID: cpxlate$microsoft.com
                                              • API String ID: 1659193697-1417270902
                                              • Opcode ID: 7234369e607e997fc05737b92fa64be9d20d6ac8b389998761447fe385796dbe
                                              • Instruction ID: 2d6b92822a5ce253097b69b3c07574bdd26a63d487101100c5e09b38dca8b49d
                                              • Opcode Fuzzy Hash: 7234369e607e997fc05737b92fa64be9d20d6ac8b389998761447fe385796dbe
                                              • Instruction Fuzzy Hash: CB419FF0A4564ACBFB214F34AEF836E3EE4B759705F90152ADB41C72A1E7248889DF01
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.4568272926.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000007.00000002.4568241188.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568560619.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568609836.0000000000510000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_500000_java.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: lstrcat$PathTemplstrcpylstrlen
                                              • String ID: .log$\$zincite
                                              • API String ID: 1195028341-2520228640
                                              • Opcode ID: 9b8db98ae055c8dff7040cdb26ef09709199bca6636e77b7a4b7fff887e6c2cb
                                              • Instruction ID: b4afade12c0fc9fcd69d2ee1c841bfa627f913ce1fee5f64901a70284f785ff6
                                              • Opcode Fuzzy Hash: 9b8db98ae055c8dff7040cdb26ef09709199bca6636e77b7a4b7fff887e6c2cb
                                              • Instruction Fuzzy Hash: B70186B180455D9BDF109F74DD9DFDE7FBCAB24300F5000A1A6C4D2091D6B0AAC88F51
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • CreateFileA.KERNEL32(00000020,80000000,00000003,00000000,00000003,00000080,00000000,76230F10,00000000), ref: 00504F0C
                                              • GetFileSize.KERNEL32(00000000,00000000), ref: 00504F2A
                                              • CreateFileMappingA.KERNEL32(00000000,00000000,00000002,00000000,00000000,00000000), ref: 00504F3A
                                              • MapViewOfFile.KERNEL32(00000000,00000004,00000000,00000000,00000000,00000000), ref: 00504F5B
                                              • memset.MSVCRT ref: 00504F89
                                              • UnmapViewOfFile.KERNEL32(00000000), ref: 00504FCC
                                              • CloseHandle.KERNEL32(?), ref: 00504FD5
                                              • CloseHandle.KERNEL32(?), ref: 00504FDF
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.4568272926.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000007.00000002.4568241188.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568560619.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568609836.0000000000510000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_500000_java.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: File$CloseCreateHandleView$MappingSizeUnmapmemset
                                              • String ID:
                                              • API String ID: 3315828190-0
                                              • Opcode ID: af9d264d035b30454285412ee2e0fbb538361efd641962c35410f79fff99e6b2
                                              • Instruction ID: 0ab0f1c3a718459e2b74eb1b04299cdf3ef3ce68078fedbeea16834dce009e45
                                              • Opcode Fuzzy Hash: af9d264d035b30454285412ee2e0fbb538361efd641962c35410f79fff99e6b2
                                              • Instruction Fuzzy Hash: 1D31D5F190438AAFDB206F649C88EAE7FACFB04359F100529FB92D22D1D7209C45CB61
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • lstrlen.KERNEL32(00000000,?), ref: 00504652
                                              • lstrcmpiA.KERNEL32(008BA0D2,?), ref: 00504689
                                              • lstrlen.KERNEL32(?), ref: 005046A1
                                              • GetProcessHeap.KERNEL32(?,-0000000F), ref: 005046AA
                                              • RtlAllocateHeap.NTDLL(00000000), ref: 005046B1
                                              • memset.MSVCRT ref: 005046C9
                                              • GetTickCount.KERNEL32 ref: 005046D5
                                              • lstrcpy.KERNEL32(0000000A,?), ref: 005046EE
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.4568272926.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000007.00000002.4568241188.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568560619.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568609836.0000000000510000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_500000_java.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Heaplstrlen$AllocateCountProcessTicklstrcmpilstrcpymemset
                                              • String ID:
                                              • API String ID: 518059893-0
                                              • Opcode ID: 9efe57d214a3b300e581acbdec6397eaff9b66c6c968e2989330a7faa671002f
                                              • Instruction ID: 707180101a398f47e83f4d7edf7de099827023ee405d7e436c1cd2a4ce101803
                                              • Opcode Fuzzy Hash: 9efe57d214a3b300e581acbdec6397eaff9b66c6c968e2989330a7faa671002f
                                              • Instruction Fuzzy Hash: E2212676800655ABC7219F64DC08BDF7BE8FB19350F004865EA86D3290E770E9489FA1
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • isdigit.MSVCRT ref: 005034F2
                                              • memset.MSVCRT ref: 00503548
                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000014,00000000,00000000,?,?,00000000), ref: 00503572
                                              • lstrlen.KERNEL32(00000000,?,?,00000000), ref: 0050358E
                                              • lstrlen.KERNEL32(?,?,?,00000000), ref: 005035A9
                                              • lstrlen.KERNEL32(00000000,?,?,00000000), ref: 005035F0
                                              • memcpy.MSVCRT ref: 00503602
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.4568272926.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000007.00000002.4568241188.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568560619.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568609836.0000000000510000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_500000_java.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: lstrlen$ByteCharMultiWideisdigitmemcpymemset
                                              • String ID:
                                              • API String ID: 3478709927-0
                                              • Opcode ID: a2ce9885984fa3000aded219a2996b6cc6e5ec1c0a8ebb19bb3fbddf8be59116
                                              • Instruction ID: 23a442e20ae22f83cb2f45545b469242e3b658874f908f9248848cc5510e9995
                                              • Opcode Fuzzy Hash: a2ce9885984fa3000aded219a2996b6cc6e5ec1c0a8ebb19bb3fbddf8be59116
                                              • Instruction Fuzzy Hash: BE41B471804299AFDB25CFA4C988AEE7FACAF19344F14019DD882A7191D6719F49CB60
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000007.00000002.4568272926.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000007.00000002.4568241188.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568560619.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568609836.0000000000510000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_500000_java.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: c63324c0295fa89b6ebd5856617ed0b4d67f95c478c8ab9655f69d5cbd800aba
                                              • Instruction ID: 1af87907bf89bedeb0649b551357384cbbe48afd0fdc4005cd780a5b5450faca
                                              • Opcode Fuzzy Hash: c63324c0295fa89b6ebd5856617ed0b4d67f95c478c8ab9655f69d5cbd800aba
                                              • Instruction Fuzzy Hash: 7841B039A00219ABCB00DFA5CC84AEEBBF8FF48715F104456E959E7291E3749A41CB64
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • GetProcessHeap.KERNEL32(00000000,00000090,00000000,00504A02,?,005049A9,00504A02,00000000,?,?,00504A02,?), ref: 005048E1
                                              • RtlAllocateHeap.NTDLL(00000000,?,005049A9), ref: 005048E8
                                              • memset.MSVCRT ref: 005048FC
                                              • lstrcpyn.KERNEL32(00000010,?,0000007F,?,00504A02,?), ref: 00504915
                                              • GetTickCount.KERNEL32 ref: 0050491B
                                              • GetTickCount.KERNEL32 ref: 00504942
                                              • lstrcpyn.KERNEL32(00000010,00000000,0000007F,?,005049A9,00504A02,00000000,?,?,00504A02,?), ref: 0050495B
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.4568272926.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000007.00000002.4568241188.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568560619.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568609836.0000000000510000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_500000_java.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: CountHeapTicklstrcpyn$AllocateProcessmemset
                                              • String ID:
                                              • API String ID: 2696074827-0
                                              • Opcode ID: 402b7b3b154f41ef7f311cd206536f8d1fec18a9e784e76e33cb7e60e1247590
                                              • Instruction ID: 703d1ba90af1539a1c1e71d69a92d341ab7fc86eaf6e4218c2875852d7dfb891
                                              • Opcode Fuzzy Hash: 402b7b3b154f41ef7f311cd206536f8d1fec18a9e784e76e33cb7e60e1247590
                                              • Instruction Fuzzy Hash: A0214AB2900B919FD730DF64D98896FBBE4FF54700B108D2DE69AD3691D334A8489F51
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.4568272926.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000007.00000002.4568241188.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568560619.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568609836.0000000000510000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_500000_java.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: isspace$lstrcpy
                                              • String ID: cpxlate$microsoft.com$EP
                                              • API String ID: 3591682678-1338335977
                                              • Opcode ID: 97e05d28098dfa30c11553f396c773aa8e9dcaeee145c2bf642825238118a22f
                                              • Instruction ID: d322a60b3cd344418dea32cdce2ecae7b80887596fe3726befac56383c2b426d
                                              • Opcode Fuzzy Hash: 97e05d28098dfa30c11553f396c773aa8e9dcaeee145c2bf642825238118a22f
                                              • Instruction Fuzzy Hash: 2011E7E96087D39EEB224EB4444477E7FD87F56311F0805A9F7D0861D6C3A48885CBA1
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • GetModuleHandleA.KERNEL32(urlmon.dll,?,00000200), ref: 0050795B
                                              • LoadLibraryA.KERNEL32(urlmon.dll,?,00000200), ref: 00507966
                                              • GetProcAddress.KERNEL32(00000000,URLDownloadToCacheFileA), ref: 00507976
                                              • lstrcpy.KERNEL32(?,?), ref: 005079A8
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.4568272926.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000007.00000002.4568241188.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568560619.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568609836.0000000000510000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_500000_java.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: AddressHandleLibraryLoadModuleProclstrcpy
                                              • String ID: URLDownloadToCacheFileA$urlmon.dll
                                              • API String ID: 1765825236-446873360
                                              • Opcode ID: 8d756ae2cdbdadfac3edac27fec9d7869389870997cdf4f7ecb942f188448ba0
                                              • Instruction ID: 185a24763c0bcb0fc453a4a8a7a4dc2d3681b975c5b2d20548b30850ca32465b
                                              • Opcode Fuzzy Hash: 8d756ae2cdbdadfac3edac27fec9d7869389870997cdf4f7ecb942f188448ba0
                                              • Instruction Fuzzy Hash: A0F0C872A0861977E7115B748C59FEF7F6CAF59B40F000424FA45D10C0EBB0E54986A5
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • GetTempPathA.KERNEL32(00000104,?,00000000,?), ref: 00505F41
                                              • GetTempFileNameA.KERNEL32(?,tmp,00000000,?), ref: 00505F5C
                                              • CopyFileA.KERNEL32(005065B9,?,00000000), ref: 00505F75
                                                • Part of subcall function 00505EE3: CreateFileA.KERNELBASE(00000003,C0000000,00000003,00000000,00000003,00000080,00000000,?,00506082,?), ref: 00505EFA
                                                • Part of subcall function 00505EE3: SetFilePointer.KERNELBASE(00000000,00000000,00000000,00000000), ref: 00505F14
                                                • Part of subcall function 00505EE3: CloseHandle.KERNEL32(00000000), ref: 00505F22
                                              • DeleteFileA.KERNEL32(005065B9), ref: 00505F94
                                              • lstrcpy.KERNEL32(005065B9,?), ref: 00505FA2
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.4568272926.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000007.00000002.4568241188.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568560619.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568609836.0000000000510000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_500000_java.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: File$Temp$CloseCopyCreateDeleteHandleNamePathPointerlstrcpy
                                              • String ID: tmp
                                              • API String ID: 2319981759-753892680
                                              • Opcode ID: edf9a31c2175ba5224d3b1140d48908c277679a7e7ee6f9f0873a1c53c273d39
                                              • Instruction ID: b6d547f1361db50440f4c558ef177c196600c1e2c9737aacd924c07538a66ded
                                              • Opcode Fuzzy Hash: edf9a31c2175ba5224d3b1140d48908c277679a7e7ee6f9f0873a1c53c273d39
                                              • Instruction Fuzzy Hash: B101A2B690065AAFDB109B60DC8DFDE7BBCAB54700F000095F6C5E2091E6B466C9CF62
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.4568272926.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000007.00000002.4568241188.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568560619.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568609836.0000000000510000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_500000_java.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: htons$CountTickmemsetsendto
                                              • String ID:
                                              • API String ID: 2621409306-0
                                              • Opcode ID: e09023cd58fd96e722efa017393dccad0732a0c6f729856dbb0536fb1071b873
                                              • Instruction ID: db08ba042e804f953b88991fca2d77eeadd2c4749c7c0b9e33eca97f00638003
                                              • Opcode Fuzzy Hash: e09023cd58fd96e722efa017393dccad0732a0c6f729856dbb0536fb1071b873
                                              • Instruction Fuzzy Hash: 1E312121A0025A5BDB258FB48C04BEE7BE8FF14304F1440B8EA09A7291E3B05E86CB59
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • lstrcpyn.KERNEL32(?,008BA0BF,0000007F,00000000), ref: 00504824
                                              • lstrlen.KERNEL32(?), ref: 0050482E
                                              • GetProcessHeap.KERNEL32(00000000,-0000000A), ref: 0050483A
                                              • RtlAllocateHeap.NTDLL(00000000), ref: 00504841
                                              • lstrcpy.KERNEL32(00000000,?), ref: 00504852
                                              • CreateThread.KERNEL32(00000000,00000000,0050477F,00000000,00000000,?), ref: 00504868
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.4568272926.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000007.00000002.4568241188.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568560619.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568609836.0000000000510000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_500000_java.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Heap$AllocateCreateProcessThreadlstrcpylstrcpynlstrlen
                                              • String ID:
                                              • API String ID: 3371211169-0
                                              • Opcode ID: 9415a5e40e1ec01e5b2a933be3d9349c4a5e167bbc259252a0e3da0ad32e4735
                                              • Instruction ID: 07f746d2b3960384b515d2a8365d25916a05af25f1ccb339341a6fe92818cc76
                                              • Opcode Fuzzy Hash: 9415a5e40e1ec01e5b2a933be3d9349c4a5e167bbc259252a0e3da0ad32e4735
                                              • Instruction Fuzzy Hash: AA11E2B5E00AA59BEB208BB59D5DBBE3BACFF50700F148811FB46D70D0EB20C8058B65
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • GetCurrentThread.KERNEL32 ref: 00504782
                                              • SetThreadPriority.KERNEL32(00000000), ref: 00504789
                                              • RtlExitUserThread.NTDLL(00000000), ref: 005047B0
                                                • Part of subcall function 00504708: memset.MSVCRT ref: 00504721
                                                • Part of subcall function 00504708: memset.MSVCRT ref: 0050474B
                                              • GetProcessHeap.KERNEL32(00000000,?), ref: 005047A1
                                              • HeapFree.KERNEL32(00000000), ref: 005047A8
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.4568272926.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000007.00000002.4568241188.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568560619.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568609836.0000000000510000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_500000_java.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: Thread$Heapmemset$CurrentExitFreePriorityProcessUser
                                              • String ID:
                                              • API String ID: 2017824994-0
                                              • Opcode ID: 836c254a06e8348137cac086d59406f412e6514e815de78c3af08e5fd35cbc47
                                              • Instruction ID: 134dd03ee56ed5e35b093408589009be06d3af64b950e7fdb32cbac4dc487e3d
                                              • Opcode Fuzzy Hash: 836c254a06e8348137cac086d59406f412e6514e815de78c3af08e5fd35cbc47
                                              • Instruction Fuzzy Hash: 66E0EC72545A60ABD6102BA1AD1DB8E3FA8EF15762F054101F69A960E08B6054849ABB
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • GetModuleHandleA.KERNEL32(kernel32.dll), ref: 005031C3
                                              • GetProcAddress.KERNEL32(00000000,RegisterServiceProcess), ref: 005031D2
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.4568272926.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000007.00000002.4568241188.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568560619.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568609836.0000000000510000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_500000_java.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: AddressHandleModuleProc
                                              • String ID: RegisterServiceProcess$kernel32.dll
                                              • API String ID: 1646373207-4020013434
                                              • Opcode ID: 88f355962e72c872d7e8e3649b1a006756f8412f5a34d5979d28c820e35911b0
                                              • Instruction ID: a02a020f7e88b2a2deb55d5915b0d8113451b0eb92c2fbf378a69a289d5184d3
                                              • Opcode Fuzzy Hash: 88f355962e72c872d7e8e3649b1a006756f8412f5a34d5979d28c820e35911b0
                                              • Instruction Fuzzy Hash: A711BF10D0C6C999FB0297B8891979EBEA61F22749F0840C894846A2D2C6FF5718D3B6
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • lstrlen.KERNEL32(00000000,00000000,00000000), ref: 00506C46
                                              • lstrlen.KERNEL32(00000000), ref: 00506C55
                                              • CharLowerA.USER32(00000000), ref: 00506C74
                                              • lstrcmpiA.KERNEL32(00000000,?), ref: 00506C84
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.4568272926.0000000000501000.00000040.00000001.01000000.00000007.sdmp, Offset: 00500000, based on PE: true
                                              • Associated: 00000007.00000002.4568241188.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.0000000000509000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568272926.000000000050D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568560619.000000000050F000.00000004.00000001.01000000.00000007.sdmpDownload File
                                              • Associated: 00000007.00000002.4568609836.0000000000510000.00000040.00000001.01000000.00000007.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_500000_java.jbxd
                                              Yara matches
                                              Similarity
                                              • API ID: lstrlen$CharLowerlstrcmpi
                                              • String ID:
                                              • API String ID: 1011886143-0
                                              • Opcode ID: 1614e062b7db843fd35929ba8e3fbe92fee8bfd64a38d3db1eeeb3163424b487
                                              • Instruction ID: a780f0e17b679421bcea0a2979c9bb813d318467be715c50e32b2a5f4f05fe6d
                                              • Opcode Fuzzy Hash: 1614e062b7db843fd35929ba8e3fbe92fee8bfd64a38d3db1eeeb3163424b487
                                              • Instruction Fuzzy Hash: F351D476A481994AFF364B2C84187FC7FD6FB26340F9814AAC8C1861D6D2648CF3C75A
                                              Uniqueness

                                              Uniqueness Score: -1.00%