Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
avz.exe

Overview

General Information

Sample name:avz.exe
Analysis ID:1436352
MD5:59e8187b34416258ae6ab3cdf4ee6628
SHA1:38378107dec5f543448a80134219a61dd37fab80
SHA256:cbfadfb4f37c0e70827f4b5349d20827079aa86aa24c0b10c921aa06681f4757
Tags:Detectionverificationexe
Infos:

Detection

Score:25
Range:0 - 100
Whitelisted:false
Confidence:60%

Signatures

May modify the system service descriptor table (often done to hook functions)
AV process strings found (often used to terminate AV products)
Contains functionality to query locales information (e.g. system language)
Detected potential crypto function
Enables debug privileges
Enables driver privileges
Found large amount of non-executed APIs
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains executable resources (Code or Archives)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

Analysis Advice

Sample tries to load a library which is not present or installed on the analysis machine, adding the library might reveal more behavior
Sample may offer command line options, please run it with the 'Execute binary with arguments' cookbook (it's possible that the command line switches require additional characters like: "-", "/", "--")
  • System is w10x64
  • avz.exe (PID: 7728 cmdline: "C:\Users\user\Desktop\avz.exe" MD5: 59E8187B34416258AE6AB3CDF4EE6628)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000002.2857267956.0000000000401000.00000040.00000001.01000000.00000003.sdmpJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
    SourceRuleDescriptionAuthorStrings
    0.2.avz.exe.400000.0.unpackJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
      No Sigma rule has matched
      No Snort rule has matched

      Click to jump to signature section

      Show All Signature Results
      Source: avz.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
      Source: C:\Users\user\Desktop\avz.exeCode function: 0_2_0040E718 FindFirstFileW,FindClose,0_2_0040E718
      Source: C:\Users\user\Desktop\avz.exeCode function: 0_2_0040E14C GetModuleHandleW,GetProcAddress,FindFirstFileW,FindClose,lstrlenW,lstrlenW,0_2_0040E14C
      Source: C:\Users\user\Desktop\avz.exeCode function: 0_2_00424B74 FindFirstFileW,FindClose,0_2_00424B74
      Source: C:\Users\user\Desktop\avz.exeCode function: 0_2_00424D58 FindFirstFileW,FindClose,0_2_00424D58
      Source: C:\Users\user\Desktop\avz.exeCode function: 0_2_00422AAC GetLogicalDriveStringsW,QueryDosDeviceW,0_2_00422AAC
      Source: avz.exe, avz.exe, 00000000.00000002.2857267956.0000000000401000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: http://whitelist.kaspersky.com/application?MD5=
      Source: avz.exe, 00000000.00000002.2857267956.0000000000960000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: http://www.kaspersky.ru/
      Source: avz.exe, 00000000.00000002.2857267956.0000000000960000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: http://www.z-oleg.com/secur/avz/report.php
      Source: avz.exe, 00000000.00000002.2857267956.0000000000960000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: http://www.z-oleg.com/secur/avz_up5/
      Source: avz.exe, 00000000.00000002.2857267956.0000000000401000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: http://z-oleg.com/secur/avz/
      Source: avz.exe, 00000000.00000002.2857267956.0000000000960000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: http://z-oleg.com/secur/avz/uploadvir.php
      Source: avz.exe, 00000000.00000002.2857267956.0000000000960000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: http://z-oleg.com/secur/avz_doc/
      Source: avz.exe, avz.exe, 00000000.00000002.2857267956.0000000000401000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: https://nova.rambler.ru/search?query=
      Source: avz.exe, 00000000.00000002.2857267956.0000000000401000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: https://nova.rambler.ru/search?query=U
      Source: avz.exe, avz.exe, 00000000.00000002.2857267956.0000000000401000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: https://www.google.ru/search?hl=ru&q=
      Source: avz.exe, 00000000.00000002.2857267956.0000000000401000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: https://www.google.ru/search?hl=ru&q=U
      Source: avz.exeString found in binary or memory: https://www.kaspersky.com/
      Source: avz.exe, 00000000.00000002.2857267956.0000000000401000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: https://www.kaspersky.com/U
      Source: avz.exe, 00000000.00000002.2857267956.0000000000401000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: https://www.kaspersky.com/https://www.kaspersky.ru/U
      Source: avz.exeString found in binary or memory: https://www.kaspersky.ru/
      Source: avz.exeString found in binary or memory: https://www.z-oleg.com/secur/avz/report.php
      Source: avz.exe, 00000000.00000002.2857267956.0000000000401000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: https://www.z-oleg.com/secur/avz/report.phpU
      Source: avz.exe, avz.exe, 00000000.00000002.2857267956.0000000000960000.00000040.00000001.01000000.00000003.sdmp, avz.exe, 00000000.00000002.2857267956.0000000000401000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: https://www.z-oleg.com/secur/avz_up5/
      Source: avz.exeString found in binary or memory: https://z-oleg.com/secur/avz
      Source: avz.exeString found in binary or memory: https://z-oleg.com/secur/avz/upload_qr.php
      Source: avz.exe, 00000000.00000002.2857267956.0000000000401000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: https://z-oleg.com/secur/avz/upload_qr.phpU
      Source: avz.exe, 00000000.00000002.2857267956.0000000000401000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: https://z-oleg.com/secur/avzU
      Source: avz.exeString found in binary or memory: https://z-oleg.com/secur/avz_doc/
      Source: avz.exe, 00000000.00000002.2857267956.0000000000401000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: https://z-oleg.com/secur/avz_doc/U
      Source: C:\Users\user\Desktop\avz.exeCode function: 0_2_004412E80_2_004412E8
      Source: C:\Users\user\Desktop\avz.exeCode function: 0_2_0040CBA40_2_0040CBA4
      Source: C:\Users\user\Desktop\avz.exeProcess token adjusted: Load DriverJump to behavior
      Source: avz.exeStatic PE information: Resource name: RT_BITMAP type: 68K BCS executable
      Source: avz.exeStatic PE information: Resource name: RT_STRING type: DOS executable (COM)
      Source: avz.exeStatic PE information: Resource name: RT_STRING type: DOS executable (COM)
      Source: avz.exeStatic PE information: Resource name: RT_STRING type: DOS executable (COM, 0x8C-variant)
      Source: avz.exeStatic PE information: Resource name: RT_STRING type: DOS executable (COM, 0x8C-variant)
      Source: avz.exeBinary or memory string: OriginalFilename vs avz.exe
      Source: avz.exe, 00000000.00000002.2859328721.000000000A533000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamecomctl32.DLL.MUIj% vs avz.exe
      Source: avz.exe, 00000000.00000002.2857267956.0000000000401000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilename vs avz.exe
      Source: avz.exe, 00000000.00000002.2857267956.0000000000401000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameU vs avz.exe
      Source: avz.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
      Source: avz.exeStatic PE information: Section: UPX1 ZLIB complexity 0.9887729595035105
      Source: classification engineClassification label: sus25.evad.winEXE@1/0@0/0
      Source: C:\Users\user\Desktop\avz.exeCode function: 0_2_00425874 GetDiskFreeSpaceW,0_2_00425874
      Source: C:\Users\user\Desktop\avz.exeFile created: C:\Users\user\Desktop\BASEJump to behavior
      Source: Yara matchFile source: 0.2.avz.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 00000000.00000002.2857267956.0000000000401000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
      Source: C:\Users\user\Desktop\avz.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
      Source: C:\Users\user\Desktop\avz.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
      Source: C:\Users\user\Desktop\avz.exeFile read: C:\Windows\win.iniJump to behavior
      Source: C:\Users\user\Desktop\avz.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: avz.exeString found in binary or memory: NATS-SEFI-ADD
      Source: avz.exeString found in binary or memory: NATS-DANO-ADD
      Source: avz.exeString found in binary or memory: </InstalledProg>
      Source: avz.exeString found in binary or memory: JIS_C6229-1984-b-add
      Source: avz.exeString found in binary or memory: jp-ocr-b-add
      Source: avz.exeString found in binary or memory: JIS_C6229-1984-hand-add
      Source: avz.exeString found in binary or memory: jp-ocr-hand-add
      Source: avz.exeString found in binary or memory: ISO_6937-2-add
      Source: avz.exeString found in binary or memory: MAIN-START
      Source: avz.exeString found in binary or memory: switch></addop><mulop><switch><char text="*" add="op"/><char text="/" add="op"/><keyword text="DIV" add="op" addtext="div"/><keywo
      Source: C:\Users\user\Desktop\avz.exeFile read: C:\Users\user\Desktop\avz.exeJump to behavior
      Source: C:\Users\user\Desktop\avz.exeSection loaded: netapi32.dllJump to behavior
      Source: C:\Users\user\Desktop\avz.exeSection loaded: version.dllJump to behavior
      Source: C:\Users\user\Desktop\avz.exeSection loaded: wininet.dllJump to behavior
      Source: C:\Users\user\Desktop\avz.exeSection loaded: wsock32.dllJump to behavior
      Source: C:\Users\user\Desktop\avz.exeSection loaded: wkscli.dllJump to behavior
      Source: C:\Users\user\Desktop\avz.exeSection loaded: cscapi.dllJump to behavior
      Source: C:\Users\user\Desktop\avz.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Users\user\Desktop\avz.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\avz.exeSection loaded: wtsapi32.dllJump to behavior
      Source: C:\Users\user\Desktop\avz.exeSection loaded: winsta.dllJump to behavior
      Source: C:\Users\user\Desktop\avz.exeSection loaded: olepro32.dllJump to behavior
      Source: C:\Users\user\Desktop\avz.exeSection loaded: riched20.dllJump to behavior
      Source: C:\Users\user\Desktop\avz.exeSection loaded: usp10.dllJump to behavior
      Source: C:\Users\user\Desktop\avz.exeSection loaded: msls31.dllJump to behavior
      Source: C:\Users\user\Desktop\avz.exeSection loaded: dataexchange.dllJump to behavior
      Source: C:\Users\user\Desktop\avz.exeSection loaded: d3d11.dllJump to behavior
      Source: C:\Users\user\Desktop\avz.exeSection loaded: dcomp.dllJump to behavior
      Source: C:\Users\user\Desktop\avz.exeSection loaded: dxgi.dllJump to behavior
      Source: C:\Users\user\Desktop\avz.exeSection loaded: twinapi.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\avz.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\Desktop\avz.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\Desktop\avz.exeSection loaded: propsys.dllJump to behavior
      Source: C:\Users\user\Desktop\avz.exeSection loaded: windowscodecs.dllJump to behavior
      Source: C:\Users\user\Desktop\avz.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Users\user\Desktop\avz.exeSection loaded: textshaping.dllJump to behavior
      Source: C:\Users\user\Desktop\avz.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Users\user\Desktop\avz.exeSection loaded: cryptsp.dllJump to behavior
      Source: C:\Users\user\Desktop\avz.exeSection loaded: rsaenh.dllJump to behavior
      Source: C:\Users\user\Desktop\avz.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Users\user\Desktop\avz.exeSection loaded: gpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\avz.exeSection loaded: textinputframework.dllJump to behavior
      Source: C:\Users\user\Desktop\avz.exeSection loaded: coreuicomponents.dllJump to behavior
      Source: C:\Users\user\Desktop\avz.exeSection loaded: coremessaging.dllJump to behavior
      Source: C:\Users\user\Desktop\avz.exeSection loaded: ntmarta.dllJump to behavior
      Source: C:\Users\user\Desktop\avz.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\avz.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\avz.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\avz.exeSection loaded: dwmapi.dllJump to behavior
      Source: C:\Users\user\Desktop\avz.exeSection loaded: thumbcache.dllJump to behavior
      Source: C:\Users\user\Desktop\avz.exeSection loaded: policymanager.dllJump to behavior
      Source: C:\Users\user\Desktop\avz.exeSection loaded: msvcp110_win.dllJump to behavior
      Source: C:\Users\user\Desktop\avz.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9FC8E510-A27C-4B3B-B9A3-BF65F00256A8}\InProcServer32Jump to behavior
      Source: C:\Users\user\Desktop\avz.exeWindow found: window name: TComboBoxJump to behavior
      Source: Window RecorderWindow detected: More than 3 window changes detected
      Source: avz.exeStatic file information: File size 1572352 > 1048576
      Source: avz.exeStatic PE information: Raw size of UPX1 is bigger than: 0x100000 < 0x175e00
      Source: C:\Users\user\Desktop\avz.exeCode function: 0_2_0043A25C push ecx; mov dword ptr [esp], ecx0_2_0043A25F
      Source: C:\Users\user\Desktop\avz.exeCode function: 0_2_00430204 push 004302EFh; ret 0_2_004302E7
      Source: C:\Users\user\Desktop\avz.exeCode function: 0_2_0046835C push ecx; mov dword ptr [esp], edx0_2_0046835D
      Source: C:\Users\user\Desktop\avz.exeCode function: 0_2_0046730C push ecx; mov dword ptr [esp], ecx0_2_00467310
      Source: C:\Users\user\Desktop\avz.exeCode function: 0_2_0042A448 push 0042A4E1h; ret 0_2_0042A4D9
      Source: C:\Users\user\Desktop\avz.exeCode function: 0_2_0046343C push ecx; mov dword ptr [esp], ecx0_2_00463440
      Source: C:\Users\user\Desktop\avz.exeCode function: 0_2_0041C4E8 push 0041C520h; ret 0_2_0041C518
      Source: C:\Users\user\Desktop\avz.exeCode function: 0_2_0041048C push 0041050Fh; ret 0_2_00410507
      Source: C:\Users\user\Desktop\avz.exeCode function: 0_2_00466510 push ecx; mov dword ptr [esp], edx0_2_00466511
      Source: C:\Users\user\Desktop\avz.exeCode function: 0_2_00466520 push ecx; mov dword ptr [esp], edx0_2_00466521
      Source: C:\Users\user\Desktop\avz.exeCode function: 0_2_00465530 push ecx; mov dword ptr [esp], ecx0_2_00465534
      Source: C:\Users\user\Desktop\avz.exeCode function: 0_2_008335F4 push ecx; mov dword ptr [esp], edx0_2_008335F5
      Source: C:\Users\user\Desktop\avz.exeCode function: 0_2_00466604 push ecx; mov dword ptr [esp], ecx0_2_00466608
      Source: C:\Users\user\Desktop\avz.exeCode function: 0_2_004686F8 push ecx; mov dword ptr [esp], edx0_2_004686F9
      Source: C:\Users\user\Desktop\avz.exeCode function: 0_2_00464840 push ecx; mov dword ptr [esp], ecx0_2_00464844
      Source: C:\Users\user\Desktop\avz.exeCode function: 0_2_00467828 push ecx; mov dword ptr [esp], edx0_2_00467829
      Source: C:\Users\user\Desktop\avz.exeCode function: 0_2_00462888 push 004628DEh; ret 0_2_004628D6
      Source: C:\Users\user\Desktop\avz.exeCode function: 0_2_00466978 push ecx; mov dword ptr [esp], edx0_2_00466979
      Source: C:\Users\user\Desktop\avz.exeCode function: 0_2_00466988 push ecx; mov dword ptr [esp], edx0_2_00466989
      Source: C:\Users\user\Desktop\avz.exeCode function: 0_2_00466A6C push ecx; mov dword ptr [esp], ecx0_2_00466A70
      Source: C:\Users\user\Desktop\avz.exeCode function: 0_2_00465A2C push ecx; mov dword ptr [esp], eax0_2_00465A2E
      Source: C:\Users\user\Desktop\avz.exeCode function: 0_2_0043EB78 push ecx; mov dword ptr [esp], eax0_2_0043EB79
      Source: C:\Users\user\Desktop\avz.exeCode function: 0_2_00467B78 push ecx; mov dword ptr [esp], edx0_2_00467B79
      Source: C:\Users\user\Desktop\avz.exeCode function: 0_2_0043DB14 push ecx; mov dword ptr [esp], eax0_2_0043DB15
      Source: C:\Users\user\Desktop\avz.exeCode function: 0_2_00462C10 push ecx; mov dword ptr [esp], edx0_2_00462C11
      Source: C:\Users\user\Desktop\avz.exeCode function: 0_2_00425C18 push ecx; mov dword ptr [esp], ecx0_2_00425C1B
      Source: C:\Users\user\Desktop\avz.exeCode function: 0_2_00468D5C push ecx; mov dword ptr [esp], edx0_2_00468D5D
      Source: C:\Users\user\Desktop\avz.exeCode function: 0_2_00465DF4 push ecx; mov dword ptr [esp], edx0_2_00465DF5
      Source: C:\Users\user\Desktop\avz.exeCode function: 0_2_00466DF0 push ecx; mov dword ptr [esp], edx0_2_00466DF1
      Source: C:\Users\user\Desktop\avz.exeCode function: 0_2_00466ED4 push ecx; mov dword ptr [esp], ecx0_2_00466ED8
      Source: C:\Users\user\Desktop\avz.exeCode function: 0_2_0043CED0 push 0043CF27h; ret 0_2_0043CF1F
      Source: initial sampleStatic PE information: section name: UPX0
      Source: initial sampleStatic PE information: section name: UPX1

      Hooking and other Techniques for Hiding and Protection

      barindex
      Source: avz.exeBinary or memory string: KeServiceDescriptorTable
      Source: avz.exe, 00000000.00000002.2857267956.0000000000401000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: KeServiceDescriptorTable
      Source: C:\Users\user\Desktop\avz.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOTJump to behavior
      Source: C:\Users\user\Desktop\avz.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
      Source: C:\Users\user\Desktop\avz.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\avz.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\avz.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\avz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\avz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\avz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\avz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\avz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\avz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\avz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\avz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\avz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\avz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\avz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\avz.exeAPI coverage: 9.0 %
      Source: C:\Users\user\Desktop\avz.exeCode function: 0_2_0040E718 FindFirstFileW,FindClose,0_2_0040E718
      Source: C:\Users\user\Desktop\avz.exeCode function: 0_2_0040E14C GetModuleHandleW,GetProcAddress,FindFirstFileW,FindClose,lstrlenW,lstrlenW,0_2_0040E14C
      Source: C:\Users\user\Desktop\avz.exeCode function: 0_2_00424B74 FindFirstFileW,FindClose,0_2_00424B74
      Source: C:\Users\user\Desktop\avz.exeCode function: 0_2_00424D58 FindFirstFileW,FindClose,0_2_00424D58
      Source: C:\Users\user\Desktop\avz.exeCode function: 0_2_00422AAC GetLogicalDriveStringsW,QueryDosDeviceW,0_2_00422AAC
      Source: avz.exe, 00000000.00000002.2858364688.0000000001AE3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}T
      Source: avz.exe, 00000000.00000002.2858364688.0000000001AE3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
      Source: avz.exe, 00000000.00000002.2858364688.0000000001B53000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: War&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Pro
      Source: avz.exe, 00000000.00000002.2858364688.0000000001AE3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
      Source: avz.exe, 00000000.00000002.2858364688.0000000001AE3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
      Source: C:\Users\user\Desktop\avz.exeProcess token adjusted: DebugJump to behavior
      Source: C:\Users\user\Desktop\avz.exeCode function: GetUserDefaultUILanguage,GetLocaleInfoW,0_2_0040E850
      Source: C:\Users\user\Desktop\avz.exeCode function: IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_2_0040DCF0
      Source: C:\Users\user\Desktop\avz.exeCode function: GetLocaleInfoW,0_2_00429DD8
      Source: C:\Users\user\Desktop\avz.exeCode function: GetLocaleInfoW,0_2_00429E24
      Source: C:\Users\user\Desktop\avz.exeCode function: 0_2_00428164 GetLocalTime,0_2_00428164
      Source: C:\Users\user\Desktop\avz.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
      Source: avz.exe, 00000000.00000002.2858603420.000000000546A000.00000004.00001000.00020000.00000000.sdmp, avz.exe, 00000000.00000002.2858364688.0000000001B10000.00000004.00000020.00020000.00000000.sdmp, avz.exe, 00000000.00000002.2858603420.0000000005478000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: C:\Users\user\Desktop\avz.exe
      Source: avz.exe, 00000000.00000002.2857267956.00000000008E6000.00000040.00000001.01000000.00000003.sdmp, avz.exe, 00000000.00000002.2858364688.0000000001B10000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: avz.exe
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
      Command and Scripting Interpreter
      1
      LSASS Driver
      1
      LSASS Driver
      1
      Masquerading
      1
      Credential API Hooking
      1
      System Time Discovery
      Remote Services1
      Credential API Hooking
      1
      Encrypted Channel
      Exfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault AccountsScheduled Task/Job1
      DLL Side-Loading
      1
      DLL Side-Loading
      11
      Obfuscated Files or Information
      LSASS Memory1
      Query Registry
      Remote Desktop Protocol1
      Archive Collected Data
      Junk DataExfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
      Software Packing
      Security Account Manager11
      Security Software Discovery
      SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
      DLL Side-Loading
      NTDS3
      File and Directory Discovery
      Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets14
      System Information Discovery
      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      avz.exe8%ReversingLabs
      avz.exe4%VirustotalBrowse
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      No contacted domains info
      NameSourceMaliciousAntivirus DetectionReputation
      https://www.z-oleg.com/secur/avz/report.phpUavz.exe, 00000000.00000002.2857267956.0000000000401000.00000040.00000001.01000000.00000003.sdmpfalse
        high
        https://www.kaspersky.com/https://www.kaspersky.ru/Uavz.exe, 00000000.00000002.2857267956.0000000000401000.00000040.00000001.01000000.00000003.sdmpfalse
          high
          http://www.kaspersky.ru/avz.exe, 00000000.00000002.2857267956.0000000000960000.00000040.00000001.01000000.00000003.sdmpfalse
            high
            http://z-oleg.com/secur/avz/uploadvir.phpavz.exe, 00000000.00000002.2857267956.0000000000960000.00000040.00000001.01000000.00000003.sdmpfalse
              high
              https://z-oleg.com/secur/avz_doc/avz.exefalse
                high
                https://www.kaspersky.com/avz.exefalse
                  high
                  http://whitelist.kaspersky.com/application?MD5=avz.exe, avz.exe, 00000000.00000002.2857267956.0000000000401000.00000040.00000001.01000000.00000003.sdmpfalse
                    high
                    http://www.z-oleg.com/secur/avz_up5/avz.exe, 00000000.00000002.2857267956.0000000000960000.00000040.00000001.01000000.00000003.sdmpfalse
                      high
                      https://nova.rambler.ru/search?query=Uavz.exe, 00000000.00000002.2857267956.0000000000401000.00000040.00000001.01000000.00000003.sdmpfalse
                        high
                        https://www.kaspersky.com/Uavz.exe, 00000000.00000002.2857267956.0000000000401000.00000040.00000001.01000000.00000003.sdmpfalse
                          high
                          https://www.google.ru/search?hl=ru&q=Uavz.exe, 00000000.00000002.2857267956.0000000000401000.00000040.00000001.01000000.00000003.sdmpfalse
                            high
                            https://www.kaspersky.ru/avz.exefalse
                              high
                              https://z-oleg.com/secur/avz/upload_qr.phpavz.exefalse
                                high
                                http://z-oleg.com/secur/avz_doc/avz.exe, 00000000.00000002.2857267956.0000000000960000.00000040.00000001.01000000.00000003.sdmpfalse
                                  high
                                  https://z-oleg.com/secur/avzUavz.exe, 00000000.00000002.2857267956.0000000000401000.00000040.00000001.01000000.00000003.sdmpfalse
                                    high
                                    https://www.z-oleg.com/secur/avz_up5/avz.exe, avz.exe, 00000000.00000002.2857267956.0000000000960000.00000040.00000001.01000000.00000003.sdmp, avz.exe, 00000000.00000002.2857267956.0000000000401000.00000040.00000001.01000000.00000003.sdmpfalse
                                      high
                                      https://z-oleg.com/secur/avz_doc/Uavz.exe, 00000000.00000002.2857267956.0000000000401000.00000040.00000001.01000000.00000003.sdmpfalse
                                        high
                                        http://www.z-oleg.com/secur/avz/report.phpavz.exe, 00000000.00000002.2857267956.0000000000960000.00000040.00000001.01000000.00000003.sdmpfalse
                                          high
                                          http://z-oleg.com/secur/avz/avz.exe, 00000000.00000002.2857267956.0000000000401000.00000040.00000001.01000000.00000003.sdmpfalse
                                            high
                                            https://nova.rambler.ru/search?query=avz.exe, avz.exe, 00000000.00000002.2857267956.0000000000401000.00000040.00000001.01000000.00000003.sdmpfalse
                                              high
                                              https://www.z-oleg.com/secur/avz/report.phpavz.exefalse
                                                high
                                                https://z-oleg.com/secur/avzavz.exefalse
                                                  high
                                                  https://www.google.ru/search?hl=ru&q=avz.exe, avz.exe, 00000000.00000002.2857267956.0000000000401000.00000040.00000001.01000000.00000003.sdmpfalse
                                                    high
                                                    https://z-oleg.com/secur/avz/upload_qr.phpUavz.exe, 00000000.00000002.2857267956.0000000000401000.00000040.00000001.01000000.00000003.sdmpfalse
                                                      high
                                                      No contacted IP infos
                                                      Joe Sandbox version:40.0.0 Tourmaline
                                                      Analysis ID:1436352
                                                      Start date and time:2024-05-04 15:04:06 +02:00
                                                      Joe Sandbox product:CloudBasic
                                                      Overall analysis duration:0h 4m 37s
                                                      Hypervisor based Inspection enabled:false
                                                      Report type:full
                                                      Cookbook file name:default.jbs
                                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                      Number of analysed new started processes analysed:7
                                                      Number of new started drivers analysed:0
                                                      Number of existing processes analysed:0
                                                      Number of existing drivers analysed:0
                                                      Number of injected processes analysed:0
                                                      Technologies:
                                                      • HCA enabled
                                                      • EGA enabled
                                                      • AMSI enabled
                                                      Analysis Mode:default
                                                      Analysis stop reason:Timeout
                                                      Sample name:avz.exe
                                                      Detection:SUS
                                                      Classification:sus25.evad.winEXE@1/0@0/0
                                                      EGA Information:
                                                      • Successful, ratio: 100%
                                                      HCA Information:Failed
                                                      Cookbook Comments:
                                                      • Found application associated with file extension: .exe
                                                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, MoUsoCoreWorker.exe, svchost.exe
                                                      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                      • Not all processes where analyzed, report is missing behavior information
                                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                                      No simulations
                                                      No context
                                                      No context
                                                      No context
                                                      No context
                                                      No context
                                                      No created / dropped files found
                                                      File type:PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
                                                      Entropy (8bit):7.889404299781525
                                                      TrID:
                                                      • Win32 Executable (generic) a (10002005/4) 99.37%
                                                      • UPX compressed Win32 Executable (30571/9) 0.30%
                                                      • Win32 EXE Yoda's Crypter (26571/9) 0.26%
                                                      • Win16/32 Executable Delphi generic (2074/23) 0.02%
                                                      • Generic Win/DOS Executable (2004/3) 0.02%
                                                      File name:avz.exe
                                                      File size:1'572'352 bytes
                                                      MD5:59e8187b34416258ae6ab3cdf4ee6628
                                                      SHA1:38378107dec5f543448a80134219a61dd37fab80
                                                      SHA256:cbfadfb4f37c0e70827f4b5349d20827079aa86aa24c0b10c921aa06681f4757
                                                      SHA512:9e0cd06ee0b763fbdaf983b47733508b826c1cf1a0248330be262ec14d8c0fbc0b1013b3ada75481572e526a062cab272da2ece10c122ca541034657529ebb54
                                                      SSDEEP:24576:gxC+MB3qWEQZsYhgjkzM1fNbPj+Vy/0T60P//cH0JDDtd2e9oStdWTmVoWUr4f5A:oRdKZs2wiVy8W0P8Udlt7li4kB
                                                      TLSH:817523692A18C067D39828758F05D8FD1D593D6173883E0A33D3BDDFBF696962B420B2
                                                      File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
                                                      Icon Hash:995109959b4f0504
                                                      Entrypoint:0x99e9d0
                                                      Entrypoint Section:UPX1
                                                      Digitally signed:false
                                                      Imagebase:0x400000
                                                      Subsystem:windows gui
                                                      Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                                                      DLL Characteristics:
                                                      Time Stamp:0x662321FC [Sat Apr 20 02:01:32 2024 UTC]
                                                      TLS Callbacks:
                                                      CLR (.Net) Version:
                                                      OS Version Major:5
                                                      OS Version Minor:0
                                                      File Version Major:5
                                                      File Version Minor:0
                                                      Subsystem Version Major:5
                                                      Subsystem Version Minor:0
                                                      Import Hash:70c9d82a50a5b5542c5c4c83152ea81b
                                                      Instruction
                                                      pushad
                                                      mov esi, 00829000h
                                                      lea edi, dword ptr [esi-00428000h]
                                                      mov dword ptr [edi+004B4C3Ch], 6D35F187h
                                                      push edi
                                                      or ebp, FFFFFFFFh
                                                      jmp 00007F4E91321A90h
                                                      nop
                                                      nop
                                                      nop
                                                      nop
                                                      mov al, byte ptr [esi]
                                                      inc esi
                                                      mov byte ptr [edi], al
                                                      inc edi
                                                      add ebx, ebx
                                                      jne 00007F4E91321A89h
                                                      mov ebx, dword ptr [esi]
                                                      sub esi, FFFFFFFCh
                                                      adc ebx, ebx
                                                      jc 00007F4E91321A6Fh
                                                      mov eax, 00000001h
                                                      add ebx, ebx
                                                      jne 00007F4E91321A89h
                                                      mov ebx, dword ptr [esi]
                                                      sub esi, FFFFFFFCh
                                                      adc ebx, ebx
                                                      adc eax, eax
                                                      add ebx, ebx
                                                      jnc 00007F4E91321A8Dh
                                                      jne 00007F4E91321AAAh
                                                      mov ebx, dword ptr [esi]
                                                      sub esi, FFFFFFFCh
                                                      adc ebx, ebx
                                                      jc 00007F4E91321AA1h
                                                      dec eax
                                                      add ebx, ebx
                                                      jne 00007F4E91321A89h
                                                      mov ebx, dword ptr [esi]
                                                      sub esi, FFFFFFFCh
                                                      adc ebx, ebx
                                                      adc eax, eax
                                                      jmp 00007F4E91321A56h
                                                      add ebx, ebx
                                                      jne 00007F4E91321A89h
                                                      mov ebx, dword ptr [esi]
                                                      sub esi, FFFFFFFCh
                                                      adc ebx, ebx
                                                      adc ecx, ecx
                                                      jmp 00007F4E91321AD4h
                                                      xor ecx, ecx
                                                      sub eax, 03h
                                                      jc 00007F4E91321A93h
                                                      shl eax, 08h
                                                      mov al, byte ptr [esi]
                                                      inc esi
                                                      xor eax, FFFFFFFFh
                                                      je 00007F4E91321AF7h
                                                      sar eax, 1
                                                      mov ebp, eax
                                                      jmp 00007F4E91321A8Dh
                                                      add ebx, ebx
                                                      jne 00007F4E91321A89h
                                                      mov ebx, dword ptr [esi]
                                                      sub esi, FFFFFFFCh
                                                      adc ebx, ebx
                                                      jc 00007F4E91321A4Eh
                                                      inc ecx
                                                      add ebx, ebx
                                                      jne 00007F4E91321A89h
                                                      mov ebx, dword ptr [esi]
                                                      sub esi, FFFFFFFCh
                                                      adc ebx, ebx
                                                      jc 00007F4E91321A40h
                                                      add ebx, ebx
                                                      jne 00007F4E91321A89h
                                                      mov ebx, dword ptr [esi]
                                                      sub esi, FFFFFFFCh
                                                      adc ebx, ebx
                                                      adc ecx, ecx
                                                      add ebx, ebx
                                                      jnc 00007F4E91321A71h
                                                      jne 00007F4E91321A8Bh
                                                      mov ebx, dword ptr [esi]
                                                      sub esi, FFFFFFFCh
                                                      adc ebx, ebx
                                                      jnc 00007F4E91321A66h
                                                      add ecx, 02h
                                                      cmp ebp, 00000000h
                                                      NameVirtual AddressVirtual Size Is in Section
                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x4e70000x95UPX1
                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x5a87000x354.rsrc
                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x59f0000x9700.rsrc
                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_TLS0x59eb880x18UPX1
                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x4e60000xb1eUPX1
                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                      UPX00x10000x4280000x0d41d8cd98f00b204e9800998ecf8427eunknownunknownunknownunknownIMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                      UPX10x4290000x1760000x175e00986697aac5f2c961e9296db7079873abFalse0.9887729595035105data7.922141861509734IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                      .rsrc0x59f0000xa0000x9c001db7c7ad4fe3caff159d67448a4c1014False0.21501903044871795data3.623768923715147IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                                      RT_CURSOR0x552c700x134data1.0357142857142858
                                                      RT_CURSOR0x552da40x134dataEnglishUnited States1.0357142857142858
                                                      RT_CURSOR0x552ed80x134dataEnglishUnited States1.0357142857142858
                                                      RT_CURSOR0x55300c0x134dataEnglishUnited States1.0357142857142858
                                                      RT_CURSOR0x5531400x134dataEnglishUnited States1.0357142857142858
                                                      RT_CURSOR0x5532740x134dataEnglishUnited States1.0357142857142858
                                                      RT_CURSOR0x5533a80x134dataEnglishUnited States1.0357142857142858
                                                      RT_CURSOR0x5534dc0x134data1.0357142857142858
                                                      RT_CURSOR0x5536100x134dataEnglishUnited States1.0357142857142858
                                                      RT_BITMAP0x5537440x1d0dataEnglishUnited States1.0237068965517242
                                                      RT_BITMAP0x5539140x1e4dataEnglishUnited States1.0227272727272727
                                                      RT_BITMAP0x553af80x1d0dataEnglishUnited States1.0237068965517242
                                                      RT_BITMAP0x553cc80x1d0dataEnglishUnited States1.0237068965517242
                                                      RT_BITMAP0x553e980x1d0dataEnglishUnited States1.0237068965517242
                                                      RT_BITMAP0x5540680x1d0dataEnglishUnited States1.0237068965517242
                                                      RT_BITMAP0x5542380x1d0dataEnglishUnited States1.0237068965517242
                                                      RT_BITMAP0x5544080x1d0dataEnglishUnited States1.0237068965517242
                                                      RT_BITMAP0x5545d80x1d0dataEnglishUnited States1.0237068965517242
                                                      RT_BITMAP0x5547a80x1d0dataEnglishUnited States1.0237068965517242
                                                      RT_BITMAP0x5549780x2a4data1.0162721893491125
                                                      RT_BITMAP0x554c1c0xc0dataEnglishUnited States1.0572916666666667
                                                      RT_BITMAP0x554cdc0x128OpenPGP Public Key1.037162162162162
                                                      RT_BITMAP0x554e040x7b8data1.0055668016194332
                                                      RT_BITMAP0x5555bc0xe0dataEnglishUnited States1.0491071428571428
                                                      RT_BITMAP0x55569c0xe0dataEnglishUnited States1.0491071428571428
                                                      RT_BITMAP0x55577c0x5cdataEnglishUnited States1.1195652173913044
                                                      RT_BITMAP0x5557d80x5cdataEnglishUnited States1.1195652173913044
                                                      RT_BITMAP0x5558340x110data1.0404411764705883
                                                      RT_BITMAP0x5559440x110data1.0404411764705883
                                                      RT_BITMAP0x555a540x110data1.0404411764705883
                                                      RT_BITMAP0x555b640x5cdata1.1195652173913044
                                                      RT_BITMAP0x555bc00x5cdata1.1195652173913044
                                                      RT_BITMAP0x555c1c0x110data1.0404411764705883
                                                      RT_BITMAP0x555d2c0x110data1.0404411764705883
                                                      RT_BITMAP0x555e3c0x110data1.0404411764705883
                                                      RT_BITMAP0x555f4c0x110data1.0404411764705883
                                                      RT_BITMAP0x55605c0xb0data1.0625
                                                      RT_BITMAP0x55610c0xb0data1.0625
                                                      RT_BITMAP0x5561bc0x5cPGP Secret Sub-key -EnglishUnited States1.1195652173913044
                                                      RT_BITMAP0x5562180x5cdataEnglishUnited States1.1195652173913044
                                                      RT_BITMAP0x5562740x5cdataEnglishUnited States1.1195652173913044
                                                      RT_BITMAP0x5562d00x46edataEnglishUnited States1.009700176366843
                                                      RT_BITMAP0x5567400x46edataEnglishUnited States1.009700176366843
                                                      RT_BITMAP0x556bb00x46edataEnglishUnited States1.009700176366843
                                                      RT_BITMAP0x5570200x46edataEnglishUnited States1.009700176366843
                                                      RT_BITMAP0x5574900x46edataEnglishUnited States1.009700176366843
                                                      RT_BITMAP0x5579000x46e68K BCS executableEnglishUnited States1.009700176366843
                                                      RT_BITMAP0x557d700x46edataEnglishUnited States1.009700176366843
                                                      RT_BITMAP0x5581e00x46edataEnglishUnited States1.009700176366843
                                                      RT_BITMAP0x5586500x46edataEnglishUnited States1.009700176366843
                                                      RT_BITMAP0x558ac00x46edataEnglishUnited States1.009700176366843
                                                      RT_BITMAP0x558f300x46edataEnglishUnited States1.009700176366843
                                                      RT_BITMAP0x5593a00x46edataEnglishUnited States1.009700176366843
                                                      RT_BITMAP0x5598100x128dataCzechCzech Republic1.037162162162162
                                                      RT_BITMAP0x5599380x308data1.0141752577319587
                                                      RT_BITMAP0x559c400xe0dataEnglishUnited States1.0491071428571428
                                                      RT_BITMAP0x559d200xc8dataCzechCzech Republic1.055
                                                      RT_BITMAP0x559de80xc0dataEnglishUnited States1.0572916666666667
                                                      RT_BITMAP0x559ea80xc0dataEnglishUnited States1.0572916666666667
                                                      RT_BITMAP0x559f680xe0dataEnglishUnited States1.0491071428571428
                                                      RT_BITMAP0x55a0480xc0dataEnglishUnited States1.0572916666666667
                                                      RT_BITMAP0x55a1080x48data1.1527777777777777
                                                      RT_BITMAP0x55a1500x48data1.1527777777777777
                                                      RT_BITMAP0x55a1980xe0dataEnglishUnited States1.0491071428571428
                                                      RT_BITMAP0x55a2780x48data1.1527777777777777
                                                      RT_BITMAP0x55a2c00x48data1.1527777777777777
                                                      RT_BITMAP0x55a3080xe8dataEnglishUnited States1.0474137931034482
                                                      RT_BITMAP0x55a3f00xc0dataEnglishUnited States1.0572916666666667
                                                      RT_BITMAP0x55a4b00xc8dataCzechCzech Republic1.055
                                                      RT_BITMAP0x55a5780x2d0data1.0152777777777777
                                                      RT_BITMAP0x55a8480x98dataEnglishUnited States1.0723684210526316
                                                      RT_BITMAP0x55a8e00x98dataEnglishUnited States1.0723684210526316
                                                      RT_BITMAP0x55a9780xe0dataEnglishUnited States1.0491071428571428
                                                      RT_ICON0x5a1c740x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishUnited States0.5067567567567568
                                                      RT_ICON0x5a1da00x568Device independent bitmap graphic, 16 x 32 x 8, image size 320EnglishUnited States0.4819364161849711
                                                      RT_ICON0x5a230c0x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.2154255319148936
                                                      RT_ICON0x5a27780x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640EnglishUnited States0.3897849462365591
                                                      RT_ICON0x5a2a640x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1152EnglishUnited States0.4038808664259928
                                                      RT_ICON0x5a33100x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.12218574108818012
                                                      RT_ICON0x5a43bc0x668Device independent bitmap graphic, 48 x 96 x 4, image size 1536EnglishUnited States0.25914634146341464
                                                      RT_ICON0x5a4a280xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2688EnglishUnited States0.2977078891257996
                                                      RT_ICON0x5a58d40x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.08246887966804979
                                                      RT_DIALOG0x560c400x52data1.1341463414634145
                                                      RT_DIALOG0x560c940x52data1.1341463414634145
                                                      RT_STRING0x560ce80x1bcdata1.0247747747747749
                                                      RT_STRING0x560ea40x228data1.019927536231884
                                                      RT_STRING0x5610cc0x3d4data1.0112244897959184
                                                      RT_STRING0x5614a00x5b0data1.007554945054945
                                                      RT_STRING0x561a500x3a8data1.0117521367521367
                                                      RT_STRING0x561df80x46cdata1.0097173144876326
                                                      RT_STRING0x5622640x43cdata1.0101476014760147
                                                      RT_STRING0x5626a00x488data1.0094827586206896
                                                      RT_STRING0x562b280x390data1.0120614035087718
                                                      RT_STRING0x562eb80x404data1.0107003891050583
                                                      RT_STRING0x5632bc0x440data1.010110294117647
                                                      RT_STRING0x5636fc0x34cdata1.0130331753554502
                                                      RT_STRING0x563a480x390data1.0120614035087718
                                                      RT_STRING0x563dd80x288data1.0169753086419753
                                                      RT_STRING0x5640600x2b0data1.0159883720930232
                                                      RT_STRING0x5643100x1dcdata1.023109243697479
                                                      RT_STRING0x5644ec0x118data1.0392857142857144
                                                      RT_STRING0x5646040x108data1.0416666666666667
                                                      RT_STRING0x56470c0x2b8data1.0158045977011494
                                                      RT_STRING0x5649c40x38cDOS executable (COM)1.0121145374449338
                                                      RT_STRING0x564d500x37cdata1.0123318385650224
                                                      RT_STRING0x5650cc0x328OpenPGP Secret Key1.0136138613861385
                                                      RT_STRING0x5653f40x1c0data1.0245535714285714
                                                      RT_STRING0x5655b40x58cOpenPGP Public Key1.0077464788732395
                                                      RT_STRING0x565b400x1dcdata1.023109243697479
                                                      RT_STRING0x565d1c0x3e0data1.0110887096774193
                                                      RT_STRING0x5660fc0x3d8data1.011178861788618
                                                      RT_STRING0x5664d40x33cdata1.0132850241545894
                                                      RT_STRING0x5668100x43cdata1.0101476014760147
                                                      RT_STRING0x566c4c0x58cdata1.0077464788732395
                                                      RT_STRING0x5671d80x46cdata1.0097173144876326
                                                      RT_STRING0x5676440x2ecDOS executable (COM)1.0147058823529411
                                                      RT_STRING0x5679300x2b0data1.0159883720930232
                                                      RT_STRING0x567be00x44cdata1.01
                                                      RT_STRING0x56802c0x124data1.0376712328767124
                                                      RT_STRING0x5681500xd4data1.0518867924528301
                                                      RT_STRING0x5682240x288data1.0169753086419753
                                                      RT_STRING0x5684ac0x11cdata1.0387323943661972
                                                      RT_STRING0x5685c80x3d0data1.0112704918032787
                                                      RT_STRING0x5689980x414DOS executable (COM, 0x8C-variant)1.010536398467433
                                                      RT_STRING0x568dac0x428data1.0103383458646618
                                                      RT_STRING0x5691d40x514data1.0084615384615385
                                                      RT_STRING0x5696e80x280data1.0171875
                                                      RT_STRING0x5699680x3e0data1.0110887096774193
                                                      RT_STRING0x569d480x4f8data1.0086477987421383
                                                      RT_STRING0x56a2400x38cDOS executable (COM, 0x8C-variant)1.0121145374449338
                                                      RT_STRING0x56a5cc0x374data1.012443438914027
                                                      RT_STRING0x56a9400x458data1.0098920863309353
                                                      RT_STRING0x56ad980x10cdata1.041044776119403
                                                      RT_STRING0x56aea40xccdata1.053921568627451
                                                      RT_STRING0x56af700x244data1.0189655172413794
                                                      RT_STRING0x56b1b40x414data1.010536398467433
                                                      RT_STRING0x56b5c80x358data1.0128504672897196
                                                      RT_STRING0x56b9200x310data1.0140306122448979
                                                      RT_STRING0x56bc300x334data1.0134146341463415
                                                      RT_RCDATA0x56bf640x10data1.5
                                                      RT_RCDATA0x56bf740x1a60data0.9995556872037915
                                                      RT_RCDATA0x56d9d40x2Non-ISO extended-ASCII text, with no line terminatorsEnglishUnited States5.0
                                                      RT_RCDATA0x56d9d80x2992data0.9907912046607781
                                                      RT_RCDATA0x57036c0xb72data1.0037542662116041
                                                      RT_RCDATA0x570ee00xe38data1.003021978021978
                                                      RT_RCDATA0x571d180x729data1.0060010911074742
                                                      RT_RCDATA0x5724440x52edata1.0082956259426847
                                                      RT_RCDATA0x5729740xc14data1.0035575679172057
                                                      RT_RCDATA0x5735880x2efedata0.9951787198669991
                                                      RT_RCDATA0x5764880x4b1data1.0091590341382182
                                                      RT_RCDATA0x57693c0xa0bdata1.0042784908595876
                                                      RT_RCDATA0x5773480x4a0data1.0092905405405406
                                                      RT_RCDATA0x5777e80x143adata1.0021243723445346
                                                      RT_RCDATA0x578c240x2b3data1.015918958031838
                                                      RT_RCDATA0x578ed80x74e6data0.9947871416159861
                                                      RT_RCDATA0x5803c00x2a55data0.9935406477807511
                                                      RT_RCDATA0x582e180x6bfdata1.0063694267515924
                                                      RT_RCDATA0x5834d80x113data1.04
                                                      RT_RCDATA0x5835ec0x494data1.0093856655290103
                                                      RT_RCDATA0x583a800xd549data0.945385615648065
                                                      RT_RCDATA0x590fcc0x3c4data0.9813278008298755
                                                      RT_RCDATA0x5913900x161edata0.9927587424938185
                                                      RT_RCDATA0x5929b00x45ddata1.0098478066248882
                                                      RT_RCDATA0x592e100xf07OpenPGP Secret Key0.9981804003119313
                                                      RT_RCDATA0x593d180xfebdata0.9936196319018404
                                                      RT_RCDATA0x594d040x12efdata0.9921600990303281
                                                      RT_RCDATA0x595ff40xc32data0.9910313901345291
                                                      RT_RCDATA0x596c280x39fdata1.011866235167206
                                                      RT_RCDATA0x596fc80xd72OpenPGP Secret Key0.9930273097036607
                                                      RT_RCDATA0x597d3c0x533OpenPGP Secret Key1.0082644628099173
                                                      RT_RCDATA0x5982700xef3data0.9918996603083355
                                                      RT_RCDATA0x5991640x491data0.8785286569717707
                                                      RT_RCDATA0x5995f80x1abdata1.0257611241217799
                                                      RT_GROUP_CURSOR0x5997a40x14data1.45
                                                      RT_GROUP_CURSOR0x5997b80x14data1.45
                                                      RT_GROUP_CURSOR0x5997cc0x14dataEnglishUnited States1.45
                                                      RT_GROUP_CURSOR0x5997e00x14dataEnglishUnited States1.45
                                                      RT_GROUP_CURSOR0x5997f40x14dataEnglishUnited States1.45
                                                      RT_GROUP_CURSOR0x5998080x14dataEnglishUnited States1.45
                                                      RT_GROUP_CURSOR0x59981c0x14dataEnglishUnited States1.45
                                                      RT_GROUP_CURSOR0x5998300x14dataEnglishUnited States1.45
                                                      RT_GROUP_CURSOR0x5998440x14dataEnglishUnited States1.45
                                                      RT_GROUP_ICON0x5a7e800x84dataEnglishUnited States0.6439393939393939
                                                      RT_VERSION0x5a7f080x150dataEnglishUnited States0.5833333333333334
                                                      RT_MANIFEST0x5a805c0x6a2XML 1.0 document, ASCII text, with CRLF line terminatorsRussianRussia0.4287396937573616
                                                      DLLImport
                                                      KERNEL32.DLLLoadLibraryA, GetProcAddress, VirtualProtect, VirtualAlloc, VirtualFree, ExitProcess
                                                      advapi32.dllFreeSid
                                                      comctl32.dllImageList_Add
                                                      comdlg32.dllPrintDlgW
                                                      gdi32.dllPie
                                                      netapi32.dllNetWkstaGetInfo
                                                      ole32.dllOleDraw
                                                      oleaut32.dllVariantCopy
                                                      shell32.dllDragFinish
                                                      user32.dllGetDC
                                                      version.dllVerQueryValueW
                                                      wininet.dllInternetOpenW
                                                      winspool.drvOpenPrinterW
                                                      wsock32.dllhtons
                                                      Language of compilation systemCountry where language is spokenMap
                                                      EnglishUnited States
                                                      CzechCzech Republic
                                                      RussianRussia
                                                      No network behavior found

                                                      Click to jump to process

                                                      Click to jump to process

                                                      Click to dive into process behavior distribution

                                                      Target ID:0
                                                      Start time:15:04:49
                                                      Start date:04/05/2024
                                                      Path:C:\Users\user\Desktop\avz.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Users\user\Desktop\avz.exe"
                                                      Imagebase:0x400000
                                                      File size:1'572'352 bytes
                                                      MD5 hash:59E8187B34416258AE6AB3CDF4EE6628
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:Borland Delphi
                                                      Yara matches:
                                                      • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: 00000000.00000002.2857267956.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                      Reputation:low
                                                      Has exited:false

                                                      Reset < >

                                                        Execution Graph

                                                        Execution Coverage:1.9%
                                                        Dynamic/Decrypted Code Coverage:0%
                                                        Signature Coverage:8.9%
                                                        Total number of Nodes:326
                                                        Total number of Limit Nodes:18
                                                        execution_graph 21037 406840 21038 406851 21037->21038 21040 406856 21037->21040 21041 40678c 21038->21041 21042 4067d2 21041->21042 21045 406795 21041->21045 21043 4067f3 21042->21043 21044 4067db VirtualAlloc 21042->21044 21043->21040 21044->21043 21045->21042 21046 4067a0 Sleep 21045->21046 21047 4067b5 21046->21047 21047->21042 21048 4067b9 Sleep 21047->21048 21048->21045 21343 43c840 137 API calls 21344 40a244 57 API calls 21351 408450 13 API calls 21352 40a650 12 API calls 21354 43c650 76 API calls 21359 42ae5c 94 API calls 21366 410e70 FreeLibrary LocalFree 21368 425874 GetDiskFreeSpaceW 21370 406478 10 API calls 21374 430804 GetProcAddress GetModuleHandleW 21375 430204 84 API calls 21378 410014 8 API calls 21380 425014 GetFileTime FileTimeToLocalFileTime FileTimeToDosDateTime 21382 43be18 135 API calls 21385 44d220 84 API calls 21392 42e634 75 API calls 21338 42d63c SetErrorMode 21339 40b7f8 21338->21339 21340 42d674 LoadLibraryW 21339->21340 21398 407ec0 12 API calls 21402 43ced0 32 API calls 21410 43ccdc 31 API calls 21415 424ae0 WriteFile 21417 42f4e4 WideCharToMultiByte 21418 43c2e4 82 API calls 21419 4384e4 93 API calls 21421 41c4e8 12 API calls 21423 42c4e8 96 API calls 21433 4230f8 81 API calls 21436 4098fc 25 API calls 21437 4160fc 14 API calls 21444 41048c 42 API calls 21446 412a90 20 API calls 21074 42bc90 21087 40abb8 21074->21087 21078 42bcc5 21079 42bd50 21078->21079 21082 42bcdd 21078->21082 21096 40a790 21079->21096 21083 42bd2a 21082->21083 21084 42bd10 74D41560 21082->21084 21095 407110 11 API calls 21083->21095 21084->21083 21086 42bd48 21089 40abbc 21087->21089 21088 40abe0 21091 40ad58 21088->21091 21089->21088 21100 407110 11 API calls 21089->21100 21093 40acc0 21091->21093 21092 40acfb 21092->21078 21093->21092 21101 407110 11 API calls 21093->21101 21095->21086 21097 40a7b1 21096->21097 21098 40a796 21096->21098 21098->21097 21102 407110 11 API calls 21098->21102 21100->21088 21101->21092 21102->21097 21458 424aa8 ReadFile 21461 4250b0 DosDateTimeToFileTime LocalFileTimeToFileTime SetFileTime GetLastError 21462 4550b0 27 API calls 21149 415eb8 21153 4076e8 21149->21153 21151 415ecb CreateWindowExW 21152 415f05 21151->21152 21153->21151 21467 4100bc 12 API calls 21478 407550 12 API calls 21480 42d150 GetCurrentThreadId 21134 429d54 21135 429d65 21134->21135 21136 429d6b FormatMessageW 21134->21136 21135->21136 21137 429d8d 21136->21137 21140 40a918 21137->21140 21141 40a928 21140->21141 21144 40a7b4 21141->21144 21145 40a7d5 LocalFree 21144->21145 21146 40a7ba 21144->21146 21146->21145 21148 407110 11 API calls 21146->21148 21148->21145 21486 41655c 12 API calls 21488 405a94 25 API calls 21492 43c568 30 API calls 21495 40d570 35 API calls 21499 42bd7c 12 API calls 21500 42b77c 83 API calls 21501 40ff00 12 API calls 21504 429b00 83 API calls 21505 44c300 83 API calls 21506 407704 11 API calls 21508 424d04 121 API calls 21512 44cb08 84 API calls 21514 415f10 6 API calls 21516 425114 116 API calls 21522 42f51c MultiByteToWideChar 21524 42ff1c VerSetConditionMask VerifyVersionInfoW 21525 43031c VariantChangeType 21528 424b24 SetFilePointer GetLastError 21531 43a72c 109 API calls 21533 424734 72 API calls 21535 43b138 105 API calls 21538 4093c8 Sleep Sleep SwitchToThread 21539 44c5cc 91 API calls 21171 40d7cc 21172 40d7f8 21171->21172 21173 40d7dc GetModuleFileNameW 21171->21173 21175 40ea40 GetModuleFileNameW 21173->21175 21176 40ea8e 21175->21176 21185 40e91c 21176->21185 21178 40eaba 21179 40ead4 21178->21179 21182 40eacc LoadLibraryExW 21178->21182 21211 40a7f0 21179->21211 21182->21179 21183 40a790 11 API calls 21184 40eaf9 21183->21184 21184->21172 21186 40e93d 21185->21186 21187 40a790 11 API calls 21186->21187 21188 40e95a 21187->21188 21189 40e9c5 21188->21189 21190 40abb8 11 API calls 21188->21190 21191 40a7f0 11 API calls 21189->21191 21194 40e96f 21190->21194 21192 40ea32 21191->21192 21192->21178 21193 40e9a0 21215 40e658 21193->21215 21194->21193 21278 40bc34 21194->21278 21198 40e9c7 GetUserDefaultUILanguage 21223 40e008 RtlEnterCriticalSection 21198->21223 21199 40e9b8 21201 40e784 13 API calls 21199->21201 21201->21189 21205 40ea09 21205->21189 21260 40e850 21205->21260 21206 40e9ef GetSystemDefaultUILanguage 21207 40e008 28 API calls 21206->21207 21209 40e9fc 21207->21209 21210 40e784 13 API calls 21209->21210 21210->21205 21213 40a7f6 21211->21213 21212 40a81c 21212->21183 21213->21212 21337 407110 11 API calls 21213->21337 21216 40e67a 21215->21216 21219 40e68c 21215->21219 21282 40e33c 21216->21282 21218 40e684 21306 40e6bc 11 API calls 21218->21306 21221 40a790 11 API calls 21219->21221 21222 40e6ae 21221->21222 21222->21198 21222->21199 21224 40e054 RtlLeaveCriticalSection 21223->21224 21225 40e034 21223->21225 21226 40a790 11 API calls 21224->21226 21227 40e045 RtlLeaveCriticalSection 21225->21227 21228 40e065 IsValidLocale 21226->21228 21229 40e0f6 21227->21229 21230 40e0c3 RtlEnterCriticalSection 21228->21230 21231 40e074 21228->21231 21234 40a790 11 API calls 21229->21234 21238 40e0db 21230->21238 21232 40e088 21231->21232 21233 40e07d 21231->21233 21310 40dcf0 14 API calls 21232->21310 21309 40deec 17 API calls 21233->21309 21237 40e10b 21234->21237 21248 40e784 21237->21248 21241 40e0ec RtlLeaveCriticalSection 21238->21241 21239 40e086 21239->21230 21240 40e091 GetSystemDefaultUILanguage 21240->21230 21242 40e09b 21240->21242 21241->21229 21243 40e0ac GetSystemDefaultUILanguage 21242->21243 21311 40ab70 11 API calls 21242->21311 21312 40dcf0 14 API calls 21243->21312 21246 40e0b9 21313 40ab70 11 API calls 21246->21313 21249 40e7a2 21248->21249 21250 40a790 11 API calls 21249->21250 21251 40e7bf 21250->21251 21252 40e81d 21251->21252 21254 40e824 21251->21254 21257 40bc34 11 API calls 21251->21257 21314 40ba64 21251->21314 21325 40e718 21251->21325 21253 40a790 11 API calls 21252->21253 21253->21254 21255 40a7f0 11 API calls 21254->21255 21256 40e83e 21255->21256 21256->21205 21256->21206 21257->21251 21335 40a874 21260->21335 21263 40e8a0 21264 40ba64 11 API calls 21263->21264 21265 40e8ad 21264->21265 21266 40e718 13 API calls 21265->21266 21270 40e8b4 21266->21270 21267 40e8ed 21268 40a7f0 11 API calls 21267->21268 21269 40e907 21268->21269 21272 40a790 11 API calls 21269->21272 21270->21267 21271 40ba64 11 API calls 21270->21271 21273 40e8db 21271->21273 21274 40e90f 21272->21274 21275 40e718 13 API calls 21273->21275 21274->21189 21276 40e8e2 21275->21276 21276->21267 21277 40a790 11 API calls 21276->21277 21277->21267 21279 40bc3f 21278->21279 21280 40a918 11 API calls 21279->21280 21281 40bc75 21280->21281 21281->21193 21283 40e353 21282->21283 21284 40e367 GetModuleFileNameW 21283->21284 21285 40e37c 21283->21285 21284->21285 21286 40e3a4 RegOpenKeyExW 21285->21286 21287 40e54b 21285->21287 21289 40e465 21286->21289 21290 40e3cb RegOpenKeyExW 21286->21290 21288 40a790 11 API calls 21287->21288 21293 40e560 21288->21293 21307 40e14c 7 API calls 21289->21307 21290->21289 21291 40e3e9 RegOpenKeyExW 21290->21291 21291->21289 21294 40e407 RegOpenKeyExW 21291->21294 21293->21218 21294->21289 21296 40e425 RegOpenKeyExW 21294->21296 21295 40e483 RegQueryValueExW 21297 40e4a1 21295->21297 21298 40e4d4 RegQueryValueExW 21295->21298 21296->21289 21299 40e443 RegOpenKeyExW 21296->21299 21302 40e4a9 RegQueryValueExW 21297->21302 21300 40e4f0 21298->21300 21304 40e4d2 21298->21304 21299->21287 21299->21289 21305 40e4f8 RegQueryValueExW 21300->21305 21301 40e53a RegCloseKey 21301->21218 21302->21304 21304->21301 21308 407110 11 API calls 21304->21308 21305->21304 21306->21219 21307->21295 21308->21301 21309->21239 21310->21240 21311->21243 21312->21246 21313->21230 21315 40bad6 21314->21315 21316 40ba68 21314->21316 21317 40ba70 21316->21317 21320 40ab70 21316->21320 21317->21315 21322 40ba7f 21317->21322 21333 40ab70 11 API calls 21317->21333 21318 40abb4 21318->21251 21320->21318 21332 407110 11 API calls 21320->21332 21322->21315 21334 40ab70 11 API calls 21322->21334 21324 40bad2 21324->21251 21326 40e72d 21325->21326 21327 40e74a FindFirstFileW 21326->21327 21328 40e760 21327->21328 21329 40e75a FindClose 21327->21329 21330 40a790 11 API calls 21328->21330 21329->21328 21331 40e775 21330->21331 21331->21251 21332->21318 21333->21322 21334->21324 21336 40a878 GetUserDefaultUILanguage GetLocaleInfoW 21335->21336 21336->21263 21337->21213 21543 4251cc 117 API calls 21544 4165d0 SendMessageW 21546 4089d4 13 API calls 21549 4299d4 13 API calls 21103 405be4 21104 405e44 21103->21104 21105 405bfc 21103->21105 21106 405f5c 21104->21106 21107 405e08 21104->21107 21108 405c0e 21105->21108 21117 405c99 Sleep 21105->21117 21110 405f65 21106->21110 21111 40598c VirtualAlloc 21106->21111 21109 405e62 21107->21109 21114 405e22 Sleep 21107->21114 21112 405c1d 21108->21112 21119 405cfc 21108->21119 21121 405cdd Sleep 21108->21121 21122 4058c8 VirtualAlloc 21109->21122 21125 405e80 21109->21125 21113 4059b7 21111->21113 21118 4059c7 21111->21118 21127 405944 Sleep Sleep 21113->21127 21114->21109 21116 405e38 Sleep 21114->21116 21116->21107 21117->21108 21120 405caf Sleep 21117->21120 21126 405d08 21119->21126 21128 4058c8 21119->21128 21120->21105 21121->21119 21124 405cf3 Sleep 21121->21124 21122->21125 21124->21108 21127->21118 21132 40585c 21128->21132 21130 4058d1 VirtualAlloc 21131 4058e8 21130->21131 21131->21126 21133 4057fc 21132->21133 21133->21130 21562 4283f8 13 API calls 21563 43b9f8 143 API calls 21049 410f80 21050 411027 21049->21050 21052 410fa6 21049->21052 21052->21050 21053 410b90 21052->21053 21054 410bbb 21053->21054 21055 410c2c RaiseException 21054->21055 21064 410c54 21054->21064 21072 410cc1 21055->21072 21056 410cf4 21059 410d43 21056->21059 21060 410cf8 GetLastError 21056->21060 21057 410ce9 LoadLibraryA 21057->21056 21058 410df3 21063 410df7 GetLastError 21058->21063 21058->21072 21069 410d51 21059->21069 21070 410d84 FreeLibrary 21059->21070 21065 410d09 21060->21065 21061 410de7 GetProcAddress 21061->21058 21062 410d8a 21062->21058 21062->21061 21062->21072 21066 410e08 21063->21066 21064->21056 21064->21057 21064->21062 21064->21072 21065->21059 21068 410d1b RaiseException 21065->21068 21067 410e1a RaiseException 21066->21067 21066->21072 21067->21072 21068->21072 21069->21062 21071 410d57 LocalAlloc 21069->21071 21070->21062 21071->21062 21073 410d67 21071->21073 21072->21052 21073->21062 21566 43c780 134 API calls 21567 44df80 91 API calls 21574 432788 98 API calls 21575 42c58c 38 API calls 21155 424d98 21168 40b7f8 21155->21168 21157 424da6 GetFileAttributesW 21158 424e02 GetLastError 21157->21158 21159 424db3 21157->21159 21160 424dbc 21158->21160 21161 424e0e 21158->21161 21159->21160 21162 424dc8 CreateFileW 21159->21162 21161->21160 21163 424e18 21161->21163 21164 424de2 CloseHandle 21162->21164 21165 424dec GetLastError 21162->21165 21170 424d58 FindFirstFileW FindClose 21163->21170 21164->21160 21165->21160 21167 424e1f 21167->21160 21169 40b7fe 21168->21169 21169->21157 21170->21167 21588 44c7ac 88 API calls 21589 4561a8 84 API calls 21590 4305b4 36 API calls 21154 4165b8 SendMessageW 21593 43b1bc 89 API calls

                                                        Control-flow Graph

                                                        APIs
                                                        • GetUserDefaultUILanguage.KERNEL32(00000003,?,00000004,00000000,0040E910,?,?), ref: 0040E882
                                                        • GetLocaleInfoW.KERNEL32(?,00000003,?,00000004,00000000,0040E910,?,?), ref: 0040E88B
                                                          • Part of subcall function 0040E718: FindFirstFileW.KERNEL32(00000000,?,00000000,0040E776,?,00000001), ref: 0040E74B
                                                          • Part of subcall function 0040E718: FindClose.KERNEL32(00000000,00000000,?,00000000,0040E776,?,00000001), ref: 0040E75B
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2857267956.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2857247249.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008C7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E9000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000952000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000960000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.000000000099B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2858280239.00000000009A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_avz.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Find$CloseDefaultFileFirstInfoLanguageLocaleUser
                                                        • String ID:
                                                        • API String ID: 3216391948-0
                                                        • Opcode ID: 0700dd98b66c5903688b8b15a74bddea8521a4b67d0f7c0f087b3ee225181435
                                                        • Instruction ID: 3811a30886e5d95731f1d26f13dd2990b041ae6e55f2e9b7b56907c5429bf487
                                                        • Opcode Fuzzy Hash: 0700dd98b66c5903688b8b15a74bddea8521a4b67d0f7c0f087b3ee225181435
                                                        • Instruction Fuzzy Hash: 6D112470A002099BDF04FBA6C942AADB3B9EF44304F50447BF514B73D2DB399E15C669
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 275 40e718-40e758 call 40a874 call 40b7f8 FindFirstFileW 280 40e760-40e775 call 40a790 275->280 281 40e75a-40e75b FindClose 275->281 281->280
                                                        APIs
                                                        • FindFirstFileW.KERNEL32(00000000,?,00000000,0040E776,?,00000001), ref: 0040E74B
                                                        • FindClose.KERNEL32(00000000,00000000,?,00000000,0040E776,?,00000001), ref: 0040E75B
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2857267956.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2857247249.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008C7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E9000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000952000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000960000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.000000000099B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2858280239.00000000009A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_avz.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Find$CloseFileFirst
                                                        • String ID:
                                                        • API String ID: 2295610775-0
                                                        • Opcode ID: ac57312274a22885ef9385209d012e2dfb6dd8944491f83ace8229893c571ab4
                                                        • Instruction ID: cfabb1e82c86de5fe3525c019f52d29633545275c25a8562c8cef58bdab8754f
                                                        • Opcode Fuzzy Hash: ac57312274a22885ef9385209d012e2dfb6dd8944491f83ace8229893c571ab4
                                                        • Instruction Fuzzy Hash: CBF05E71500608AFCB61FBB6CD5299EB3ACEF4571476009B7B814F31D1EA389E20995D
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        APIs
                                                        • GetModuleFileNameW.KERNEL32(00000000,?,00000105,00000000,0040E561,?,?), ref: 0040E375
                                                        • RegOpenKeyExW.ADVAPI32(80000001,Software\Embarcadero\Locales,00000000,000F0019,?,00000000,0040E561,?,?), ref: 0040E3BE
                                                        • RegOpenKeyExW.ADVAPI32(80000002,Software\Embarcadero\Locales,00000000,000F0019,?,80000001,Software\Embarcadero\Locales,00000000,000F0019,?,00000000,0040E561,?,?), ref: 0040E3E0
                                                        • RegOpenKeyExW.ADVAPI32(80000001,Software\CodeGear\Locales,00000000,000F0019,?,80000002,Software\Embarcadero\Locales,00000000,000F0019,?,80000001,Software\Embarcadero\Locales,00000000,000F0019,?,00000000), ref: 0040E3FE
                                                        • RegOpenKeyExW.ADVAPI32(80000002,Software\CodeGear\Locales,00000000,000F0019,?,80000001,Software\CodeGear\Locales,00000000,000F0019,?,80000002,Software\Embarcadero\Locales,00000000,000F0019,?,80000001), ref: 0040E41C
                                                        • RegOpenKeyExW.ADVAPI32(80000001,Software\Borland\Locales,00000000,000F0019,?,80000002,Software\CodeGear\Locales,00000000,000F0019,?,80000001,Software\CodeGear\Locales,00000000,000F0019,?,80000002), ref: 0040E43A
                                                        • RegOpenKeyExW.ADVAPI32(80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,80000002,Software\CodeGear\Locales,00000000,000F0019,?,80000001), ref: 0040E458
                                                        • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,00000000,?,00000000,0040E544,?,80000001,Software\Embarcadero\Locales,00000000,000F0019,?,00000000,0040E561), ref: 0040E498
                                                        • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,?,00000000,00000000,00000000,?,00000000,0040E544,?,80000001), ref: 0040E4C3
                                                        • RegCloseKey.ADVAPI32(?,0040E54B,00000000,00000000,?,?,?,00000000,00000000,00000000,?,00000000,0040E544,?,80000001,Software\Embarcadero\Locales), ref: 0040E53E
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2857267956.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2857247249.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008C7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E9000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000952000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000960000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.000000000099B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2858280239.00000000009A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_avz.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Open$QueryValue$CloseFileModuleName
                                                        • String ID: Software\Borland\Delphi\Locales$Software\Borland\Locales$Software\CodeGear\Locales$Software\Embarcadero\Locales
                                                        • API String ID: 2701450724-3496071916
                                                        • Opcode ID: c2c871c4c25e8eca74535b3c46514c1a97de02158678078f6dbc333099dfa2ff
                                                        • Instruction ID: 8df006f22b3a254145f45432dd01ca0764f38ecc40a7ea8518213d31a401c070
                                                        • Opcode Fuzzy Hash: c2c871c4c25e8eca74535b3c46514c1a97de02158678078f6dbc333099dfa2ff
                                                        • Instruction Fuzzy Hash: 3D512771A4020CBEDB10DAA6CC42FEE77ACDB04708F544C77BA04F61C2E6789A508A5D
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        APIs
                                                        • RtlEnterCriticalSection.NTDLL(008C4B8C), ref: 0040E026
                                                        • RtlLeaveCriticalSection.NTDLL(008C4B8C), ref: 0040E04A
                                                        • RtlLeaveCriticalSection.NTDLL(008C4B8C), ref: 0040E059
                                                        • IsValidLocale.KERNEL32(00000000,00000002,00000000,0040E10C,?,?,?,00000000,?,0040E9D4,00000000,0040EA33,?,?,00000000,00000000), ref: 0040E06B
                                                        • RtlEnterCriticalSection.NTDLL(008C4B8C), ref: 0040E0C8
                                                        • RtlLeaveCriticalSection.NTDLL(008C4B8C), ref: 0040E0F1
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2857267956.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2857247249.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008C7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E9000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000952000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000960000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.000000000099B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2858280239.00000000009A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_avz.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: CriticalSection$Leave$Enter$LocaleValid
                                                        • String ID: en-GB,en,en-US,
                                                        • API String ID: 975949045-3021119265
                                                        • Opcode ID: 99267138c7f9b43ceefaf0c8989081b1abe9504df68f6f9c07349cf7b1ebe2eb
                                                        • Instruction ID: 969a9f573a89ea90201c21e821028458a1f512703f5f375bbbf21895bb880bdb
                                                        • Opcode Fuzzy Hash: 99267138c7f9b43ceefaf0c8989081b1abe9504df68f6f9c07349cf7b1ebe2eb
                                                        • Instruction Fuzzy Hash: 78219F30710A1057D710B7E78812F5A21A8EB84724F50943FB400FB6C2DAFDDC95965E
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 64 410b90-410c2a call 411040 call 411050 call 411060 call 411070 * 3 77 410c54-410c61 64->77 78 410c2c-410c4f RaiseException 64->78 79 410c63 77->79 80 410c66-410c86 77->80 81 410e64-410e6a 78->81 79->80 82 410c99-410ca1 80->82 83 410c88-410c97 call 411080 80->83 85 410ca4-410cad 82->85 83->85 87 410cc6-410cc8 85->87 88 410caf-410cbf 85->88 89 410d8a-410d94 87->89 90 410cce-410cd5 87->90 88->87 100 410cc1 88->100 91 410da4-410da6 89->91 92 410d96-410da2 89->92 94 410ce5-410ce7 90->94 95 410cd7-410ce3 90->95 98 410df3-410df5 91->98 99 410da8-410dac 91->99 92->91 96 410cf4-410cf6 94->96 97 410ce9-410cf2 LoadLibraryA 94->97 95->94 101 410d43-410d4f call 410514 96->101 102 410cf8-410d07 GetLastError 96->102 97->96 107 410df7-410e06 GetLastError 98->107 108 410e3d-410e40 98->108 104 410de7-410df1 GetProcAddress 99->104 105 410dae-410db2 99->105 106 410e42-410e49 100->106 125 410d51-410d55 101->125 126 410d84-410d85 FreeLibrary 101->126 110 410d17-410d19 102->110 111 410d09-410d15 102->111 104->98 105->104 114 410db4-410dbf 105->114 112 410e62 106->112 113 410e4b-410e5a 106->113 116 410e16-410e18 107->116 117 410e08-410e14 107->117 108->106 110->101 119 410d1b-410d3e RaiseException 110->119 111->110 112->81 113->112 114->104 120 410dc1-410dc7 114->120 116->108 118 410e1a-410e3a RaiseException 116->118 117->116 118->108 119->81 120->104 124 410dc9-410dd6 120->124 124->104 127 410dd8-410de3 124->127 125->89 128 410d57-410d65 LocalAlloc 125->128 126->89 127->104 129 410de5 127->129 128->89 130 410d67-410d82 128->130 129->108 130->89
                                                        APIs
                                                        • RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00410C48
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2857267956.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2857247249.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008C7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E9000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000952000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000960000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.000000000099B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2858280239.00000000009A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_avz.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: ExceptionRaise
                                                        • String ID:
                                                        • API String ID: 3997070919-0
                                                        • Opcode ID: a7b5bc098e118efd5262aaa79d43dd566328c810c3c383e58a0a6d4e39ba55a5
                                                        • Instruction ID: 7fb592685186cf33688800424b75e34a538c16581061763188b4eff0837aa182
                                                        • Opcode Fuzzy Hash: a7b5bc098e118efd5262aaa79d43dd566328c810c3c383e58a0a6d4e39ba55a5
                                                        • Instruction Fuzzy Hash: F8A14E75A007099FDB14DFE9D880BEEBBB6BB48300F14811AE505AB390DBB4A9C5CF54
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 131 424d98-424db1 call 40b7f8 GetFileAttributesW 134 424e02-424e0c GetLastError 131->134 135 424db3-424db6 131->135 138 424e23-424e25 134->138 139 424e0e-424e11 134->139 136 424dfb-424e00 135->136 137 424db8-424dba 135->137 140 424e29-424e2c 136->140 141 424dc0-424dc2 137->141 142 424dbc-424dbe 137->142 138->140 139->138 143 424e13-424e16 139->143 144 424dc4-424dc6 141->144 145 424dc8-424de0 CreateFileW 141->145 142->140 143->138 146 424e18-424e21 call 424d58 143->146 144->140 147 424de2-424dea CloseHandle 145->147 148 424dec-424df9 GetLastError 145->148 146->138 151 424e27 146->151 147->140 148->140 151->140
                                                        APIs
                                                        • GetFileAttributesW.KERNEL32(00000000,?,?,?,00422F52), ref: 00424DA9
                                                        • GetLastError.KERNEL32(00000000,?,?,?,00422F52), ref: 00424E02
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2857267956.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2857247249.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008C7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E9000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000952000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000960000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.000000000099B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2858280239.00000000009A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_avz.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: AttributesErrorFileLast
                                                        • String ID: ${
                                                        • API String ID: 1799206407-4046706400
                                                        • Opcode ID: 48a71003d5f46396b33cf28021c47105213fb405774180b804ec14106ee9548e
                                                        • Instruction ID: b43b927ac7921c27406272267bd3af01d1d6248a404300e15480699ddc2f1e40
                                                        • Opcode Fuzzy Hash: 48a71003d5f46396b33cf28021c47105213fb405774180b804ec14106ee9548e
                                                        • Instruction Fuzzy Hash: 0C01F73431423011FA3560B93C86BBB0144DFD67A6FFA1917F911A7BE1CA8D4C43506E
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 152 424e30-424e50 call 40b7f8 GetFileAttributesW 155 424e56-424e5c 152->155 156 424ed7-424edf GetLastError 152->156 159 424e5e-424e67 155->159 160 424e6c-424e70 155->160 157 424f01-424f03 156->157 158 424ee1-424ee4 156->158 161 424f07-424f0e 157->161 158->157 164 424ee6-424eeb 158->164 159->161 162 424e72-424e8d CreateFileW 160->162 163 424ea0-424ea6 160->163 162->161 165 424e8f-424e9e CloseHandle 162->165 166 424ea8-424eaa 163->166 167 424eac-424ec7 CreateFileW 163->167 164->157 168 424eed-424ef0 164->168 165->161 166->161 169 424ed3-424ed5 167->169 170 424ec9-424ed1 CloseHandle 167->170 168->157 171 424ef2-424ef5 168->171 169->161 170->161 171->157 172 424ef7-424efa 171->172 172->157 173 424efc-424eff 172->173 173->157 174 424f05 173->174 174->161
                                                        APIs
                                                        • GetFileAttributesW.KERNEL32(00000000,?,?,?,?,?,0042493D), ref: 00424E46
                                                        • CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,02000000,00000000,00000000,?,?,?,?,?,0042493D), ref: 00424E85
                                                        • CloseHandle.KERNEL32(00000000,00000000,80000000,00000001,00000000,00000003,02000000,00000000,00000000,?,?,?,?,?,0042493D), ref: 00424E90
                                                        • GetLastError.KERNEL32(00000000,?,?,?,?,?,0042493D), ref: 00424ED7
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2857267956.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2857247249.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008C7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E9000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000952000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000960000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.000000000099B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2858280239.00000000009A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_avz.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: File$AttributesCloseCreateErrorHandleLast
                                                        • String ID:
                                                        • API String ID: 2927643983-0
                                                        • Opcode ID: 81d8c16c902cbaf31908049c1d90399f2241ce0585bd2bf338620e2f96500007
                                                        • Instruction ID: ecd14b63ca4923df054c3088237b710d2f266073a6e603d34634352d570b6b73
                                                        • Opcode Fuzzy Hash: 81d8c16c902cbaf31908049c1d90399f2241ce0585bd2bf338620e2f96500007
                                                        • Instruction Fuzzy Hash: 14115B31B4423024FA7011B8BE86F7B2188CBC2724FBB1527FB51E66C5C18D9C81501E
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 175 40678c-406793 176 4067d2-4067d9 175->176 177 406795 175->177 179 4067f3-4067fd 176->179 180 4067db-4067ee VirtualAlloc 176->180 178 4067c0-4067d0 call 405630 177->178 178->176 183 406797-40679e 178->183 180->179 183->178 184 4067a0-4067b7 Sleep call 405630 183->184 184->176 187 4067b9-4067bb Sleep 184->187 187->178
                                                        APIs
                                                        • Sleep.KERNEL32(00000000,00406856,?,?,?,004068E9), ref: 004067A2
                                                        • Sleep.KERNEL32(0000000A,00000000,00406856,?,?,?,004068E9), ref: 004067BB
                                                        • VirtualAlloc.KERNEL32(00000000,00010000,00001000,00000004,00406856,?,?,?,004068E9), ref: 004067E9
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2857267956.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2857247249.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008C7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E9000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000952000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000960000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.000000000099B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2858280239.00000000009A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_avz.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Sleep$AllocVirtual
                                                        • String ID:
                                                        • API String ID: 3510833457-0
                                                        • Opcode ID: bd580362bbecb767b6105ddf6ddc66df879c95c9dfc539682c4a020134eba282
                                                        • Instruction ID: 3586af41941fe4e54c37ecdce78ec90e2d0ab3b540c31e4ea7a10a641838911c
                                                        • Opcode Fuzzy Hash: bd580362bbecb767b6105ddf6ddc66df879c95c9dfc539682c4a020134eba282
                                                        • Instruction Fuzzy Hash: 10F0822071075064EB10ABB06C1AF571661A7017ACF41183FA3037B2D2D7BD9999D65D
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 188 40e91c-40e95e call 40a874 * 2 call 40a790 195 40e964-40e974 call 40abb8 188->195 196 40ea18-40ea32 call 40a7f0 188->196 201 40e976-40e979 195->201 202 40e97b-40e980 195->202 201->202 203 40e982-40e98b 202->203 204 40e9a7-40e9b6 call 40e658 202->204 205 40e9a2-40e9a5 203->205 206 40e98d-40e9a0 call 40bc34 203->206 211 40e9c7-40e9e4 GetUserDefaultUILanguage call 40e008 call 40e784 204->211 212 40e9b8-40e9c5 call 40e784 204->212 205->203 205->204 206->204 219 40e9e6-40e9ed 211->219 220 40ea09-40ea0c 211->220 212->196 219->220 221 40e9ef-40ea04 GetSystemDefaultUILanguage call 40e008 call 40e784 219->221 220->196 222 40ea0e-40ea13 call 40e850 220->222 221->220 222->196
                                                        APIs
                                                        • GetUserDefaultUILanguage.KERNEL32(00000000,0040EA33,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,0040EABA,00000000,?,00000105), ref: 0040E9C7
                                                        • GetSystemDefaultUILanguage.KERNEL32(00000000,0040EA33,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,0040EABA,00000000,?,00000105), ref: 0040E9EF
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2857267956.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2857247249.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008C7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E9000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000952000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000960000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.000000000099B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2858280239.00000000009A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_avz.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: DefaultLanguage$SystemUser
                                                        • String ID:
                                                        • API String ID: 384301227-0
                                                        • Opcode ID: 7cda3bb782ff04a27bd42aa94b9f18a25c9832d78bcbd4f3fea7fdbfa4e7290b
                                                        • Instruction ID: 98b503460a745a57f3c14c933e1ef4cc48e28c0ffa6fee42ab21ad605bd5f443
                                                        • Opcode Fuzzy Hash: 7cda3bb782ff04a27bd42aa94b9f18a25c9832d78bcbd4f3fea7fdbfa4e7290b
                                                        • Instruction Fuzzy Hash: 88312070A102199BDB14EB9BC882A9EB7B5FF48304F50487BE400B33D1D77C9E958B59
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        APIs
                                                        • GetModuleFileNameW.KERNEL32(00000000,?,00000105,00000000,0040EAFA,?,00400000,008B5C48), ref: 0040EA7C
                                                        • LoadLibraryExW.KERNEL32(00000000,00000000,00000002,00000000,?,00000105,00000000,0040EAFA,?,00400000,008B5C48), ref: 0040EACD
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2857267956.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2857247249.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008C7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E9000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000952000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000960000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.000000000099B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2858280239.00000000009A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_avz.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: FileLibraryLoadModuleName
                                                        • String ID:
                                                        • API String ID: 1159719554-0
                                                        • Opcode ID: 0350a7ccb8c1c526539eaedde8086d9c2dc1334cf9ad47a7efefb4de2d8be29c
                                                        • Instruction ID: 20d0a0414cf8f6ebef93b6583375bab900407c3ab3e2ac4c874ab0c1f2033a40
                                                        • Opcode Fuzzy Hash: 0350a7ccb8c1c526539eaedde8086d9c2dc1334cf9ad47a7efefb4de2d8be29c
                                                        • Instruction Fuzzy Hash: D1118230A4021C9BDB14EB61C886BDE73B8EB08304F1144BAF408B32D1DB785F84CE99
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 265 429d54-429d63 266 429d65 265->266 267 429d6b-429d8b FormatMessageW 265->267 266->267 268 429d8e-429d90 267->268 269 429d92-429d9e 268->269 270 429da6-429dc9 call 40a918 LocalFree 268->270 271 429da0-429da4 269->271 272 429d8d 269->272 271->270 271->272 272->268
                                                        APIs
                                                        • FormatMessageW.KERNEL32(00003300,00000000,00000000,00000000,?,00000000,00000000,?,00000000,?,?,0043238A,00000000,004323E3), ref: 00429D78
                                                        • LocalFree.KERNEL32(?,00429DD1,00003300,00000000,00000000,00000000,?,00000000,00000000,?,00000000,?,?,0043238A,00000000,004323E3), ref: 00429DC4
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2857267956.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2857247249.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008C7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E9000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000952000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000960000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.000000000099B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2858280239.00000000009A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_avz.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: FormatFreeLocalMessage
                                                        • String ID:
                                                        • API String ID: 1427518018-0
                                                        • Opcode ID: 85646905df23e58e8383d6d38fe2bd207c96aad944755341ac33a141038212d1
                                                        • Instruction ID: 989ab6ebfb786be34d35395e77302ccde31e9c7036b91f8ff4082280360bdeeb
                                                        • Opcode Fuzzy Hash: 85646905df23e58e8383d6d38fe2bd207c96aad944755341ac33a141038212d1
                                                        • Instruction Fuzzy Hash: A2014930724328BFE7289655AC12F7B329DEFC4B00FE0403BB400D22C1D97D9D11A668
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 284 42d63c-42d68f SetErrorMode call 40b7f8 LoadLibraryW
                                                        APIs
                                                        • SetErrorMode.KERNEL32 ref: 0042D646
                                                        • LoadLibraryW.KERNEL32(00000000,00000000,0042D690,?,00000000,0042D6AE), ref: 0042D675
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2857267956.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2857247249.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008C7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E9000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000952000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000960000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.000000000099B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2858280239.00000000009A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_avz.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: ErrorLibraryLoadMode
                                                        • String ID:
                                                        • API String ID: 2987862817-0
                                                        • Opcode ID: a24b81db8646aea93704916e5821ca76e1f8cb7b1f27d862d26963d0353bc75e
                                                        • Instruction ID: 42147dc9f2810356fc869eb36e5528ddbba2ae7ae7b38aae34635417d0df3c90
                                                        • Opcode Fuzzy Hash: a24b81db8646aea93704916e5821ca76e1f8cb7b1f27d862d26963d0353bc75e
                                                        • Instruction Fuzzy Hash: 0EF08270B04708BEDB029F769C528ABBBFCE74DB0079348B6F814A2691E67D5820856C
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        APIs
                                                        • 74D41560.VERSION(?,0042BD78,?,?,00000000,?,00000000,?,00000000,0042BD49,?,00000000,?,00000000,0042BD66), ref: 0042BD21
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2857267956.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2857247249.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008C7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E9000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000952000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000960000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.000000000099B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2858280239.00000000009A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_avz.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: D41560
                                                        • String ID:
                                                        • API String ID: 3025727225-0
                                                        • Opcode ID: cd534159c38a5224cf7425053597969d595ad40571e794f29e76ec093baeb153
                                                        • Instruction ID: 142d2396d975a6c64bd12ea1ce118dffe536678657c9fec164b7dbb8f94f2fe7
                                                        • Opcode Fuzzy Hash: cd534159c38a5224cf7425053597969d595ad40571e794f29e76ec093baeb153
                                                        • Instruction Fuzzy Hash: 31217471B14709AFDB00DFA6DC829EEB7FCEB483007914876B510E3691D738AE009A58
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 311 415eb8-415f00 call 4076e8 CreateWindowExW call 4076d8 315 415f05-415f0c 311->315
                                                        APIs
                                                        • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 00415EF7
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2857267956.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2857247249.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008C7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E9000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000952000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000960000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.000000000099B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2858280239.00000000009A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_avz.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: CreateWindow
                                                        • String ID:
                                                        • API String ID: 716092398-0
                                                        • Opcode ID: b9e7d47dc86991aef5be46c282249b581b1e0f82557d0ce3bc0e2ed4b639fc0f
                                                        • Instruction ID: 2d9cd11f058f90f2e14b19f2c1d4c7c756708d382e317987b3b81fd2818f3a88
                                                        • Opcode Fuzzy Hash: b9e7d47dc86991aef5be46c282249b581b1e0f82557d0ce3bc0e2ed4b639fc0f
                                                        • Instruction Fuzzy Hash: AEF07FB2605119AF8B80DE9DDC81EDB77ECEB4D264B05412ABA08E7201D635ED108BA4
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 316 40d7cc-40d7da 317 40d807-40d812 316->317 318 40d7dc-40d7f3 GetModuleFileNameW call 40ea40 316->318 320 40d7f8-40d7ff 318->320 320->317 321 40d801-40d804 320->321 321->317
                                                        APIs
                                                        • GetModuleFileNameW.KERNEL32(00400000,?,0000020A), ref: 0040D7EA
                                                          • Part of subcall function 0040EA40: GetModuleFileNameW.KERNEL32(00000000,?,00000105,00000000,0040EAFA,?,00400000,008B5C48), ref: 0040EA7C
                                                          • Part of subcall function 0040EA40: LoadLibraryExW.KERNEL32(00000000,00000000,00000002,00000000,?,00000105,00000000,0040EAFA,?,00400000,008B5C48), ref: 0040EACD
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2857267956.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2857247249.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008C7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E9000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000952000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000960000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.000000000099B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2858280239.00000000009A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_avz.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: FileModuleName$LibraryLoad
                                                        • String ID:
                                                        • API String ID: 4113206344-0
                                                        • Opcode ID: 751168551c2308f442b75f3116d8031d5525a74588f1d5826d195966025f1d29
                                                        • Instruction ID: 1c38836be26e917c7004fabc85749c792c4e11dd02784b61004cf669b28b0675
                                                        • Opcode Fuzzy Hash: 751168551c2308f442b75f3116d8031d5525a74588f1d5826d195966025f1d29
                                                        • Instruction Fuzzy Hash: 3AE0EDB2A003109BCF50DE98C8C5A573BE4AB08758F044966ED64DF387D375DD248BE5
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • CreateDirectoryW.KERNEL32(00000000,00000000,00000001,00424FDE,00000000,00425003,?,?,00000000,00000000,00000000,00000000), ref: 00425A81
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2857267956.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2857247249.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008C7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E9000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000952000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000960000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.000000000099B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2858280239.00000000009A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_avz.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: CreateDirectory
                                                        • String ID:
                                                        • API String ID: 4241100979-0
                                                        • Opcode ID: d3b65435948135ef86e67bec4c74d3fd09c2601ff01950b86c823f1883d5ba4a
                                                        • Instruction ID: 7ca6796180724455c01f6d530e22512ccb907c442657097512633fa598517ca2
                                                        • Opcode Fuzzy Hash: d3b65435948135ef86e67bec4c74d3fd09c2601ff01950b86c823f1883d5ba4a
                                                        • Instruction Fuzzy Hash: 83B092A27902411AEA0036FA1CD2B2E008CD794A0AF10083AB511D7182D96AC8441059
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • SendMessageW.USER32(?,?,?,?), ref: 004165C3
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2857267956.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2857247249.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008C7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E9000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000952000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000960000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.000000000099B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2858280239.00000000009A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_avz.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: MessageSend
                                                        • String ID:
                                                        • API String ID: 3850602802-0
                                                        • Opcode ID: c415726e24c9a1ab1789cd6958d8a568dd54a7f1ca1d1d92b1dc9262691174a1
                                                        • Instruction ID: aba2cb8b160f5213c2966014cbc55f102fa82e411ee86e298bc762e95902e9d8
                                                        • Opcode Fuzzy Hash: c415726e24c9a1ab1789cd6958d8a568dd54a7f1ca1d1d92b1dc9262691174a1
                                                        • Instruction Fuzzy Hash: 94B092F200530C7E6500AA96ECC6CB7B75CE6986A8780811ABB0846202A466AC9041BC
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • VirtualAlloc.KERNEL32(00000000,0013FFF0,00001000,00000004,?,?,00405EDF,FFFFFFDC,00405BB0), ref: 004058DF
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2857267956.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2857247249.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008C7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E9000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000952000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000960000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.000000000099B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2858280239.00000000009A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_avz.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: AllocVirtual
                                                        • String ID:
                                                        • API String ID: 4275171209-0
                                                        • Opcode ID: 99705875f4c210d976d8a1df65d6998ceadab0ea21d78aa928a9aad47088ed72
                                                        • Instruction ID: 5f107d390ec8fce1bfdbed002a99d211afe16f3ea22c88ff3c615973c05485db
                                                        • Opcode Fuzzy Hash: 99705875f4c210d976d8a1df65d6998ceadab0ea21d78aa928a9aad47088ed72
                                                        • Instruction Fuzzy Hash: B1F08CF2B003209FD7249F78AD40B027BE5F704714B10423EEA09EB7D8EBB088018B84
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • GetModuleHandleW.KERNEL32(kernel32.dll,0041CE98,?,?), ref: 0040E169
                                                        • GetProcAddress.KERNEL32(00000000,GetLongPathNameW), ref: 0040E17A
                                                        • FindFirstFileW.KERNEL32(?,?,kernel32.dll,0041CE98,?,?), ref: 0040E27A
                                                        • FindClose.KERNEL32(?,?,?,kernel32.dll,0041CE98,?,?), ref: 0040E28C
                                                        • lstrlenW.KERNEL32(?,?,?,?,kernel32.dll,0041CE98,?,?), ref: 0040E298
                                                        • lstrlenW.KERNEL32(?,?,?,?,?,kernel32.dll,0041CE98,?,?), ref: 0040E2DD
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2857267956.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2857247249.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008C7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E9000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000952000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000960000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.000000000099B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2858280239.00000000009A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_avz.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Findlstrlen$AddressCloseFileFirstHandleModuleProc
                                                        • String ID: GetLongPathNameW$\$kernel32.dll
                                                        • API String ID: 1930782624-3908791685
                                                        • Opcode ID: 92ab88ae555d9b73fc90b149e4d3ea8c5713dbcaf25f78294dbb6621d00702aa
                                                        • Instruction ID: 662e2d521b8b4418c1b62f8d2bcefb21e50cd24e361e2b8799a5a39498fe5c02
                                                        • Opcode Fuzzy Hash: 92ab88ae555d9b73fc90b149e4d3ea8c5713dbcaf25f78294dbb6621d00702aa
                                                        • Instruction Fuzzy Hash: A741D371E006189BCB10EBA6CC89ADEB3B5EF44310F1449BAD844F72D1E77CAE558B49
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • IsValidLocale.KERNEL32(?,00000002,00000000,0040DE55,?,0041CE98,?,00000000), ref: 0040DD9A
                                                        • GetLocaleInfoW.KERNEL32(00000000,00000059,?,00000055,?,00000002,00000000,0040DE55,?,0041CE98,?,00000000), ref: 0040DDB6
                                                        • GetLocaleInfoW.KERNEL32(00000000,0000005A,?,00000055,00000000,00000059,?,00000055,?,00000002,00000000,0040DE55,?,0041CE98,?,00000000), ref: 0040DDC7
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2857267956.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2857247249.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008C7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E9000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000952000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000960000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.000000000099B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2858280239.00000000009A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_avz.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Locale$Info$Valid
                                                        • String ID:
                                                        • API String ID: 1826331170-0
                                                        • Opcode ID: 9b18f4f6c5c07ef99b456e3fa767a60fc193aa48d43288d82f24196a99c720c7
                                                        • Instruction ID: a8219854aac5032f0b467625a93bd80a9c4f493a1c36e479c7c13f539b835aa5
                                                        • Opcode Fuzzy Hash: 9b18f4f6c5c07ef99b456e3fa767a60fc193aa48d43288d82f24196a99c720c7
                                                        • Instruction Fuzzy Hash: 10319D31A00A18ABDB21EBA1DC81BEF77B9FB44705F5001BAA508B72D1D7385E84DE59
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • GetLogicalDriveStringsW.KERNEL32(00000104,?,00000000,00422BDA), ref: 00422AE9
                                                        • QueryDosDeviceW.KERNEL32(?,?,00000104,00000104,?,00000000,00422BDA), ref: 00422B13
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2857267956.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2857247249.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008C7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E9000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000952000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000960000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.000000000099B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2858280239.00000000009A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_avz.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: DeviceDriveLogicalQueryStrings
                                                        • String ID:
                                                        • API String ID: 3173366581-0
                                                        • Opcode ID: 42659737104c80c07e9846b63d526cfee1ce295624b73bfd3fb8e047cceb0fec
                                                        • Instruction ID: 796e0180e6f874f9e3daf781fdd7e74bd84a102b19b209bea209e783d957a077
                                                        • Opcode Fuzzy Hash: 42659737104c80c07e9846b63d526cfee1ce295624b73bfd3fb8e047cceb0fec
                                                        • Instruction Fuzzy Hash: D2317871B00229ABDB24DF65DD81ADEB7B8EB44310F5040EAE904A7351D778EE448F5C
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • FindFirstFileW.KERNEL32(?,?), ref: 00424B88
                                                        • FindClose.KERNEL32(00000000,?,?), ref: 00424B93
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2857267956.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2857247249.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008C7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E9000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000952000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000960000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.000000000099B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2858280239.00000000009A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_avz.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Find$CloseFileFirst
                                                        • String ID:
                                                        • API String ID: 2295610775-0
                                                        • Opcode ID: 3b7b8ae2faa15df2c07da32fc0b8b9799ded07ea549e46d916206e73d94a739b
                                                        • Instruction ID: d8fc9fb91bce8af4b1c4e4b703f86f1a301d6b94da96fb367cb3d589edda14b5
                                                        • Opcode Fuzzy Hash: 3b7b8ae2faa15df2c07da32fc0b8b9799ded07ea549e46d916206e73d94a739b
                                                        • Instruction Fuzzy Hash: D3E01B3190061947CB20DEB9DC49BDB779CAB84324F5407977D28C32D1E738EA55869A
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • FindFirstFileW.KERNEL32(00000000,?,00000000,?,00424E1F,00000000,?,?,?,00422F52), ref: 00424D73
                                                        • FindClose.KERNEL32(00000000,00000000,?,00000000,?,00424E1F,00000000,?,?,?,00422F52), ref: 00424D7E
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2857267956.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2857247249.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008C7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E9000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000952000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000960000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.000000000099B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2858280239.00000000009A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_avz.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Find$CloseFileFirst
                                                        • String ID:
                                                        • API String ID: 2295610775-0
                                                        • Opcode ID: 6a71c6e7ef97c2a5fb9a493e2f46f97449728dd588981de2b0c989bcfbc02975
                                                        • Instruction ID: bdf729f2c76547e9294129b6043dc3896349c7a0640c821610c1a3fb9eb6f338
                                                        • Opcode Fuzzy Hash: 6a71c6e7ef97c2a5fb9a493e2f46f97449728dd588981de2b0c989bcfbc02975
                                                        • Instruction Fuzzy Hash: 7EE0CD3271434811C71055FA1CC97AB73CCAB84324F4407AB7C5CD21D2EB3C8950019D
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?), ref: 00425895
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2857267956.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2857247249.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008C7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E9000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000952000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000960000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.000000000099B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2858280239.00000000009A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_avz.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: DiskFreeSpace
                                                        • String ID:
                                                        • API String ID: 1705453755-0
                                                        • Opcode ID: d92bc986ef81812ceff184397a2704dd1345a0b70e15d0921bb9ce514f0ee12e
                                                        • Instruction ID: cbc403bdb30c5b628bad92339df88a3604d98f03f7add9cf00e72c7a3d5c39a6
                                                        • Opcode Fuzzy Hash: d92bc986ef81812ceff184397a2704dd1345a0b70e15d0921bb9ce514f0ee12e
                                                        • Instruction Fuzzy Hash: 1611C0B5A00209AFDB04DF99C8819EFB7F9FFCC304B14C569A519E7254E6319A018B94
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • GetLocaleInfoW.KERNEL32(?,?,?,00000100), ref: 00429DF6
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2857267956.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2857247249.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008C7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E9000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000952000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000960000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.000000000099B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2858280239.00000000009A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_avz.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: InfoLocale
                                                        • String ID:
                                                        • API String ID: 2299586839-0
                                                        • Opcode ID: def7ac3e456bb8f8ec7bf3fd384838056e1632a3009c17d1bba6b72a090af279
                                                        • Instruction ID: 67777cc51c3e3a8affb08b4c0b1f9cdeec2521c4ed3bfa8c9619515006d4a270
                                                        • Opcode Fuzzy Hash: def7ac3e456bb8f8ec7bf3fd384838056e1632a3009c17d1bba6b72a090af279
                                                        • Instruction Fuzzy Hash: 82E0D87270031417D310A5595C86EFB725C9788300F40417FBE05D7383EDB49E9042ED
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • GetLocaleInfoW.KERNEL32(?,0000000F,?,00000002,0000002C,?,?,?,00429F26,?,00000001,00000000,0042A135), ref: 00429E37
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2857267956.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2857247249.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008C7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E9000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000952000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000960000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.000000000099B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2858280239.00000000009A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_avz.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: InfoLocale
                                                        • String ID:
                                                        • API String ID: 2299586839-0
                                                        • Opcode ID: 42eda52df85462583e631e3bece2b3b05b8c069128f14d6ed3dd90bd0c6255f1
                                                        • Instruction ID: 65d72377fed7332669f71cbd0272c2506b4d9e4e24131374b0ea35ead9819877
                                                        • Opcode Fuzzy Hash: 42eda52df85462583e631e3bece2b3b05b8c069128f14d6ed3dd90bd0c6255f1
                                                        • Instruction Fuzzy Hash: 1CD0A7B730927076E210915B7E85EBB56DCCBC9771F51443BBB48C6242E214CC06D375
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2857267956.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2857247249.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008C7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E9000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000952000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000960000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.000000000099B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2858280239.00000000009A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_avz.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: LocalTime
                                                        • String ID:
                                                        • API String ID: 481472006-0
                                                        • Opcode ID: e96037cdcb3af8b33d5c2ea492dad19547a9688f617538e7be4aa87ff84122d3
                                                        • Instruction ID: 54c9bdabe8e395a7f608ec81a9535ec0056474b9b36f6d7f26fe090c1deeff9c
                                                        • Opcode Fuzzy Hash: e96037cdcb3af8b33d5c2ea492dad19547a9688f617538e7be4aa87ff84122d3
                                                        • Instruction Fuzzy Hash: 75E0A56040D621A1C344AF56D44143EB7E5AED4B42F808C9EF8D4401A1EB38C5E8D36B
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2857267956.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2857247249.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008C7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E9000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000952000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000960000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.000000000099B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2858280239.00000000009A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_avz.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 5b21352abde81e8ee2e7784e7ba7487dd1bed82b7de2696400854922f7f065d9
                                                        • Instruction ID: 6b8c1f254004efe189f6bbb4a7b1384ef2992162a6a0a8b41d9a8cff10a552b8
                                                        • Opcode Fuzzy Hash: 5b21352abde81e8ee2e7784e7ba7487dd1bed82b7de2696400854922f7f065d9
                                                        • Instruction Fuzzy Hash: 5202C036910235CFDB92CF69C180109B7B6FF8A72432A82D6D854AB229D270BE51DFD1
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2857267956.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2857247249.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008C7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E9000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000952000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000960000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.000000000099B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2858280239.00000000009A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_avz.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: d17ffc1b7c175c9f3f133bcf490b3ef334a0cf6f2a578ee1034f9dfeca47056c
                                                        • Instruction ID: 9c2adda681bae308b16cda7bcb35e3e1c7b0fb4e491055bf19dcf38a0b2ed589
                                                        • Opcode Fuzzy Hash: d17ffc1b7c175c9f3f133bcf490b3ef334a0cf6f2a578ee1034f9dfeca47056c
                                                        • Instruction Fuzzy Hash: 2801D632B043114B870CDD3EDDD952AB6D3ABC8910F09C73E9589C72C4DD318C1AC286
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • GetModuleHandleW.KERNEL32(oleaut32.dll), ref: 0043080D
                                                          • Part of subcall function 004307D8: GetProcAddress.KERNEL32(00000000), ref: 004307F1
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2857267956.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2857247249.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008C7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E9000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000952000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000960000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.000000000099B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2858280239.00000000009A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_avz.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: AddressHandleModuleProc
                                                        • String ID: VarAdd$VarAnd$VarBoolFromStr$VarBstrFromBool$VarBstrFromCy$VarBstrFromDate$VarCmp$VarCyFromStr$VarDateFromStr$VarDiv$VarI4FromStr$VarIdiv$VarMod$VarMul$VarNeg$VarNot$VarOr$VarR4FromStr$VarR8FromStr$VarSub$VarXor$VariantChangeTypeEx$oleaut32.dll
                                                        • API String ID: 1646373207-1918263038
                                                        • Opcode ID: e0839a13ef9fe47684dd56df152b3b05aa7d9bef75fba41a3ad76975bab60dfe
                                                        • Instruction ID: 92727bea0c399d7e089baf32d9d5e319d72316314fc2ded378fb3a487a5c4fc3
                                                        • Opcode Fuzzy Hash: e0839a13ef9fe47684dd56df152b3b05aa7d9bef75fba41a3ad76975bab60dfe
                                                        • Instruction Fuzzy Hash: 0B41FA616483085B53847B6E786182A77E8E75C714FA0E33BF5049AEA5DB38BC418E2D
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • LoadLibraryW.KERNEL32(PSAPI.dll,?,00416EC9), ref: 004169CC
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2857267956.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2857247249.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008C7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E9000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000952000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000960000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.000000000099B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2858280239.00000000009A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_avz.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: LibraryLoad
                                                        • String ID: EmptyWorkingSet$EnumDeviceDrivers$EnumProcessModules$EnumProcesses$GetDeviceDriverBaseNameA$GetDeviceDriverBaseNameW$GetDeviceDriverFileNameA$GetDeviceDriverFileNameW$GetMappedFileNameA$GetMappedFileNameW$GetModuleBaseNameA$GetModuleBaseNameW$GetModuleFileNameExA$GetModuleFileNameExW$GetModuleInformation$GetProcessMemoryInfo$InitializeProcessForWsWatch$PSAPI.dll$QueryWorkingSet
                                                        • API String ID: 1029625771-2267155864
                                                        • Opcode ID: 3b17d900d9fb32b61366c26caae8728510ed44753c1ef3421e4c8f10743df750
                                                        • Instruction ID: dafbba327100e23e13b9bce306479ad729c29725f9fa77da75123b8140bb5cb0
                                                        • Opcode Fuzzy Hash: 3b17d900d9fb32b61366c26caae8728510ed44753c1ef3421e4c8f10743df750
                                                        • Instruction Fuzzy Hash: F34101B0A40A50ABDF00EBA9D886FA637B8FB59305751066AB400CF264D77CE8C18B5D
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • FindWindowW.USER32(MouseZ,Magellan MSWHEEL), ref: 00415F28
                                                        • RegisterClipboardFormatW.USER32(MSWHEEL_ROLLMSG), ref: 00415F34
                                                        • RegisterClipboardFormatW.USER32(MSH_WHEELSUPPORT_MSG), ref: 00415F43
                                                        • RegisterClipboardFormatW.USER32(MSH_SCROLL_LINES_MSG), ref: 00415F4F
                                                        • SendMessageW.USER32(00000000,00000000,00000000,00000000), ref: 00415F67
                                                        • SendMessageW.USER32(00000000,?,00000000,00000000), ref: 00415F8B
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2857267956.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2857247249.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008C7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E9000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000952000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000960000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.000000000099B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2858280239.00000000009A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_avz.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: ClipboardFormatRegister$MessageSend$FindWindow
                                                        • String ID: MSH_SCROLL_LINES_MSG$MSH_WHEELSUPPORT_MSG$MSWHEEL_ROLLMSG$Magellan MSWHEEL$MouseZ
                                                        • API String ID: 1416857345-3736581797
                                                        • Opcode ID: 1aa6db04791840d1f838eaca6eb156c58cb8deeae8a85bebaaa1482f2d7939e1
                                                        • Instruction ID: fbfa7c2c10157cbc6459837c8ee6b7d3063f3ad165bdc784deb74b8f7a3f5c78
                                                        • Opcode Fuzzy Hash: 1aa6db04791840d1f838eaca6eb156c58cb8deeae8a85bebaaa1482f2d7939e1
                                                        • Instruction Fuzzy Hash: E5111F70204701EFE3159F65C842BEBBBA8EF85754F60402AF8449B285E6B89D818B98
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • IsValidLocale.KERNEL32(?,00000001,00000000,0042A135,?,?,?,?,00000000,00000000), ref: 00429E77
                                                        • GetThreadLocale.KERNEL32(?,00000001,00000000,0042A135,?,?,?,?,00000000,00000000), ref: 00429E80
                                                          • Part of subcall function 00429E24: GetLocaleInfoW.KERNEL32(?,0000000F,?,00000002,0000002C,?,?,?,00429F26,?,00000001,00000000,0042A135), ref: 00429E37
                                                          • Part of subcall function 00429DD8: GetLocaleInfoW.KERNEL32(?,?,?,00000100), ref: 00429DF6
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2857267956.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2857247249.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008C7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E9000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000952000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000960000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.000000000099B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2858280239.00000000009A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_avz.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Locale$Info$ThreadValid
                                                        • String ID: AMPM$2$:mm$:mm:ss$AMPM $m/d/yy$mmmm d, yyyy
                                                        • API String ID: 233154393-3379564615
                                                        • Opcode ID: 1ee8cf7d1d2100117b1e952d746c51a6bc7536ec43c56e5ee8175d076dabd0e5
                                                        • Instruction ID: de098bb62cddf8eeaab23ab6c58694bf9fc9945ba54a5f45fc28193c39012481
                                                        • Opcode Fuzzy Hash: 1ee8cf7d1d2100117b1e952d746c51a6bc7536ec43c56e5ee8175d076dabd0e5
                                                        • Instruction Fuzzy Hash: AF7132317101289BDB01EBA5E841BDF72AADF44704F94807BF904AB346DA3CDE16976E
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                          • Part of subcall function 00409448: GetTickCount.KERNEL32 ref: 0040947F
                                                          • Part of subcall function 00409448: GetTickCount.KERNEL32 ref: 00409497
                                                          • Part of subcall function 00429DD8: GetLocaleInfoW.KERNEL32(?,?,?,00000100), ref: 00429DF6
                                                        • GetThreadLocale.KERNEL32(00000000,00000004), ref: 0042A61C
                                                        • EnumCalendarInfoW.KERNEL32(0042A448,00000000,00000000,00000004), ref: 0042A627
                                                        • GetThreadLocale.KERNEL32(00000000,00000003,0042A448,00000000,00000000,00000004), ref: 0042A662
                                                        • EnumCalendarInfoW.KERNEL32(0042A4EC,00000000,00000000,00000003,0042A448,00000000,00000000,00000004), ref: 0042A66D
                                                        • GetThreadLocale.KERNEL32(00000000,00000004), ref: 0042A6FE
                                                        • EnumCalendarInfoW.KERNEL32(0042A448,00000000,00000000,00000004), ref: 0042A709
                                                        • GetThreadLocale.KERNEL32(00000000,00000003,0042A448,00000000,00000000,00000004), ref: 0042A746
                                                        • EnumCalendarInfoW.KERNEL32(0042A4EC,00000000,00000000,00000003,0042A448,00000000,00000000,00000004), ref: 0042A751
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2857267956.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2857247249.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008C7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E9000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000952000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000960000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.000000000099B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2858280239.00000000009A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_avz.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: InfoLocale$CalendarEnumThread$CountTick
                                                        • String ID: B.C.
                                                        • API String ID: 1601775584-621294921
                                                        • Opcode ID: ed2633bfbf01954b83452c2ae3521b02fcae5d245beea307e078fed541a42bf1
                                                        • Instruction ID: 7b532adcd31deb5feb0d66c23733b9de51a913cecd74f929d691c27f48c900b8
                                                        • Opcode Fuzzy Hash: ed2633bfbf01954b83452c2ae3521b02fcae5d245beea307e078fed541a42bf1
                                                        • Instruction Fuzzy Hash: 6461A274B006108FDB10EF69D885E9A77B5FB88314B90857AEC00D73A1C738ED91CB99
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 00432E09
                                                        • SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 00432E25
                                                        • SafeArrayCreate.OLEAUT32(0000000C,?,?), ref: 00432E5E
                                                        • SafeArrayPtrOfIndex.OLEAUT32(?,?,?), ref: 00432EDB
                                                        • SafeArrayPtrOfIndex.OLEAUT32(00000000,?,?), ref: 00432EF4
                                                        • VariantCopy.OLEAUT32(?), ref: 00432F29
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2857267956.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2857247249.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008C7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E9000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000952000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000960000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.000000000099B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2858280239.00000000009A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_avz.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: ArraySafe$BoundIndex$CopyCreateVariant
                                                        • String ID:
                                                        • API String ID: 351091851-3916222277
                                                        • Opcode ID: a88f8c186627226a8bb89a534aa3a27678cbc0ad8fea231a65c47542f7067d81
                                                        • Instruction ID: 4ec420417957f98377c31f631acc3d5e9fbeafff5ff5c0a360f7f9dd5ce58477
                                                        • Opcode Fuzzy Hash: a88f8c186627226a8bb89a534aa3a27678cbc0ad8fea231a65c47542f7067d81
                                                        • Instruction Fuzzy Hash: 7D5100759006299BCB21DB59DD91BDAB3BCBF0C314F0051DAF909E7202D678AF818F64
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • VirtualQuery.KERNEL32(?,?,0000001C,00000000,0042B76A), ref: 0042B604
                                                        • GetModuleFileNameW.KERNEL32(?,?,00000105,?,?,0000001C,00000000,0042B76A), ref: 0042B630
                                                          • Part of subcall function 00410254: LoadStringW.USER32(00000000,00010000,?,00001000), ref: 00410299
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2857267956.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2857247249.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008C7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E9000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000952000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000960000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.000000000099B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2858280239.00000000009A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_avz.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: FileLoadModuleNameQueryStringVirtual
                                                        • String ID: gA$(gA$(hA$0gA$8gA
                                                        • API String ID: 902310565-2315461067
                                                        • Opcode ID: aa4007e2ac4df262029a5b5b3c5ebc1777ff6d8d55acbb50982d19775eae0fa7
                                                        • Instruction ID: c20b52338d199a289a12ca4b603f57bff3eb28f55eb7dd03666e4b5dd3f0ee9f
                                                        • Opcode Fuzzy Hash: aa4007e2ac4df262029a5b5b3c5ebc1777ff6d8d55acbb50982d19775eae0fa7
                                                        • Instruction Fuzzy Hash: A651E734A04668DFDB50DF68DD89AD9B7F4EB48304F4041E6E808A7351D778AE84CF59
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • GetModuleHandleW.KERNEL32(kernel32.dll,GetLogicalProcessorInformation,00000000), ref: 004091F6
                                                        • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 004091FC
                                                        • GetLogicalProcessorInformation.KERNEL32(00000000,00000000,GetLogicalProcessorInformation,00000000), ref: 0040920F
                                                        • GetLastError.KERNEL32(00000000,00000000,GetLogicalProcessorInformation,00000000), ref: 00409218
                                                        • GetLogicalProcessorInformation.KERNEL32(00000000,00000000,00000000,0040928C,?,00000000,00000000,GetLogicalProcessorInformation,00000000), ref: 00409243
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2857267956.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2857247249.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008C7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E9000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000952000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000960000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.000000000099B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2858280239.00000000009A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_avz.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: InformationLogicalProcessor$AddressErrorHandleLastModuleProc
                                                        • String ID: GetLogicalProcessorInformation$kernel32.dll
                                                        • API String ID: 1184211438-812649623
                                                        • Opcode ID: b5b5ef7ece3e5db104d06d6a461812be039b62a027b790defb21eca3e90c2c69
                                                        • Instruction ID: 1748b76f01d1b7f4fa5c93cc10198c5b6f48fdbdd5d7321f97b5cbe42bf4362f
                                                        • Opcode Fuzzy Hash: b5b5ef7ece3e5db104d06d6a461812be039b62a027b790defb21eca3e90c2c69
                                                        • Instruction Fuzzy Hash: 64117271D08604BEEB10EBA5D842B9EB7A8DB40314F2049BFE404B65C3D67D9D808619
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • Sleep.KERNEL32(00000000,?,?,00000000,00405BD8), ref: 00405FFE
                                                        • Sleep.KERNEL32(0000000A,00000000,?,?,00000000,00405BD8), ref: 00406018
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2857267956.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2857247249.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008C7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E9000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000952000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000960000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.000000000099B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2858280239.00000000009A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_avz.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Sleep
                                                        • String ID:
                                                        • API String ID: 3472027048-0
                                                        • Opcode ID: 3d12017965c1e6ec3bb7374744ea864a06a5e0024714f769dd9334216f0e0332
                                                        • Instruction ID: 9151ffcba9cb40bf2fae9799633bdcc14248b04464888a796b8d01ff3c8e85bd
                                                        • Opcode Fuzzy Hash: 3d12017965c1e6ec3bb7374744ea864a06a5e0024714f769dd9334216f0e0332
                                                        • Instruction Fuzzy Hash: 70710331244A109FE725CB29CD84B17BBE5EB45324F14C27FE849AB3D2D6788841CF59
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                          • Part of subcall function 0042AC64: VirtualQuery.KERNEL32(?,?,0000001C,00000000,0042AE10), ref: 0042AC97
                                                          • Part of subcall function 0042AC64: GetModuleFileNameW.KERNEL32(?,?,00000105), ref: 0042ACBB
                                                          • Part of subcall function 0042AC64: GetModuleFileNameW.KERNEL32(MZP,?,00000105), ref: 0042ACD6
                                                          • Part of subcall function 0042AC64: LoadStringW.USER32(00000000,0000FFEF,?,00000100), ref: 0042AD71
                                                        • WideCharToMultiByte.KERNEL32(00000001,00000000,?,00000000,00000000,00000000,00000000,00000000,00000400,00000000,0042AF81), ref: 0042AEBD
                                                        • WideCharToMultiByte.KERNEL32(00000001,00000000,?,00000000,?,00000000,00000000,00000000), ref: 0042AEF0
                                                        • GetStdHandle.KERNEL32(000000F4,?,00000000,?,00000000,00000001,00000000,?,00000000,?,00000000,00000000,00000000), ref: 0042AF02
                                                        • WriteFile.KERNEL32(00000000,000000F4,?,00000000,?,00000000,00000001,00000000,?,00000000,?,00000000,00000000,00000000), ref: 0042AF08
                                                        • GetStdHandle.KERNEL32(000000F4,0042AF9C,00000002,?,00000000,00000000,000000F4,?,00000000,?,00000000,00000001,00000000,?,00000000,?), ref: 0042AF1C
                                                        • WriteFile.KERNEL32(00000000,000000F4,0042AF9C,00000002,?,00000000,00000000,000000F4,?,00000000,?,00000000,00000001,00000000,?,00000000), ref: 0042AF22
                                                        • LoadStringW.USER32(00000000,0000FFD0,?,00000040), ref: 0042AF46
                                                        • MessageBoxW.USER32(00000000,?,?,00002010), ref: 0042AF60
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2857267956.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2857247249.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008C7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E9000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000952000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000960000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.000000000099B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2858280239.00000000009A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_avz.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: File$ByteCharHandleLoadModuleMultiNameStringWideWrite$MessageQueryVirtual
                                                        • String ID:
                                                        • API String ID: 135118572-0
                                                        • Opcode ID: b09159c0806e6ff97a796ec39832f3a121be48d1c476e2ccab17963672d8f62d
                                                        • Instruction ID: 0d96ae8e9d09ebb0fb24c4c868295916678d77c4f245c56f45ea8f186dc1020f
                                                        • Opcode Fuzzy Hash: b09159c0806e6ff97a796ec39832f3a121be48d1c476e2ccab17963672d8f62d
                                                        • Instruction Fuzzy Hash: A73188B1744218BFEB10E795EC82FDA73ACEB44704F904166BA04E71D1DEB87E848769
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2857267956.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2857247249.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008C7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E9000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000952000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000960000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.000000000099B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2858280239.00000000009A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_avz.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: af5fee4053ccfd8eda4222657e49ae256434644a39e4506ff90d3e4f52558343
                                                        • Instruction ID: e4bb5e60ae9d8a74cb8e59fb61834b0517264fe028697c87ef6dc4da0fb2cfcf
                                                        • Opcode Fuzzy Hash: af5fee4053ccfd8eda4222657e49ae256434644a39e4506ff90d3e4f52558343
                                                        • Instruction Fuzzy Hash: 65C14272710A010BD714AA7D9C8476FB692DBC4324F29823FE605EB3D6DA7CEC418B58
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                          • Part of subcall function 004098BC: GetCurrentThreadId.KERNEL32 ref: 004098BF
                                                        • GetTickCount.KERNEL32 ref: 0040947F
                                                        • GetTickCount.KERNEL32 ref: 00409497
                                                        • GetCurrentThreadId.KERNEL32 ref: 004094C6
                                                        • GetTickCount.KERNEL32 ref: 004094F1
                                                        • GetTickCount.KERNEL32 ref: 00409528
                                                        • GetTickCount.KERNEL32 ref: 00409552
                                                        • GetCurrentThreadId.KERNEL32 ref: 004095C2
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2857267956.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2857247249.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008C7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E9000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000952000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000960000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.000000000099B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2858280239.00000000009A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_avz.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: CountTick$CurrentThread
                                                        • String ID:
                                                        • API String ID: 3968769311-0
                                                        • Opcode ID: 45b437dbed47f981b5bbcfaaf90de7331bcc883f9fb90d2309538c648ee17df6
                                                        • Instruction ID: 4197c7784af8f999670a3dde22c005d51560284a8e20b89e315f358f9684a336
                                                        • Opcode Fuzzy Hash: 45b437dbed47f981b5bbcfaaf90de7331bcc883f9fb90d2309538c648ee17df6
                                                        • Instruction Fuzzy Hash: 1D41407160C7416ED722AE79C98435FBAD1AF80354F14893EE4D8973C3EA798C81875A
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • GetStdHandle.KERNEL32(000000F5,Runtime error at 00000000,0000001D,?,00000000,?,0040A4E6,?,?,?,?,0040A5FA,00407203,0040724A,?,?), ref: 0040A461
                                                        • WriteFile.KERNEL32(00000000,000000F5,Runtime error at 00000000,0000001D,?,00000000,?,0040A4E6,?,?,?,?,0040A5FA,00407203,0040724A,?), ref: 0040A467
                                                        • GetStdHandle.KERNEL32(000000F5,00000000,00000002,?,00000000,00000000,000000F5,Runtime error at 00000000,0000001D,?,00000000,?,0040A4E6,?,?,?), ref: 0040A482
                                                        • WriteFile.KERNEL32(00000000,000000F5,00000000,00000002,?,00000000,00000000,000000F5,Runtime error at 00000000,0000001D,?,00000000,?,0040A4E6), ref: 0040A488
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2857267956.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2857247249.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008C7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E9000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000952000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000960000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.000000000099B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2858280239.00000000009A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_avz.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: FileHandleWrite
                                                        • String ID: Error$Runtime error at 00000000
                                                        • API String ID: 3320372497-2970929446
                                                        • Opcode ID: a5c2b3ef274f10e101e72884be1022945b687b6694a4f5241685cc9f5443053d
                                                        • Instruction ID: 8a2e0f98f1cb10d7845291bb527a883e0b6e36b5f05b7f91f10e3923a5105889
                                                        • Opcode Fuzzy Hash: a5c2b3ef274f10e101e72884be1022945b687b6694a4f5241685cc9f5443053d
                                                        • Instruction Fuzzy Hash: 74F0625168478478EA10B3B55C0AF6B3618F744B25F54477FB620B82E2CAFC48848B6A
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • GetFileSize.KERNEL32(?,?,00000000,00422F11), ref: 00422D31
                                                        • CreateFileMappingW.KERNEL32(?,00000000,00000002,00000000,00000001,00000000,?,?,00000000,00422F11), ref: 00422DC7
                                                        • MapViewOfFile.KERNEL32(000003EE,00000004,00000000,00000000,00000001,00000000,00422EA0,?,?,00000000,00000002,00000000,00000001,00000000,?,?), ref: 00422DF6
                                                        • GetCurrentProcess.KERNEL32(00000104,00000000,00422E82,?,000003EE,00000004,00000000,00000000,00000001,00000000,00422EA0,?,?,00000000,00000002,00000000), ref: 00422E1B
                                                        • UnmapViewOfFile.KERNEL32(00000000,00422E89,000003EE,00000004,00000000,00000000,00000001,00000000,00422EA0,?,?,00000000,00000002,00000000,00000001,00000000), ref: 00422E7C
                                                          • Part of subcall function 00422AAC: GetLogicalDriveStringsW.KERNEL32(00000104,?,00000000,00422BDA), ref: 00422AE9
                                                          • Part of subcall function 00422AAC: QueryDosDeviceW.KERNEL32(?,?,00000104,00000104,?,00000000,00422BDA), ref: 00422B13
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2857267956.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2857247249.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008C7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E9000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000952000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000960000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.000000000099B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2858280239.00000000009A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_avz.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: File$View$CreateCurrentDeviceDriveLogicalMappingProcessQuerySizeStringsUnmap
                                                        • String ID:
                                                        • API String ID: 435433801-0
                                                        • Opcode ID: ad4652ba22eff28cab9b011fb52d156467f253577bc146de9d54660df817ed2e
                                                        • Instruction ID: 5a254778e1851bdcbdf599d1b6fa6e3d011a768260e796bad8529f9734c59cc4
                                                        • Opcode Fuzzy Hash: ad4652ba22eff28cab9b011fb52d156467f253577bc146de9d54660df817ed2e
                                                        • Instruction Fuzzy Hash: 93517230A00219BFDB20EFA5DD95BDEB7B5EB48304F9044AAE504A7290D7B85E81CB58
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • GetStdHandle.KERNEL32(000000F4,00405618,00000000,?,00000000,?,?,00000000,00406E45), ref: 004064CE
                                                        • WriteFile.KERNEL32(00000000,000000F4,00405618,00000000,?,00000000,?,?,00000000,00406E45), ref: 004064D4
                                                        • GetStdHandle.KERNEL32(000000F4,00405614,00000000,?,00000000,00000000,000000F4,00405618,00000000,?,00000000,?,?,00000000,00406E45), ref: 004064F3
                                                        • WriteFile.KERNEL32(00000000,000000F4,00405614,00000000,?,00000000,00000000,000000F4,00405618,00000000,?,00000000,?,?,00000000,00406E45), ref: 004064F9
                                                        • GetStdHandle.KERNEL32(000000F4,?,00000000,?,00000000,00000000,000000F4,00405614,00000000,?,00000000,00000000,000000F4,00405618,00000000,?), ref: 00406510
                                                        • WriteFile.KERNEL32(00000000,000000F4,?,00000000,?,00000000,00000000,000000F4,00405614,00000000,?,00000000,00000000,000000F4,00405618,00000000), ref: 00406516
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2857267956.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2857247249.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008C7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E9000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000952000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000960000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.000000000099B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2858280239.00000000009A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_avz.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: FileHandleWrite
                                                        • String ID:
                                                        • API String ID: 3320372497-0
                                                        • Opcode ID: 3dc040826da280c7b9392c470598f39269d0a841bb0d5035c6e1c5611a8b6961
                                                        • Instruction ID: 2a8ba324e91a7e7a8d1e7623cdd631929826dbf6519b3623dff416626cd046b0
                                                        • Opcode Fuzzy Hash: 3dc040826da280c7b9392c470598f39269d0a841bb0d5035c6e1c5611a8b6961
                                                        • Instruction Fuzzy Hash: C90144A1248B103EE501F7BA9C86FAB268CDF4972DF51063B7118F60D2C5788D548FBA
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • Sleep.KERNEL32(00000000,FFFFFFDC,00405BB0), ref: 00405C9B
                                                        • Sleep.KERNEL32(0000000A,00000000,FFFFFFDC,00405BB0), ref: 00405CB1
                                                        • Sleep.KERNEL32(00000000,?,?,FFFFFFDC,00405BB0), ref: 00405CDF
                                                        • Sleep.KERNEL32(0000000A,00000000,?,?,FFFFFFDC,00405BB0), ref: 00405CF5
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2857267956.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2857247249.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008C7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E9000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000952000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000960000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.000000000099B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2858280239.00000000009A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_avz.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Sleep
                                                        • String ID:
                                                        • API String ID: 3472027048-0
                                                        • Opcode ID: fd9e149fc077c62ac1cb0d2a52850570bd8223e1c6952a906501d14ae0c51be4
                                                        • Instruction ID: 73b3eeebb6945c8d2749b15a811edb9c3e4d553475b65aec9881030c5ef190ba
                                                        • Opcode Fuzzy Hash: fd9e149fc077c62ac1cb0d2a52850570bd8223e1c6952a906501d14ae0c51be4
                                                        • Instruction Fuzzy Hash: 56C12072604B618BDB25CF29E884B17BBA1FB85310F1882BFD445AB3D5C7789941CF98
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • VirtualQuery.KERNEL32(?,?,0000001C,00000000,0042AE10), ref: 0042AC97
                                                        • GetModuleFileNameW.KERNEL32(?,?,00000105), ref: 0042ACBB
                                                        • GetModuleFileNameW.KERNEL32(MZP,?,00000105), ref: 0042ACD6
                                                        • LoadStringW.USER32(00000000,0000FFEF,?,00000100), ref: 0042AD71
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2857267956.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2857247249.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008C7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E9000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000952000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000960000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.000000000099B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2858280239.00000000009A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_avz.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: FileModuleName$LoadQueryStringVirtual
                                                        • String ID: MZP
                                                        • API String ID: 3990497365-2889622443
                                                        • Opcode ID: ba77518689330cb1b0535cf0a7d48155ff414153aaea9229868a9b2700b7f7a0
                                                        • Instruction ID: ae8db52867a6f02680e14c50f2ed2f4cf839cf6d740da82d911e2f87a05549bd
                                                        • Opcode Fuzzy Hash: ba77518689330cb1b0535cf0a7d48155ff414153aaea9229868a9b2700b7f7a0
                                                        • Instruction Fuzzy Hash: E5415270A002689FDB20DF55DD81BD9B7F9AB88304F8040EAE908E7251D7799EA4CF19
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2857267956.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2857247249.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008C7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E9000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000952000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000960000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.000000000099B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2858280239.00000000009A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_avz.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 64b76a4bdee36c4afcba397b63e3570457c9e699ab127eb2a4a91cf48366803d
                                                        • Instruction ID: 71429c688a4c31f75ba805e4d2a083748cfbcbec8ea10e1a626119188e79f16b
                                                        • Opcode Fuzzy Hash: 64b76a4bdee36c4afcba397b63e3570457c9e699ab127eb2a4a91cf48366803d
                                                        • Instruction Fuzzy Hash: 2ED1BE35A04149AFCF00EFA5C4818FEBBB9FF4D314F5450A6E840A7351E638AE55CB6A
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2857267956.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2857247249.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008C7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E9000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000952000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000960000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.000000000099B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2858280239.00000000009A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_avz.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: InitVariant
                                                        • String ID:
                                                        • API String ID: 1927566239-0
                                                        • Opcode ID: 1a5ef56cd7e7e4459cd6da983dfe7ef76dd614a8f874364c6a0c4c4a86e3860d
                                                        • Instruction ID: 3b33c8a4d625262ce05aac053ee8e330884a6e6640a5839ce2bf0caaaa85649f
                                                        • Opcode Fuzzy Hash: 1a5ef56cd7e7e4459cd6da983dfe7ef76dd614a8f874364c6a0c4c4a86e3860d
                                                        • Instruction Fuzzy Hash: 7EB12775A00209EFCB04EF95C5818EDB7B4EF4D714F9064AAF900A7251DB38AE85DB68
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • GetCurrentThreadId.KERNEL32 ref: 0040A4F6
                                                        • FreeLibrary.KERNEL32(00400000,?,?,?,?,0040A5FA,00407203,0040724A,?,?,00407263,?,?,?,?,00461CE6), ref: 0040A594
                                                        • ExitProcess.KERNEL32(00000000,?,?,?,?,0040A5FA,00407203,0040724A,?,?,00407263,?,?,?,?,00461CE6), ref: 0040A5CD
                                                          • Part of subcall function 0040A428: GetStdHandle.KERNEL32(000000F5,Runtime error at 00000000,0000001D,?,00000000,?,0040A4E6,?,?,?,?,0040A5FA,00407203,0040724A,?,?), ref: 0040A461
                                                          • Part of subcall function 0040A428: WriteFile.KERNEL32(00000000,000000F5,Runtime error at 00000000,0000001D,?,00000000,?,0040A4E6,?,?,?,?,0040A5FA,00407203,0040724A,?), ref: 0040A467
                                                          • Part of subcall function 0040A428: GetStdHandle.KERNEL32(000000F5,00000000,00000002,?,00000000,00000000,000000F5,Runtime error at 00000000,0000001D,?,00000000,?,0040A4E6,?,?,?), ref: 0040A482
                                                          • Part of subcall function 0040A428: WriteFile.KERNEL32(00000000,000000F5,00000000,00000002,?,00000000,00000000,000000F5,Runtime error at 00000000,0000001D,?,00000000,?,0040A4E6), ref: 0040A488
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2857267956.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2857247249.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008C7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E9000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000952000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000960000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.000000000099B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2858280239.00000000009A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_avz.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: FileHandleWrite$CurrentExitFreeLibraryProcessThread
                                                        • String ID: @3B
                                                        • API String ID: 3490077880-3814855006
                                                        • Opcode ID: d7a5be3b1cd6048d197d4fe152a8bda805781fe9892db142f3eab9669dbd1bde
                                                        • Instruction ID: 5d1d9798a3a686d6ed063720b418eab16085fba7c731d977bf47d82cfd733821
                                                        • Opcode Fuzzy Hash: d7a5be3b1cd6048d197d4fe152a8bda805781fe9892db142f3eab9669dbd1bde
                                                        • Instruction Fuzzy Hash: E331AD70600740ABDB30ABB6884871B76E0BB08318F18443FE405AB2D1D77CDCA4C71B
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • GetThreadLocale.KERNEL32(00000004,?,00000000,?,00000200,00000000,00428657), ref: 004285FA
                                                        • GetDateFormatW.KERNEL32(00000000,00000004,?,00000000,?,00000200,00000000,00428657), ref: 00428600
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2857267956.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2857247249.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008C7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E9000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000952000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000960000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.000000000099B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2858280239.00000000009A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_avz.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: DateFormatLocaleThread
                                                        • String ID: $yyyy
                                                        • API String ID: 3303714858-404527807
                                                        • Opcode ID: 4f1f99426b1af829e2c909c2451d964a6fb8680ff718a23145411cafab76a871
                                                        • Instruction ID: 6637f5fd66acc0210661637f80b1713101e3411e92d846e5cdc835b8e1ef0f6c
                                                        • Opcode Fuzzy Hash: 4f1f99426b1af829e2c909c2451d964a6fb8680ff718a23145411cafab76a871
                                                        • Instruction Fuzzy Hash: E02165356016289BDB11DF95D841AAEB3F8EF08700F5144ABFC04E7381DB389E54C7A9
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • LoadLibraryW.KERNEL32(hhctrl.ocx,00416111), ref: 00416066
                                                          • Part of subcall function 00414F7C: GetProcAddress.KERNEL32(004427A8,?), ref: 00414FA0
                                                          • Part of subcall function 00414F7C: GetProcAddress.KERNEL32(004427A8,00000000), ref: 00414FC2
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2857267956.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2857247249.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008C7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E9000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000952000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000960000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.000000000099B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2858280239.00000000009A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_avz.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: AddressProc$LibraryLoad
                                                        • String ID: HtmlHelpA$HtmlHelpW$hhctrl.ocx
                                                        • API String ID: 2238633743-2872279806
                                                        • Opcode ID: 423fae1a5712db9c4d01cb5542911d204a440723cb33bc678aaa6d1a26fd76b2
                                                        • Instruction ID: d61c27442857f174904f1baba1beb4b108deb7937cca62d30b80dfa8185e3ce6
                                                        • Opcode Fuzzy Hash: 423fae1a5712db9c4d01cb5542911d204a440723cb33bc678aaa6d1a26fd76b2
                                                        • Instruction Fuzzy Hash: 60F09274540B109EDF15DB65E859BD63AB6B35C705FA2442AE000862A0D7BDB5C4CB09
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • GetFileAttributesExW.KERNEL32(00000000,00000000,?,00000000,00424CF2), ref: 00424BFA
                                                        • GetFileAttributesExW.KERNEL32(00000000,00000000,?,00000000,00000000,?,00000000,00424CF2), ref: 00424C5D
                                                        • GetLastError.KERNEL32(00000000,00000000,?,00000000,00424CF2), ref: 00424C6C
                                                        • FileTimeToLocalFileTime.KERNEL32(?,?,00000000,00000000,?,00000000,00424CF2), ref: 00424CB5
                                                          • Part of subcall function 00422F24: GetFileAttributesW.KERNEL32(00000000), ref: 00422F71
                                                          • Part of subcall function 00422F24: CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000,00000000), ref: 00422FA3
                                                          • Part of subcall function 00422F24: CloseHandle.KERNEL32(000000FF,00422FEC,00000000,80000000,00000001,00000000,00000003,00000000,00000000,00000000), ref: 00422FDF
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2857267956.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2857247249.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008C7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E9000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000952000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000960000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.000000000099B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2858280239.00000000009A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_avz.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: File$Attributes$Time$CloseCreateErrorHandleLastLocal
                                                        • String ID:
                                                        • API String ID: 3059364927-0
                                                        • Opcode ID: 5e7c79930a72b09e5ff77fc31b3e36cc653edefa963234aef69869e02b34d4e2
                                                        • Instruction ID: d33ed64edae41702e397e581a60024facf28ab7922bf400e91a9c9f08f4d251c
                                                        • Opcode Fuzzy Hash: 5e7c79930a72b09e5ff77fc31b3e36cc653edefa963234aef69869e02b34d4e2
                                                        • Instruction Fuzzy Hash: E131A871E01229ABCB10EFEAD981BAEB7B9EF84304F524567F800E3341D7389E059658
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • GetThreadUILanguage.KERNEL32(?,00000000), ref: 0040DEFD
                                                        • SetThreadPreferredUILanguages.KERNEL32(00000004,?,?), ref: 0040DF5B
                                                        • SetThreadPreferredUILanguages.KERNEL32(00000000,00000000,?), ref: 0040DFB8
                                                        • SetThreadPreferredUILanguages.KERNEL32(00000008,?,?), ref: 0040DFEB
                                                          • Part of subcall function 0040DEA8: GetThreadPreferredUILanguages.KERNEL32(00000038,?,00000000,?,?,00000000,?,?,0040DF69), ref: 0040DEBF
                                                          • Part of subcall function 0040DEA8: GetThreadPreferredUILanguages.KERNEL32(00000038,?,00000000,?,?,?,0040DF69), ref: 0040DEDC
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2857267956.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2857247249.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008C7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E9000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000952000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000960000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.000000000099B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2858280239.00000000009A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_avz.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Thread$LanguagesPreferred$Language
                                                        • String ID:
                                                        • API String ID: 2255706666-0
                                                        • Opcode ID: 15ae0c7a0683f35f4954645567adbb561c3980bc8151f8db019a494b3132f1ec
                                                        • Instruction ID: ed53143e23c3fe3e570e85c1ff96fbf00cdd0e2ebef1580dbd30679384d2b5a9
                                                        • Opcode Fuzzy Hash: 15ae0c7a0683f35f4954645567adbb561c3980bc8151f8db019a494b3132f1ec
                                                        • Instruction Fuzzy Hash: 53316370E0021A9BCB10DBE9C895AAEB3B8FF58314F004576E511FB2D1D7789D49CB95
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • DosDateTimeToFileTime.KERNEL32(?,?,?), ref: 004250CD
                                                        • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 004250DE
                                                        • SetFileTime.KERNEL32(?,00000000,00000000,?), ref: 004250FA
                                                        • GetLastError.KERNEL32(?,00000000,00000000,?), ref: 00425103
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2857267956.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2857247249.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008C7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E9000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000952000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000960000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.000000000099B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2858280239.00000000009A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_avz.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Time$File$DateErrorLastLocal
                                                        • String ID:
                                                        • API String ID: 4098483309-0
                                                        • Opcode ID: 730b44dcf02f7a47d28b967bc5d2fb3c5397017f6f4bed316b92bd236c1fc5e5
                                                        • Instruction ID: 104ce1d5c36ce0db7031dab684c0c83d281e793dc59dbf0bc52fdb779c7bd7f3
                                                        • Opcode Fuzzy Hash: 730b44dcf02f7a47d28b967bc5d2fb3c5397017f6f4bed316b92bd236c1fc5e5
                                                        • Instruction Fuzzy Hash: 64F04F72A006197ACB10DAE95C81BFFB3EC9B48345F504167B900E2281F678DA0483A9
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                          • Part of subcall function 00424E30: GetFileAttributesW.KERNEL32(00000000,?,?,?,?,?,0042493D), ref: 00424E46
                                                        • GetVolumeInformationW.KERNEL32(00000000,?,00000104,00000104,?,?,00000104,00000104), ref: 00424990
                                                        • GetDriveTypeW.KERNEL32(00000000,00000000,?,00000104,00000104,?), ref: 004249B5
                                                          • Part of subcall function 00424D98: GetFileAttributesW.KERNEL32(00000000,?,?,?,00422F52), ref: 00424DA9
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2857267956.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2857247249.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008C7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E9000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000952000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000960000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.000000000099B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2858280239.00000000009A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_avz.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: AttributesFile$DriveInformationTypeVolume
                                                        • String ID: |HB
                                                        • API String ID: 2660071179-47754647
                                                        • Opcode ID: 59c1109705d04a2b68fe279d5e633c08280419d2b124c901f533439a887fabf5
                                                        • Instruction ID: 1d84b7afeaea9bcce400ccf02c52260b49ede79b3fdc239eada8d72e5af75229
                                                        • Opcode Fuzzy Hash: 59c1109705d04a2b68fe279d5e633c08280419d2b124c901f533439a887fabf5
                                                        • Instruction Fuzzy Hash: ED31ABB0B001285BDB11E7A5E842BEF77A4DF84308F850167E901A73D1D77C9E85D65D
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%

                                                        APIs
                                                        • GetModuleHandleW.KERNEL32(NTDLL.DLL,NtQueryObject), ref: 00422C0E
                                                          • Part of subcall function 00414F7C: GetProcAddress.KERNEL32(004427A8,?), ref: 00414FA0
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2857267956.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2857247249.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008C7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008DF000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.00000000008E9000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000952000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.0000000000960000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2857267956.000000000099B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2858280239.00000000009A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_avz.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: AddressHandleModuleProc
                                                        • String ID: NTDLL.DLL$NtQueryObject
                                                        • API String ID: 1646373207-3865875859
                                                        • Opcode ID: c7194e78d248e79cc6de978be01c56cbecd9f0151e5e89ad9617909cd235c3c3
                                                        • Instruction ID: 199557c96de0f5bba26cc897b3fa2e069fb6324f482ff4156a06a5118d166eb1
                                                        • Opcode Fuzzy Hash: c7194e78d248e79cc6de978be01c56cbecd9f0151e5e89ad9617909cd235c3c3
                                                        • Instruction Fuzzy Hash: DF118E71704614BFEB10EFA6EE82F9E73B8EB48714F604466F104E6290D6B8A9C0861C
                                                        Uniqueness

                                                        Uniqueness Score: -1.00%